Kaspersky ID:
KLA48845
Дата обнаружения:
11/04/2023
Обновлено:
02/02/2024

Описание

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, cause denial of service, gain privileges, bypass security restrictions, spoof user interface.

Below is a complete list of vulnerabilities:

  1. An information disclosure vulnerability in Remote Desktop Protocol Client can be exploited remotely to obtain sensitive information.
  2. A remote code execution vulnerability in Microsoft PostScript and PCL6 Class Printer Driver can be exploited remotely to execute arbitrary code.
  3. An information disclosure vulnerability in Microsoft PostScript and PCL6 Class Printer Driver can be exploited remotely to obtain sensitive information.
  4. A denial of service vulnerability in Windows Secure Channel can be exploited remotely to cause denial of service.
  5. An elevation of privilege vulnerability in Windows Kerberos can be exploited remotely to gain privileges.
  6. A remote code execution vulnerability in Windows DNS Server can be exploited remotely to execute arbitrary code.
  7. An elevation of privilege vulnerability in Windows Win32k can be exploited remotely to gain privileges.
  8. An elevation of privilege vulnerability in Windows Error Reporting Service can be exploited remotely to gain privileges.
  9. An elevation of privilege vulnerability in Windows Ancillary Function Driver for WinSock can be exploited remotely to gain privileges.
  10. An elevation of privilege vulnerability in Windows CNG Key Isolation Service can be exploited remotely to gain privileges.
  11. A security feature bypass vulnerability in Windows Boot Manager can be exploited remotely to bypass security restrictions.
  12. An information disclosure vulnerability in Windows Common Log File System Driver can be exploited remotely to obtain sensitive information.
  13. An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
  14. A remote code execution vulnerability in DHCP Server Service can be exploited remotely to execute arbitrary code.
  15. A remote code execution vulnerability in Windows Kernel can be exploited remotely to execute arbitrary code.
  16. A remote code execution vulnerability in Layer 2 Tunneling Protocol can be exploited remotely to execute arbitrary code.
  17. An elevation of privilege vulnerability in Windows NTLM can be exploited remotely to gain privileges.
  18. A remote code execution vulnerability in Microsoft WDAC OLE DB provider for SQL Server can be exploited remotely to execute arbitrary code.
  19. An elevation of privilege vulnerability in Windows Graphics Component can be exploited remotely to gain privileges.
  20. A denial of service vulnerability in Windows Network Address Translation (NAT) can be exploited remotely to cause denial of service.
  21. An elevation of privilege vulnerability in Windows Advanced Local Procedure Call (ALPC) can be exploited remotely to gain privileges.
  22. A denial of service vulnerability in Microsoft Message Queuing can be exploited remotely to cause denial of service.
  23. A remote code execution vulnerability in Windows Bluetooth Driver can be exploited remotely to execute arbitrary code.
  24. A security feature bypass vulnerability in Windows Group Policy can be exploited remotely to bypass security restrictions.
  25. A remote code execution vulnerability in Remote Procedure Call Runtime can be exploited remotely to execute arbitrary code.
  26. A remote code execution vulnerability in Windows Domain Name Service can be exploited remotely to execute arbitrary code.
  27. An elevation of privilege vulnerability in Windows Registry can be exploited remotely to gain privileges.
  28. An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
  29. An information disclosure vulnerability in Remote Procedure Call Runtime can be exploited remotely to obtain sensitive information.
  30. A denial of service vulnerability in Windows Kernel can be exploited remotely to cause denial of service.
  31. An elevation of privilege vulnerability in Windows Clip Service can be exploited remotely to gain privileges.
  32. A spoofing vulnerability in Windows can be exploited remotely to spoof user interface.
  33. A remote code execution vulnerability in Windows Network Load Balancing can be exploited remotely to execute arbitrary code.
  34. A remote code execution vulnerability in Windows Internet Key Exchange (IKE) Protocol Extensions can be exploited remotely to execute arbitrary code.
  35. A remote code execution vulnerability in Windows Pragmatic General Multicast (PGM) can be exploited remotely to execute arbitrary code.
  36. An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
  37. An information disclosure vulnerability in Windows DNS Server can be exploited remotely to obtain sensitive information.
  38. A security feature bypass vulnerability in Windows Enroll Engine can be exploited remotely to bypass security restrictions.
  39. A remote code execution vulnerability in Windows Point-to-Point Tunneling Protocol can be exploited remotely to execute arbitrary code.
  40. A remote code execution vulnerability in Raw Image Extension can be exploited remotely to execute arbitrary code.
  41. A remote code execution vulnerability in Microsoft Message Queuing can be exploited remotely to execute arbitrary code.
  42. An information disclosure vulnerability in Windows Kernel Memory can be exploited remotely to obtain sensitive information.
  43. An information disclosure vulnerability in Windows Kernel can be exploited remotely to obtain sensitive information.
  44. An elevation of privilege vulnerability in Netlogon RPC can be exploited remotely to gain privileges.
  45. A security feature bypass vulnerability in Windows Lock Screen can be exploited remotely to bypass security restrictions.
  46. A denial of service vulnerability in Windows Secure Socket Tunneling Protocol (SSTP) can be exploited remotely to cause denial of service.
  47. A remote code execution vulnerability in Windows Point-to-Point Protocol over Ethernet (PPPoE) can be exploited remotely to execute arbitrary code.
  48. An elevation of privilege vulnerability in Windows Remote Procedure Call Service (RPCSS) can be exploited remotely to gain privileges.
  49. An information disclosure vulnerability in Windows Network File System can be exploited remotely to obtain sensitive information.

Первичный источник обнаружения

Эксплуатация

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Связанные продукты

Список CVE

  • CVE-2023-28272
    critical
  • CVE-2023-28306
    high
  • CVE-2023-28298
    high
  • CVE-2023-28267
    high
  • CVE-2023-28228
    high
  • CVE-2023-28240
    critical
  • CVE-2023-28238
    critical
  • CVE-2023-28250
    critical
  • CVE-2023-28308
    high
  • CVE-2023-28244
    critical
  • CVE-2023-28252
    critical
  • CVE-2023-28218
    high
  • CVE-2023-24931
    critical
  • CVE-2023-28229
    high
  • CVE-2023-28293
    critical
  • CVE-2023-28231
    critical
  • CVE-2023-28232
    critical
  • CVE-2023-28219
    critical
  • CVE-2023-28275
    critical
  • CVE-2023-21554
    critical
  • CVE-2023-28271
    high
  • CVE-2023-24912
    critical
  • CVE-2023-28254
    high
  • CVE-2023-28253
    high
  • CVE-2023-28268
    critical
  • CVE-2023-28255
    high
  • CVE-2023-28305
    high
  • CVE-2023-28241
    critical
  • CVE-2023-28217
    critical
  • CVE-2023-28216
    high
  • CVE-2023-28302
    critical
  • CVE-2023-28227
    critical
  • CVE-2023-28256
    high
  • CVE-2023-28278
    high
  • CVE-2023-28276
    warning
  • CVE-2023-21727
    critical
  • CVE-2023-28222
    high
  • CVE-2023-28307
    high
  • CVE-2023-28220
    critical
  • CVE-2023-28223
    high
  • CVE-2023-28266
    high
  • CVE-2023-21729
    high
  • CVE-2023-21769
    critical
  • CVE-2023-24887
    critical
  • CVE-2023-24883
    high
  • CVE-2023-28233
    critical
  • CVE-2023-28243
    critical
  • CVE-2023-28274
    critical
  • CVE-2023-28221
    high
  • CVE-2023-28249
    high
  • CVE-2023-24886
    critical
  • CVE-2023-24929
    critical
  • CVE-2023-28237
    critical
  • CVE-2023-28225
    critical
  • CVE-2023-28248
    critical
  • CVE-2023-28236
    critical
  • CVE-2023-24928
    critical
  • CVE-2023-28234
    critical
  • CVE-2023-24925
    critical
  • CVE-2023-28246
    critical
  • CVE-2023-24914
    high
  • CVE-2023-28273
    high
  • CVE-2023-28269
    high
  • CVE-2023-28277
    warning
  • CVE-2023-28226
    high
  • CVE-2023-28291
    critical
  • CVE-2023-28270
    high
  • CVE-2023-24924
    critical
  • CVE-2023-28235
    high
  • CVE-2023-28224
    high
  • CVE-2023-24885
    critical
  • CVE-2023-28292
    critical
  • CVE-2023-24927
    critical
  • CVE-2023-24884
    critical
  • CVE-2023-28297
    critical
  • CVE-2023-28247
    critical
  • CVE-2023-24926
    critical

Список KB

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Confirm changes?
Your message has been sent successfully.