Lucene search

K
kasperskyKaspersky LabKLA62388
HistoryDec 12, 2023 - 12:00 a.m.

KLA62388 Multiple vulnerabilities in Microsoft Windows

2023-12-1200:00:00
Kaspersky Lab
threats.kaspersky.com
58
microsoft windows
arbitrary code execution
sensitive information
denial of service
privilege escalation
user interface spoofing
public exploits
kb section.

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

0.035 Low

EPSS

Percentile

91.6%

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, cause denial of service, overwrite arbitrary files, gain privileges, spoof user interface.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Internet Connection Sharing (ICS) can be exploited remotely to execute arbitrary code.
  2. An information disclosure vulnerability in DHCP Server Service can be exploited remotely to obtain sensitive information.
  3. A denial of service vulnerability in Windows Kernel can be exploited remotely to cause denial of service.
  4. A remote code execution vulnerability in Microsoft WDAC OLE DB provider for SQL Server can be exploited remotely to execute arbitrary code.
  5. A division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality.
  6. An elevation of privilege vulnerability in Windows Telephony Server can be exploited remotely to gain privileges.
  7. A remote code execution vulnerability in Microsoft ODBC Driver can be exploited remotely to execute arbitrary code.
  8. A denial of service vulnerability in Internet Connection Sharing (ICS) can be exploited remotely to cause denial of service.
  9. An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
  10. A remote code execution vulnerability in Windows MSHTML Platform can be exploited remotely to execute arbitrary code.
  11. An elevation of privilege vulnerability in Sysmain Service can be exploited remotely to gain privileges.
  12. A spoofing vulnerability in Windows DPAPI (Data Protection Application Programming Interface) can be exploited remotely to spoof user interface.
  13. A denial of service vulnerability in DHCP Server Service can be exploited remotely to cause denial of service.
  14. An elevation of privilege vulnerability in Windows Cloud Files Mini Filter Driver can be exploited remotely to gain privileges.
  15. An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
  16. A remote code execution vulnerability in Windows Bluetooth Driver can be exploited remotely to execute arbitrary code.
  17. A spoofing vulnerability in Windows DNS can be exploited remotely to spoof user interface.
  18. An elevation of privilege vulnerability in Local Security Authority Subsystem Service can be exploited remotely to gain privileges.
  19. An elevation of privilege vulnerability in XAML Diagnostics can be exploited remotely to gain privileges.
  20. A remote code execution vulnerability in Microsoft USBHUB 3.0 Device Driver can be exploited remotely to execute arbitrary code.
  21. A remote code execution vulnerability in Windows Media can be exploited remotely to execute arbitrary code.
  22. An elevation of privilege vulnerability in Windows Ancillary Function Driver for WinSock can be exploited remotely to gain privileges.

Original advisories

CVE-2023-35630

CVE-2023-35641

CVE-2023-35643

CVE-2023-35635

CVE-2023-36006

CVE-2023-20588

CVE-2023-36005

CVE-2023-35639

CVE-2023-35642

CVE-2023-36011

CVE-2023-35628

CVE-2023-35644

CVE-2023-36004

CVE-2023-35638

CVE-2023-36012

CVE-2023-36696

CVE-2023-35633

CVE-2023-35634

CVE-2023-35631

CVE-2023-35622

CVE-2023-36391

CVE-2023-36003

CVE-2023-35629

CVE-2023-21740

CVE-2023-35632

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

Microsoft-Windows

Microsoft-Windows-Server

Microsoft-Windows-10

Microsoft-Windows-Server-2016

Microsoft-Windows-Server-2019

Microsoft-Windows-11

CVE list

CVE-2023-20588 high

CVE-2023-35630 critical

CVE-2023-35641 critical

CVE-2023-35643 critical

CVE-2023-35635 high

CVE-2023-36006 critical

CVE-2023-36005 critical

CVE-2023-35639 critical

CVE-2023-35642 high

CVE-2023-36011 critical

CVE-2023-35628 critical

CVE-2023-35644 critical

CVE-2023-36004 critical

CVE-2023-35638 critical

CVE-2023-36012 high

CVE-2023-36696 critical

CVE-2023-35633 critical

CVE-2023-35634 critical

CVE-2023-35631 critical

CVE-2023-35622 critical

CVE-2023-36391 critical

CVE-2023-36003 high

CVE-2023-35629 high

CVE-2023-21740 critical

CVE-2023-35632 critical

KB list

5033118

5033372

5033383

5033379

5033373

5033464

5033369

5033375

5033371

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

  • OAF

Overwrite arbitrary files. Exploitation of vulnerabilities with this impact can lead to loss of some information, contained in overwritten files.

Affected Products

  • Windows 10 Version 21H2 for x64-based SystemsWindows Server 2019 (Server Core installation)Windows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for 32-bit SystemsWindows 10 Version 1809 for 32-bit SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 22H2 for ARM64-based SystemsWindows 11 version 21H2 for ARM64-based SystemsWindows Server 2019Windows Server 2016 (Server Core installation)Windows 10 Version 22H2 for ARM64-based SystemsWindows Server 2022Windows 10 Version 1809 for x64-based SystemsWindows Server 2016Windows 10 Version 21H2 for 32-bit SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 23H2 for x64-based SystemsWindows 10 Version 1607 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows 10 for x64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 1809 for ARM64-based SystemsWindows 11 version 21H2 for x64-based Systems

References

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

0.035 Low

EPSS

Percentile

91.6%