View all Worklets
Windows

Windows - Security - Mitigate TCP/IP Denial of Service Vulnerability ( CVE-2023-36603 )

Mitigates TCP/IP Denial of Service Vulnerability CVE-2023-36603 on Windows

Worklet Details

Introduction to the Powershell-based Mitigate TCP/IP Denial of Service Vulnerability (CVE-2023-36603) Worklet

The Mitigate TCP/IP Denial of Service Vulnerability (CVE-2023) Worklet is designed to protect your Windows system against potential cyber-attacks that exploit the CVE-2023-36603 vulnerability.

This Worklet makes use of PowerShell commands to modify your system's registry settings, specifically targeting the 'EnablePacketQueue' subkey.

Why would you use the Mitigate TCP/IP Denial of Service Vulnerability (CVE-2023-36603) Worklet?

This Worklet is an essential tool for preemptive system protection. Microsoft has acknowledged the TCP/IP Denial of Service Vulnerability (CVE-2023-36603) as a significant threat, and this Worklet provides a mitigation strategy until updates addressing this vulnerability are installed.

Components of the Mitigate TCP/IP Denial of Service Vulnerability (CVE-2023-36603) Worklet

The Worklet comprises of two main functions. The Test-Registry function checks the current configuration of the registry against the desired state configuration.

If discrepancies are detected, the Set-Registry function steps in to remediate by setting the desired registry configuration.

How does the Mitigate TCP/IP Denial of Service Vulnerability (CVE-2023-36603) Worklet work?

The Worklet starts by testing the current registry configuration against the desired state configuration using the Test-Registry function.

If the current configuration does not match the desired state, the Set-Registry function intervenes. It modifies the 'EnablePacketQueue' subkey in the Windows Firewall policy to a DWORD value of '0', disabling all queuing.

What is the expected outcome when you use the Mitigate TCP/IP Denial of Service Vulnerability (CVE-2023-36603) Worklet?

Once the Worklet is run, it ensures that the 'EnablePacketQueue' subkey in your system's registry is set to '0', disabling all queuing on your device.

This change in setting mitigates the vulnerability, reducing the chances of your system falling prey to a TCP/IP Denial of Service attack. The device is then compliant with the desired registry configuration, and the vulnerability can be mitigated until the update is installed.

View in app

Consider Worklets your easy button

What's a Worklet?

A Worklet is an automation script, written in Bash or PowerShell, designed for seamless execution on endpoints – at scale – within the Automox platform. Worklet automation scripts perform configuration, remediation, and the installation or removal of applications and settings across Windows, macOS, and Linux.

do more with worklets