⚠ Actively exploited
Added to CISA KEV on 2023-01-10. Federal agencies required to patch by 2023-01-31. Required action: Apply updates per vendor instructions..

CVE-2023-21674

CWE-416Use After Free7 documents7 sources
Severity
8.8HIGH
EPSS
10.1%
top 6.89%
CISA KEV
KEV
Added 2023-01-10
Due 2023-01-31
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedJan 10
KEV addedJan 10
Latest updateJan 11
KEV dueJan 31
CISA Required Action: Apply updates per vendor instructions.

Description

Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:HExploitability: 2.0 | Impact: 6.0

Affected Packages25 packages

NVDmicrosoft/windows< 10.0.14393.5648+3
CVEListV5microsoft/windows_8.16.3.06.3.9600.20778
NVDmicrosoft/windows_10_1507< 10.0.10240.19685
NVDmicrosoft/windows_10_1607< 10.0.14393.5648
NVDmicrosoft/windows_10_1809< 10.0.17763.3887

Patches

🔴Vulnerability Details

3
GHSA
GHSA-hqxf-h392-6m7w: Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability2023-01-11
CVEList
Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability2023-01-10
VulnCheck
Microsoft Windows Advanced Local Procedure Call (ALPC) Privilege Escalation Vulnerability2023

📋Vendor Advisories

2
Microsoft
Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability2023-01-10
CISA
Microsoft Windows Advanced Local Procedure Call (ALPC) Privilege Escalation Vulnerability2023-01-10
CVE-2023-21674 (HIGH CVSS 8.8) | Windows Advanced Local Procedure Ca | cvebase.io