Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-36408: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2023-36408cvecve-2023-36408cwe-122
Published: Tue Nov 14 2023 (11/14/2023, 17:57:18 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Hyper-V Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 10/09/2025, 00:29:39 UTC

Technical Analysis

CVE-2023-36408 is a heap-based buffer overflow vulnerability classified under CWE-122, found in Microsoft Windows 10 Version 1809 (build 10.0.17763.0) within the Hyper-V virtualization component. This vulnerability allows an attacker with limited privileges (low-level user) to perform an elevation of privilege attack by exploiting improper handling of memory buffers on the heap. The flaw can be triggered locally without user interaction, enabling the attacker to gain higher privileges on the system, potentially SYSTEM-level access. The CVSS v3.1 score of 7.8 reflects high severity, with attack vector local, low attack complexity, and requiring low privileges but no user interaction. The vulnerability impacts confidentiality, integrity, and availability, as an attacker could execute arbitrary code with elevated rights, manipulate system processes, or cause system crashes. No public exploit code or active exploitation has been reported yet, but the vulnerability was reserved in June 2023 and published in November 2023, indicating recent discovery and disclosure. The lack of patch links suggests that a fix may be pending or distributed through cumulative updates. Hyper-V is widely used in enterprise environments for virtualization, making this vulnerability particularly relevant for organizations relying on Windows 10 1809 for virtual machine hosting or management.

Potential Impact

For European organizations, the impact of CVE-2023-36408 can be significant, especially for those still operating legacy Windows 10 Version 1809 systems with Hyper-V enabled. Successful exploitation could allow attackers to escalate privileges from a low-level user to SYSTEM, enabling full control over affected hosts. This could lead to unauthorized access to sensitive data, disruption of critical services, and the potential for lateral movement within networks. Organizations in sectors such as government, finance, healthcare, and critical infrastructure, which often use virtualization for workload isolation and resource optimization, are at heightened risk. The vulnerability's local attack vector means that insider threats or attackers who gain initial footholds through other means could leverage this flaw to deepen their access. Given the high confidentiality, integrity, and availability impacts, exploitation could result in data breaches, ransomware deployment, or operational outages. The absence of known exploits in the wild currently provides a window for proactive mitigation, but the risk remains elevated due to the ease of exploitation and the critical nature of the vulnerability.

Mitigation Recommendations

1. Apply official Microsoft security updates as soon as they become available for Windows 10 Version 1809 to remediate the vulnerability. Monitor Microsoft’s security advisories and Windows Update channels closely. 2. If patching is not immediately possible, restrict access to Hyper-V management interfaces and services to trusted administrators only, minimizing the attack surface. 3. Implement strict access controls and user privilege management to limit the number of users with local access and Hyper-V usage rights. 4. Employ endpoint detection and response (EDR) solutions to monitor for unusual privilege escalation attempts or anomalous behavior related to Hyper-V processes. 5. Consider upgrading affected systems to a more recent, supported Windows version where this vulnerability is not present or has been patched. 6. Conduct regular security audits and vulnerability scans focusing on virtualization hosts to identify and remediate potential weaknesses. 7. Use application whitelisting and system hardening techniques to reduce the risk of exploitation. 8. Educate system administrators and security teams about this vulnerability and the importance of timely patching and monitoring.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-06-21T15:14:27.783Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983cc4522896dcbee5b2

Added to database: 5/21/2025, 9:09:16 AM

Last enriched: 10/9/2025, 12:29:39 AM

Last updated: 12/3/2025, 1:46:55 PM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats