Lucene search

K
kasperskyKaspersky LabKLA48553
HistoryMar 14, 2023 - 12:00 a.m.

KLA48553 Multiple vulnerabilities in Microsoft Windows

2023-03-1400:00:00
Kaspersky Lab
threats.kaspersky.com
220

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.1 High

AI Score

Confidence

High

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.028 Low

EPSS

Percentile

90.4%

Detect date:

03/14/2023

Severity:

Critical

Description:

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, obtain sensitive information, cause denial of service, bypass security restrictions.

Exploitation:

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Affected products:

Windows 10 Version 22H2 for ARM64-based Systems
Windows Server 2019 (Server Core installation)
Windows 10 Version 20H2 for 32-bit Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows 10 for x64-based Systems
Windows 10 Version 20H2 for x64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 10 for 32-bit Systems
Windows 11 version 21H2 for x64-based Systems
Windows Server 2012 R2 (Server Core installation)
Windows 10 Version 20H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows Server 2016 (Server Core installation)
Windows Server 2012 R2
Windows 10 Version 1607 for x64-based Systems
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows 10 Version 1809 for 32-bit Systems
Windows Server 2016
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows Server 2019

Solution:

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Original advisories:

CVE-2023-24861
CVE-2023-23400
CVE-2023-23423
CVE-2023-24910
CVE-2023-24868
CVE-2023-24858
CVE-2023-23413
CVE-2023-23418
CVE-2023-24907
CVE-2023-23422
CVE-2023-24870
CVE-2023-23415
CVE-2023-1018
CVE-2023-21708
CVE-2023-24865
CVE-2023-23385
CVE-2023-23393
CVE-2023-24913
CVE-2023-24866
CVE-2023-23414
CVE-2023-23421
CVE-2023-24871
CVE-2023-23410
CVE-2023-23407
CVE-2023-23403
CVE-2023-23411
CVE-2023-23406
CVE-2023-23401
CVE-2023-24859
CVE-2023-24911
CVE-2023-24867
CVE-2023-24909
CVE-2023-23405
CVE-2023-23404
CVE-2023-23392
CVE-2023-24880
CVE-2023-24856
CVE-2023-24876
CVE-2023-23412
CVE-2023-24863
CVE-2023-24872
CVE-2023-24862
CVE-2023-23420
CVE-2023-23409
CVE-2023-23417
CVE-2023-24908
CVE-2023-24869
CVE-2023-23416
CVE-2023-23419
CVE-2023-23394
CVE-2023-24857
CVE-2023-1017
CVE-2023-23402
CVE-2023-24906
CVE-2023-24864
CVE-2023-23388

Impacts:

ACE

Related products:

Microsoft Windows

CVE-IDS:

CVE-2023-248617.0High
CVE-2023-234007.2High
CVE-2023-234237.8Critical
CVE-2023-249107.8Critical
CVE-2023-248688.8Critical
CVE-2023-248587.5Critical
CVE-2023-234138.8Critical
CVE-2023-234187.8Critical
CVE-2023-249078.8Critical
CVE-2023-234227.8Critical
CVE-2023-248706.5High
CVE-2023-234159.8Critical
CVE-2023-10185.5High
CVE-2023-217089.8Critical
CVE-2023-248656.5High
CVE-2023-233857.0High
CVE-2023-233937.0High
CVE-2023-249138.8Critical
CVE-2023-248666.5High
CVE-2023-234147.1High
CVE-2023-234217.8Critical
CVE-2023-248718.8Critical
CVE-2023-234107.8Critical
CVE-2023-234077.1High
CVE-2023-234038.8Critical
CVE-2023-234116.5High
CVE-2023-234068.8Critical
CVE-2023-234017.8Critical
CVE-2023-248597.5Critical
CVE-2023-249114.3Warning
CVE-2023-248678.8Critical
CVE-2023-249098.8Critical
CVE-2023-234058.1Critical
CVE-2023-234048.1Critical
CVE-2023-233929.8Critical
CVE-2023-248804.4Warning
CVE-2023-248567.5Critical
CVE-2023-248768.8Critical
CVE-2023-234127.8Critical
CVE-2023-248636.5High
CVE-2023-248728.8Critical
CVE-2023-248625.5High
CVE-2023-234207.8Critical
CVE-2023-234095.5High
CVE-2023-234177.8Critical
CVE-2023-249088.1Critical
CVE-2023-248698.1Critical
CVE-2023-234167.8Critical
CVE-2023-234197.8Critical
CVE-2023-233945.5High
CVE-2023-248576.5High
CVE-2023-10177.8Critical
CVE-2023-234027.8Critical
CVE-2023-249066.5High
CVE-2023-248648.8Critical
CVE-2023-233888.8Critical

KB list:

5023786
5023752
5023764
5023706
5023756
5023713
5023765
5023698
5023702
5023696
5023697
5023705

Microsoft official advisories:

References

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.1 High

AI Score

Confidence

High

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.028 Low

EPSS

Percentile

90.4%