Skip to main content

CVE-2023-36398: CWE-908: Use of Uninitialized Resource in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2023-36398cvecve-2023-36398cwe-908
Published: Tue Nov 14 2023 (11/14/2023, 17:57:24 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows NTFS Information Disclosure Vulnerability

AI-Powered Analysis

AILast updated: 06/25/2025, 04:19:21 UTC

Technical Analysis

CVE-2023-36398 is a vulnerability identified in Microsoft Windows 10 Version 1809 (build 10.0.17763.0) related to the NTFS file system implementation. The issue is categorized under CWE-908, which involves the use of uninitialized resources. Specifically, this vulnerability arises when the Windows NTFS driver improperly handles certain internal resources, leading to potential information disclosure. An attacker with low privileges (local access with limited privileges) can exploit this flaw without requiring user interaction. The vulnerability has a CVSS 3.1 base score of 6.5 (medium severity) with the vector AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C, indicating that the attack requires local access, low attack complexity, and low privileges, but no user interaction. The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact is high on confidentiality (C:H), but there is no impact on integrity or availability. No known exploits are currently in the wild, and no patches have been linked yet. The vulnerability could allow an attacker to gain unauthorized access to sensitive information stored on the NTFS file system by leveraging uninitialized memory or resource states, potentially exposing data that should remain confidential. This flaw does not allow code execution or system disruption but compromises data confidentiality within the affected system.

Potential Impact

For European organizations, the primary impact of CVE-2023-36398 is the potential unauthorized disclosure of sensitive data stored on Windows 10 Version 1809 systems. Given that this vulnerability requires local access with low privileges, the risk is higher in environments where multiple users share systems or where attackers can gain limited local access through other means (e.g., phishing leading to low-privilege account compromise). Confidentiality breaches could affect personal data, intellectual property, or other sensitive organizational information, potentially violating GDPR and other data protection regulations. The scope change means that the vulnerability could expose data beyond the initially compromised component, increasing the risk of broader data leakage. However, since there is no impact on integrity or availability, the threat does not directly enable system manipulation or denial of service. The lack of known exploits in the wild reduces immediate risk but does not eliminate the need for vigilance, especially in sectors with high data sensitivity such as finance, healthcare, and government. Organizations still running Windows 10 Version 1809, which is an older release, may be more vulnerable due to the absence of recent security updates and the potential for legacy system use in critical infrastructure or industrial environments.

Mitigation Recommendations

1. Upgrade or Patch: Although no patch links are currently provided, organizations should monitor Microsoft’s official security advisories for updates or patches addressing CVE-2023-36398 and apply them promptly once available. 2. System Upgrade: Given that Windows 10 Version 1809 is an older release, organizations should prioritize upgrading to a supported and fully patched Windows version (e.g., Windows 10 21H2 or later, or Windows 11) to mitigate this and other vulnerabilities. 3. Limit Local Access: Restrict local access to systems running Windows 10 Version 1809 by enforcing strict access controls, using endpoint protection, and limiting user privileges to the minimum necessary. 4. Network Segmentation: Segment networks to isolate legacy systems and reduce the risk of lateral movement by attackers who gain local access. 5. Monitor for Anomalies: Deploy endpoint detection and response (EDR) tools to monitor for unusual local access patterns or attempts to access NTFS internals. 6. Data Encryption: Use full disk encryption and file-level encryption to protect sensitive data, reducing the impact of potential information disclosure. 7. User Awareness: Educate users about the risks of local compromise and enforce strong authentication methods to reduce the likelihood of privilege escalation or unauthorized local access.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-06-21T15:14:27.782Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983cc4522896dcbee56a

Added to database: 5/21/2025, 9:09:16 AM

Last enriched: 6/25/2025, 4:19:21 AM

Last updated: 8/17/2025, 11:31:35 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats