BDU:2023-00377
Scores
EPSS
Percentile: 0.0%
CVSS
CVSS Score: 7.8/10
All CVSS Scores
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vector Breakdown
CVSS (Common Vulnerability Scoring System) vector provides detailed metrics about vulnerability characteristics
CVSS
Attack Vector
Local (L)
Describes how the vulnerability is exploited
Attack Complexity
Low (L)
Describes the conditions beyond the attacker's control
Privileges Required
Low (L)
Describes the level of privileges an attacker must possess
User Interaction
None (N)
Captures the requirement for a human user participation
Scope
Unchanged (U)
Determines if a successful attack impacts components beyond the vulnerable component
Confidentiality Impact
High (H)
Measures the impact to the confidentiality of information
Integrity Impact
High (H)
Measures the impact to integrity of a successfully exploited vulnerability
Availability Impact
High (H)
Measures the impact to the availability of the impacted component
Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C
Vector Breakdown
CVSS (Common Vulnerability Scoring System) vector provides detailed metrics about vulnerability characteristics
CVSS
Attack Vector
Local (L)
Describes how the vulnerability is exploited
Attack Complexity
Low (L)
Describes the conditions beyond the attacker's control
Authentication
Single
Describes the level of privileges an attacker must possess
Confidentiality Impact
Complete
Measures the impact to the confidentiality of information
Integrity Impact
Complete
Measures the impact to integrity of a successfully exploited vulnerability
Availability Impact
Complete
Measures the impact to the availability of the impacted component
Description
Уязвимость драйвера WinSock операционной системы Microsoft Windows связана с недостатками разграничения доступа. Эксплуатация уязвимости может позволить нарушителю повысить свои привилегии
Scaner-VS 7 — a modern vulnerability management solution
Sources
Related Vulnerabilities
Exploits
Exploit ID: CVE-2023-21768
Source: github-poc
URL: https://github.com/radoi-teodor/CVE-2023-21768-DSE-Bypass
Recommendations
Source: bdu
Использование рекомендаций производителя:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-21768
Vulnerable Software (151)
Type: Configuration
Vendor: microsoft corp
Product: windows_11 21h2
Operating System: * *
{ "version_exact": "*"}
Source: bdu
Type: Configuration
Vendor: microsoft corp
Product: windows_11 22h2
Operating System: * *
{ "version_exact": "*"}
Source: bdu
Type: Configuration
Vendor: microsoft corp
Product: windows_server_2022
Operating System: * *
{ "version_exact": "*"}
Source: bdu
Type: Configuration
Vendor: microsoft corp
Product: windows_server_2022
Operating System: * *
{ "version_exact": "(server core installation)"}
Source: bdu
Type: Windows KB
Vendor: Microsoft
Product: Windows
Version: 10.0.22621.6060
Operating System: Windows 22621 build 6060
Identifier: KB5066793
Source: msrc
Type: Windows KB
Vendor: Microsoft
Product: Windows
Version: 22621.5549
Operating System: Windows 22621 build 5549
Identifier: KB5060826
Source: msrc
Type: Windows KB
Vendor: Microsoft
Product: Windows
Version: 10.0.22621.5472
Operating System: Windows 22621 build 5472
Identifier: KB5060999
Source: msrc
Type: Windows KB
Vendor: Microsoft
Product: Windows
Version: 22621.5415
Operating System: Windows 22621 build 5415
Identifier: KB5062170
Source: msrc
Type: Windows KB
Vendor: Microsoft
Product: Windows
Version: 22621.5413
Operating System: Windows 22621 build 5413
Identifier: KB5058502
Source: msrc
Type: Windows KB
Vendor: Microsoft
Product: Windows
Version: 10.0.22621.5335
Operating System: Windows 22621 build 5335
Identifier: KB5058405
Source: msrc
Type: Windows KB
Vendor: Microsoft
Product: Windows
Version: 22621.5262
Operating System: Windows 22621 build 5262
Identifier: KB5055629
Source: msrc
Type: Windows KB
Vendor: Microsoft
Product: Windows
Version: 22621.5192
Operating System: Windows 22621 build 5192
Identifier: KB5058919
Source: msrc
Type: Windows KB
Vendor: Microsoft
Product: Windows
Version: 10.0.22621.5189
Operating System: Windows 22621 build 5189
Identifier: KB5055528
Source: msrc
Type: Windows KB
Vendor: Microsoft
Product: Windows
Version: 22621.5126
Operating System: Windows 22621 build 5126
Identifier: KB5053657
Source: msrc
Type: Windows KB
Vendor: Microsoft
Product: Windows
Version: 10.0.22621.5039
Operating System: Windows 22621 build 5039
Identifier: KB5053602
Source: msrc
Type: Windows KB
Vendor: Microsoft
Product: Windows
Version: 22621.4974
Operating System: Windows 22621 build 4974
Identifier: KB5052094
Source: msrc
Type: Windows KB
Vendor: Microsoft
Product: Windows
Version: 10.0.22621.4890
Operating System: Windows 22621 build 4890
Identifier: KB5051989
Source: msrc
Type: Windows KB
Vendor: Microsoft
Product: Windows
Version: 22621.4830
Operating System: Windows 22621 build 4830
Identifier: KB5050092
Source: msrc
Type: Windows KB
Vendor: Microsoft
Product: Windows
Version: 10.0.22621.4751
Operating System: Windows 22621 build 4751
Identifier: KB5050021
Source: msrc
Type: Windows KB
Vendor: Microsoft
Product: Windows
Version: 10.0.22621.4602
Operating System: Windows 22621 build 4602
Identifier: KB5048685
Source: msrc