Vulnerability Details : CVE-2023-41763
Skype for Business Elevation of Privilege Vulnerability
Vulnerability category: Gain privilege
Products affected by CVE-2023-41763
- cpe:2.3:a:microsoft:skype_for_business_server:2015:cumulative_update_13:*:*:*:*:*:*
- cpe:2.3:a:microsoft:skype_for_business_server:2019:cumulative_update_7:*:*:*:*:*:*
CVE-2023-41763 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Microsoft Skype for Business Privilege Escalation Vulnerability
CISA required action:
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
CISA description:
Microsoft Skype for Business contains an unspecified vulnerability that allows for privilege escalation.
Notes:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-41763; https://nvd.nist.gov/vuln/detail/CVE-2023-41763
Added on
2023-10-10
Action due date
2023-10-31
Exploit prediction scoring system (EPSS) score for CVE-2023-41763
8.26%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 94 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-41763
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
3.9
|
1.4
|
Microsoft Corporation | |
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/... |
N/A
|
N/A
|
MS-CVE-2023-41763 |
CWE ids for CVE-2023-41763
-
The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.Assigned by:
- nvd@nist.gov (Primary)
- secure@microsoft.com (Secondary)
References for CVE-2023-41763
-
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41763
CVE-2023-41763 - Security Update Guide - Microsoft - Skype for Business Elevation of Privilege VulnerabilityPatch;Vendor Advisory
Jump to