Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-36397: CWE-126: Buffer Over-read in Microsoft Windows 10 Version 1809

0
Critical
VulnerabilityCVE-2023-36397cvecve-2023-36397cwe-126
Published: Tue Nov 14 2023 (11/14/2023, 17:57:24 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability

AI-Powered Analysis

AILast updated: 10/09/2025, 00:26:20 UTC

Technical Analysis

CVE-2023-36397 is a critical security vulnerability identified in the Windows Pragmatic General Multicast (PGM) protocol implementation on Microsoft Windows 10 Version 1809 (build 17763.0). The vulnerability is classified as CWE-126, a buffer over-read flaw, which occurs when the software reads data beyond the bounds of a buffer. This improper bounds checking in the PGM protocol stack allows a remote attacker to send specially crafted multicast packets that trigger the buffer over-read condition. Exploiting this flaw can lead to remote code execution (RCE) without requiring any authentication or user interaction, granting the attacker the ability to execute arbitrary code with system-level privileges. The CVSS 3.1 base score of 9.8 reflects the critical nature of this vulnerability, with attack vector being network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact metrics indicate high confidentiality (C:H), integrity (I:H), and availability (A:H) impacts. Although no exploits have been publicly reported or observed in the wild yet, the vulnerability's characteristics make it a prime target for attackers aiming to compromise legacy Windows 10 systems. The vulnerability was reserved in June 2023 and published in November 2023, but no patch links are currently available, suggesting that organizations must be vigilant and implement interim mitigations. The PGM protocol is used primarily for reliable multicast communications, which are common in certain enterprise and industrial environments, increasing the risk for organizations relying on these technologies. The vulnerability affects only Windows 10 Version 1809, which is an older release, but many enterprises and critical infrastructure operators may still be running this version due to extended support or legacy application dependencies.

Potential Impact

The impact of CVE-2023-36397 on European organizations can be severe. Successful exploitation allows remote attackers to execute arbitrary code with system-level privileges, potentially leading to full system compromise. This threatens the confidentiality of sensitive data, the integrity of system operations, and the availability of critical services. Organizations using Windows 10 Version 1809 in environments where multicast networking is enabled are particularly vulnerable. Critical infrastructure sectors such as energy, telecommunications, and transportation that rely on multicast protocols for efficient data distribution could face operational disruptions or data breaches. The lack of required authentication and user interaction lowers the barrier for exploitation, increasing the risk of automated or widespread attacks. European enterprises with legacy systems may experience significant downtime, data loss, or ransomware attacks stemming from this vulnerability. Additionally, the vulnerability could be leveraged as a foothold for lateral movement within networks, escalating the overall risk posture. The absence of known exploits in the wild currently provides a window for proactive defense, but the critical severity demands urgent attention.

Mitigation Recommendations

1. Apply official Microsoft security patches immediately once they become available for Windows 10 Version 1809 to remediate the vulnerability. 2. Until patches are released, disable or restrict the use of the Pragmatic General Multicast (PGM) protocol on affected systems, especially on network interfaces exposed to untrusted networks. 3. Implement network-level controls such as firewall rules to block or limit multicast traffic from untrusted sources, reducing the attack surface. 4. Monitor network traffic for unusual or malformed multicast packets that could indicate exploitation attempts. 5. Conduct an inventory of all systems running Windows 10 Version 1809 and prioritize their upgrade to supported Windows versions with active security updates. 6. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalies in multicast traffic patterns. 7. Educate IT staff about this vulnerability and ensure incident response plans include procedures for handling potential exploitation. 8. Consider network segmentation to isolate legacy systems that cannot be immediately upgraded or patched. 9. Review and tighten access controls and privilege management to limit the impact of potential compromises. 10. Engage with Microsoft support channels for guidance and updates regarding patch availability and mitigation strategies.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-06-21T15:14:27.782Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983cc4522896dcbee566

Added to database: 5/21/2025, 9:09:16 AM

Last enriched: 10/9/2025, 12:26:20 AM

Last updated: 10/15/2025, 1:25:29 PM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats