CVE-2023-36047: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Microsoft Windows 10 Version 1809
Windows Authentication Elevation of Privilege Vulnerability
AI Analysis
Technical Summary
CVE-2023-36047 is a high-severity elevation of privilege vulnerability affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability is classified under CWE-59, which pertains to improper link resolution before file access, commonly referred to as 'link following'. This flaw arises when the operating system incorrectly resolves symbolic links or shortcuts before accessing files, potentially allowing an attacker with limited privileges to manipulate file access paths. By exploiting this, an attacker who already has some level of access (low privileges) can escalate their privileges to a higher level, potentially SYSTEM or administrative privileges, thereby gaining full control over the affected system. The CVSS v3.1 base score is 7.8, indicating a high severity, with the vector string AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. This means the attack requires local access (AV:L), low attack complexity (AC:L), and low privileges (PR:L), but no user interaction (UI:N). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits in the wild have been reported yet, and no official patches are linked in the provided data, suggesting that mitigation may rely on vendor updates or workarounds once available. The vulnerability specifically targets Windows 10 Version 1809, an older but still in-use version of Windows 10, which may be present in enterprise environments that have not upgraded to newer versions. The flaw's exploitation could allow attackers to bypass security controls and execute arbitrary code with elevated privileges, leading to full system compromise, data theft, or disruption of services.
Potential Impact
For European organizations, the impact of CVE-2023-36047 can be significant, especially in sectors where Windows 10 Version 1809 remains in use, such as manufacturing, healthcare, government, and critical infrastructure. An attacker exploiting this vulnerability could escalate privileges from a low-level user account to administrative control, enabling them to install malware, exfiltrate sensitive data, disrupt operations, or move laterally within a network. This is particularly concerning for organizations subject to strict data protection regulations like GDPR, where unauthorized access to personal data can lead to severe legal and financial consequences. Additionally, the vulnerability could be leveraged in targeted attacks against high-value assets or critical systems, increasing the risk of operational downtime and reputational damage. Since the attack requires local access, the threat is heightened in environments where endpoint security is weak, or where attackers can gain initial footholds through phishing, compromised credentials, or insider threats. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as proof-of-concept code or weaponized exploits could emerge.
Mitigation Recommendations
1. Prioritize upgrading affected systems from Windows 10 Version 1809 to a supported and patched version of Windows 10 or Windows 11, as Microsoft regularly releases security updates for newer versions. 2. Implement strict access controls and endpoint protection to limit local user privileges and prevent unauthorized local access. 3. Employ application whitelisting and restrict the execution of untrusted code to reduce the risk of privilege escalation exploitation. 4. Monitor systems for unusual file access patterns or symbolic link manipulations that could indicate exploitation attempts. 5. Use enhanced logging and alerting on privilege escalation events to detect potential abuse early. 6. If upgrading is not immediately feasible, consider applying any available vendor workarounds or mitigations documented by Microsoft or security advisories, such as disabling or restricting features that handle symbolic links or shortcuts. 7. Conduct regular vulnerability assessments and penetration testing focused on privilege escalation vectors to identify and remediate weaknesses proactively. 8. Educate users and administrators about the risks of local privilege escalation and enforce the principle of least privilege to minimize attack surfaces.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands, Belgium, Sweden, Finland
CVE-2023-36047: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Microsoft Windows 10 Version 1809
Description
Windows Authentication Elevation of Privilege Vulnerability
AI-Powered Analysis
Technical Analysis
CVE-2023-36047 is a high-severity elevation of privilege vulnerability affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability is classified under CWE-59, which pertains to improper link resolution before file access, commonly referred to as 'link following'. This flaw arises when the operating system incorrectly resolves symbolic links or shortcuts before accessing files, potentially allowing an attacker with limited privileges to manipulate file access paths. By exploiting this, an attacker who already has some level of access (low privileges) can escalate their privileges to a higher level, potentially SYSTEM or administrative privileges, thereby gaining full control over the affected system. The CVSS v3.1 base score is 7.8, indicating a high severity, with the vector string AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. This means the attack requires local access (AV:L), low attack complexity (AC:L), and low privileges (PR:L), but no user interaction (UI:N). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits in the wild have been reported yet, and no official patches are linked in the provided data, suggesting that mitigation may rely on vendor updates or workarounds once available. The vulnerability specifically targets Windows 10 Version 1809, an older but still in-use version of Windows 10, which may be present in enterprise environments that have not upgraded to newer versions. The flaw's exploitation could allow attackers to bypass security controls and execute arbitrary code with elevated privileges, leading to full system compromise, data theft, or disruption of services.
Potential Impact
For European organizations, the impact of CVE-2023-36047 can be significant, especially in sectors where Windows 10 Version 1809 remains in use, such as manufacturing, healthcare, government, and critical infrastructure. An attacker exploiting this vulnerability could escalate privileges from a low-level user account to administrative control, enabling them to install malware, exfiltrate sensitive data, disrupt operations, or move laterally within a network. This is particularly concerning for organizations subject to strict data protection regulations like GDPR, where unauthorized access to personal data can lead to severe legal and financial consequences. Additionally, the vulnerability could be leveraged in targeted attacks against high-value assets or critical systems, increasing the risk of operational downtime and reputational damage. Since the attack requires local access, the threat is heightened in environments where endpoint security is weak, or where attackers can gain initial footholds through phishing, compromised credentials, or insider threats. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as proof-of-concept code or weaponized exploits could emerge.
Mitigation Recommendations
1. Prioritize upgrading affected systems from Windows 10 Version 1809 to a supported and patched version of Windows 10 or Windows 11, as Microsoft regularly releases security updates for newer versions. 2. Implement strict access controls and endpoint protection to limit local user privileges and prevent unauthorized local access. 3. Employ application whitelisting and restrict the execution of untrusted code to reduce the risk of privilege escalation exploitation. 4. Monitor systems for unusual file access patterns or symbolic link manipulations that could indicate exploitation attempts. 5. Use enhanced logging and alerting on privilege escalation events to detect potential abuse early. 6. If upgrading is not immediately feasible, consider applying any available vendor workarounds or mitigations documented by Microsoft or security advisories, such as disabling or restricting features that handle symbolic links or shortcuts. 7. Conduct regular vulnerability assessments and penetration testing focused on privilege escalation vectors to identify and remediate weaknesses proactively. 8. Educate users and administrators about the risks of local privilege escalation and enforce the principle of least privilege to minimize attack surfaces.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2023-06-20T20:44:39.829Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983cc4522896dcbee50b
Added to database: 5/21/2025, 9:09:16 AM
Last enriched: 6/25/2025, 4:34:36 AM
Last updated: 8/12/2025, 3:56:08 PM
Views: 10
Related Threats
CVE-2025-8983: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8982: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8981: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-50862: n/a
MediumCVE-2025-50861: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.