
Cloud Vulnerability DB
A community-led vulnerabilities database
Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability (CVE-2023-36397) was disclosed on November 14, 2023. This critical vulnerability affects various versions of Windows operating systems including Windows Server (2008-2022) and Windows 10/11. The vulnerability received a CVSS score of 9.8 (Critical), indicating its severe nature (Arctic Wolf, NVD).
The vulnerability exists in the Windows Message Queuing service when running in a PGM Server environment. An unauthenticated threat actor could exploit this vulnerability by sending a specially crafted file over the network when the Windows message queuing service is running. The vulnerability is classified as a Buffer Over-read (CWE-126) issue (Arctic Wolf).
If successfully exploited, an unauthenticated attacker could achieve remote code execution on the target system. The vulnerability's critical CVSS score of 9.8 indicates potential complete compromise of the affected system's confidentiality, integrity, and availability (Arctic Wolf).
Primary mitigation involves applying the security updates released by Microsoft for all affected systems. As a workaround, organizations can disable the Message Queuing (MSMQ) service if it's not required in their environment. If disabling MSMQ is not feasible, blocking inbound connections to TCP port 1801 from suspicious sources can help prevent exploitation (Arctic Wolf).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."