CVE-2023-36401 Overview
CVE-2023-36401 is a Remote Code Execution vulnerability affecting the Microsoft Remote Registry Service across a wide range of Windows operating systems. This vulnerability allows an authenticated attacker with high privileges to execute arbitrary code on affected systems by exploiting weaknesses in the Remote Registry Service. The vulnerability stems from an integer overflow condition (CWE-190) that can be leveraged to achieve remote code execution when the Remote Registry Service is accessible over the network.
Critical Impact
Successful exploitation of this vulnerability enables an attacker with administrative privileges to execute arbitrary code remotely on affected Windows systems, potentially leading to complete system compromise, data exfiltration, and lateral movement within enterprise networks.
Affected Products
- Microsoft Windows 10 (versions 1507, 1607, 1809, 21H2, 22H2)
- Microsoft Windows 11 (versions 21H2, 22H2, 23H2)
- Microsoft Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016, 2019, 2022
Discovery Timeline
- November 14, 2023 - CVE-2023-36401 published to NVD
- November 21, 2024 - Last updated in NVD database
Technical Details for CVE-2023-36401
Vulnerability Analysis
This vulnerability exists within the Microsoft Remote Registry Service (RemoteRegistry), a Windows component that allows remote management of the Windows Registry. The flaw is classified as an Integer Overflow (CWE-190) vulnerability, which occurs when arithmetic operations produce values that exceed the maximum size that can be stored in the allocated integer type.
When exploited, this integer overflow can lead to memory corruption conditions that allow an attacker to manipulate program execution flow. The vulnerability requires the attacker to have network access to the target system and high-level privileges (administrative credentials), but does not require any user interaction to exploit. If successful, the attacker gains the ability to execute arbitrary code with the same privileges as the Remote Registry Service, typically running as SYSTEM.
Root Cause
The root cause of CVE-2023-36401 is an integer overflow condition in the Remote Registry Service. When processing certain registry-related requests, the service fails to properly validate the size of input data before performing arithmetic calculations. This can result in an integer wrapping to a smaller-than-expected value, leading to insufficient buffer allocation. Subsequent operations that use this undersized buffer can cause heap or stack corruption, creating an exploitable condition for remote code execution.
Attack Vector
The attack vector for this vulnerability is network-based, requiring the attacker to have network connectivity to the target system's Remote Registry Service. The exploitation flow involves:
- The attacker establishes a network connection to the target system where the Remote Registry Service is enabled and accessible
- Using valid high-privilege credentials (such as domain administrator), the attacker authenticates to the Remote Registry Service
- The attacker crafts and sends malicious registry requests containing values designed to trigger the integer overflow
- The overflow causes memory corruption within the service process
- Through careful manipulation of the corrupted memory state, the attacker achieves arbitrary code execution with SYSTEM privileges
The Remote Registry Service typically listens on dynamic RPC ports, with initial connections through the RPC Endpoint Mapper on port 135/TCP. Enterprise environments where this service is enabled for remote management are particularly at risk.
Detection Methods for CVE-2023-36401
Indicators of Compromise
- Unusual or unexpected connections to the Remote Registry Service from external or untrusted IP addresses
- Abnormal Remote Registry Service (svchost.exe hosting RemoteRegistry) process behavior including unexpected child processes
- Windows Event Log entries (Security Event ID 4656, 4663) showing suspicious registry access patterns from remote sources
- Network traffic anomalies involving RPC communications on port 135 followed by dynamic port connections to registry endpoints
Detection Strategies
- Monitor Windows Security Event Logs for remote registry access events, particularly from accounts that do not typically perform such operations
- Implement network-level detection rules to identify suspicious RPC traffic patterns targeting the Remote Registry Service
- Deploy endpoint detection capabilities that can identify integer overflow exploitation attempts and memory corruption behaviors
- Use SentinelOne's Behavioral AI to detect anomalous process execution chains originating from the Remote Registry Service
Monitoring Recommendations
- Enable verbose logging for the Remote Registry Service and correlate with Security Event Logs
- Configure network monitoring to alert on Remote Registry Service connections from non-administrative workstations
- Implement alerting for any Remote Registry Service crashes or unexpected restarts that could indicate exploitation attempts
- Review authentication logs for suspicious high-privilege account usage targeting registry services
How to Mitigate CVE-2023-36401
Immediate Actions Required
- Apply the Microsoft security update for CVE-2023-36401 from the November 2023 Patch Tuesday release immediately
- Audit systems to determine where the Remote Registry Service is enabled and whether it is necessary for operations
- Disable the Remote Registry Service on systems where remote registry management is not required
- Restrict network access to the Remote Registry Service using Windows Firewall or network segmentation
Patch Information
Microsoft has released security updates addressing this vulnerability as part of the November 2023 security updates. Administrators should obtain the appropriate patch from the Microsoft Security Update Guide for CVE-2023-36401. The updates are available through Windows Update, Windows Server Update Services (WSUS), and the Microsoft Update Catalog for all affected operating system versions.
Workarounds
- Disable the Remote Registry Service by running sc config RemoteRegistry start= disabled and sc stop RemoteRegistry on systems where the service is not required
- Use Windows Firewall to block inbound RPC traffic to the Remote Registry Service from untrusted networks
- Implement network segmentation to restrict Remote Registry Service access to authorized management networks only
- Apply the principle of least privilege to reduce the number of accounts with remote registry access capabilities
# Disable Remote Registry Service
sc config RemoteRegistry start= disabled
sc stop RemoteRegistry
# Block Remote Registry via Windows Firewall (PowerShell)
New-NetFirewallRule -DisplayName "Block Remote Registry" -Direction Inbound -Service RemoteRegistry -Action Block
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


