Description
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, cause denial of service, overwrite arbitrary files, gain privileges, spoof user interface.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in Internet Connection Sharing (ICS) can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in DHCP Server Service can be exploited remotely to obtain sensitive information.
- A denial of service vulnerability in Windows Kernel can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Microsoft WDAC OLE DB provider for SQL Server can be exploited remotely to execute arbitrary code.
- A division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality.
- An elevation of privilege vulnerability in Windows Telephony Server can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft ODBC Driver can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Internet Connection Sharing (ICS) can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows MSHTML Platform can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Sysmain Service can be exploited remotely to gain privileges.
- A spoofing vulnerability in Windows DPAPI (Data Protection Application Programming Interface) can be exploited remotely to spoof user interface.
- A denial of service vulnerability in DHCP Server Service can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Cloud Files Mini Filter Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Bluetooth Driver can be exploited remotely to execute arbitrary code.
- A spoofing vulnerability in Windows DNS can be exploited remotely to spoof user interface.
- An elevation of privilege vulnerability in Local Security Authority Subsystem Service can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in XAML Diagnostics can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft USBHUB 3.0 Device Driver can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Media can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Ancillary Function Driver for WinSock can be exploited remotely to gain privileges.
Original advisories
- CVE-2023-35641
- CVE-2023-35643
- CVE-2023-35635
- CVE-2023-36006
- CVE-2023-20588
- CVE-2023-36005
- CVE-2023-35639
- CVE-2023-35642
- CVE-2023-36011
- CVE-2023-35628
- CVE-2023-35644
- CVE-2023-36004
- CVE-2023-35638
- CVE-2023-36012
- CVE-2023-36696
- CVE-2023-35633
- CVE-2023-35634
- CVE-2023-35631
- CVE-2023-35622
- CVE-2023-36391
- CVE-2023-36003
- CVE-2023-35629
- CVE-2023-21740
- CVE-2023-35632
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-10
- Microsoft-Windows-Server-2016
- Microsoft-Windows-Server-2019
- Microsoft-Windows-11
CVE list
- CVE-2023-20588 high
- CVE-2023-35630 critical
- CVE-2023-35641 critical
- CVE-2023-35643 critical
- CVE-2023-35635 high
- CVE-2023-36006 critical
- CVE-2023-36005 critical
- CVE-2023-35639 critical
- CVE-2023-35642 high
- CVE-2023-36011 critical
- CVE-2023-35628 critical
- CVE-2023-35644 critical
- CVE-2023-36004 critical
- CVE-2023-35638 critical
- CVE-2023-36012 high
- CVE-2023-36696 critical
- CVE-2023-35633 critical
- CVE-2023-35634 critical
- CVE-2023-35631 critical
- CVE-2023-35622 critical
- CVE-2023-36391 critical
- CVE-2023-36003 high
- CVE-2023-35629 high
- CVE-2023-21740 critical
- CVE-2023-35632 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!