CVE-2023-36046: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Microsoft Windows 11 version 21H2
Windows Authentication Denial of Service Vulnerability
AI Analysis
Technical Summary
CVE-2023-36046 is a vulnerability classified under CWE-59, which pertains to improper link resolution before file access, commonly known as 'link following.' This vulnerability affects Microsoft Windows 11 version 21H2 (build 10.0.0). The flaw arises because the operating system incorrectly handles symbolic links or reparse points during file access operations related to authentication processes. An authenticated local attacker with limited privileges can exploit this weakness to cause a denial of service (DoS) in the Windows Authentication subsystem. Specifically, by manipulating symbolic links or file paths, the attacker can disrupt the normal authentication flow, leading to failures in user authentication or system logins. The vulnerability does not impact confidentiality but severely affects integrity and availability of authentication services. The CVSS v3.1 base score is 7.1, reflecting high severity due to the ease of exploitation by a local authenticated user without requiring user interaction and the significant impact on system availability and integrity. No public exploits or active exploitation in the wild have been reported as of the publication date (November 14, 2023). The vulnerability was reserved on June 20, 2023, and is recognized by CISA as enriched data, indicating its importance. Since no patch links are currently provided, mitigation relies on limiting local user privileges and monitoring authentication systems until official patches are released by Microsoft.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the availability and integrity of authentication services on Windows 11 version 21H2 systems. Disruption of authentication can lead to denial of service conditions, preventing legitimate users from accessing critical systems and services. This can affect business continuity, especially in sectors relying heavily on Windows-based infrastructure such as finance, healthcare, government, and critical infrastructure. The inability to authenticate users may also increase operational costs and reduce productivity. Although confidentiality is not directly impacted, the loss of authentication integrity can indirectly expose organizations to further risks, such as unauthorized access attempts during recovery or fallback procedures. The impact is heightened in environments where local user accounts have elevated privileges or where multi-factor authentication is not enforced. European organizations with large deployments of Windows 11 21H2, particularly those with complex authentication environments, should consider this vulnerability a high priority for remediation.
Mitigation Recommendations
1. Immediately restrict local user privileges on Windows 11 version 21H2 systems to the minimum necessary, preventing untrusted users from having authenticated local access. 2. Implement strict access control policies to limit the creation and manipulation of symbolic links or reparse points by non-administrative users. 3. Monitor authentication logs and system event logs for unusual failures or anomalies that could indicate exploitation attempts. 4. Deploy application whitelisting and endpoint detection and response (EDR) solutions to detect suspicious local activities involving file system link manipulations. 5. Prepare for rapid deployment of Microsoft patches once released by maintaining an up-to-date inventory of affected systems. 6. Consider network segmentation to isolate critical authentication servers and reduce the attack surface. 7. Enforce multi-factor authentication (MFA) to mitigate the impact of authentication disruptions. 8. Educate IT staff about the nature of CWE-59 vulnerabilities and the importance of controlling symbolic link usage in the environment.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2023-36046: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Microsoft Windows 11 version 21H2
Description
Windows Authentication Denial of Service Vulnerability
AI-Powered Analysis
Technical Analysis
CVE-2023-36046 is a vulnerability classified under CWE-59, which pertains to improper link resolution before file access, commonly known as 'link following.' This vulnerability affects Microsoft Windows 11 version 21H2 (build 10.0.0). The flaw arises because the operating system incorrectly handles symbolic links or reparse points during file access operations related to authentication processes. An authenticated local attacker with limited privileges can exploit this weakness to cause a denial of service (DoS) in the Windows Authentication subsystem. Specifically, by manipulating symbolic links or file paths, the attacker can disrupt the normal authentication flow, leading to failures in user authentication or system logins. The vulnerability does not impact confidentiality but severely affects integrity and availability of authentication services. The CVSS v3.1 base score is 7.1, reflecting high severity due to the ease of exploitation by a local authenticated user without requiring user interaction and the significant impact on system availability and integrity. No public exploits or active exploitation in the wild have been reported as of the publication date (November 14, 2023). The vulnerability was reserved on June 20, 2023, and is recognized by CISA as enriched data, indicating its importance. Since no patch links are currently provided, mitigation relies on limiting local user privileges and monitoring authentication systems until official patches are released by Microsoft.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the availability and integrity of authentication services on Windows 11 version 21H2 systems. Disruption of authentication can lead to denial of service conditions, preventing legitimate users from accessing critical systems and services. This can affect business continuity, especially in sectors relying heavily on Windows-based infrastructure such as finance, healthcare, government, and critical infrastructure. The inability to authenticate users may also increase operational costs and reduce productivity. Although confidentiality is not directly impacted, the loss of authentication integrity can indirectly expose organizations to further risks, such as unauthorized access attempts during recovery or fallback procedures. The impact is heightened in environments where local user accounts have elevated privileges or where multi-factor authentication is not enforced. European organizations with large deployments of Windows 11 21H2, particularly those with complex authentication environments, should consider this vulnerability a high priority for remediation.
Mitigation Recommendations
1. Immediately restrict local user privileges on Windows 11 version 21H2 systems to the minimum necessary, preventing untrusted users from having authenticated local access. 2. Implement strict access control policies to limit the creation and manipulation of symbolic links or reparse points by non-administrative users. 3. Monitor authentication logs and system event logs for unusual failures or anomalies that could indicate exploitation attempts. 4. Deploy application whitelisting and endpoint detection and response (EDR) solutions to detect suspicious local activities involving file system link manipulations. 5. Prepare for rapid deployment of Microsoft patches once released by maintaining an up-to-date inventory of affected systems. 6. Consider network segmentation to isolate critical authentication servers and reduce the attack surface. 7. Enforce multi-factor authentication (MFA) to mitigate the impact of authentication disruptions. 8. Educate IT staff about the nature of CWE-59 vulnerabilities and the importance of controlling symbolic link usage in the environment.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2023-06-20T20:44:39.829Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983bc4522896dcbee4fe
Added to database: 5/21/2025, 9:09:15 AM
Last enriched: 10/9/2025, 12:23:36 AM
Last updated: 12/3/2025, 2:12:49 PM
Views: 43
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13756: CWE-862 Missing Authorization in techjewel Fluent Booking – The Ultimate Appointments Scheduling, Events Booking, Events Calendar Solution
MediumCVE-2025-13401: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in optimizingmatters Autoptimize
MediumCVE-2025-13390: CWE-303 Incorrect Implementation of Authentication Algorithm in listingthemes WP Directory Kit
CriticalCVE-2025-13359: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in stevejburge Tag, Category, and Taxonomy Manager – AI Autotagger with OpenAI
MediumCVE-2025-13354: CWE-862 Missing Authorization in stevejburge Tag, Category, and Taxonomy Manager – AI Autotagger with OpenAI
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.