Skip to main content

CVE-2023-23379: CWE-23: Relative Path Traversal in Microsoft Microsoft Defender for IoT

High
VulnerabilityCVE-2023-23379cvecve-2023-23379cwe-23
Published: Tue Feb 14 2023 (02/14/2023, 19:32:58 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Microsoft Defender for IoT

Description

Microsoft Defender for IoT Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 06/25/2025, 17:02:39 UTC

Technical Analysis

CVE-2023-23379 is a high-severity elevation of privilege vulnerability affecting Microsoft Defender for IoT version 22.0.0. The vulnerability is classified as a Relative Path Traversal (CWE-23), which allows an attacker with limited privileges (low-level privileges) on the affected system to manipulate file paths in a way that accesses or modifies files outside the intended directory scope. This can lead to unauthorized access to sensitive files or execution of malicious code, resulting in elevation of privilege. The CVSS 3.1 base score is 7.8, indicating a high impact on confidentiality, integrity, and availability. The attack vector is local (AV:L), requiring the attacker to have some level of access to the system (PR:L), but no user interaction is needed (UI:N). The vulnerability does not require user interaction and the scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. Exploitation could allow an attacker to gain higher privileges, potentially compromising the Defender for IoT environment and the underlying IoT infrastructure it protects. No known exploits are reported in the wild as of the published date. The vulnerability was reserved in January 2023 and published in February 2023. The lack of patch links suggests that a fix may be pending or not yet publicly available, emphasizing the need for vigilance and mitigation by affected organizations.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on Microsoft Defender for IoT to secure critical industrial control systems, manufacturing environments, smart infrastructure, and other IoT deployments. An attacker exploiting this vulnerability could elevate privileges locally, potentially gaining control over the Defender for IoT system and thereby undermining the security monitoring and protection of connected IoT devices. This could lead to unauthorized access to sensitive operational data, disruption of IoT device availability, and manipulation of device behavior, which in critical sectors such as energy, manufacturing, transportation, and healthcare could cause operational downtime, safety hazards, and data breaches. Given the increasing adoption of IoT solutions in Europe, particularly in sectors aligned with the EU’s digital and industrial strategies, this vulnerability poses a risk to both private enterprises and public infrastructure. The local attack vector limits remote exploitation, but insider threats or attackers who have gained initial footholds could leverage this vulnerability to escalate privileges and deepen their access.

Mitigation Recommendations

European organizations should immediately audit their use of Microsoft Defender for IoT, specifically checking for version 22.0.0 deployments. Until an official patch is released, organizations should implement strict access controls to limit local user privileges and restrict access to systems running Defender for IoT. Monitoring and logging should be enhanced to detect unusual file access patterns or privilege escalation attempts. Network segmentation should isolate IoT security management systems from general user environments to reduce the risk of local attackers reaching these systems. Employing application whitelisting and integrity monitoring on Defender for IoT components can help detect unauthorized modifications. Additionally, organizations should engage with Microsoft support channels to obtain any available mitigations or workarounds and stay updated on patch releases. Training and awareness for system administrators on this specific vulnerability and its exploitation method can further reduce risk. Finally, incorporating this vulnerability into incident response plans will prepare organizations to respond swiftly if exploitation attempts are detected.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-01-11T22:08:03.134Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983ac4522896dcbed0c9

Added to database: 5/21/2025, 9:09:14 AM

Last enriched: 6/25/2025, 5:02:39 PM

Last updated: 7/26/2025, 5:07:54 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats