Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-36803: CWE-126: Buffer Over-read in Microsoft Windows 10 Version 1809

0
Medium
VulnerabilityCVE-2023-36803cvecve-2023-36803cwe-126
Published: Tue Sep 12 2023 (09/12/2023, 16:58:26 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Kernel Information Disclosure Vulnerability

AI-Powered Analysis

AILast updated: 10/30/2025, 18:59:28 UTC

Technical Analysis

CVE-2023-36803 is a security vulnerability classified under CWE-126 (Buffer Over-read) affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability exists in the Windows kernel, where improper bounds checking leads to a buffer over-read condition. This flaw allows a local attacker with at least low-level privileges (PR:L) to read sensitive kernel memory beyond the intended buffer boundaries, resulting in an information disclosure vulnerability. The vulnerability does not affect system integrity or availability, as it does not allow code execution or system crashes. The attack vector is local (AV:L), requiring the attacker to have authenticated access to the system but no user interaction (UI:N) is needed once privileges are obtained. The scope remains unchanged (S:U), meaning the impact is limited to the vulnerable component without affecting other system components. The CVSS v3.1 base score is 5.5, indicating a medium severity level. No known exploits have been reported in the wild, and no official patches were linked in the provided data, though Microsoft typically addresses such vulnerabilities in cumulative updates. The vulnerability could be leveraged to gather sensitive kernel information, which may facilitate privilege escalation or other attacks if combined with additional vulnerabilities. Since Windows 10 Version 1809 is an older release, many organizations may have moved to newer versions, but legacy systems remain at risk. The vulnerability highlights the importance of maintaining updated systems and restricting local access to trusted users.

Potential Impact

For European organizations, the primary impact of CVE-2023-36803 is the potential disclosure of sensitive kernel memory information, which can compromise confidentiality. While it does not directly allow code execution or system disruption, the leaked information could be used by attackers to craft more effective privilege escalation or lateral movement attacks. Organizations running legacy Windows 10 Version 1809 systems, especially in critical infrastructure sectors such as finance, healthcare, and government, face increased risk if local attackers gain access. The vulnerability could be exploited by malicious insiders or attackers who have already gained limited access, making internal threat detection and access control crucial. The lack of known exploits reduces immediate risk, but the presence of this vulnerability in older systems that may no longer receive security updates increases long-term exposure. European entities with strict data protection regulations (e.g., GDPR) must consider the confidentiality breach implications and ensure timely remediation to avoid compliance issues.

Mitigation Recommendations

1. Upgrade affected systems from Windows 10 Version 1809 to a supported and fully patched Windows version to eliminate the vulnerability. 2. If upgrading is not immediately feasible, apply any available cumulative security updates from Microsoft addressing this issue. 3. Restrict local administrative and user access to trusted personnel only, minimizing the risk of local exploitation. 4. Implement strict endpoint security controls, including application whitelisting and behavior monitoring, to detect anomalous local activities. 5. Employ network segmentation and access controls to limit lateral movement opportunities for attackers who gain local access. 6. Conduct regular vulnerability assessments and patch management audits focusing on legacy systems. 7. Monitor system logs and security alerts for unusual kernel memory access patterns or privilege escalation attempts. 8. Educate users and administrators about the risks of running unsupported OS versions and the importance of timely updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2023-06-27T15:11:59.874Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6903adc7aebfcd54748fc802

Added to database: 10/30/2025, 6:26:15 PM

Last enriched: 10/30/2025, 6:59:28 PM

Last updated: 11/6/2025, 1:49:03 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats