Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-28229: CWE-591: Sensitive Data Storage in Improperly Locked Memory in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2023-28229cvecve-2023-28229cwe-591
Published: Tue Apr 11 2023 (04/11/2023, 19:13:37 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows CNG Key Isolation Service Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 10/28/2025, 23:01:35 UTC

Technical Analysis

CVE-2023-28229 is a vulnerability identified in Microsoft Windows 10 Version 1809, specifically affecting the Cryptography Next Generation (CNG) Key Isolation Service. The vulnerability is classified under CWE-591, which involves sensitive data being stored in memory that is not properly locked, allowing unauthorized processes to potentially access this data. The CNG Key Isolation Service is responsible for protecting private keys and cryptographic operations, so improper memory locking can lead to exposure of sensitive cryptographic material. An attacker with low privileges on the system could exploit this flaw to elevate their privileges, gaining higher-level access to the system. The CVSS v3.1 score is 7.0 (high), reflecting the vulnerability's impact on confidentiality, integrity, and availability, combined with the requirement for local access and high attack complexity. No user interaction is required, but the attacker must have some level of access to the affected system. There are no known public exploits or patches currently available, which suggests that organizations should prioritize mitigation through system upgrades or other controls. The vulnerability's presence in an older Windows 10 version (1809) means that systems not updated or migrated to newer versions remain vulnerable. This flaw could be leveraged in targeted attacks to compromise sensitive cryptographic keys, potentially undermining system security and trust.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those still operating legacy Windows 10 Version 1809 systems in enterprise or critical infrastructure environments. Successful exploitation could lead to unauthorized privilege escalation, allowing attackers to access sensitive cryptographic keys and perform unauthorized actions with elevated rights. This could compromise the confidentiality and integrity of sensitive data, disrupt critical services, and facilitate further lateral movement within networks. The impact is particularly severe for sectors such as finance, healthcare, government, and energy, where cryptographic protections are foundational to security. Although exploitation requires local access and high complexity, insider threats or attackers who have gained initial footholds could leverage this vulnerability to deepen their control. The absence of known exploits in the wild reduces immediate risk but does not eliminate the potential for future attacks. Organizations relying on Windows 10 1809 should consider this vulnerability a priority for remediation to avoid exposure to privilege escalation attacks.

Mitigation Recommendations

1. Upgrade affected systems from Windows 10 Version 1809 to a supported and fully patched version of Windows 10 or Windows 11 to eliminate the vulnerability. 2. If upgrading is not immediately feasible, implement strict access controls to limit local user access to trusted personnel only, reducing the risk of exploitation. 3. Employ endpoint detection and response (EDR) solutions to monitor for unusual privilege escalation attempts or suspicious activity related to the CNG Key Isolation Service. 4. Harden systems by disabling unnecessary services and restricting permissions on cryptographic service components to minimize attack surface. 5. Conduct regular audits of user privileges and remove or restrict accounts that do not require local access. 6. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises. 7. Monitor vendor advisories for patches or updates addressing this vulnerability and apply them promptly once available. 8. Educate IT staff about the risks of legacy systems and the importance of timely patching and upgrades.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-03-13T22:18:32.384Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9a7247d717aace21907

Added to database: 10/21/2025, 7:06:15 PM

Last enriched: 10/28/2025, 11:01:35 PM

Last updated: 10/30/2025, 3:45:08 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats