
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-23392 is a critical HTTP Protocol Stack Remote Code Execution Vulnerability affecting Microsoft Windows systems. The vulnerability was disclosed on March 14, 2023, with a CVSS v3.1 base score of 9.8 (CRITICAL). It primarily affects Windows Server 2022 and Windows 11 systems (NVD, Rapid7).
The vulnerability allows an unauthenticated attacker to send a specially crafted packet to a server that uses the HTTP Protocol Stack, potentially leading to remote code execution. The attack vector has low complexity and requires no privileges or user interaction. Microsoft has assessed this vulnerability as more likely to be exploited compared to other vulnerabilities due to these characteristics (Dark Reading).
The vulnerability has a critical severity rating due to its potential for remote code execution without requiring authentication or user interaction. Given its CVSS score of 9.8, successful exploitation could lead to complete system compromise, allowing attackers to execute arbitrary code on affected systems (Rapid7).
Microsoft has released security updates to address this vulnerability. The fixes are available through various KB updates including KB5023698 for Windows 11 21H2, KB5023706 for Windows 11 22H2, and KB5023705 for Windows Server 2022 (Rapid7).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."