Vulnerability Details : CVE-2023-24899
Windows Graphics Component Elevation of Privilege Vulnerability
Vulnerability category: Gain privilege
Products affected by CVE-2023-24899
- cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-24899
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 22 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-24899
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.0
|
HIGH | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.0
|
5.9
|
Microsoft Corporation |
CWE ids for CVE-2023-24899
-
The product contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.Assigned by: nvd@nist.gov (Primary)
-
The product stores sensitive data in memory that is not locked, or that has been incorrectly locked, which might cause the memory to be written to swap files on disk by the virtual memory manager. This can make the data more accessible to external actors.Assigned by: secure@microsoft.com (Secondary)
References for CVE-2023-24899
-
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24899
CVE-2023-24899 - Security Update Guide - Microsoft - Windows Graphics Component Elevation of Privilege VulnerabilityPatch;Vendor Advisory
Jump to