Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-36770: CWE-122: Heap-based Buffer Overflow in Microsoft 3D Builder

0
High
VulnerabilityCVE-2023-36770cvecve-2023-36770cwe-122
Published: Tue Sep 12 2023 (09/12/2023, 16:58:43 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: 3D Builder

Description

CVE-2023-36770 is a high-severity heap-based buffer overflow vulnerability in Microsoft 3D Builder version 20. 0. 0. It allows remote code execution when a user interacts with a specially crafted file, requiring user interaction but no privileges. The vulnerability impacts confidentiality, integrity, and availability, with a CVSS score of 7. 8. No known exploits are currently in the wild. European organizations using Windows systems with 3D Builder installed could be at risk, especially in sectors relying on 3D modeling or design. Mitigation involves applying patches once available, restricting access to 3D Builder, and employing application control policies. Countries with high Windows adoption and significant industrial or design sectors, such as Germany, France, and the UK, are most likely to be affected.

AI-Powered Analysis

AILast updated: 10/30/2025, 19:11:29 UTC

Technical Analysis

CVE-2023-36770 is a heap-based buffer overflow vulnerability classified under CWE-122, found in Microsoft 3D Builder version 20.0.0. This vulnerability enables remote code execution (RCE) when a user opens or interacts with a maliciously crafted 3D model file or input processed by the 3D Builder application. The flaw arises due to improper handling of memory buffers on the heap, which can be overflowed to overwrite adjacent memory, allowing an attacker to execute arbitrary code with the privileges of the user running the application. The CVSS 3.1 base score of 7.8 reflects a high severity, with an attack vector of local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but user interaction required (UI:R). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits have been reported in the wild yet, and no official patches are currently linked, though Microsoft is likely to release updates. The vulnerability is particularly concerning because 3D Builder is included by default on many Windows 10 and 11 installations, increasing the attack surface. Attackers could deliver malicious files via email, downloads, or removable media, relying on user interaction to trigger the exploit. Successful exploitation could lead to full system compromise, data theft, or disruption of services.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially in industries that utilize 3D modeling software such as manufacturing, engineering, architecture, and design firms. Compromise could lead to unauthorized access to sensitive intellectual property, disruption of design workflows, and potential lateral movement within corporate networks. Since 3D Builder is often pre-installed on Windows systems, many endpoints could be vulnerable, increasing the attack surface. The requirement for user interaction means phishing campaigns or social engineering could be effective vectors. The high impact on confidentiality, integrity, and availability could result in data breaches, operational downtime, and reputational damage. Organizations with strict regulatory requirements like GDPR must be particularly vigilant to prevent data exposure. Additionally, the lack of current public exploits provides a window for proactive mitigation before widespread exploitation occurs.

Mitigation Recommendations

Organizations should monitor Microsoft’s security advisories closely and apply patches promptly once released. Until patches are available, consider disabling or uninstalling 3D Builder on systems where it is not required. Employ application control policies (e.g., Windows Defender Application Control or AppLocker) to restrict execution of untrusted or unknown 3D model files. Educate users about the risks of opening unsolicited or suspicious files, particularly those related to 3D models. Implement network-level protections such as email filtering and endpoint detection and response (EDR) solutions to detect and block malicious payloads. Regularly audit installed software to identify and manage vulnerable applications. For high-risk environments, consider sandboxing or isolating systems that handle 3D files. Maintain robust backup and recovery procedures to mitigate potential ransomware or destructive attacks stemming from exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2023-06-27T15:11:59.869Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6903adc5aebfcd54748fc7be

Added to database: 10/30/2025, 6:26:13 PM

Last enriched: 10/30/2025, 7:11:29 PM

Last updated: 10/30/2025, 11:21:17 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats