Windows DWM Core Library Elevation of Privilege Vulnerability
CVE-2023-36033

7.8HIGH

Key Information:

Badges

๐Ÿ’ฐ Ransomware๐Ÿ‘พ Exploit Exists๐Ÿฆ… CISA Reported๐Ÿ“ฐ News Worthy

Summary

An elevation of privilege vulnerability exists in Windows DWM Core Library, allowing attackers to execute arbitrary code with elevated permissions, which could lead to unauthorized access to sensitive data and system resources. Users are advised to apply the latest security updates to mitigate potential exploitation risks.

CISA Reported

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace as recent news articles suggest the vulnerability is being used by ransomware groups.

The CISA's recommendation is: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Affected Version(s)

Windows 10 Version 1809 32-bit Systems 10.0.17763.0 < 10.0.17763.5122

Windows 10 Version 1809 ARM64-based Systems 10.0.0 < 10.0.17763.5122

Windows 10 Version 21H2 32-bit Systems 10.0.19043.0 < 10.0.19043.3693

News Articles

Malware report for Q2 2024 โ€” a quarterly review

In this report, Kaspersky researchers explore the most significant attacks of Q2 2024 that used a XZ backdoor, the LockBit builder, ShrinkLocker ransomware, etc.

4 months ago

Microsoft patches 3 high-severity bugs under active attack

Microsoft fixed three vulnerabilities that threat actors are exploiting, part of its' Patch Tuesday bug fix roundup.

6 months ago

Microsoft fixes Windows zero-day exploited in QakBot malware attacks

โ€‹Microsoft has fixed a zero-day vulnerability exploited in attacks to deliver QakBot and other malware payloads on vulnerable Windows systems.

8 months ago

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • ๐Ÿ’ฐ

    Used in Ransomware

  • ๐Ÿ“ฐ

    First article discovered by BleepingComputer

  • ๐Ÿ‘พ

    Exploit known to exist

  • ๐Ÿฆ…

    CISA Reported

  • Vulnerability published

  • Vulnerability Reserved

.