CVE-2023-36770: CWE-122: Heap-based Buffer Overflow in Microsoft 3D Builder
CVE-2023-36770 is a high-severity heap-based buffer overflow vulnerability in Microsoft 3D Builder version 20. 0. 0. It allows remote code execution when a user interacts with a specially crafted file, requiring user interaction but no privileges. The vulnerability impacts confidentiality, integrity, and availability, with a CVSS score of 7. 8. No known exploits are currently in the wild. European organizations using Windows systems with 3D Builder installed could be at risk, especially in sectors relying on 3D modeling or design. Mitigation involves applying patches once available, restricting access to 3D Builder, and employing application control policies. Countries with high Windows adoption and significant industrial or design sectors, such as Germany, France, and the UK, are most likely to be affected.
AI Analysis
Technical Summary
CVE-2023-36770 is a heap-based buffer overflow vulnerability classified under CWE-122, found in Microsoft 3D Builder version 20.0.0. This vulnerability enables remote code execution (RCE) when a user opens or interacts with a maliciously crafted 3D model file or input processed by the 3D Builder application. The flaw arises due to improper handling of memory buffers on the heap, which can be overflowed to overwrite adjacent memory, allowing an attacker to execute arbitrary code with the privileges of the user running the application. The CVSS 3.1 base score of 7.8 reflects a high severity, with an attack vector of local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but user interaction required (UI:R). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits have been reported in the wild yet, and no official patches are currently linked, though Microsoft is likely to release updates. The vulnerability is particularly concerning because 3D Builder is included by default on many Windows 10 and 11 installations, increasing the attack surface. Attackers could deliver malicious files via email, downloads, or removable media, relying on user interaction to trigger the exploit. Successful exploitation could lead to full system compromise, data theft, or disruption of services.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially in industries that utilize 3D modeling software such as manufacturing, engineering, architecture, and design firms. Compromise could lead to unauthorized access to sensitive intellectual property, disruption of design workflows, and potential lateral movement within corporate networks. Since 3D Builder is often pre-installed on Windows systems, many endpoints could be vulnerable, increasing the attack surface. The requirement for user interaction means phishing campaigns or social engineering could be effective vectors. The high impact on confidentiality, integrity, and availability could result in data breaches, operational downtime, and reputational damage. Organizations with strict regulatory requirements like GDPR must be particularly vigilant to prevent data exposure. Additionally, the lack of current public exploits provides a window for proactive mitigation before widespread exploitation occurs.
Mitigation Recommendations
Organizations should monitor Microsoft’s security advisories closely and apply patches promptly once released. Until patches are available, consider disabling or uninstalling 3D Builder on systems where it is not required. Employ application control policies (e.g., Windows Defender Application Control or AppLocker) to restrict execution of untrusted or unknown 3D model files. Educate users about the risks of opening unsolicited or suspicious files, particularly those related to 3D models. Implement network-level protections such as email filtering and endpoint detection and response (EDR) solutions to detect and block malicious payloads. Regularly audit installed software to identify and manage vulnerable applications. For high-risk environments, consider sandboxing or isolating systems that handle 3D files. Maintain robust backup and recovery procedures to mitigate potential ransomware or destructive attacks stemming from exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2023-36770: CWE-122: Heap-based Buffer Overflow in Microsoft 3D Builder
Description
CVE-2023-36770 is a high-severity heap-based buffer overflow vulnerability in Microsoft 3D Builder version 20. 0. 0. It allows remote code execution when a user interacts with a specially crafted file, requiring user interaction but no privileges. The vulnerability impacts confidentiality, integrity, and availability, with a CVSS score of 7. 8. No known exploits are currently in the wild. European organizations using Windows systems with 3D Builder installed could be at risk, especially in sectors relying on 3D modeling or design. Mitigation involves applying patches once available, restricting access to 3D Builder, and employing application control policies. Countries with high Windows adoption and significant industrial or design sectors, such as Germany, France, and the UK, are most likely to be affected.
AI-Powered Analysis
Technical Analysis
CVE-2023-36770 is a heap-based buffer overflow vulnerability classified under CWE-122, found in Microsoft 3D Builder version 20.0.0. This vulnerability enables remote code execution (RCE) when a user opens or interacts with a maliciously crafted 3D model file or input processed by the 3D Builder application. The flaw arises due to improper handling of memory buffers on the heap, which can be overflowed to overwrite adjacent memory, allowing an attacker to execute arbitrary code with the privileges of the user running the application. The CVSS 3.1 base score of 7.8 reflects a high severity, with an attack vector of local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but user interaction required (UI:R). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits have been reported in the wild yet, and no official patches are currently linked, though Microsoft is likely to release updates. The vulnerability is particularly concerning because 3D Builder is included by default on many Windows 10 and 11 installations, increasing the attack surface. Attackers could deliver malicious files via email, downloads, or removable media, relying on user interaction to trigger the exploit. Successful exploitation could lead to full system compromise, data theft, or disruption of services.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially in industries that utilize 3D modeling software such as manufacturing, engineering, architecture, and design firms. Compromise could lead to unauthorized access to sensitive intellectual property, disruption of design workflows, and potential lateral movement within corporate networks. Since 3D Builder is often pre-installed on Windows systems, many endpoints could be vulnerable, increasing the attack surface. The requirement for user interaction means phishing campaigns or social engineering could be effective vectors. The high impact on confidentiality, integrity, and availability could result in data breaches, operational downtime, and reputational damage. Organizations with strict regulatory requirements like GDPR must be particularly vigilant to prevent data exposure. Additionally, the lack of current public exploits provides a window for proactive mitigation before widespread exploitation occurs.
Mitigation Recommendations
Organizations should monitor Microsoft’s security advisories closely and apply patches promptly once released. Until patches are available, consider disabling or uninstalling 3D Builder on systems where it is not required. Employ application control policies (e.g., Windows Defender Application Control or AppLocker) to restrict execution of untrusted or unknown 3D model files. Educate users about the risks of opening unsolicited or suspicious files, particularly those related to 3D models. Implement network-level protections such as email filtering and endpoint detection and response (EDR) solutions to detect and block malicious payloads. Regularly audit installed software to identify and manage vulnerable applications. For high-risk environments, consider sandboxing or isolating systems that handle 3D files. Maintain robust backup and recovery procedures to mitigate potential ransomware or destructive attacks stemming from exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
 - 5.2
 - Assigner Short Name
 - microsoft
 - Date Reserved
 - 2023-06-27T15:11:59.869Z
 - Cvss Version
 - 3.1
 - State
 - PUBLISHED
 
Threat ID: 6903adc5aebfcd54748fc7be
Added to database: 10/30/2025, 6:26:13 PM
Last enriched: 10/30/2025, 7:11:29 PM
Last updated: 10/30/2025, 11:21:17 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-34287: CWE-732 Incorrect Permission Assignment for Critical Resource in Nagios XI
HighCVE-2025-34286: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Nagios XI
CriticalCVE-2025-34135: CWE-732 Incorrect Permission Assignment for Critical Resource in Nagios XI
MediumCVE-2025-34134: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Nagios XI
CriticalCVE-2024-14009: CWE-269 Improper Privilege Management in Nagios XI
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.