Skip to main content

CVE-2023-36705: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2023-36705cvecve-2023-36705cwe-59
Published: Tue Nov 14 2023 (11/14/2023, 17:57:05 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Installer Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 06/25/2025, 03:35:20 UTC

Technical Analysis

CVE-2023-36705 is a high-severity elevation of privilege vulnerability affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability is classified under CWE-59, which pertains to improper link resolution before file access, commonly known as 'link following'. This flaw exists in the Windows Installer component, where the system improperly resolves symbolic links or junction points before accessing files. An attacker with limited privileges (local access with low privileges) can exploit this vulnerability to escalate their privileges to a higher level, potentially SYSTEM or administrative privileges, by manipulating file system links. The vulnerability does not require user interaction and can be exploited locally with low attack complexity. The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, as successful exploitation allows an attacker to gain elevated privileges and potentially execute arbitrary code or modify system files. The vulnerability scope is unchanged, meaning the exploit affects only the vulnerable component on the local system. No known exploits are currently reported in the wild, and no official patches or mitigation links have been published at the time of this analysis. Given the nature of the vulnerability, it is primarily a local attack vector, requiring the attacker to have some level of access to the affected system, but no user interaction is needed once access is obtained. This vulnerability is significant because Windows 10 Version 1809 remains in use in various enterprise environments, especially where legacy systems are maintained. Improper link resolution can lead to privilege escalation chains that facilitate further attacks such as lateral movement, persistence, or data exfiltration.

Potential Impact

For European organizations, the impact of CVE-2023-36705 can be substantial, especially in sectors relying on Windows 10 Version 1809 for critical operations, such as manufacturing, government, healthcare, and finance. Successful exploitation allows attackers with limited access to escalate privileges to administrative levels, potentially compromising entire systems. This can lead to unauthorized access to sensitive data, disruption of services, and deployment of malware or ransomware. Given that many European enterprises maintain legacy Windows environments for compatibility reasons, the vulnerability increases the attack surface for insider threats or attackers who gain initial foothold through phishing or other means. The lack of user interaction requirement means that once an attacker has local access, exploitation can be automated and stealthy. Moreover, the vulnerability could be chained with other exploits to achieve remote code execution or network-wide compromise, amplifying its impact. The confidentiality, integrity, and availability of critical systems and data are all at risk, potentially affecting compliance with European data protection regulations such as GDPR if personal data is exposed or systems are disrupted.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting local access to systems running Windows 10 Version 1809, ensuring that only trusted users have login capabilities. 2. Implement strict access controls and monitoring on file system permissions, especially for directories and files used by Windows Installer, to prevent unauthorized creation or manipulation of symbolic links or junction points. 3. Employ application whitelisting and endpoint detection and response (EDR) solutions to detect suspicious activities related to privilege escalation attempts. 4. Use Group Policy to limit the ability of non-administrative users to create symbolic links or junction points where possible. 5. Regularly audit and monitor event logs for unusual privilege escalation attempts or file system manipulations. 6. Plan and prioritize upgrading affected systems to a supported and patched Windows version as soon as Microsoft releases an official patch or consider migrating to Windows 10 versions beyond 1809 that are not affected. 7. In environments where upgrading is not immediately feasible, consider deploying compensating controls such as enhanced network segmentation and strict endpoint security policies to limit the impact of a potential compromise. 8. Educate IT staff and users about the risks of local privilege escalation and enforce the principle of least privilege to minimize the number of users with elevated rights.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-06-26T13:29:45.601Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983cc4522896dcbee622

Added to database: 5/21/2025, 9:09:16 AM

Last enriched: 6/25/2025, 3:35:20 AM

Last updated: 7/26/2025, 7:57:32 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats