CVE-2023-36884
vulnerability analysis and mitigation

Overview

CVE-2023-36884 is a Windows Search Remote Code Execution Vulnerability discovered in July 2023. The vulnerability affects Microsoft Windows and Office products, allowing attackers to perform remote code execution through specially-crafted Microsoft Office documents. Microsoft has confirmed targeted attacks against defense and government entities in Europe and North America, particularly related to the Ukrainian World Congress (Microsoft MSRC).

Technical details

The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (HIGH) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H. The vulnerability is classified under CWE-362 (Concurrent Execution using Shared Resource with Improper Synchronization). The attack requires user interaction, as the victim needs to open a malicious file for successful exploitation (NVD).

Impact

If successfully exploited, the vulnerability allows attackers to perform remote code execution in the context of the victim. This means attackers could potentially execute arbitrary code, gain the same privileges as the compromised user, and take control of the affected system (Hacker News).

Mitigation and workarounds

Microsoft recommends using the 'Block all Office applications from creating child processes' attack surface reduction (ASR) rule as a mitigation measure. Additionally, Microsoft 365 Semi-Annual Channel version 2302 and later versions are protected from this vulnerability (Microsoft Answers).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management