Kaspersky ID:
KLA48553
Detect Date:
03/14/2023
Updated:
05/30/2024

Description

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, obtain sensitive information, spoof user interface, cause denial of service, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability in Windows Graphics Component can be exploited remotely to gain privileges.
  2. A remote code execution vulnerability in Windows DNS Server can be exploited remotely to execute arbitrary code.
  3. An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
  4. A remote code execution vulnerability in Microsoft PostScript and PCL6 Class Printer Driver can be exploited remotely to execute arbitrary code.
  5. An information disclosure vulnerability in Microsoft PostScript and PCL6 Class Printer Driver can be exploited remotely to obtain sensitive information.
  6. An elevation of privilege vulnerability in Windows Resilient File System (ReFS) can be exploited remotely to gain privileges.
  7. A remote code execution vulnerability in Internet Control Message Protocol (ICMP) can be exploited remotely to execute arbitrary code.
  8. An elevation of privilege vulnerability in CERT/CC can be exploited remotely to gain privileges.
  9. A remote code execution vulnerability in Remote Procedure Call Runtime can be exploited remotely to execute arbitrary code.
  10. An elevation of privilege vulnerability in Windows Point-to-Point Protocol over Ethernet (PPPoE) can be exploited remotely to gain privileges.
  11. An elevation of privilege vulnerability in Windows BrokerInfrastructure Service can be exploited remotely to gain privileges.
  12. A remote code execution vulnerability in Windows Point-to-Point Protocol over Ethernet (PPPoE) can be exploited remotely to execute arbitrary code.
  13. A remote code execution vulnerability in Windows Bluetooth Service can be exploited remotely to execute arbitrary code.
  14. An elevation of privilege vulnerability in Windows HTTP.sys can be exploited remotely to gain privileges.
  15. A denial of service vulnerability in Windows Hyper-V can be exploited remotely to cause denial of service.
  16. A remote code execution vulnerability in Windows Media can be exploited remotely to execute arbitrary code.
  17. A denial of service vulnerability in Windows Internet Key Exchange (IKE) Extension can be exploited remotely to cause denial of service.
  18. A remote code execution vulnerability in Windows Point-to-Point Tunneling Protocol can be exploited remotely to execute arbitrary code.
  19. A remote code execution vulnerability in HTTP Protocol Stack can be exploited remotely to execute arbitrary code.
  20. A security feature bypass vulnerability in Windows SmartScreen can be exploited remotely to bypass security restrictions.
  21. An elevation of privilege vulnerability in Windows Accounts Picture can be exploited remotely to gain privileges.
  22. A denial of service vulnerability in Windows Secure Channel can be exploited remotely to cause denial of service.
  23. An information disclosure vulnerability in Client Server Run-Time Subsystem (CSRSS) can be exploited remotely to obtain sensitive information.
  24. An elevation of privilege vulnerability in Windows Partition Management Driver can be exploited remotely to gain privileges.
  25. A remote code execution vulnerability in Windows Cryptographic Services can be exploited remotely to execute arbitrary code.
  26. An elevation of privilege vulnerability in TPM2.0 Module Library can be exploited remotely to gain privileges.
  27. An elevation of privilege vulnerability in Microsoft PostScript and PCL6 Class Printer Driver can be exploited remotely to gain privileges.
  28. An elevation of privilege vulnerability in Windows Bluetooth Driver can be exploited remotely to gain privileges.
 
 

 

 

Original advisories

Exploitation

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2023-24861
    high
  • CVE-2023-23400
    high
  • CVE-2023-23423
    high
  • CVE-2023-24910
    high
  • CVE-2023-24868
    high
  • CVE-2023-24858
    high
  • CVE-2023-23413
    high
  • CVE-2023-23418
    high
  • CVE-2023-24907
    high
  • CVE-2023-23422
    high
  • CVE-2023-24870
    high
  • CVE-2023-23415
    critical
  • CVE-2023-1018
    high
  • CVE-2023-21708
    critical
  • CVE-2023-24865
    high
  • CVE-2023-23385
    high
  • CVE-2023-23393
    high
  • CVE-2023-24913
    high
  • CVE-2023-24866
    high
  • CVE-2023-23414
    high
  • CVE-2023-23421
    high
  • CVE-2023-24871
    high
  • CVE-2023-23410
    high
  • CVE-2023-23407
    high
  • CVE-2023-23403
    high
  • CVE-2023-23411
    high
  • CVE-2023-23406
    high
  • CVE-2023-23401
    high
  • CVE-2023-24859
    high
  • CVE-2023-24911
    warning
  • CVE-2023-24867
    high
  • CVE-2023-24909
    high
  • CVE-2023-23405
    high
  • CVE-2023-23404
    high
  • CVE-2023-23392
    critical
  • CVE-2023-24880
    warning
  • CVE-2023-24856
    high
  • CVE-2023-24876
    high
  • CVE-2023-23412
    high
  • CVE-2023-24863
    high
  • CVE-2023-24872
    high
  • CVE-2023-24862
    high
  • CVE-2023-23420
    high
  • CVE-2023-23409
    high
  • CVE-2023-23417
    high
  • CVE-2023-24908
    high
  • CVE-2023-24869
    high
  • CVE-2023-23416
    high
  • CVE-2023-23419
    high
  • CVE-2023-23394
    high
  • CVE-2023-24857
    high
  • CVE-2023-1017
    high
  • CVE-2023-23402
    high
  • CVE-2023-24906
    high
  • CVE-2023-24864
    high
  • CVE-2023-23388
    high

KB list

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.