CVE-2023-28231 Overview
CVE-2023-28231 is a critical remote code execution vulnerability affecting the DHCP Server Service in Microsoft Windows Server operating systems. This heap-based buffer overflow vulnerability (CWE-122) allows an attacker with adjacent network access to execute arbitrary code on affected DHCP servers without requiring authentication or user interaction.
The DHCP Server Service is a fundamental network infrastructure component responsible for dynamically assigning IP addresses and network configuration to clients. Successful exploitation of this vulnerability could allow an attacker to gain complete control over the affected server, potentially compromising the entire network infrastructure.
Critical Impact
An attacker on the adjacent network can execute arbitrary code with SYSTEM privileges on Windows DHCP servers, potentially compromising network infrastructure and enabling lateral movement across the organization.
Affected Products
- Microsoft Windows Server 2008 SP2
- Microsoft Windows Server 2008 R2 SP1 (x64)
- Microsoft Windows Server 2012
- Microsoft Windows Server 2012 R2
- Microsoft Windows Server 2016
- Microsoft Windows Server 2019
- Microsoft Windows Server 2022
Discovery Timeline
- 2023-04-11 - CVE-2023-28231 published to NVD
- 2024-11-21 - Last updated in NVD database
Technical Details for CVE-2023-28231
Vulnerability Analysis
This vulnerability resides in the Windows DHCP Server Service and is classified as a heap-based buffer overflow (CWE-122). The flaw exists in how the DHCP server processes specially crafted DHCP messages from clients on the local network segment.
The vulnerability requires adjacent network access, meaning the attacker must be positioned on the same network segment as the target DHCP server. While this limits the attack surface compared to internet-facing vulnerabilities, it remains a significant threat in enterprise environments where internal networks may contain untrusted or compromised devices.
No authentication or user interaction is required for exploitation, making this vulnerability particularly dangerous once an attacker has network adjacency. The potential impact spans confidentiality, integrity, and availability—successful exploitation grants the attacker complete control over the affected system.
With an EPSS score of 67.341% (98.531 percentile), this vulnerability is predicted to have a high probability of exploitation in the wild, underscoring the urgency of remediation.
Root Cause
The root cause of CVE-2023-28231 is a heap-based buffer overflow condition (CWE-122) in the DHCP Server Service. This occurs when the service fails to properly validate the size of incoming DHCP message data before copying it into a fixed-size heap buffer. When maliciously crafted DHCP packets containing oversized or malformed data fields are processed, the excess data overwrites adjacent heap memory, potentially corrupting control structures and enabling arbitrary code execution.
Attack Vector
The attack vector for this vulnerability is adjacent network access. An attacker must be on the same physical or logical network segment as the target DHCP server. The attack can be carried out by:
- Positioning on the same network segment as the vulnerable DHCP server
- Crafting malicious DHCP packets with oversized data fields designed to trigger the heap overflow
- Sending the malicious packets to the DHCP server on standard DHCP ports (UDP 67/68)
- The server processes the malformed packet, triggering the buffer overflow
- Carefully constructed payloads can achieve arbitrary code execution with SYSTEM privileges
Since DHCP services operate at the network layer without authentication, any device on the adjacent network can potentially exploit this vulnerability. This includes compromised endpoints, rogue devices, or attackers who have gained initial access to the network.
Detection Methods for CVE-2023-28231
Indicators of Compromise
- Anomalous DHCP traffic patterns, including unusually large DHCP packets or malformed DHCP options
- DHCP Server Service crashes or unexpected restarts on Windows Server systems
- Suspicious processes spawned by the DHCP Server Service (dhcpserver.dll)
- Unexpected memory allocation patterns or heap corruption errors in DHCP server logs
Detection Strategies
- Monitor DHCP server event logs for service crashes, errors, or restarts (Event IDs 1014, 1016, 1020)
- Deploy network intrusion detection systems (NIDS) with signatures for malformed DHCP packets
- Implement endpoint detection and response (EDR) solutions to monitor for suspicious child processes spawned by DHCP services
- Use SentinelOne Singularity to detect exploitation attempts through behavioral analysis of the DHCP Server Service
Monitoring Recommendations
- Enable verbose logging for DHCP Server Service and centralize logs for analysis
- Configure alerts for DHCP service failures or abnormal restart patterns
- Monitor network traffic for DHCP packets exceeding normal size thresholds
- Implement segmentation monitoring to detect unauthorized devices on DHCP server network segments
How to Mitigate CVE-2023-28231
Immediate Actions Required
- Apply the Microsoft security update for CVE-2023-28231 immediately on all affected Windows Server systems running DHCP services
- Inventory all DHCP servers in the environment to ensure complete patch coverage
- Implement network segmentation to restrict access to DHCP servers from untrusted network segments
- Review and harden DHCP server configurations following Microsoft security best practices
Patch Information
Microsoft has released security updates to address this vulnerability as part of the April 2023 Patch Tuesday release. Organizations should apply the appropriate update for their Windows Server version immediately.
For detailed patch information and download links, refer to the Microsoft Security Update Guide for CVE-2023-28231.
Workarounds
- If patching is not immediately possible, consider disabling the DHCP Server Service on affected systems until updates can be applied (note: this will disrupt DHCP services)
- Implement strict network segmentation to isolate DHCP servers from untrusted network segments
- Deploy network access control (NAC) solutions to prevent unauthorized devices from accessing DHCP server network segments
- Use firewall rules to restrict DHCP traffic to known, trusted network ranges where possible
# Verify DHCP Server Service status and patch level
# Check if DHCP Server role is installed
Get-WindowsFeature -Name DHCP
# Verify installed updates for CVE-2023-28231
Get-HotFix | Where-Object {$_.Description -eq "Security Update"}
# Monitor DHCP Server Service status
Get-Service -Name DHCPServer | Select-Object Status, StartType
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


