Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-36394: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2023-36394cvecve-2023-36394cwe-59
Published: Tue Nov 14 2023 (11/14/2023, 17:57:26 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Search Service Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 10/09/2025, 00:25:32 UTC

Technical Analysis

CVE-2023-36394 is a vulnerability classified under CWE-59 (Improper Link Resolution Before File Access) affecting the Windows Search Service on Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw arises because the Windows Search Service improperly handles symbolic links or junction points before accessing files, which can be exploited by an attacker with limited privileges to escalate their rights on the system. Specifically, an attacker with low privileges can create or manipulate symbolic links to trick the service into accessing or modifying files or directories it should not, thereby gaining elevated privileges. The vulnerability has a CVSS 3.1 base score of 7.0, indicating high severity, with an attack vector of local (AV:L), requiring high attack complexity (AC:H), and low privileges (PR:L). No user interaction is needed (UI:N), and the scope remains unchanged (S:U). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning a successful exploit could fully compromise the system. Although no public exploits are known at this time, the vulnerability is significant due to the potential for privilege escalation, which can be a stepping stone for further attacks. The vulnerability was published on November 14, 2023, and is relevant primarily to legacy Windows 10 1809 installations, which are still in use in some enterprise environments. The lack of patch links in the provided data suggests that organizations should verify patch availability directly from Microsoft and consider interim mitigations. The Windows Search Service is a core component, and exploitation could allow attackers to bypass security controls, access sensitive files, or execute arbitrary code with elevated privileges.

Potential Impact

For European organizations, the impact of CVE-2023-36394 can be substantial, especially for those still operating Windows 10 Version 1809 in production environments. Successful exploitation could lead to full system compromise, enabling attackers to access confidential data, alter or delete critical files, and disrupt availability of services. This is particularly concerning for sectors such as finance, healthcare, government, and critical infrastructure, where data confidentiality and system integrity are paramount. The elevation of privilege can facilitate lateral movement within networks, increasing the risk of widespread compromise. Additionally, organizations subject to GDPR and other stringent data protection regulations could face compliance violations and significant penalties if sensitive personal data is exposed due to exploitation of this vulnerability. The local attack vector limits remote exploitation, but insider threats or attackers with initial footholds could leverage this vulnerability to escalate privileges and deepen their access. Given the high attack complexity, exploitation is not trivial but remains a credible risk in environments with inadequate patch management or legacy system dependencies.

Mitigation Recommendations

1. Verify and apply the latest security updates from Microsoft addressing CVE-2023-36394 as soon as they become available. 2. If patches are not yet released, implement strict access controls to limit local user permissions, especially restricting the ability to create or modify symbolic links or junction points. 3. Employ application whitelisting and endpoint detection and response (EDR) solutions to monitor and block suspicious activities related to symbolic link creation or manipulation. 4. Conduct regular audits of systems running Windows 10 Version 1809 to identify and remediate unauthorized local accounts or privilege escalations. 5. Consider upgrading legacy Windows 10 1809 systems to supported versions with ongoing security updates to reduce exposure. 6. Educate IT and security teams about the risks of symbolic link vulnerabilities and ensure monitoring of Windows Search Service logs for anomalies. 7. Use Group Policy or security baselines to restrict or disable unnecessary services or features related to Windows Search where feasible. 8. Implement network segmentation to limit the impact of compromised endpoints and reduce lateral movement opportunities. 9. Maintain robust incident response plans to quickly detect and respond to potential exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-06-21T15:14:27.781Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983cc4522896dcbee54b

Added to database: 5/21/2025, 9:09:16 AM

Last enriched: 10/9/2025, 12:25:32 AM

Last updated: 12/3/2025, 11:38:59 AM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats