Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23673: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1607

0
High
VulnerabilityCVE-2026-23673cvecve-2026-23673cwe-125
Published: Tue Mar 10 2026 (03/10/2026, 17:04:38 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1607

Description

Out-of-bounds read in Windows Resilient File System (ReFS) allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 03/10/2026, 18:36:58 UTC

Technical Analysis

CVE-2026-23673 is an out-of-bounds read vulnerability classified under CWE-125, discovered in the Windows Resilient File System (ReFS) implementation on Windows 10 Version 1607 (build 10.0.14393.0). The vulnerability arises when the ReFS driver improperly handles memory boundaries during file system operations, allowing an attacker with local authenticated access to read memory outside the allocated buffer. This can lead to information disclosure and potentially enable privilege escalation by corrupting memory or bypassing security checks. The attack vector requires local access with limited privileges (PR:L), no user interaction (UI:N), and has low attack complexity (AC:L). The vulnerability impacts confidentiality, integrity, and availability (C:H/I:H/A:H), making it a critical concern for affected systems. Although no public exploits have been reported, the vulnerability's nature suggests that attackers could leverage it to gain SYSTEM-level privileges, compromising the entire system. The vulnerability is specific to an older Windows 10 build, which limits its prevalence but still affects organizations that have not upgraded or patched legacy systems. Microsoft has not yet released a patch, so mitigation currently relies on limiting local access and monitoring for suspicious activity.

Potential Impact

The impact of CVE-2026-23673 is significant for organizations still running Windows 10 Version 1607, particularly those using the ReFS file system. Successful exploitation allows an attacker with local access to escalate privileges to SYSTEM level, potentially leading to full system compromise. This can result in unauthorized access to sensitive data, disruption of critical services, and the ability to deploy further malware or ransomware. The vulnerability affects confidentiality by exposing memory contents, integrity by allowing privilege escalation, and availability by potentially causing system instability or crashes. Organizations with legacy systems in critical infrastructure, government, healthcare, and financial sectors face heightened risks. The lack of a patch increases the window of exposure, and the ease of exploitation with low complexity makes it attractive for attackers. Although exploitation requires local access, insider threats or attackers who gain initial footholds through other means could leverage this vulnerability to deepen their control.

Mitigation Recommendations

To mitigate CVE-2026-23673, organizations should prioritize upgrading from Windows 10 Version 1607 to a supported and patched version of Windows. Until a patch is released, restrict local access to trusted users only and enforce strict access controls on systems running ReFS. Implement robust endpoint detection and response (EDR) solutions to monitor for unusual privilege escalation attempts or memory access patterns. Employ application whitelisting and least privilege principles to limit the ability of attackers to execute arbitrary code locally. Regularly audit and review user accounts and permissions to minimize the risk of unauthorized local access. Network segmentation can help contain potential compromises. Additionally, maintain up-to-date backups and incident response plans to recover quickly if exploitation occurs. Once Microsoft releases a security update, apply it promptly to eliminate the vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2026-01-14T16:59:33.466Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b05628ea502d3aa87d68c4

Added to database: 3/10/2026, 5:34:32 PM

Last enriched: 3/10/2026, 6:36:58 PM

Last updated: 3/13/2026, 3:05:14 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses