CVE-2023-36404: CWE-284: Improper Access Control in Microsoft Windows 10 Version 1809
Windows Kernel Information Disclosure Vulnerability
AI Analysis
Technical Summary
CVE-2023-36404 is a medium-severity vulnerability affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). It is classified under CWE-284, indicating an improper access control weakness. Specifically, this vulnerability involves an information disclosure flaw within the Windows kernel, allowing an attacker with limited privileges (low-level privileges) to gain unauthorized access to sensitive kernel information. The vulnerability does not require user interaction and has a low attack complexity, but it does require the attacker to have some level of local privileges (PR:L). The CVSS 3.1 base score is 5.5, reflecting a moderate impact primarily on confidentiality (C:H), with no impact on integrity or availability. The vulnerability scope is unchanged (S:U), meaning the exploit affects only the vulnerable component without extending to other system components. No known exploits are currently reported in the wild, and no official patches have been linked yet. The flaw could potentially allow attackers to gather sensitive kernel data that might be leveraged in further privilege escalation or other attacks, although the vulnerability itself does not directly enable such actions. The vulnerability is limited to Windows 10 Version 1809, which is an older release, but still in use in some environments, especially in legacy or specialized systems. Given the kernel-level nature of the flaw, the information disclosure could aid attackers in crafting more effective exploits or bypassing security controls.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to confidentiality of sensitive system information on affected Windows 10 Version 1809 machines. Organizations running legacy systems or specialized industrial, governmental, or enterprise environments that have not upgraded beyond this Windows version are at risk. Disclosure of kernel information could facilitate subsequent targeted attacks, including privilege escalation or evasion of security mechanisms, potentially leading to broader compromise. While the vulnerability itself does not directly impact system integrity or availability, the information gained could be a stepping stone for more severe attacks. This is particularly relevant for sectors with high-value or sensitive data such as finance, critical infrastructure, healthcare, and government agencies. The lack of known exploits in the wild reduces immediate risk, but the presence of a publicly known vulnerability increases the likelihood of future exploitation attempts. Organizations with strict compliance requirements and data protection regulations (e.g., GDPR) must consider the potential confidentiality impact seriously.
Mitigation Recommendations
1. Upgrade or patch: Although no official patch link is provided, organizations should monitor Microsoft’s security advisories closely and apply any forthcoming patches promptly. 2. Upgrade Windows: Where feasible, migrate systems from Windows 10 Version 1809 to a more recent, supported Windows version that does not contain this vulnerability. 3. Privilege management: Restrict local user privileges rigorously to minimize the number of users who have the low-level privileges required to exploit this vulnerability. 4. Endpoint protection: Deploy advanced endpoint detection and response (EDR) solutions that can detect anomalous kernel-level activities or attempts to access sensitive kernel information. 5. Network segmentation: Isolate legacy systems running Windows 10 Version 1809 from critical network segments to reduce exposure. 6. Monitoring and logging: Enhance monitoring of local privilege use and kernel-related system calls to detect potential exploitation attempts. 7. Application whitelisting: Limit execution of unauthorized code that could attempt to leverage kernel information disclosure. 8. Incident response readiness: Prepare for potential exploitation by having incident response plans that include detection and containment of kernel-level attacks.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands, Belgium
CVE-2023-36404: CWE-284: Improper Access Control in Microsoft Windows 10 Version 1809
Description
Windows Kernel Information Disclosure Vulnerability
AI-Powered Analysis
Technical Analysis
CVE-2023-36404 is a medium-severity vulnerability affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). It is classified under CWE-284, indicating an improper access control weakness. Specifically, this vulnerability involves an information disclosure flaw within the Windows kernel, allowing an attacker with limited privileges (low-level privileges) to gain unauthorized access to sensitive kernel information. The vulnerability does not require user interaction and has a low attack complexity, but it does require the attacker to have some level of local privileges (PR:L). The CVSS 3.1 base score is 5.5, reflecting a moderate impact primarily on confidentiality (C:H), with no impact on integrity or availability. The vulnerability scope is unchanged (S:U), meaning the exploit affects only the vulnerable component without extending to other system components. No known exploits are currently reported in the wild, and no official patches have been linked yet. The flaw could potentially allow attackers to gather sensitive kernel data that might be leveraged in further privilege escalation or other attacks, although the vulnerability itself does not directly enable such actions. The vulnerability is limited to Windows 10 Version 1809, which is an older release, but still in use in some environments, especially in legacy or specialized systems. Given the kernel-level nature of the flaw, the information disclosure could aid attackers in crafting more effective exploits or bypassing security controls.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to confidentiality of sensitive system information on affected Windows 10 Version 1809 machines. Organizations running legacy systems or specialized industrial, governmental, or enterprise environments that have not upgraded beyond this Windows version are at risk. Disclosure of kernel information could facilitate subsequent targeted attacks, including privilege escalation or evasion of security mechanisms, potentially leading to broader compromise. While the vulnerability itself does not directly impact system integrity or availability, the information gained could be a stepping stone for more severe attacks. This is particularly relevant for sectors with high-value or sensitive data such as finance, critical infrastructure, healthcare, and government agencies. The lack of known exploits in the wild reduces immediate risk, but the presence of a publicly known vulnerability increases the likelihood of future exploitation attempts. Organizations with strict compliance requirements and data protection regulations (e.g., GDPR) must consider the potential confidentiality impact seriously.
Mitigation Recommendations
1. Upgrade or patch: Although no official patch link is provided, organizations should monitor Microsoft’s security advisories closely and apply any forthcoming patches promptly. 2. Upgrade Windows: Where feasible, migrate systems from Windows 10 Version 1809 to a more recent, supported Windows version that does not contain this vulnerability. 3. Privilege management: Restrict local user privileges rigorously to minimize the number of users who have the low-level privileges required to exploit this vulnerability. 4. Endpoint protection: Deploy advanced endpoint detection and response (EDR) solutions that can detect anomalous kernel-level activities or attempts to access sensitive kernel information. 5. Network segmentation: Isolate legacy systems running Windows 10 Version 1809 from critical network segments to reduce exposure. 6. Monitoring and logging: Enhance monitoring of local privilege use and kernel-related system calls to detect potential exploitation attempts. 7. Application whitelisting: Limit execution of unauthorized code that could attempt to leverage kernel information disclosure. 8. Incident response readiness: Prepare for potential exploitation by having incident response plans that include detection and containment of kernel-level attacks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2023-06-21T15:14:27.783Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983cc4522896dcbee59c
Added to database: 5/21/2025, 9:09:16 AM
Last enriched: 6/25/2025, 4:05:15 AM
Last updated: 8/1/2025, 6:38:28 AM
Views: 12
Related Threats
CVE-2025-9027: SQL Injection in code-projects Online Medicine Guide
MediumCVE-2025-9026: OS Command Injection in D-Link DIR-860L
MediumCVE-2025-9025: SQL Injection in code-projects Simple Cafe Ordering System
MediumCVE-2025-9024: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2025-9023: Buffer Overflow in Tenda AC7
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.