CVE-2023-36025
Windows SmartScreen Security Feature Bypass Vulnerability
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- June 20, 2023
- Published Date
- November 14, 2023
- Last Updated
- February 05, 2025
- Vendor
- Microsoft
- Product
- Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows 11 version 21H2, Windows 10 Version 21H2, Windows 11 version 22H2, Windows 10 Version 22H2, Windows 11 version 22H3, Windows 11 Version 23H2, Windows Server 2022, 23H2 Edition (Server Core installation), Windows 10 Version 1507, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 Service Pack 2 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 R2 Service Pack 1, Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows Server 2012, Windows Server 2012 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation)
- Description
- Windows SmartScreen Security Feature Bypass Vulnerability
CVSS Scores
CVSS v3.1
8.8 - HIGH
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
SSVC Information
- Exploitation
- active
- Technical Impact
- total
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2023-11-14 00:00:00 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
coolman6942o/-EXPLOIT-CVE-2023-36025
Type: github • Created: 2023-12-28 23:29:04 UTC • Stars: 5
Windows SmartScreen Security Feature Bypass Vulnerability
J466Y/test_CVE-2023-36025
Type: github • Created: 2023-11-28 10:34:50 UTC • Stars: 5
test repo for CVE-2023-36025
ka7ana/CVE-2023-36025
Type: github • Created: 2023-11-17 15:46:44 UTC • Stars: 12
Quick test for CVE-2023-26025 behaviours