Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2023-28293

CWE-1917 documents6 sources
Severity
7.8HIGH
EPSS
7.6%
top 8.12%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedApr 11
Latest updateMay 1

Description

Windows Kernel Elevation of Privilege Vulnerability

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages29 packages

NVDmicrosoft/windows_10_1607< 10.0.14393.5850
NVDmicrosoft/windows_10_1809< 10.0.17763.4252
NVDmicrosoft/windows_10_20h2< 10.0.19042.2846
NVDmicrosoft/windows_10_21h2< 10.0.19044.2846
NVDmicrosoft/windows_10_22h2< 10.0.19045.2846

Patches

🔴Vulnerability Details

4
Project0
The Windows Registry Adventure #7: Attack surface analysis - Project Zero2025-05-01
Project0
The Windows Registry Adventure #1: Introduction and research results - Project Zero2024-04-01
CVEList
Windows Kernel Elevation of Privilege Vulnerability2023-04-11
GHSA
GHSA-rggp-g5p7-mr37: Windows Kernel Elevation of Privilege Vulnerability2023-04-11

💥Exploits & PoCs

1
Exploit-DB
Windows 11 22h2 - Kernel Privilege Elevation2023-06-26

📋Vendor Advisories

1
Microsoft
Windows Kernel Elevation of Privilege Vulnerability2023-04-11
CVE-2023-28293 (HIGH CVSS 7.8) | Windows Kernel Elevation of Privile | cvebase.io