CVE-2023-23420

CWE-416Use After Free9 documents5 sources
Severity
7.8HIGH
EPSS
0.3%
top 47.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 14
Latest updateMay 1

Description

Windows Kernel Elevation of Privilege Vulnerability

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages30 packages

NVDmicrosoft/windows_10< 10.0.10240.19805
NVDmicrosoft/windows_10_1607< 10.0.14393.5786
NVDmicrosoft/windows_10_1809< 10.0.17763.4131
NVDmicrosoft/windows_10_20h2< 10.0.19042.2728
NVDmicrosoft/windows_10_21h2< 10.0.19044.2728

Patches

🔴Vulnerability Details

7
Project0
The Windows Registry Adventure #8: Practical exploitation of hive memory corruption - Project Zero2025-05-01
Project0
The Windows Registry Adventure #7: Attack surface analysis - Project Zero2025-05-01
Project0
The Windows Registry Adventure #6: Kernel-mode objects - Project Zero2025-04-01
Project0
The Windows Registry Adventure #5: The regf file format - Project Zero2024-12-01
Project0
The Windows Registry Adventure #1: Introduction and research results - Project Zero2024-04-01

📋Vendor Advisories

1
Microsoft
Windows Kernel Elevation of Privilege Vulnerability2023-03-14
CVE-2023-23420 (HIGH CVSS 7.8) | Windows Kernel Elevation of Privile | cvebase.io