Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability
CVE-2023-35317

7.8HIGH

Key Information:

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2023-35317?

The Windows Server Update Service (WSUS) is susceptible to an elevation of privilege vulnerability that could allow an attacker to gain elevated permissions on the system. An attacker who successfully exploits this vulnerability can take actions that are not normally permitted. This vulnerability is particularly concerning for organizations relying on WSUS for managing updates and patching their systems. For further details and guidance, visit the vendor's advisory.

Affected Version(s)

Windows Server 2012 (Server Core installation) x64-based Systems 6.2.9200.0 < 6.2.9200.24374

Windows Server 2012 R2 (Server Core installation) x64-based Systems 6.3.9600.0 < 6.3.9600.21063

Windows Server 2012 R2 x64-based Systems 6.3.9600.0 < 6.3.9600.21063

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2023-35317 : Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability