CVE-2023-36803: CWE-126: Buffer Over-read in Microsoft Windows 10 Version 1809
Windows Kernel Information Disclosure Vulnerability
AI Analysis
Technical Summary
CVE-2023-36803 is a security vulnerability classified under CWE-126 (Buffer Over-read) affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability exists in the Windows kernel, where improper bounds checking leads to a buffer over-read condition. This flaw allows a local attacker with at least low-level privileges (PR:L) to read sensitive kernel memory beyond the intended buffer boundaries, resulting in an information disclosure vulnerability. The vulnerability does not affect system integrity or availability, as it does not allow code execution or system crashes. The attack vector is local (AV:L), requiring the attacker to have authenticated access to the system but no user interaction (UI:N) is needed once privileges are obtained. The scope remains unchanged (S:U), meaning the impact is limited to the vulnerable component without affecting other system components. The CVSS v3.1 base score is 5.5, indicating a medium severity level. No known exploits have been reported in the wild, and no official patches were linked in the provided data, though Microsoft typically addresses such vulnerabilities in cumulative updates. The vulnerability could be leveraged to gather sensitive kernel information, which may facilitate privilege escalation or other attacks if combined with additional vulnerabilities. Since Windows 10 Version 1809 is an older release, many organizations may have moved to newer versions, but legacy systems remain at risk. The vulnerability highlights the importance of maintaining updated systems and restricting local access to trusted users.
Potential Impact
For European organizations, the primary impact of CVE-2023-36803 is the potential disclosure of sensitive kernel memory information, which can compromise confidentiality. While it does not directly allow code execution or system disruption, the leaked information could be used by attackers to craft more effective privilege escalation or lateral movement attacks. Organizations running legacy Windows 10 Version 1809 systems, especially in critical infrastructure sectors such as finance, healthcare, and government, face increased risk if local attackers gain access. The vulnerability could be exploited by malicious insiders or attackers who have already gained limited access, making internal threat detection and access control crucial. The lack of known exploits reduces immediate risk, but the presence of this vulnerability in older systems that may no longer receive security updates increases long-term exposure. European entities with strict data protection regulations (e.g., GDPR) must consider the confidentiality breach implications and ensure timely remediation to avoid compliance issues.
Mitigation Recommendations
1. Upgrade affected systems from Windows 10 Version 1809 to a supported and fully patched Windows version to eliminate the vulnerability. 2. If upgrading is not immediately feasible, apply any available cumulative security updates from Microsoft addressing this issue. 3. Restrict local administrative and user access to trusted personnel only, minimizing the risk of local exploitation. 4. Implement strict endpoint security controls, including application whitelisting and behavior monitoring, to detect anomalous local activities. 5. Employ network segmentation and access controls to limit lateral movement opportunities for attackers who gain local access. 6. Conduct regular vulnerability assessments and patch management audits focusing on legacy systems. 7. Monitor system logs and security alerts for unusual kernel memory access patterns or privilege escalation attempts. 8. Educate users and administrators about the risks of running unsupported OS versions and the importance of timely updates.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands
CVE-2023-36803: CWE-126: Buffer Over-read in Microsoft Windows 10 Version 1809
Description
Windows Kernel Information Disclosure Vulnerability
AI-Powered Analysis
Technical Analysis
CVE-2023-36803 is a security vulnerability classified under CWE-126 (Buffer Over-read) affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability exists in the Windows kernel, where improper bounds checking leads to a buffer over-read condition. This flaw allows a local attacker with at least low-level privileges (PR:L) to read sensitive kernel memory beyond the intended buffer boundaries, resulting in an information disclosure vulnerability. The vulnerability does not affect system integrity or availability, as it does not allow code execution or system crashes. The attack vector is local (AV:L), requiring the attacker to have authenticated access to the system but no user interaction (UI:N) is needed once privileges are obtained. The scope remains unchanged (S:U), meaning the impact is limited to the vulnerable component without affecting other system components. The CVSS v3.1 base score is 5.5, indicating a medium severity level. No known exploits have been reported in the wild, and no official patches were linked in the provided data, though Microsoft typically addresses such vulnerabilities in cumulative updates. The vulnerability could be leveraged to gather sensitive kernel information, which may facilitate privilege escalation or other attacks if combined with additional vulnerabilities. Since Windows 10 Version 1809 is an older release, many organizations may have moved to newer versions, but legacy systems remain at risk. The vulnerability highlights the importance of maintaining updated systems and restricting local access to trusted users.
Potential Impact
For European organizations, the primary impact of CVE-2023-36803 is the potential disclosure of sensitive kernel memory information, which can compromise confidentiality. While it does not directly allow code execution or system disruption, the leaked information could be used by attackers to craft more effective privilege escalation or lateral movement attacks. Organizations running legacy Windows 10 Version 1809 systems, especially in critical infrastructure sectors such as finance, healthcare, and government, face increased risk if local attackers gain access. The vulnerability could be exploited by malicious insiders or attackers who have already gained limited access, making internal threat detection and access control crucial. The lack of known exploits reduces immediate risk, but the presence of this vulnerability in older systems that may no longer receive security updates increases long-term exposure. European entities with strict data protection regulations (e.g., GDPR) must consider the confidentiality breach implications and ensure timely remediation to avoid compliance issues.
Mitigation Recommendations
1. Upgrade affected systems from Windows 10 Version 1809 to a supported and fully patched Windows version to eliminate the vulnerability. 2. If upgrading is not immediately feasible, apply any available cumulative security updates from Microsoft addressing this issue. 3. Restrict local administrative and user access to trusted personnel only, minimizing the risk of local exploitation. 4. Implement strict endpoint security controls, including application whitelisting and behavior monitoring, to detect anomalous local activities. 5. Employ network segmentation and access controls to limit lateral movement opportunities for attackers who gain local access. 6. Conduct regular vulnerability assessments and patch management audits focusing on legacy systems. 7. Monitor system logs and security alerts for unusual kernel memory access patterns or privilege escalation attempts. 8. Educate users and administrators about the risks of running unsupported OS versions and the importance of timely updates.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- microsoft
- Date Reserved
- 2023-06-27T15:11:59.874Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6903adc7aebfcd54748fc802
Added to database: 10/30/2025, 6:26:15 PM
Last enriched: 10/30/2025, 6:59:28 PM
Last updated: 11/6/2025, 1:49:03 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-5651: Improper Control of Generation of Code ('Code Injection')
HighCVE-2024-57520: n/a
CriticalNevada Ransomware Attack Started Months Before It Was Discovered, Per Report
MediumAutomotive IT Firm Hyundai AutoEver Discloses Data Breach
MediumState-Sponsored Hackers Stole SonicWall Cloud Backups in Recent Attack
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.