Skip to main content

CVE-2023-36395: CWE-190: Integer Overflow or Wraparound in Microsoft Windows Server 2019

High
VulnerabilityCVE-2023-36395cvecve-2023-36395cwe-190
Published: Tue Nov 14 2023 (11/14/2023, 17:57:25 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows Server 2019

Description

Windows Deployment Services Denial of Service Vulnerability

AI-Powered Analysis

AILast updated: 06/25/2025, 04:20:17 UTC

Technical Analysis

CVE-2023-36395 is a high-severity vulnerability identified in Microsoft Windows Server 2019, specifically version 10.0.17763.0. The vulnerability is classified under CWE-190, which pertains to integer overflow or wraparound errors. This flaw exists within the Windows Deployment Services (WDS) component, a service used to deploy Windows operating systems remotely over a network. The vulnerability allows an unauthenticated attacker to cause a denial of service (DoS) condition remotely without requiring any user interaction. The root cause is an integer overflow or wraparound, which typically occurs when an arithmetic operation attempts to create a numeric value that is outside the range that can be represented with a given number of bits. In this case, the overflow leads to improper handling of data within WDS, causing the service or the entire system to crash or become unresponsive. The CVSS v3.1 base score is 7.5, indicating a high severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The vulnerability impacts availability (A:H) but does not affect confidentiality or integrity. No known exploits are currently reported in the wild, and no official patches have been linked yet. However, the vulnerability is publicly disclosed and should be considered a significant risk for organizations relying on Windows Server 2019 with WDS enabled.

Potential Impact

For European organizations, the impact of CVE-2023-36395 could be substantial, particularly for those utilizing Windows Server 2019 in their IT infrastructure with Windows Deployment Services enabled. WDS is commonly used in enterprise environments for automated OS deployment and system provisioning. A successful exploitation could lead to denial of service, disrupting deployment workflows and potentially causing downtime in critical IT operations. This could affect data center operations, cloud service providers, managed service providers, and large enterprises that rely on rapid provisioning and maintenance of Windows systems. The disruption could delay system updates, patch deployments, and new system rollouts, impacting business continuity. Although the vulnerability does not compromise data confidentiality or integrity, the loss of availability can have cascading effects on operational efficiency and service delivery. Given that no authentication or user interaction is required, attackers could remotely target vulnerable servers over the network, increasing the risk of widespread disruption if exploited at scale.

Mitigation Recommendations

1. Immediate mitigation should include disabling Windows Deployment Services if it is not essential to business operations, thereby removing the attack surface. 2. For environments that require WDS, implement network segmentation and firewall rules to restrict access to WDS servers only to trusted management networks and authorized personnel. 3. Monitor network traffic for unusual or malformed packets targeting WDS ports to detect potential exploitation attempts early. 4. Employ intrusion detection and prevention systems (IDS/IPS) with updated signatures to identify and block exploit attempts related to integer overflow vulnerabilities. 5. Regularly audit and update Windows Server 2019 systems to the latest cumulative updates and security patches as soon as Microsoft releases a fix for this vulnerability. 6. Establish robust incident response procedures to quickly isolate and remediate affected systems in case of a DoS attack. 7. Consider deploying redundancy and failover mechanisms for critical deployment services to minimize operational impact during an outage. 8. Conduct penetration testing and vulnerability assessments focusing on WDS configurations to ensure no additional weaknesses exist.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-06-21T15:14:27.782Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983cc4522896dcbee553

Added to database: 5/21/2025, 9:09:16 AM

Last enriched: 6/25/2025, 4:20:17 AM

Last updated: 7/26/2025, 8:17:55 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats