Microsoft has released security updates to address a critical vulnerability in Windows that could allow attackers to gain elevated system privileges.
Microsoft has released critical security updates for multiple Windows versions. A privilege escalation vulnerability exists in the Windows Common Log File System Driver. Attackers could exploit this to take complete control of affected systems.
The vulnerability, tracked as CVE-2023-36874, has a CVSS score of 7.8. It affects all supported versions of Windows 10, Windows 11, and Windows Server. The vulnerability exists in the way Windows handles certain file operations.
Exploitation requires local access. An attacker who successfully exploits this vulnerability could run arbitrary code with elevated privileges. This could allow them to install programs, view, change, or delete data, and create new accounts with full user rights.
Microsoft has addressed this vulnerability in the June 2023 Security Updates. Organizations should apply these updates immediately.
Affected versions include:
- Windows 10 Version 21H2
- Windows 10 Version 22H2
- Windows 11 Version 22H2
- Windows Server 2022
- Windows Server 2019
- Windows Server 2016
To mitigate this vulnerability:
- Apply the security updates immediately
- Restrict local user access where possible
- Monitor for unusual system behavior
- Enable Windows Defender Antivirus with real-time protection
Microsoft has confirmed that this vulnerability is being exploited in limited attacks. Organizations should prioritize patching systems that handle sensitive data or are exposed to untrusted networks.
For detailed information about the vulnerability, refer to the Microsoft Security Advisory. Additional guidance is available in the Windows Security documentation.
Comments
Please log in or register to join the discussion