CVE-2023-35633Link Following in Microsoft Windows 10 Version 1507

CWE-59Link Following12 documents8 sources
Severity
7.8HIGHNVD
EPSS
2.7%
top 14.08%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 12
Latest updateMay 1

Description

Windows Kernel Elevation of Privilege Vulnerability

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages14 packages

NVDmicrosoft/windows_10_1507< 10.0.10240.20345
CVEListV5microsoft/windows_server_20126.2.9200.06.2.9200.24614
CVEListV5microsoft/windows_server_2012_r26.3.9600.06.3.9600.21715
CVEListV5microsoft/windows_10_version_150710.0.10240.010.0.10240.20345
CVEListV5microsoft/windows_server_2008_service_pack_26.0.6003.06.0.6003.22413

Patches

🔴Vulnerability Details

5
Project0
The Windows Registry Adventure #7: Attack surface analysis - Project Zero2025-05-01
Project0
The Windows Registry Adventure #5: The regf file format - Project Zero2024-12-01
Project0
The Windows Registry Adventure #4: Hives and the registry layout - Project Zero2024-10-01
Project0
The Windows Registry Adventure #1: Introduction and research results - Project Zero2024-04-01
GHSA
GHSA-2xc6-pfrf-w5p4: Windows Kernel Elevation of Privilege Vulnerability2023-12-12

📋Vendor Advisories

1
Microsoft
Windows Kernel Elevation of Privilege Vulnerability2023-12-12

🕵️Threat Intelligence

5
Trendmicro
The December 2023 Security Update Review2023-12-12
Qualys
Microsoft and Adobe Patch Tuesday, December 2023 Security Update Review2023-12-12
Qualys
Qualys Review: Microsoft and Adobe December Security Patches | Qualys2023-12-12
Bleepingcomputer
Microsoft December 2023 Patch Tuesday fixes 34 flaws, 1 zero-day2023-12-12
Zscaler
Zscaler found Windows Security Vulnerabilities | 12-12-2023
CVE-2023-35633 — Link Following in Microsoft | cvebase