CVE-2023-36874
Windows Error Reporting Service Elevation of Privilege Vulnerability
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- June 27, 2023
- Published Date
- July 11, 2023
- Last Updated
- January 27, 2025
- Vendor
- Microsoft
- Product
- Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows 11 version 21H2, Windows 10 Version 21H2, Windows 11 version 22H2, Windows 10 Version 22H2, Windows 10 Version 1507, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 Service Pack 2 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 R2 Service Pack 1, Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows Server 2012, Windows Server 2012 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation)
- Description
- Windows Error Reporting Service Elevation of Privilege Vulnerability
- Tags
- Exploitation
- active
- Technical Impact
- total
CVSS Scores
CVSS v3.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
SSVC Information
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2023-07-11 00:00:00 UTC |
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Metasploit | https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/win_error_cve_2023_36874.rb | 2025-04-29 11:01:41 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
win_error_cve_2023_36874
Type: metasploit • Created: Unknown
Octoberfest7/CVE-2023-36874_BOF
Type: github • Created: 2023-08-24 22:24:34 UTC • Stars: 205
Wh04m1001/CVE-2023-36874
Type: github • Created: 2023-08-23 12:07:40 UTC • Stars: 233
d0rb/CVE-2023-36874
Type: github • Created: 2023-08-20 13:50:42 UTC • Stars: 77
Timeline
-
CVE ID Reserved
-
Added to KEVIntel
-
CVE Published to Public
-
Proof of Concept Exploit Available
-
Detected by Metasploit