Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-36033: CWE-822: Untrusted Pointer Dereference in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2023-36033cvecve-2023-36033cwe-822
Published: Tue Nov 14 2023 (11/14/2023, 17:57:37 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

CVE-2023-36033 is a high-severity elevation of privilege vulnerability in the Windows DWM Core Library affecting Windows 10 Version 1809 (build 10. 0. 17763. 0). It involves an untrusted pointer dereference (CWE-822) that can lead to full compromise of confidentiality, integrity, and availability without requiring user interaction but with limited privileges. Although no known exploits are currently in the wild, successful exploitation could allow attackers to escalate privileges locally and execute arbitrary code with elevated rights. This vulnerability is particularly relevant for European organizations still running legacy Windows 10 1809 systems, especially in sectors with strict data protection requirements. Mitigation requires applying available patches or workarounds, restricting access to vulnerable systems, and monitoring for suspicious local activity. Countries with significant legacy Windows 10 1809 usage and critical infrastructure relying on these systems, such as Germany, France, Italy, and the UK, are most at risk. Given the high impact and moderate exploit complexity, organizations must prioritize remediation to prevent potential privilege escalation attacks.

AI-Powered Analysis

AILast updated: 10/28/2025, 23:51:32 UTC

Technical Analysis

CVE-2023-36033 is an elevation of privilege vulnerability classified under CWE-822 (Untrusted Pointer Dereference) found in the Windows Desktop Window Manager (DWM) Core Library of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability arises when the DWM Core Library dereferences pointers that can be influenced by an attacker with limited privileges, leading to memory corruption and potential execution of arbitrary code with elevated privileges. The CVSS v3.1 base score is 7.8, indicating a high severity level. The attack vector is local (AV:L), requiring low attack complexity (AC:L) and low privileges (PR:L), but no user interaction (UI:N). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). This means an attacker who already has limited access to the system could exploit this flaw to gain full control, compromising system security. No public exploits have been reported yet, but the vulnerability was reserved in June 2023 and published in November 2023, with Microsoft having acknowledged it and possibly providing patches or advisories. The vulnerability is critical for environments where Windows 10 1809 remains in use, especially as this version is out of mainstream support, increasing the risk of unpatched systems. The technical root cause is the unsafe handling of pointers within the DWM Core Library, leading to potential memory corruption and privilege escalation.

Potential Impact

For European organizations, the impact of CVE-2023-36033 can be significant, particularly in sectors such as government, finance, healthcare, and critical infrastructure where Windows 10 Version 1809 may still be operational. Successful exploitation allows attackers with limited local access to escalate privileges to SYSTEM level, potentially leading to full system compromise, data theft, disruption of services, or deployment of ransomware. The high impact on confidentiality, integrity, and availability means sensitive data and critical operations could be jeopardized. Organizations relying on legacy systems or with insufficient patch management processes are at higher risk. Additionally, the lack of user interaction requirement facilitates automated or stealthy exploitation by insiders or malware that has gained initial foothold. This vulnerability could be leveraged in targeted attacks or lateral movement within networks, increasing the overall threat landscape for European enterprises.

Mitigation Recommendations

To mitigate CVE-2023-36033, European organizations should: 1) Immediately apply any available security patches or updates from Microsoft for Windows 10 Version 1809. If official patches are unavailable, consider upgrading to a supported Windows version to eliminate exposure. 2) Restrict local access to vulnerable systems by enforcing strict access controls, limiting administrative privileges, and using endpoint protection solutions to detect suspicious behavior. 3) Employ application whitelisting and behavior monitoring to detect attempts to exploit pointer dereference vulnerabilities. 4) Conduct thorough audits of systems running Windows 10 1809 to identify and remediate unpatched devices. 5) Use network segmentation to isolate legacy systems and reduce the attack surface. 6) Educate IT staff about the vulnerability and ensure incident response plans include steps for privilege escalation scenarios. 7) Monitor logs and alerts for unusual local privilege escalation attempts. These targeted actions go beyond generic advice by focusing on legacy system management, access restriction, and proactive detection tailored to this vulnerability's characteristics.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-06-20T20:44:39.825Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983bc4522896dcbee4ae

Added to database: 5/21/2025, 9:09:15 AM

Last enriched: 10/28/2025, 11:51:32 PM

Last updated: 12/2/2025, 8:22:26 AM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats