Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
CVE-2023-21712
8.1HIGH
Key Information:
- Vendor
- Microsoft
- Status
- Vendor
- CVE Published:
- 27 April 2023
Summary
A vulnerability in the Windows Point-to-Point Tunneling Protocol allows an attacker to execute arbitrary code on the target system by sending specially crafted packets. Exploitation of this vulnerability can lead to a complete compromise of the affected machine, granting the attacker full control over system resources and data. Organizations using the affected versions of Windows should ensure that their systems are updated to mitigate the risks associated with this severe vulnerability.
Affected Version(s)
Windows 10 Version 1507 32-bit Systems 10.0.10240.0 < 10.0.10240.19562
Windows 10 Version 1607 32-bit Systems 10.0.14393.0 < 10.0.14393.5501
Windows 10 Version 1809 32-bit Systems 10.0.17763.0 < 10.0.17763.3650
References
CVSS V3.1
Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved