Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-38144: CWE-126: Buffer Over-read in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2023-38144cvecve-2023-38144cwe-126
Published: Tue Sep 12 2023 (09/12/2023, 16:58:22 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Common Log File System Driver Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 10/30/2025, 18:56:15 UTC

Technical Analysis

CVE-2023-38144 is a buffer over-read vulnerability classified under CWE-126 found in the Windows Common Log File System Driver on Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability arises due to improper validation of input buffers, allowing an attacker with limited privileges (local authenticated user) to read beyond the intended memory boundaries. This can lead to elevation of privilege by corrupting memory or leaking sensitive information, potentially enabling the attacker to execute code with higher privileges or disrupt system operations. The vulnerability does not require user interaction and has a low attack complexity, but requires local access and some privileges. The CVSS v3.1 score is 7.8, reflecting high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the vulnerability is publicly disclosed and considered critical for affected systems. The lack of patch links suggests that mitigations or patches may be pending or need to be obtained through official Microsoft channels. Organizations running Windows 10 Version 1809 should assess exposure and prepare to deploy fixes promptly.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially for those still operating legacy Windows 10 Version 1809 systems, which are common in industrial, governmental, and enterprise environments. Successful exploitation can lead to unauthorized privilege escalation, allowing attackers to gain administrative control, access sensitive data, modify system configurations, or disrupt services. This can compromise confidentiality, integrity, and availability of critical systems. The vulnerability's local attack vector means insider threats or attackers who have gained initial access can leverage this flaw to deepen their foothold. Given the high CVSS score and potential for widespread impact, organizations in sectors such as finance, healthcare, manufacturing, and public administration are particularly vulnerable. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits. Failure to address this vulnerability could lead to data breaches, operational disruptions, and regulatory non-compliance under GDPR and other frameworks.

Mitigation Recommendations

1. Immediately identify and inventory all systems running Windows 10 Version 1809 (build 10.0.17763.0) within the organization. 2. Apply official Microsoft security updates or patches addressing CVE-2023-38144 as soon as they become available. 3. Until patches are deployed, restrict local user privileges and limit access to affected systems to trusted personnel only. 4. Employ application whitelisting and endpoint protection solutions to detect and prevent suspicious local privilege escalation attempts. 5. Monitor system logs and security events for unusual activity related to the Common Log File System Driver or privilege escalation indicators. 6. Consider upgrading affected systems to a more recent, supported Windows version with ongoing security updates to reduce exposure to legacy vulnerabilities. 7. Conduct user awareness training to reduce risk of initial compromise that could lead to exploitation of this vulnerability. 8. Implement network segmentation to isolate critical systems and limit lateral movement opportunities for attackers exploiting local vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2023-07-12T23:41:45.859Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6903adc8aebfcd54748fc83c

Added to database: 10/30/2025, 6:26:16 PM

Last enriched: 10/30/2025, 6:56:15 PM

Last updated: 11/6/2025, 1:51:22 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats