Kaspersky ID:
KLA48553
Detect Date:
03/14/2023
Updated:
01/25/2024

Description

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, obtain sensitive information, cause denial of service, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability in Windows Graphics Component can be exploited remotely to gain privileges.
  2. A remote code execution vulnerability in Windows DNS Server can be exploited remotely to execute arbitrary code.
  3. An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
  4. A remote code execution vulnerability in Microsoft PostScript and PCL6 Class Printer Driver can be exploited remotely to execute arbitrary code.
  5. An information disclosure vulnerability in Microsoft PostScript and PCL6 Class Printer Driver can be exploited remotely to obtain sensitive information.
  6. An elevation of privilege vulnerability in Windows Resilient File System (ReFS) can be exploited remotely to gain privileges.
  7. A remote code execution vulnerability in Internet Control Message Protocol (ICMP) can be exploited remotely to execute arbitrary code.
  8. An elevation of privilege vulnerability in CERT/CC can be exploited remotely to gain privileges.
  9. A remote code execution vulnerability in Remote Procedure Call Runtime can be exploited remotely to execute arbitrary code.
  10. An elevation of privilege vulnerability in Windows Point-to-Point Protocol over Ethernet (PPPoE) can be exploited remotely to gain privileges.
  11. An elevation of privilege vulnerability in Windows BrokerInfrastructure Service can be exploited remotely to gain privileges.
  12. A remote code execution vulnerability in Windows Point-to-Point Protocol over Ethernet (PPPoE) can be exploited remotely to execute arbitrary code.
  13. A remote code execution vulnerability in Windows Bluetooth Service can be exploited remotely to execute arbitrary code.
  14. An elevation of privilege vulnerability in Windows HTTP.sys can be exploited remotely to gain privileges.
  15. A denial of service vulnerability in Windows Hyper-V can be exploited remotely to cause denial of service.
  16. A remote code execution vulnerability in Windows Media can be exploited remotely to execute arbitrary code.
  17. A denial of service vulnerability in Windows Internet Key Exchange (IKE) Extension can be exploited remotely to cause denial of service.
  18. A remote code execution vulnerability in Windows Point-to-Point Tunneling Protocol can be exploited remotely to execute arbitrary code.
  19. A remote code execution vulnerability in HTTP Protocol Stack can be exploited remotely to execute arbitrary code.
  20. A security feature bypass vulnerability in Windows SmartScreen can be exploited remotely to bypass security restrictions.
  21. An elevation of privilege vulnerability in Windows Accounts Picture can be exploited remotely to gain privileges.
  22. A denial of service vulnerability in Windows Secure Channel can be exploited remotely to cause denial of service.
  23. An information disclosure vulnerability in Client Server Run-Time Subsystem (CSRSS) can be exploited remotely to obtain sensitive information.
  24. An elevation of privilege vulnerability in Windows Partition Management Driver can be exploited remotely to gain privileges.
  25. A remote code execution vulnerability in Windows Cryptographic Services can be exploited remotely to execute arbitrary code.
  26. An elevation of privilege vulnerability in TPM2.0 Module Library can be exploited remotely to gain privileges.
  27. An elevation of privilege vulnerability in Microsoft PostScript and PCL6 Class Printer Driver can be exploited remotely to gain privileges.
  28. An elevation of privilege vulnerability in Windows Bluetooth Driver can be exploited remotely to gain privileges.

Original advisories

Exploitation

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2023-24861
    high
  • CVE-2023-23400
    high
  • CVE-2023-23423
    critical
  • CVE-2023-24910
    critical
  • CVE-2023-24868
    critical
  • CVE-2023-24858
    critical
  • CVE-2023-23413
    critical
  • CVE-2023-23418
    critical
  • CVE-2023-24907
    critical
  • CVE-2023-23422
    critical
  • CVE-2023-24870
    high
  • CVE-2023-23415
    critical
  • CVE-2023-1018
    high
  • CVE-2023-21708
    critical
  • CVE-2023-24865
    high
  • CVE-2023-23385
    high
  • CVE-2023-23393
    high
  • CVE-2023-24913
    critical
  • CVE-2023-24866
    high
  • CVE-2023-23414
    high
  • CVE-2023-23421
    critical
  • CVE-2023-24871
    critical
  • CVE-2023-23410
    critical
  • CVE-2023-23407
    high
  • CVE-2023-23403
    critical
  • CVE-2023-23411
    high
  • CVE-2023-23406
    critical
  • CVE-2023-23401
    critical
  • CVE-2023-24859
    critical
  • CVE-2023-24911
    warning
  • CVE-2023-24867
    critical
  • CVE-2023-24909
    critical
  • CVE-2023-23405
    critical
  • CVE-2023-23404
    critical
  • CVE-2023-23392
    critical
  • CVE-2023-24880
    warning
  • CVE-2023-24856
    critical
  • CVE-2023-24876
    critical
  • CVE-2023-23412
    critical
  • CVE-2023-24863
    high
  • CVE-2023-24872
    critical
  • CVE-2023-24862
    high
  • CVE-2023-23420
    critical
  • CVE-2023-23409
    high
  • CVE-2023-23417
    critical
  • CVE-2023-24908
    critical
  • CVE-2023-24869
    critical
  • CVE-2023-23416
    critical
  • CVE-2023-23419
    critical
  • CVE-2023-23394
    high
  • CVE-2023-24857
    high
  • CVE-2023-1017
    critical
  • CVE-2023-23402
    critical
  • CVE-2023-24906
    high
  • CVE-2023-24864
    critical
  • CVE-2023-23388
    critical

KB list

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.