CVE-2023-23392
vulnerability analysis and mitigation

Overview

CVE-2023-23392 is a critical HTTP Protocol Stack Remote Code Execution Vulnerability affecting Microsoft Windows systems. The vulnerability was disclosed on March 14, 2023, with a CVSS v3.1 base score of 9.8 (CRITICAL). It primarily affects Windows Server 2022 and Windows 11 systems (NVD, Rapid7).

Technical details

The vulnerability allows an unauthenticated attacker to send a specially crafted packet to a server that uses the HTTP Protocol Stack, potentially leading to remote code execution. The attack vector has low complexity and requires no privileges or user interaction. Microsoft has assessed this vulnerability as more likely to be exploited compared to other vulnerabilities due to these characteristics (Dark Reading).

Impact

The vulnerability has a critical severity rating due to its potential for remote code execution without requiring authentication or user interaction. Given its CVSS score of 9.8, successful exploitation could lead to complete system compromise, allowing attackers to execute arbitrary code on affected systems (Rapid7).

Mitigation and workarounds

Microsoft has released security updates to address this vulnerability. The fixes are available through various KB updates including KB5023698 for Windows 11 21H2, KB5023706 for Windows 11 22H2, and KB5023705 for Windows Server 2022 (Rapid7).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management