Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-38143: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2023-38143cvecve-2023-38143cwe-122
Published: Tue Sep 12 2023 (09/12/2023, 16:58:22 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Common Log File System Driver Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 10/30/2025, 18:56:32 UTC

Technical Analysis

CVE-2023-38143 is a heap-based buffer overflow vulnerability classified under CWE-122, found in the Windows Common Log File System Driver on Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability allows an attacker with limited privileges (low-level user or process) to execute an elevation of privilege attack, gaining SYSTEM-level access. The flaw arises from improper handling of memory buffers in the driver, which can be exploited to overwrite critical memory regions, leading to arbitrary code execution in kernel mode. The CVSS v3.1 base score is 7.8, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). No public exploit code or active exploitation has been reported yet. The vulnerability affects a legacy Windows 10 version that is out of mainstream support, increasing risk for organizations that have not upgraded. The technical details suggest that exploitation could lead to complete system compromise, making it a critical concern for environments relying on this OS version. Microsoft has not provided direct patch links in the provided data, but remediation typically involves applying security updates or upgrading to a supported OS version.

Potential Impact

The vulnerability allows attackers with limited privileges to escalate to SYSTEM-level access, compromising the confidentiality, integrity, and availability of affected systems. For European organizations, this could lead to unauthorized access to sensitive data, disruption of critical services, and potential lateral movement within networks. Sectors such as government, finance, healthcare, and critical infrastructure that may still operate legacy Windows 10 1809 systems are particularly vulnerable. The ability to elevate privileges without user interaction increases the risk of automated or wormable attacks within internal networks. The lack of known exploits in the wild currently reduces immediate risk, but the high severity and potential impact necessitate urgent mitigation. Organizations failing to address this vulnerability may face regulatory compliance issues under GDPR due to potential data breaches.

Mitigation Recommendations

1. Immediately identify and inventory all systems running Windows 10 Version 1809 (build 10.0.17763.0) within the organization. 2. Apply the latest security updates from Microsoft addressing this vulnerability as soon as they become available; if no direct patch exists, plan an upgrade to a supported Windows version (e.g., Windows 10 21H2 or later). 3. Restrict local access to vulnerable systems by enforcing strict access controls and limiting administrative privileges. 4. Implement application whitelisting and endpoint detection and response (EDR) solutions to monitor for suspicious activity indicative of privilege escalation attempts. 5. Conduct regular vulnerability scanning and penetration testing focused on privilege escalation vectors. 6. Educate IT staff about this specific vulnerability and ensure incident response plans include scenarios involving local privilege escalation. 7. For critical infrastructure, consider network segmentation to isolate legacy systems and reduce attack surface. 8. Monitor security advisories from Microsoft and trusted sources for updates or exploit disclosures related to CVE-2023-38143.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2023-07-12T23:41:45.859Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6903adc8aebfcd54748fc839

Added to database: 10/30/2025, 6:26:16 PM

Last enriched: 10/30/2025, 6:56:32 PM

Last updated: 11/6/2025, 1:44:50 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats