CVE-2023-36397: CWE-126: Buffer Over-read in Microsoft Windows 10 Version 1809
Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
AI Analysis
Technical Summary
CVE-2023-36397 is a critical security vulnerability identified in the Windows Pragmatic General Multicast (PGM) protocol implementation on Microsoft Windows 10 Version 1809 (build 17763.0). The vulnerability is classified as CWE-126, a buffer over-read flaw, which occurs when the software reads data beyond the bounds of a buffer. This improper bounds checking in the PGM protocol stack allows a remote attacker to send specially crafted multicast packets that trigger the buffer over-read condition. Exploiting this flaw can lead to remote code execution (RCE) without requiring any authentication or user interaction, granting the attacker the ability to execute arbitrary code with system-level privileges. The CVSS 3.1 base score of 9.8 reflects the critical nature of this vulnerability, with attack vector being network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact metrics indicate high confidentiality (C:H), integrity (I:H), and availability (A:H) impacts. Although no exploits have been publicly reported or observed in the wild yet, the vulnerability's characteristics make it a prime target for attackers aiming to compromise legacy Windows 10 systems. The vulnerability was reserved in June 2023 and published in November 2023, but no patch links are currently available, suggesting that organizations must be vigilant and implement interim mitigations. The PGM protocol is used primarily for reliable multicast communications, which are common in certain enterprise and industrial environments, increasing the risk for organizations relying on these technologies. The vulnerability affects only Windows 10 Version 1809, which is an older release, but many enterprises and critical infrastructure operators may still be running this version due to extended support or legacy application dependencies.
Potential Impact
The impact of CVE-2023-36397 on European organizations can be severe. Successful exploitation allows remote attackers to execute arbitrary code with system-level privileges, potentially leading to full system compromise. This threatens the confidentiality of sensitive data, the integrity of system operations, and the availability of critical services. Organizations using Windows 10 Version 1809 in environments where multicast networking is enabled are particularly vulnerable. Critical infrastructure sectors such as energy, telecommunications, and transportation that rely on multicast protocols for efficient data distribution could face operational disruptions or data breaches. The lack of required authentication and user interaction lowers the barrier for exploitation, increasing the risk of automated or widespread attacks. European enterprises with legacy systems may experience significant downtime, data loss, or ransomware attacks stemming from this vulnerability. Additionally, the vulnerability could be leveraged as a foothold for lateral movement within networks, escalating the overall risk posture. The absence of known exploits in the wild currently provides a window for proactive defense, but the critical severity demands urgent attention.
Mitigation Recommendations
1. Apply official Microsoft security patches immediately once they become available for Windows 10 Version 1809 to remediate the vulnerability. 2. Until patches are released, disable or restrict the use of the Pragmatic General Multicast (PGM) protocol on affected systems, especially on network interfaces exposed to untrusted networks. 3. Implement network-level controls such as firewall rules to block or limit multicast traffic from untrusted sources, reducing the attack surface. 4. Monitor network traffic for unusual or malformed multicast packets that could indicate exploitation attempts. 5. Conduct an inventory of all systems running Windows 10 Version 1809 and prioritize their upgrade to supported Windows versions with active security updates. 6. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalies in multicast traffic patterns. 7. Educate IT staff about this vulnerability and ensure incident response plans include procedures for handling potential exploitation. 8. Consider network segmentation to isolate legacy systems that cannot be immediately upgraded or patched. 9. Review and tighten access controls and privilege management to limit the impact of potential compromises. 10. Engage with Microsoft support channels for guidance and updates regarding patch availability and mitigation strategies.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2023-36397: CWE-126: Buffer Over-read in Microsoft Windows 10 Version 1809
Description
Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
AI-Powered Analysis
Technical Analysis
CVE-2023-36397 is a critical security vulnerability identified in the Windows Pragmatic General Multicast (PGM) protocol implementation on Microsoft Windows 10 Version 1809 (build 17763.0). The vulnerability is classified as CWE-126, a buffer over-read flaw, which occurs when the software reads data beyond the bounds of a buffer. This improper bounds checking in the PGM protocol stack allows a remote attacker to send specially crafted multicast packets that trigger the buffer over-read condition. Exploiting this flaw can lead to remote code execution (RCE) without requiring any authentication or user interaction, granting the attacker the ability to execute arbitrary code with system-level privileges. The CVSS 3.1 base score of 9.8 reflects the critical nature of this vulnerability, with attack vector being network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact metrics indicate high confidentiality (C:H), integrity (I:H), and availability (A:H) impacts. Although no exploits have been publicly reported or observed in the wild yet, the vulnerability's characteristics make it a prime target for attackers aiming to compromise legacy Windows 10 systems. The vulnerability was reserved in June 2023 and published in November 2023, but no patch links are currently available, suggesting that organizations must be vigilant and implement interim mitigations. The PGM protocol is used primarily for reliable multicast communications, which are common in certain enterprise and industrial environments, increasing the risk for organizations relying on these technologies. The vulnerability affects only Windows 10 Version 1809, which is an older release, but many enterprises and critical infrastructure operators may still be running this version due to extended support or legacy application dependencies.
