Skip to main content

CVE-2023-36399: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Microsoft Windows Server 2022, 23H2 Edition (Server Core installation)

High
VulnerabilityCVE-2023-36399cvecve-2023-36399cwe-59
Published: Tue Nov 14 2023 (11/14/2023, 17:57:23 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows Server 2022, 23H2 Edition (Server Core installation)

Description

Windows Storage Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 06/25/2025, 04:06:58 UTC

Technical Analysis

CVE-2023-36399 is a high-severity elevation of privilege vulnerability affecting Microsoft Windows Server 2022, specifically the 23H2 Edition with Server Core installation. The vulnerability is classified under CWE-59, which pertains to improper link resolution before file access, commonly known as 'link following.' This type of flaw occurs when the system incorrectly resolves symbolic links or junction points, potentially allowing an attacker to manipulate file system paths to access or modify files they should not have permissions for. In this case, the vulnerability resides within the Windows Storage subsystem, which handles file system operations. An attacker with limited privileges (low-level privileges) on a vulnerable system can exploit this flaw to escalate their privileges to a higher level, potentially gaining administrative rights. The CVSS 3.1 base score is 7.1, indicating a high severity. The vector string (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C) shows that exploitation requires local access (AV:L), low attack complexity (AC:L), and low privileges (PR:L), but no user interaction (UI:N). The impact affects integrity and availability (I:H/A:H) but not confidentiality (C:N). The scope is unchanged (S:U), meaning the vulnerability affects only the vulnerable component. There are no known exploits in the wild at the time of publication, and no patches have been linked yet. The vulnerability was reserved in June 2023 and published in November 2023. This flaw could be leveraged by attackers who have already gained limited access to a system to gain full control, potentially leading to system compromise, disruption of services, or further lateral movement within a network.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on Windows Server 2022 23H2 Server Core installations in their infrastructure. The elevation of privilege could allow attackers to bypass security controls, leading to unauthorized modification or deletion of critical files, disruption of services, or deployment of malicious software with high privileges. This can impact data integrity and system availability, potentially causing operational downtime and loss of trust. Sectors such as finance, healthcare, government, and critical infrastructure, which often use Windows Server environments, could face severe consequences including regulatory penalties under GDPR if data integrity or availability is compromised. Additionally, organizations with limited local access controls or those that allow multiple users on server systems are at higher risk. Since exploitation requires local access and low privileges, insider threats or attackers who have gained initial footholds via other vulnerabilities or phishing could leverage this flaw to escalate privileges and deepen their access. The lack of known exploits currently provides a window for proactive mitigation, but the high severity score underscores the urgency of addressing this vulnerability.

Mitigation Recommendations

1. Apply official patches from Microsoft as soon as they become available to address this vulnerability. Monitor Microsoft security advisories closely for updates. 2. Restrict local access to Windows Server 2022 23H2 Server Core installations by enforcing strict access controls and limiting the number of users with local login privileges. 3. Implement robust endpoint detection and response (EDR) solutions to monitor for suspicious file system activities, particularly unusual symbolic link or junction point manipulations. 4. Use application whitelisting and privilege management tools to limit the ability of low-privileged users to execute unauthorized actions or access sensitive system components. 5. Regularly audit and harden file system permissions to ensure that symbolic links and junction points are not misconfigured or exploitable. 6. Employ network segmentation to isolate critical servers and reduce the risk of lateral movement if an attacker gains local access. 7. Conduct user training and awareness to reduce the risk of initial compromise that could lead to exploitation of this vulnerability. 8. Maintain up-to-date backups and test restoration procedures to mitigate the impact of potential availability disruptions caused by exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-06-21T15:14:27.782Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983cc4522896dcbee56e

Added to database: 5/21/2025, 9:09:16 AM

Last enriched: 6/25/2025, 4:06:58 AM

Last updated: 7/30/2025, 1:09:39 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats