Disable packet queuing on Windows endpoints to mitigate CVE-2023-36603 TCP/IP DoS vulnerability
This Automox Worklet™ mitigates CVE-2023-36603, a critical vulnerability in Windows that allows attackers to disable the network stack through denial-of-service attacks. The Worklet disables packet queuing by setting the EnablePacketQueue registry value to 0 in the Windows Firewall policy.
Packet queuing allows the Windows network stack to scale receive-side processing for both encrypted (inbound) and decrypted (outbound) traffic in IPsec tunnel scenarios. Disabling this feature removes the attack surface that attackers exploit to crash the network stack.
The Worklet modifies two registry locations: the standard FirewallPolicy path and the Mobile endpoint Management (Mdm) path, verifying comprehensive coverage across all endpoint configurations.
Unpatched Windows endpoints remain vulnerable to network-based attacks that crash the TCP/IP stack. CVE-2023-36603 allows remote attackers to craft malicious network packets that disable endpoint networking when packet queuing is enabled. This vulnerability requires no authentication, meaning any network-connected system can exploit it to disrupt your operations.
Disabling packet queuing immediately closes this attack vector while you wait for permanent updates from Microsoft. This mitigation is recommended for all Windows workstations and servers in environments where network security is a priority.
The performance impact of disabling packet queuing is minimal for most organizations. Only highly specialized IPsec tunnel gateway deployments that rely on receive-side scaling might see reduced throughput, but the security benefit outweighs this concern.
Evaluation phase: The Worklet queries the Windows registry at SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\ and SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\Mdm\ to check if EnablePacketQueue is set to 0 with the DWORD value type. If either location is missing this configuration, the endpoint is flagged as non-compliant.
Remediation phase: The Worklet creates or updates the EnablePacketQueue registry value in both locations, setting it to 0 (DWORD). This disables all packet queuing functionality across all receive-side scaling scenarios.
Windows 10, Windows 11, or Windows Server 2016 and later
Administrator or local system privileges required for registry modification
Endpoint restart required to fully apply the mitigation
No additional software dependencies or prerequisites
After the Worklet completes successfully, the EnablePacketQueue registry value will be set to 0 in both the standard FirewallPolicy and Mdm FirewallPolicy locations. The endpoint becomes immune to CVE-2023-36603 exploitation because the packet queuing mechanism that the vulnerability targets is now disabled. You can verify compliance by inspecting the registry at HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\EnablePacketQueue to confirm the value is 0. An endpoint restart is recommended to fully apply the mitigation, though the registry change takes effect immediately for new network connections.
To verify compliance, you can inspect the registry using regedit or PowerShell and confirm that HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\EnablePacketQueue is set to 0. Subsequent Worklet runs will confirm the endpoint remains compliant, and subsequent Windows updates from Microsoft will provide permanent fixes to this vulnerability.
Run this Worklet on a pilot Windows endpoint and review evaluation output for mitigate tcp/ip denial of service vulnerability ( cve-2023-36603 ).
Confirm Automox activity logs show successful completion and exit code 0.
Verify endpoint state using checks aligned to evaluation script logic, such as Test-Registry, Write-Verbose, Write-Error.
Validate remediation effects from script operations such as Test-Registry, Write-Verbose, Write-Error, then rerun evaluation for compliance.


By submitting this form you agree to our Master Services Agreement and Privacy Policy.
Already have an account? Log in
Consider Worklets your easy button
A Worklet is an automation script, written in Bash or PowerShell, designed for seamless execution on endpoints – at scale – within the Automox platform. Worklet automation scripts perform configuration, remediation, and the installation or removal of applications and settings across Windows, macOS, and Linux.

AUTOMOX + WORKLETS™
Uncover new possibilities with simple, powerful automation.
By submitting this form you agree to our Master Services Agreement and Privacy Policy