CVE-2023-36874

Windows Error Reporting Service Elevation of Privilege Vulnerability

Basic Information

CVE State
PUBLISHED
Reserved Date
June 27, 2023
Published Date
July 11, 2023
Last Updated
January 27, 2025
Vendor
Microsoft
Product
Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows 11 version 21H2, Windows 10 Version 21H2, Windows 11 version 22H2, Windows 10 Version 22H2, Windows 10 Version 1507, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 Service Pack 2 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 R2 Service Pack 1, Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows Server 2012, Windows Server 2012 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation)
Description
Windows Error Reporting Service Elevation of Privilege Vulnerability
Tags
windows cisa microsoft metasploit_scanner

CVSS Scores

CVSS v3.1

7.8 - HIGH

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

SSVC Information

Exploitation
active
Technical Impact
total

Exploit Status

Exploited in the Wild
Yes (2023-07-11 00:00:00 UTC) Source
Proof of Concept Available
Yes (added 2023-08-20 13:50:42 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
CISA 2023-07-11 00:00:00 UTC

Scanner Integrations

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

win_error_cve_2023_36874

Type: metasploit • Created: Unknown

Metasploit module for CVE-2023-36874

Octoberfest7/CVE-2023-36874_BOF

Type: github • Created: 2023-08-24 22:24:34 UTC • Stars: 205

Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE

Wh04m1001/CVE-2023-36874

Type: github • Created: 2023-08-23 12:07:40 UTC • Stars: 233

d0rb/CVE-2023-36874

Type: github • Created: 2023-08-20 13:50:42 UTC • Stars: 77

This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Windows Error Reporting (WER) component.

Timeline

  • CVE ID Reserved

  • Added to KEVIntel

  • CVE Published to Public

  • Proof of Concept Exploit Available

  • Detected by Metasploit