Vulnerability Details : CVE-2023-36698
Windows Kernel Security Feature Bypass Vulnerability
Products affected by CVE-2023-36698
- cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-36698
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 11 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-36698
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.4
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L |
1.8
|
2.5
|
NIST | |
3.6
|
LOW | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L |
1.0
|
2.5
|
Microsoft Corporation | |
4.4
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L |
1.8
|
2.5
|
Microsoft Corporation | |
3.6
|
LOW | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L/... |
N/A
|
N/A
|
MS-CVE-2023-36698 | |
4.4
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/... |
N/A
|
N/A
|
MS-CVE-2023-36698 |
CWE ids for CVE-2023-36698
-
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.Assigned by: secure@microsoft.com (Secondary)
References for CVE-2023-36698
-
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36698
CVE-2023-36698 - Security Update Guide - Microsoft - Windows Kernel Security Feature Bypass VulnerabilityPatch;Vendor Advisory
Jump to