Skip to main content

CVE-2023-36393: CWE-426: Untrusted Search Path in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2023-36393cvecve-2023-36393cwe-426
Published: Tue Nov 14 2023 (11/14/2023, 17:57:26 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows User Interface Application Core Remote Code Execution Vulnerability

AI-Powered Analysis

AILast updated: 06/25/2025, 04:20:51 UTC

Technical Analysis

CVE-2023-36393 is a high-severity vulnerability identified in Microsoft Windows 10 Version 1809, specifically affecting the Windows User Interface Application Core. The vulnerability is categorized under CWE-426, which indicates an Untrusted Search Path issue. This type of vulnerability arises when an application or system component searches for executable files or libraries in directories that are not securely controlled or trusted, allowing an attacker to influence the search path and execute malicious code. In this case, the vulnerability enables remote code execution (RCE), meaning an attacker could run arbitrary code on the affected system remotely. The CVSS 3.1 base score of 7.8 reflects a high severity, with the vector indicating that the attack requires local access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but does require user interaction (UI:R). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). This suggests that successful exploitation could lead to full system compromise, including data theft, system manipulation, and denial of service. The vulnerability affects Windows 10 Version 1809 build 10.0.17763.0, an older but still in-use version of Windows 10. No known exploits are currently reported in the wild, and no official patches have been linked yet, though the vulnerability has been published and acknowledged by Microsoft and CISA. The untrusted search path issue likely involves the Windows UI Application Core loading components or executables from directories that could be manipulated by an attacker, potentially via removable media, network shares, or user-writable directories, leading to execution of malicious payloads when the system or user launches affected components.

Potential Impact

For European organizations, the impact of CVE-2023-36393 can be significant, especially for those still operating legacy systems or environments running Windows 10 Version 1809. Successful exploitation could allow attackers to execute arbitrary code remotely, leading to full system compromise. This can result in data breaches, loss of intellectual property, disruption of business operations, and potential lateral movement within corporate networks. Given the high impact on confidentiality, integrity, and availability, critical infrastructure sectors such as finance, healthcare, manufacturing, and government agencies are at elevated risk. The requirement for user interaction and local access somewhat limits remote exploitation, but social engineering or insider threats could facilitate attacks. Additionally, organizations with less mature patch management or endpoint security controls may be more vulnerable. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits over time. The vulnerability could also be leveraged in targeted attacks or ransomware campaigns, amplifying its impact on European enterprises.

Mitigation Recommendations

1. Immediate mitigation should focus on upgrading affected systems from Windows 10 Version 1809 to a more recent, supported Windows 10 or Windows 11 version where this vulnerability is patched or does not exist. 2. Until upgrades are possible, implement strict application whitelisting and restrict execution permissions on directories that could be used in the untrusted search path, especially user-writable folders and removable media. 3. Enforce the use of fully qualified paths for critical executables and libraries in custom or enterprise applications to avoid reliance on search paths. 4. Educate users about the risks of interacting with unknown files or removable media to reduce the chance of user interaction-based exploitation. 5. Employ endpoint detection and response (EDR) solutions to monitor for suspicious process creation or execution patterns related to this vulnerability. 6. Network segmentation and least privilege principles should be applied to limit the potential for lateral movement if a system is compromised. 7. Monitor vendor advisories and Microsoft security updates closely for the release of official patches or workarounds and apply them promptly. 8. Conduct vulnerability scanning and asset inventory to identify all systems running the affected Windows 10 Version 1809 build to prioritize remediation efforts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-06-21T15:14:27.781Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983cc4522896dcbee543

Added to database: 5/21/2025, 9:09:16 AM

Last enriched: 6/25/2025, 4:20:51 AM

Last updated: 8/17/2025, 2:35:34 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats