⚠ Exploited in the wild
Exploitation observed in the wild. Not yet on CISA KEV.

CVE-2023-21768

Severity
7.8HIGH
EPSS
75.5%
top 1.10%
CISA KEV
Not in KEV
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedJan 10
Latest updateSep 20

Description

Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

CVEListV5microsoft/windows_server_202210.0.20348.010.0.20348.1487
CVEListV5microsoft/windows_11_version_21h210.0.010.0.22000.1455
CVEListV5microsoft/windows_11_version_22h210.0.22621.010.0.22621.1105
NVDmicrosoft/windows_1121h2, 22h2+1

🔴Vulnerability Details

3
GHSA
GHSA-j69v-7pj3-vg67: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability2023-01-11
CVEList
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability2023-01-10
VulnCheck
Windows Ancillary Function Driver for WinSock Privilege Escalation2023

📋Vendor Advisories

2
Red Hat
gstreamer-plugins-bad: Integer overflow in H.265 video parser leading to stack overwrite2023-09-20
Microsoft
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability2023-01-10

🕵️Threat Intelligence

2
Sentinelone
CVE-2023-21768: Windows Local Privilege Escalation Vulnerability2023-03-20
Sentinelone
CVE-2023-21768: Windows Local Privilege Escalation Vulnerability2023-03-20