Kaspersky ID:
KLA62388
Detect Date:
12/12/2023
Updated:
02/02/2024

Description

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, cause denial of service, overwrite arbitrary files, gain privileges, spoof user interface.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Internet Connection Sharing (ICS) can be exploited remotely to execute arbitrary code.
  2. An information disclosure vulnerability in DHCP Server Service can be exploited remotely to obtain sensitive information.
  3. A denial of service vulnerability in Windows Kernel can be exploited remotely to cause denial of service.
  4. A remote code execution vulnerability in Microsoft WDAC OLE DB provider for SQL Server can be exploited remotely to execute arbitrary code.
  5. A division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality.
  6. An elevation of privilege vulnerability in Windows Telephony Server can be exploited remotely to gain privileges.
  7. A remote code execution vulnerability in Microsoft ODBC Driver can be exploited remotely to execute arbitrary code.
  8. A denial of service vulnerability in Internet Connection Sharing (ICS) can be exploited remotely to cause denial of service.
  9. An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
  10. A remote code execution vulnerability in Windows MSHTML Platform can be exploited remotely to execute arbitrary code.
  11. An elevation of privilege vulnerability in Sysmain Service can be exploited remotely to gain privileges.
  12. A spoofing vulnerability in Windows DPAPI (Data Protection Application Programming Interface) can be exploited remotely to spoof user interface.
  13. A denial of service vulnerability in DHCP Server Service can be exploited remotely to cause denial of service.
  14. An elevation of privilege vulnerability in Windows Cloud Files Mini Filter Driver can be exploited remotely to gain privileges.
  15. An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
  16. A remote code execution vulnerability in Windows Bluetooth Driver can be exploited remotely to execute arbitrary code.
  17. A spoofing vulnerability in Windows DNS can be exploited remotely to spoof user interface.
  18. An elevation of privilege vulnerability in Local Security Authority Subsystem Service can be exploited remotely to gain privileges.
  19. An elevation of privilege vulnerability in XAML Diagnostics can be exploited remotely to gain privileges.
  20. A remote code execution vulnerability in Microsoft USBHUB 3.0 Device Driver can be exploited remotely to execute arbitrary code.
  21. A remote code execution vulnerability in Windows Media can be exploited remotely to execute arbitrary code.
  22. An elevation of privilege vulnerability in Windows Ancillary Function Driver for WinSock can be exploited remotely to gain privileges.

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2023-20588
    high
  • CVE-2023-35630
    critical
  • CVE-2023-35641
    critical
  • CVE-2023-35643
    critical
  • CVE-2023-35635
    high
  • CVE-2023-36006
    critical
  • CVE-2023-36005
    critical
  • CVE-2023-35639
    critical
  • CVE-2023-35642
    high
  • CVE-2023-36011
    critical
  • CVE-2023-35628
    critical
  • CVE-2023-35644
    critical
  • CVE-2023-36004
    critical
  • CVE-2023-35638
    critical
  • CVE-2023-36012
    high
  • CVE-2023-36696
    critical
  • CVE-2023-35633
    critical
  • CVE-2023-35634
    critical
  • CVE-2023-35631
    critical
  • CVE-2023-35622
    critical
  • CVE-2023-36391
    critical
  • CVE-2023-36003
    high
  • CVE-2023-35629
    high
  • CVE-2023-21740
    critical
  • CVE-2023-35632
    critical

KB list

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.