CVE-2023-38147 Overview
CVE-2023-38147 is a remote code execution vulnerability affecting the Windows Miracast Wireless Display feature across multiple versions of Microsoft Windows operating systems. This vulnerability allows an unauthenticated attacker on an adjacent network to execute arbitrary code on vulnerable systems through the Miracast wireless display protocol implementation.
Critical Impact
An attacker within the same network segment can exploit this vulnerability to achieve full system compromise without requiring user interaction or authentication, potentially gaining complete control over affected Windows systems.
Affected Products
- Microsoft Windows 10 (versions 1507, 1607, 1809, 21H2, 22H2)
- Microsoft Windows 11 (versions 21H2, 22H2)
- Microsoft Windows Server 2016, 2019, 2022
Discovery Timeline
- September 12, 2023 - CVE-2023-38147 published to NVD
- April 8, 2025 - Last updated in NVD database
Technical Details for CVE-2023-38147
Vulnerability Analysis
This vulnerability resides in the Windows Miracast Wireless Display component, which enables wireless screen projection between devices. The flaw is classified as CWE-122 (Heap-based Buffer Overflow), indicating improper bounds checking when processing data within the Miracast protocol implementation.
Miracast uses Wi-Fi Direct to establish peer-to-peer connections for screen mirroring without requiring a traditional network infrastructure. The vulnerability exists in how Windows handles incoming Miracast protocol messages, allowing malformed data to trigger memory corruption conditions.
The attack requires the adversary to be on an adjacent network (such as the same Wi-Fi network or within Wi-Fi Direct range) but requires no privileges or user interaction to exploit. Successful exploitation results in complete compromise of confidentiality, integrity, and availability of the target system.
Root Cause
The vulnerability stems from a heap-based buffer overflow condition (CWE-122) in the Miracast Wireless Display protocol handler. When processing specially crafted Miracast connection requests or display data packets, the affected component fails to properly validate the size of incoming data before copying it to a fixed-size heap buffer. This allows an attacker to overwrite adjacent memory regions, potentially corrupting critical data structures or injecting executable code.
Attack Vector
The attack vector requires adjacent network access, meaning the attacker must be within wireless communication range of the target system or on the same network segment. The exploitation flow involves:
- The attacker positions themselves within Wi-Fi Direct range or on the same local network as the target
- The attacker initiates or intercepts Miracast protocol communications
- Specially crafted Miracast packets containing oversized or malformed data are sent to the target
- The vulnerable Windows component processes these packets without proper bounds checking
- The heap-based buffer overflow occurs, allowing memory corruption
- The attacker achieves arbitrary code execution with the privileges of the Miracast service
No user interaction is required, making this a particularly dangerous vulnerability in environments where Miracast functionality is enabled.
Detection Methods for CVE-2023-38147
Indicators of Compromise
- Unusual Miracast connection attempts or Wi-Fi Direct activity from unknown devices
- Unexpected crashes or restarts of display-related Windows services
- Anomalous memory allocation patterns in Miracast-related processes
- System event logs showing display adapter errors or service failures
Detection Strategies
- Monitor for abnormal Wi-Fi Direct traffic patterns and connection attempts
- Deploy endpoint detection solutions capable of identifying heap overflow exploitation techniques
- Implement network monitoring for Miracast protocol anomalies on local network segments
- Configure Windows Event Log auditing to capture display and wireless adapter events
Monitoring Recommendations
- Enable verbose logging for Windows wireless display services
- Implement SentinelOne's behavioral AI detection to identify memory corruption exploitation attempts
- Monitor for suspicious processes spawned by display-related system services
- Track Wi-Fi adapter activity for unauthorized peer-to-peer connections
How to Mitigate CVE-2023-38147
Immediate Actions Required
- Apply the Microsoft security update released in September 2023 immediately
- Disable Miracast Wireless Display functionality on systems where it is not required
- Restrict physical access to wireless network ranges where vulnerable systems reside
- Enable network segmentation to limit adjacent network attack exposure
Patch Information
Microsoft has released security updates addressing this vulnerability as part of their September 2023 Patch Tuesday release. Detailed patch information and affected version-specific updates are available in the Microsoft Security Response Center Advisory. Organizations should prioritize applying these updates to all affected Windows 10, Windows 11, and Windows Server systems.
Workarounds
- Disable Miracast Wireless Display feature via Group Policy or Windows Settings when not operationally required
- Disable Wi-Fi Direct functionality on systems that do not require wireless projection capabilities
- Implement network-level isolation to prevent unauthorized adjacent network access
- Use SentinelOne Singularity XDR for continuous monitoring and automated response to exploitation attempts
# Disable Miracast Wireless Display via PowerShell
# This prevents the vulnerable component from accepting connections
Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\WirelessDisplay" -Name "AllowProjectionFromPC" -Value 0 -Type DWord
Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\WirelessDisplay" -Name "AllowProjectionToPC" -Value 0 -Type DWord
# Verify the settings are applied
Get-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\WirelessDisplay"
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