Potential Impact
The impact of CVE-2023-36397 on European organizations can be severe. Successful exploitation allows remote attackers to execute arbitrary code with system-level privileges, potentially leading to full system compromise. This threatens the confidentiality of sensitive data, the integrity of system operations, and the availability of critical services. Organizations using Windows 10 Version 1809 in environments where multicast networking is enabled are particularly vulnerable. Critical infrastructure sectors such as energy, telecommunications, and transportation that rely on multicast protocols for efficient data distribution could face operational disruptions or data breaches. The lack of required authentication and user interaction lowers the barrier for exploitation, increasing the risk of automated or widespread attacks. European enterprises with legacy systems may experience significant downtime, data loss, or ransomware attacks stemming from this vulnerability. Additionally, the vulnerability could be leveraged as a foothold for lateral movement within networks, escalating the overall risk posture. The absence of known exploits in the wild currently provides a window for proactive defense, but the critical severity demands urgent attention.
Mitigation Recommendations
1. Apply official Microsoft security patches immediately once they become available for Windows 10 Version 1809 to remediate the vulnerability. 2. Until patches are released, disable or restrict the use of the Pragmatic General Multicast (PGM) protocol on affected systems, especially on network interfaces exposed to untrusted networks. 3. Implement network-level controls such as firewall rules to block or limit multicast traffic from untrusted sources, reducing the attack surface. 4. Monitor network traffic for unusual or malformed multicast packets that could indicate exploitation attempts. 5. Conduct an inventory of all systems running Windows 10 Version 1809 and prioritize their upgrade to supported Windows versions with active security updates. 6. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalies in multicast traffic patterns. 7. Educate IT staff about this vulnerability and ensure incident response plans include procedures for handling potential exploitation. 8. Consider network segmentation to isolate legacy systems that cannot be immediately upgraded or patched. 9. Review and tighten access controls and privilege management to limit the impact of potential compromises. 10. Engage with Microsoft support channels for guidance and updates regarding patch availability and mitigation strategies.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2023-06-21T15:14:27.782Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983cc4522896dcbee566
Added to database: 5/21/2025, 9:09:16 AM
Last enriched: 10/9/2025, 12:26:20 AM
Last updated: 10/15/2025, 1:25:29 PM
Views: 27
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-1796: CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in langgenius langgenius/dify
HighCVE-2025-1451: CWE-770 Allocation of Resources Without Limits or Throttling in parisneo parisneo/lollms-webui
HighCVE-2025-1040: CWE-1336 Improper Neutralization of Special Elements Used in a Template Engine in significant-gravitas significant-gravitas/autogpt
HighCVE-2025-0628: CWE-266 Incorrect Privilege Assignment in berriai berriai/litellm
HighCVE-2025-0508: CWE-328 Reversible One-Way Hash in aws aws/sagemaker-python-sdk
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.