Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2023-36424
Key Information:
- Vendor
Microsoft
- Status
- Vendor
- CVE Published:
- 14 November 2023
Badges
What is CVE-2023-36424?
CVE-2023-36424 is a significant vulnerability identified in the Windows Common Log File System Driver, a component integral to the Windows operating system intended for system file logging. This vulnerability allows for elevation of privilege, enabling an attacker to execute code at a higher privilege level than intended. Exploitation of this vulnerability could severely undermine the security of an organization’s IT infrastructure, potentially granting unauthorized users administrative level access to systems, which could lead to a variety of malicious activities.
Technical Details
CVE-2023-36424 is classified as an elevation of privilege vulnerability, meaning that it permits an attacker with limited access to gain higher access rights to the system. The exploitation stems from insufficient validation of input within the Windows Common Log File System Driver. This flaw can be targeted by attackers who may leverage various techniques to instantiate malicious code. The vulnerability is particularly concerning because it resides within a core Windows component, amplifying its potential impact across a wide range of environments relying on Microsoft products.
Potential Impact of CVE-2023-36424
-
Unauthorized Access: Successful exploitation of this vulnerability may allow attackers to obtain administrative-level access to systems, enabling them to manipulate, delete, or exfiltrate sensitive data.
-
System Compromise: The elevated privileges achieved through this vulnerability could result in a complete system compromise, granting adversaries the ability to install malware, exfiltrate sensitive information, or use the compromised system as a launching point for further attacks across the network.
-
Increased Attack Surface: Given its nature, this vulnerability potentially exposes critical systems to a wider attack surface, as attackers can leverage the elevated privileges to explore and exploit additional weaknesses within the system or network, leading to further breaches or widespread disruptions.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Windows 10 Version 1507 32-bit Systems 10.0.10240.0 < 10.0.10240.20308
Windows 10 Version 1607 32-bit Systems 10.0.14393.0 < 10.0.14393.6452
Windows 10 Version 1809 32-bit Systems 10.0.17763.0 < 10.0.17763.5122
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
News Articles
PoC released for the Windows Vulnerability - CVE-2023-36424
A security researcher has published details and proof-of-concept code for a Windows CVE-2023-36424 vulnerability that could be exploited to elevate privileges from a Medium Integrity Level to a High Integrity Level. The vulnerability is assigned a CVSS score of 7.8, this flaw could allow attackers t...
Windows Privilege Escalation Flaw (CVE-2023-36424): Exploit Code Released, Patch Urgently Needed
A security researcher has published details and proof-of-concept (PoC) code for a Windows CVE-2023-36424 vulnerability
Windows Common Log File System Driver EoP Flaw Gets PoC Exploit
Proof-of-concept (PoC) exploit code has been published for a Windows kernel vulnerability tracked as CVE-2023-36424.
References
EPSS Score
11% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 📈
Vulnerability started trending
- 🟡
Public PoC available
- 👾
Exploit known to exist
- 📰
First article discovered by SSD Secure Disclosure
Vulnerability published
Vulnerability Reserved