Skip to main content

CVE-2023-36028: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809

Critical
VulnerabilityCVE-2023-36028cvecve-2023-36028cwe-122
Published: Tue Nov 14 2023 (11/14/2023, 17:57:34 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability

AI-Powered Analysis

AILast updated: 06/25/2025, 04:51:19 UTC

Technical Analysis

CVE-2023-36028 is a critical heap-based buffer overflow vulnerability (CWE-122) affecting Microsoft Windows 10 Version 1809, specifically within the Protected Extensible Authentication Protocol (PEAP) implementation. PEAP is widely used for secure wireless network authentication, encapsulating EAP within an encrypted and authenticated Transport Layer Security (TLS) tunnel. This vulnerability arises due to improper handling of input data in the PEAP component, leading to a heap-based buffer overflow condition. An attacker who can send specially crafted authentication messages to a vulnerable system can exploit this flaw to execute arbitrary code remotely without requiring any authentication or user interaction. The vulnerability has a CVSS 3.1 base score of 9.8, indicating critical severity with high impact on confidentiality, integrity, and availability. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The scope is unchanged (S:U), meaning the impact is confined to the vulnerable component but can fully compromise the affected system. Exploitation could allow an attacker to gain full control over the system, potentially leading to data theft, system manipulation, or disruption of services. Although no known exploits are currently reported in the wild, the severity and ease of exploitation make this a high-risk vulnerability requiring immediate attention. The vulnerability affects Windows 10 Version 1809 build 17763.0, which is an older but still in-use version of Windows 10, often found in enterprise environments where legacy systems persist. No official patches or mitigation links were provided at the time of publication, emphasizing the need for organizations to monitor for updates and apply them promptly once available.

Potential Impact

For European organizations, the impact of CVE-2023-36028 can be significant, especially in sectors relying heavily on Windows 10 Version 1809 systems for wireless network authentication via PEAP. This includes government agencies, financial institutions, healthcare providers, and critical infrastructure operators. Successful exploitation could lead to full system compromise, enabling attackers to exfiltrate sensitive data, disrupt operations, or use compromised machines as footholds for lateral movement within networks. Given the vulnerability requires no authentication or user interaction, attackers could remotely target exposed systems over the network, increasing the risk of widespread exploitation in environments with insufficient network segmentation or outdated systems. The confidentiality, integrity, and availability of critical systems and data could be severely affected, potentially leading to regulatory non-compliance under GDPR and other European data protection laws. Additionally, the disruption of authentication services could impact business continuity and trust in secure wireless communications.

Mitigation Recommendations

1. Immediate identification and inventory of all systems running Windows 10 Version 1809 (build 17763.0) within the organization, focusing on those using PEAP for wireless authentication. 2. Apply any available security updates or patches from Microsoft as soon as they are released. In the absence of official patches, consider temporary mitigations such as disabling PEAP authentication or restricting network access to vulnerable systems. 3. Implement network-level controls to limit exposure of vulnerable systems, including strict firewall rules, network segmentation, and isolation of legacy systems from critical infrastructure. 4. Monitor network traffic for anomalous authentication attempts or malformed PEAP messages that could indicate exploitation attempts. 5. Employ endpoint detection and response (EDR) solutions capable of identifying suspicious activity related to authentication processes and heap-based memory corruption. 6. Educate IT and security teams about the vulnerability specifics to ensure rapid response and incident handling. 7. Plan and execute a phased upgrade strategy to move away from Windows 10 Version 1809 to supported and patched Windows versions to reduce long-term risk. 8. Review and strengthen wireless network security policies, including the use of stronger authentication protocols where feasible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-06-20T20:44:39.825Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983bc4522896dcbee474

Added to database: 5/21/2025, 9:09:15 AM

Last enriched: 6/25/2025, 4:51:19 AM

Last updated: 8/17/2025, 10:13:35 AM

Views: 20

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats