Rewterz
Rewterz Threat Advisory – CVE-2023-36413 – Microsoft Office Zero-Day Vulnerability
November 15, 2023
Rewterz
Rewterz Threat Advisory – Multiple Microsoft Exchange Server Vulnerabilities
November 15, 2023

Rewterz Threat Advisory – Multiple Microsoft Windows Zero Day Vulnerabilities

Severity

High

Analysis Summary

CVE-2023-36025 CVSS:8.8

Microsoft Windows could allow a remote attacker to bypass security restrictions, caused by a flaw in the SmartScreen component. By persuading a victim to open a specially crafted content, an attacker could exploit this vulnerability to bypass security feature to cause impact on confidentiality, integrity and availability.

CVE-2023-36033 CVSS:7.8

Microsoft Windows could allow a local authenticated attacker to gain elevated privileges on the system, caused by a flaw in the DWM Core Library component. By sending a specially crafted request, an attacker could exploit this vulnerability to escalate privileges.

CVE-2023-36036 CVSS:7.8

Microsoft Windows could allow a local authenticated attacker to gain elevated privileges on the system, caused by a flaw in the Cloud Files Mini Filter Driver Elevation component. An attacker could exploit this vulnerability to obtain SYSTEM privileges.

Impact

  • Privileges Escalation
  • Security Bypass

Indicators Of Compromise

CVE

  • CVE-2023-36025
  • CVE-2023-36033
  • CVE-2023-36036

Affected Vendors

Microsoft

Affected Products

  • Microsoft Windows Server 2012
  • Microsoft Windows Server 2012 R2
  • Microsoft Windows 10 x32
  • Microsoft Windows 10 x64
  • Microsoft Windows Server 2016
  • Microsoft Windows Server 2019
  • Microsoft Windows 10 1809 for x64-based Systems
  • Microsoft Windows 10 1809 for 32-bit Systems
  • Microsoft Windows 10 1809 for ARM64-based Systems
  • Microsoft Windows 10 1607 for 32-bit Systems
  • Microsoft Windows 10 1607 for x64-based Systems
  • Microsoft Windows Server (Server Core installation) 2019
  • Microsoft Windows Server (Server Core installation) 2016
  • Microsoft Windows Server (Server Core installation) 2012 R2
  • Microsoft Windows Server (Server Core installation) 2012
  • Microsoft Windows Server for X64-based systems 2008 R2 SP1
  • Microsoft Windows Server for X64-based systems (Server Core installation) 2008 SP2
  • Microsoft Windows Server for 32-bit systems (Server Core installation) 2008 SP2
  • Microsoft Windows Server for 32-bit systems 2008 SP2
  • Microsoft Windows Server for X64-based systems (Server Core installation) 2008 R2 SP1
  • Microsoft Windows Server 2022
  • Microsoft Windows Server (Server Core installation) 2022
  • Microsoft Windows Server for X64-based systems 2008 SP2
  • Microsoft Windows 10 21H2 for 32-bit Systems
  • Microsoft Windows 10 21H2 for ARM64-based Systems
  • Microsoft Windows 10 21H2 for x64-based Systems
  • Microsoft Windows 11 22H2 for ARM64-based Systems
  • Microsoft Windows 11 22H2 for x64-based Systems
  • Microsoft Windows 10 22H2 for x64-based Systems
  • Microsoft Windows 10 22H2 for 32-bit Systems
  • Microsoft Windows 10 22H2 for ARM64-based Systems
  • Microsoft Windows 11 21H2 for ARM64-based Systems
  • Microsoft Windows 11 21H2 for x64-based Systems
  • Microsoft Windows Server (Server Core installation) 2022 23H2
  • Microsoft Windows 11 23H2 for ARM64-based Systems
  • Microsoft Windows 11 23H2 for x64-based Systems
  • Microsoft Windows Server 2022 23H2

Remediation

Use Microsoft Automatic Update to apply the appropriate patch for your system, or the Microsoft Security Update Guide to search for available patches.

CVE-2023-36025

CVE-2023-36033

CVE-2023-36036