
Cloud Vulnerability DB
A community-led vulnerabilities database
Remote Procedure Call Runtime Denial of Service Vulnerability (CVE-2023-33172) affects multiple versions of Microsoft Windows operating systems. The vulnerability was disclosed in July 2023 and received a CVSS base score of 7.5 (HIGH) from NIST NVD, while Microsoft assessed it as 6.5 (MEDIUM) (NVD).
The vulnerability exists in the Remote Procedure Call (RPC) Runtime component of Microsoft Windows. It has been assigned a CVSS vector string of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H by NIST, indicating it is network accessible, requires low attack complexity, needs no privileges or user interaction, and primarily impacts system availability. Microsoft's assessment differs slightly with a vector string of CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, suggesting some level of privileges may be required (NVD).
If successfully exploited, this vulnerability could allow an attacker to cause a denial of service condition in the affected system, specifically targeting the Remote Procedure Call Runtime service. The attack primarily affects system availability without compromising confidentiality or integrity (NVD).
Microsoft has released security updates to address this vulnerability. The fixes are included in the July 2023 security updates for affected Windows versions, including Windows 10 (multiple versions), Windows Server 2012 R2, and other supported Windows versions. Users are advised to apply these security updates to protect their systems (Microsoft Update).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."