CVE-2023-36884
Windows Search Remote Code Execution Vulnerability
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- June 27, 2023
- Published Date
- July 11, 2023
- Last Updated
- February 03, 2025
- Vendor
- Microsoft
- Product
- Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows 11 version 21H2, Windows 10 Version 21H2, Windows 11 version 22H2, Windows 10 Version 22H2, Windows 10 Version 1507, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 Service Pack 2 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 R2 Service Pack 1, Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows Server 2012, Windows Server 2012 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation)
- Description
- Windows Search Remote Code Execution Vulnerability
- Tags
- Exploitation
- active
- Technical Impact
- total
CVSS Scores
CVSS v3.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
SSVC Information
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2023-07-17 00:00:00 UTC |
Recent Mentions
Written by: Casey Charrier, James Sadowski, Clement Lecigne, Vlad Stolyarov Executive Summary Google Threat Intelligence Group (GTIG) tracked 75...
Source: Google Threat Intelligence • Published: 2025-04-29 05:00:00 UTC
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Nessus | https://www.tenable.com/plugins/nessus/178275 | 2023-07-13 22:06:00 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
jakabakos/CVE-2023-36884-MS-Office-HTML-RCE
Type: github • Created: 2023-09-28 11:53:44 UTC • Stars: 40
raresteak/CVE-2023-36884
Type: github • Created: 2023-07-30 14:53:25 UTC • Stars: 1
ridsoliveira/Fix-CVE-2023-36884
Type: github • Created: 2023-07-28 20:39:37 UTC • Stars: 2
tarraschk/CVE-2023-36884-Checker
Type: github • Created: 2023-07-17 14:02:40 UTC • Stars: 14
zerosorai/CVE-2023-36884
Type: github • Created: 2023-07-15 16:56:18 UTC • Stars: 2
Maxwitat/CVE-2023-36884-Scripts-for-Intune-Remediation-SCCM-Compliance-Baseline
Type: github • Created: 2023-07-12 14:13:20 UTC • Stars: 25
Timeline
-
CVE ID Reserved
-
CVE Published to Public
-
Detected by Nessus
-
Exploit Used in Malware
-
Added to KEVIntel
-
Proof of Concept Exploit Available