CVE-2023-35622 Overview
CVE-2023-35622 is a DNS Spoofing vulnerability affecting Microsoft Windows Server operating systems. This vulnerability allows attackers to spoof DNS responses, potentially redirecting network traffic to malicious destinations. The flaw exists in the Windows DNS implementation and can be exploited remotely without requiring authentication or user interaction.
Critical Impact
Successful exploitation allows attackers to manipulate DNS responses, enabling man-in-the-middle attacks, credential theft, and redirection of users to malicious sites without detection.
Affected Products
- Microsoft Windows Server 2008 SP2
- Microsoft Windows Server 2008 R2 SP1
- Microsoft Windows Server 2012
- Microsoft Windows Server 2012 R2
- Microsoft Windows Server 2016
- Microsoft Windows Server 2019
- Microsoft Windows Server 2022
- Microsoft Windows Server 2022 23H2
Discovery Timeline
- December 12, 2023 - CVE-2023-35622 published to NVD
- May 22, 2025 - Last updated in NVD database
Technical Details for CVE-2023-35622
Vulnerability Analysis
This DNS Spoofing vulnerability is categorized under CWE-290 (Authentication Bypass by Spoofing), indicating a weakness in the authentication mechanisms used to validate DNS responses. The vulnerability allows network-based attackers to inject spoofed DNS responses that are accepted as legitimate by affected Windows Server systems.
The attack can be executed from the network without requiring any privileges or user interaction. The primary impact is on the integrity of DNS resolution, meaning attackers can redirect traffic intended for legitimate destinations to attacker-controlled servers. While confidentiality and availability are not directly impacted, the integrity compromise can facilitate secondary attacks including credential harvesting, malware distribution, and data exfiltration.
Root Cause
The vulnerability stems from insufficient validation in the Windows DNS implementation, specifically related to authentication bypass through spoofing (CWE-290). The DNS service fails to properly verify the authenticity of certain DNS response packets, allowing attackers to inject malicious responses that are processed as legitimate.
Attack Vector
The attack is network-based and can be executed remotely. An attacker positioned on the network path between a DNS client and server, or capable of sending crafted packets to a vulnerable Windows Server, can inject spoofed DNS responses. The low attack complexity and lack of required privileges make this vulnerability particularly concerning for enterprise environments.
The exploitation flow involves:
- Attacker monitors or positions themselves to intercept DNS queries
- Attacker crafts malicious DNS responses with spoofed source information
- Vulnerable Windows Server accepts the spoofed response due to insufficient validation
- Subsequent DNS requests are resolved using the attacker's malicious data
For technical exploitation details, refer to the Microsoft Security Advisory.
Detection Methods for CVE-2023-35622
Indicators of Compromise
- Unexpected DNS response patterns or anomalous DNS traffic to Windows Server systems
- DNS cache entries pointing to suspicious or unexpected IP addresses
- Network traffic showing DNS responses from unauthorized sources
- Logs indicating DNS resolution to known malicious domains or IP addresses
Detection Strategies
- Monitor DNS query and response logs for anomalous patterns or mismatched transaction IDs
- Implement network intrusion detection signatures for DNS spoofing attack patterns
- Deploy SentinelOne Singularity Platform for real-time detection of DNS-based attacks and network anomalies
- Audit DNS cache contents periodically for unexpected or suspicious entries
Monitoring Recommendations
- Enable verbose DNS logging on Windows Server systems and forward logs to SIEM solutions
- Configure network monitoring to alert on DNS traffic anomalies including unusual response sizes or sources
- Implement DNSSEC validation where possible to detect spoofed responses
- Monitor for lateral movement attempts following potential DNS spoofing incidents
How to Mitigate CVE-2023-35622
Immediate Actions Required
- Apply the Microsoft security update for CVE-2023-35622 immediately on all affected Windows Server systems
- Review DNS server configurations and ensure they are hardened according to Microsoft best practices
- Implement network segmentation to limit exposure of DNS servers to untrusted networks
- Enable DNS logging and monitoring to detect potential exploitation attempts
Patch Information
Microsoft has released security updates to address this vulnerability. Organizations should apply the patches available through Windows Update or the Microsoft Update Catalog. Detailed patch information and download links are available in the Microsoft Security Response Center advisory.
Workarounds
- Implement DNSSEC to provide cryptographic validation of DNS responses
- Use DNS over HTTPS (DoH) or DNS over TLS (DoT) to encrypt DNS traffic where supported
- Restrict DNS server access to trusted network segments only
- Deploy network-level protections such as firewalls and intrusion prevention systems to filter malicious DNS traffic
# Enable DNS query logging on Windows Server for detection
# Run in elevated PowerShell
Set-DnsServerDiagnostics -All $true
Get-DnsServerDiagnostics
# Review DNS cache for suspicious entries
Get-DnsServerCache | Select-Object -Property HostName, RecordData
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


