Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-36395: CWE-190: Integer Overflow or Wraparound in Microsoft Windows Server 2019

0
High
VulnerabilityCVE-2023-36395cvecve-2023-36395cwe-190
Published: Tue Nov 14 2023 (11/14/2023, 17:57:25 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows Server 2019

Description

Windows Deployment Services Denial of Service Vulnerability

AI-Powered Analysis

AILast updated: 10/09/2025, 00:25:46 UTC

Technical Analysis

CVE-2023-36395 is a vulnerability identified in Microsoft Windows Server 2019, specifically affecting the Windows Deployment Services (WDS) component. The issue is classified as an integer overflow or wraparound (CWE-190), which occurs when an arithmetic operation attempts to create a numeric value that is outside the range that can be represented with a given number of bits, causing unexpected behavior. In this case, the vulnerability allows an unauthenticated attacker to send specially crafted network packets to the WDS service, triggering the integer overflow condition. This leads to a denial of service (DoS) by crashing or destabilizing the WDS process, thereby disrupting deployment services. The CVSS v3.1 base score is 7.5 (high), reflecting the network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:H) without affecting confidentiality or integrity. The vulnerability was published on November 14, 2023, with no known exploits in the wild at the time of reporting. The lack of a patch link suggests that a fix may be pending or in development. WDS is commonly used in enterprise environments for automated deployment of Windows operating systems, making this vulnerability relevant for organizations relying on this service for IT infrastructure management.

Potential Impact

The primary impact of CVE-2023-36395 is a denial of service condition affecting Windows Deployment Services on Windows Server 2019. For European organizations, this could translate into disruption of automated OS deployment and imaging processes, potentially delaying system provisioning, updates, or recovery operations. Critical infrastructure, government agencies, and large enterprises that depend on WDS for efficient IT operations may experience operational downtime or increased manual workload. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact can affect business continuity and service delivery. The ease of exploitation without authentication and no user interaction required increases the risk of opportunistic attacks, especially in environments where WDS is exposed or insufficiently segmented. The absence of known exploits currently provides a window for proactive mitigation, but the high CVSS score indicates that the vulnerability should be treated seriously to avoid potential future exploitation.

Mitigation Recommendations

1. Monitor Microsoft security advisories closely and apply official patches or updates for Windows Server 2019 and Windows Deployment Services as soon as they become available. 2. Restrict network access to Windows Deployment Services to trusted management networks only, using firewalls, network segmentation, or VPNs to limit exposure to untrusted sources. 3. Implement intrusion detection and prevention systems (IDS/IPS) to monitor for anomalous or malformed traffic targeting WDS ports and protocols. 4. Regularly audit and harden Windows Server configurations, disabling unnecessary services and enforcing least privilege principles. 5. Establish robust incident response procedures to quickly identify and mitigate service disruptions related to WDS. 6. Consider alternative deployment methods or backup deployment infrastructure to maintain operational continuity in case of WDS service outages. 7. Educate IT staff about this vulnerability and ensure they understand the importance of timely patching and network controls specific to deployment services.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-06-21T15:14:27.782Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983cc4522896dcbee553

Added to database: 5/21/2025, 9:09:16 AM

Last enriched: 10/9/2025, 12:25:46 AM

Last updated: 12/3/2025, 7:41:13 AM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats