Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-36740: CWE-122: Heap-based Buffer Overflow in Microsoft 3D Viewer

0
High
VulnerabilityCVE-2023-36740cvecve-2023-36740cwe-122
Published: Tue Sep 12 2023 (09/12/2023, 16:58:47 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: 3D Viewer

Description

3D Viewer Remote Code Execution Vulnerability

AI-Powered Analysis

AILast updated: 10/30/2025, 19:15:06 UTC

Technical Analysis

CVE-2023-36740 is a heap-based buffer overflow vulnerability classified under CWE-122 found in Microsoft 3D Viewer version 7.0.0. This vulnerability arises when the application processes specially crafted 3D model files, leading to memory corruption on the heap. Exploitation can result in remote code execution (RCE) with the privileges of the logged-in user. The attack vector is local (AV:L), meaning the attacker must convince a user to open a malicious file, requiring user interaction (UI:R) but no prior privileges (PR:N). The vulnerability affects confidentiality, integrity, and availability, as arbitrary code execution can lead to data theft, system manipulation, or denial of service. The CVSS v3.1 base score is 7.8 (high), reflecting the significant impact and moderate attack complexity. No patches or known exploits have been reported as of the publication date (September 12, 2023). The vulnerability is particularly concerning because 3D Viewer is bundled with Windows 10 and 11, making it widely deployed. Attackers could leverage social engineering to deliver malicious 3D files via email or other file-sharing methods. The lack of a patch increases the urgency for organizations to implement interim mitigations.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the widespread use of Windows operating systems that include Microsoft 3D Viewer by default. Successful exploitation could allow attackers to execute arbitrary code, potentially leading to data breaches, ransomware deployment, or disruption of critical services. Sectors such as finance, healthcare, government, and manufacturing could be targeted due to the sensitive nature of their data and operations. The requirement for user interaction means phishing or social engineering campaigns could be effective attack vectors. Additionally, the vulnerability could be leveraged to move laterally within networks if attackers gain initial footholds. The absence of known exploits currently provides a window for proactive defense, but the high impact score necessitates urgent attention. Organizations relying on 3D Viewer for legitimate purposes may face operational challenges if the application is disabled as a mitigation.

Mitigation Recommendations

1. Disable or restrict access to Microsoft 3D Viewer via Group Policy or AppLocker to prevent users from opening potentially malicious 3D files. 2. Educate users about the risks of opening unsolicited or suspicious 3D model files received via email or other channels. 3. Implement strong email filtering and attachment scanning to block or quarantine suspicious 3D file formats. 4. Apply the principle of least privilege to limit user permissions, reducing the impact of potential code execution. 5. Monitor endpoint behavior for unusual activity related to 3D Viewer processes or unexpected file executions. 6. Maintain up-to-date backups and incident response plans in case of compromise. 7. Stay alert for official patches or updates from Microsoft and apply them promptly once available. 8. Consider network segmentation to limit lateral movement if an endpoint is compromised through this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2023-06-26T13:29:45.608Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6903adc3aebfcd54748fc70d

Added to database: 10/30/2025, 6:26:11 PM

Last enriched: 10/30/2025, 7:15:06 PM

Last updated: 11/6/2025, 11:28:30 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats