Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-38152: CWE-126: Buffer Over-read in Microsoft Windows Server 2019

0
Medium
VulnerabilityCVE-2023-38152cvecve-2023-38152cwe-126
Published: Tue Sep 12 2023 (09/12/2023, 16:58:19 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows Server 2019

Description

DHCP Server Service Information Disclosure Vulnerability

AI-Powered Analysis

AILast updated: 10/30/2025, 18:48:01 UTC

Technical Analysis

CVE-2023-38152 is a buffer over-read vulnerability classified under CWE-126 affecting the DHCP Server service in Microsoft Windows Server 2019, specifically version 10.0.17763.0. A buffer over-read occurs when a program reads more data than it should from a buffer, potentially exposing sensitive information stored in adjacent memory. In this case, the DHCP Server improperly handles certain crafted DHCP requests, allowing an unauthenticated remote attacker to cause the server to disclose information from its memory. The vulnerability does not allow code execution or denial of service but can leak sensitive data that might be leveraged for further attacks or reconnaissance. The CVSS v3.1 base score is 5.3 (medium), reflecting network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to confidentiality (C:L) without affecting integrity or availability. No public exploits or patches are currently available, but the vulnerability has been officially published and reserved since July 2023. The affected product is Windows Server 2019, a widely used server operating system in enterprise environments, often hosting DHCP services for internal networks.

Potential Impact

For European organizations, this vulnerability poses a risk of sensitive information disclosure from DHCP servers running Windows Server 2019. While it does not directly compromise system integrity or availability, leaked information could include memory contents that reveal configuration details, credentials, or other sensitive data, potentially facilitating lateral movement or privilege escalation in subsequent attacks. Organizations relying on Windows Server 2019 for DHCP services in critical infrastructure, government, finance, or large enterprises could face increased risk if attackers exploit this vulnerability to gather intelligence. The fact that no authentication or user interaction is required increases the attack surface, especially if DHCP servers are exposed to untrusted networks or poorly segmented internal networks. However, the absence of known exploits and the medium severity rating suggest the immediate risk is moderate but should not be ignored.

Mitigation Recommendations

1. Restrict DHCP server exposure by ensuring DHCP services are not accessible from untrusted external networks; use network segmentation and firewalls to limit access. 2. Monitor network traffic for anomalous or malformed DHCP requests that could indicate exploitation attempts. 3. Implement strict access controls and logging on DHCP servers to detect suspicious activity early. 4. Apply any forthcoming security patches from Microsoft promptly once released. 5. Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect DHCP anomalies. 6. Conduct regular security assessments and vulnerability scans focusing on Windows Server 2019 instances running DHCP services. 7. Educate IT staff about this vulnerability and ensure incident response plans include scenarios involving DHCP service exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2023-07-12T23:41:45.860Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6903adcaaebfcd54748fc868

Added to database: 10/30/2025, 6:26:18 PM

Last enriched: 10/30/2025, 6:48:01 PM

Last updated: 11/6/2025, 11:32:29 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats