Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2023-21554
Vulnerability from cvelistv5
Published
2023-04-11 19:13
Modified
2024-08-02 09:44
Severity ?
EPSS score ?
References
▼ | URL | Tags | |
---|---|---|---|
secure@microsoft.com | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21554 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21554 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.0 < 10.0.17763.4252 cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.4252:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.4252:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.4252:*:*:*:*:*:arm64:* |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-21554", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-03-22T19:37:20.954446Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-10T18:50:04.286Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T09:44:01.255Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "Microsoft Message Queuing Remote Code Execution Vulnerability", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21554" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.4252:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.4252:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.4252:*:*:*:*:*:arm64:*" ], "platforms": [ "32-bit Systems", "x64-based Systems", "ARM64-based Systems" ], "product": "Windows 10 Version 1809", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.17763.4252", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.4252:*:*:*:*:*:*:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2019", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.17763.4252", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.4252:*:*:*:*:*:*:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2019 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.17763.4252", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.1668:*:*:*:*:*:*:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2022", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.20348.1668", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.2846:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.2846:*:*:*:*:*:arm64:*" ], "platforms": [ "32-bit Systems", "ARM64-based Systems" ], "product": "Windows 10 Version 20H2", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.19042.2846", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.1817:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.1817:*:*:*:*:*:arm64:*" ], "platforms": [ "x64-based Systems", "ARM64-based Systems" ], "product": "Windows 11 version 21H2", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.22000.1817", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.2846:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.2846:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.2846:*:*:*:*:*:x64:*" ], "platforms": [ "32-bit Systems", "ARM64-based Systems" ], "product": "Windows 10 Version 21H2", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.19044.2846", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_11_22H2:10.0.22621.1555:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_22H2:10.0.22621.1555:*:*:*:*:*:x64:*" ], "platforms": [ "ARM64-based Systems", "x64-based Systems" ], "product": "Windows 11 version 22H2", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.22621.1555", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.2846:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.2846:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.2846:*:*:*:*:*:x86:*" ], "platforms": [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems" ], "product": "Windows 10 Version 22H2", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.19045.2846", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19869:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19869:*:*:*:*:*:x64:*" ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "product": "Windows 10 Version 1507", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.10240.19869", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5850:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5850:*:*:*:*:*:x64:*" ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "product": "Windows 10 Version 1607", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.14393.5850", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5850:*:*:*:*:*:*:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2016", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.14393.5850", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5850:*:*:*:*:*:*:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2016 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.14393.5850", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.22015:*:*:*:*:*:x64:*" ], "platforms": [ "32-bit Systems" ], "product": "Windows Server 2008 Service Pack 2", "vendor": "Microsoft", "versions": [ { "lessThan": "6.0.6003.22015", "status": "affected", "version": "6.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.22015:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.22015:*:*:*:*:*:x86:*" ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "product": "Windows Server 2008 Service Pack 2 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "6.0.6003.22015", "status": "affected", "version": "6.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.22015:*:*:*:*:*:x86:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2008 Service Pack 2", "vendor": "Microsoft", "versions": [ { "lessThan": "6.0.6003.22015", "status": "affected", "version": "6.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.26466:*:*:*:*:*:x64:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2008 R2 Service Pack 1", "vendor": "Microsoft", "versions": [ { "lessThan": "6.1.7601.26466", "status": "affected", "version": "6.1.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.26466:*:*:*:*:*:x64:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "6.1.7601.26466", "status": "affected", "version": "6.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.24216:*:*:*:*:*:x64:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2012", "vendor": "Microsoft", "versions": [ { "lessThan": "6.2.9200.24216", "status": "affected", "version": "6.2.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.24216:*:*:*:*:*:x64:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2012 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "6.2.9200.24216", "status": "affected", "version": "6.2.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20919:*:*:*:*:*:x64:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2012 R2", "vendor": "Microsoft", "versions": [ { "lessThan": "6.3.9600.20919", "status": "affected", "version": "6.3.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20919:*:*:*:*:*:x64:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2012 R2 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "6.3.9600.20919", "status": "affected", "version": "6.3.0", "versionType": "custom" } ] } ], "datePublic": "2023-04-11T07:00:00+00:00", "descriptions": [ { "lang": "en-US", "value": "Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability" } ], "metrics": [ { "cvssV3_1": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-29T01:56:11.229Z", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "Microsoft Message Queuing Remote Code Execution Vulnerability", "tags": [ "vendor-advisory" ], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21554" } ], "title": "Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2023-21554", "datePublished": "2023-04-11T19:13:25.080Z", "dateReserved": "2022-12-01T14:00:11.201Z", "dateUpdated": "2024-08-02T09:44:01.255Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-21554\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2023-04-11T21:15:15.597\",\"lastModified\":\"2024-11-21T07:43:04.183\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.14393.5850\",\"matchCriteriaId\":\"D3845BA8-1885-4B32-A069-9CD95E9895A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.17763.4252\",\"matchCriteriaId\":\"CC646C31-F80E-4BED-B15F-671250530066\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.19042.2846\",\"matchCriteriaId\":\"77610DFA-2CAF-4B06-AAA8-2387233A35FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.19044.2846\",\"matchCriteriaId\":\"28B6B095-4CE2-4612-A977-072C464D7157\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.19045.2846\",\"matchCriteriaId\":\"D8D3C91C-C19E-49D4-91DC-6C59086DE344\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.22000.1817\",\"matchCriteriaId\":\"672CF584-309F-4F28-9E3A-545C0138F5EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.22621.1555\",\"matchCriteriaId\":\"F47239E8-AEB6-4E79-91DB-51238D4368B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F422A8C-2C4E-42C8-B420-E0728037E15C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*\",\"matchCriteriaId\":\"AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7DF96F8-BA6A-4780-9CA3-F719B3F81074\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB18C4CE-5917-401E-ACF7-2747084FD36E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB79EE26-FC32-417D-A49C-A1A63165A968\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"821614DD-37DD-44E2-A8A4-FE8D23A33C3C\"}]}]}],\"references\":[{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21554\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21554\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}" } }
icsa-24-051-03
Vulnerability from csaf_cisa
Published
2024-02-20 07:00
Modified
2024-04-23 06:00
Summary
Mitsubishi Electric Electrical discharge machines
Notes
Legal Notice
All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Risk evaluation
Successful exploitation of this vulnerability could allow an attacker to disclose, tamper with, destroy, or delete information in the products, or cause a denial-of-service condition on the products.
Critical infrastructure sectors
Critical Manufacturing
Countries/areas deployed
Worldwide
Company headquarters location
Japan
Recommended Practices
CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
Recommended Practices
CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices
CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.
Recommended Practices
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Recommended Practices
Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.
Recommended Practices
No known public exploitation specifically targeting this vulnerability) has been reported to CISA at this time.
{ "document": { "acknowledgments": [ { "organization": "Mitsubishi Electric", "summary": "reporting this vulnerability to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of this vulnerability could allow an attacker to disclose, tamper with, destroy, or delete information in the products, or cause a denial-of-service condition on the products.", "title": "Risk evaluation" }, { "category": "other", "text": "Critical Manufacturing", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Japan", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "No known public exploitation specifically targeting this vulnerability) has been reported to CISA at this time.", "title": "Recommended Practices" } ], "publisher": { "category": "coordinator", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-24-051-03 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2024/icsa-24-051-03.json" }, { "category": "self", "summary": "ICSA Advisory ICSA-24-051-03 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-051-03" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Mitsubishi Electric Electrical discharge machines", "tracking": { "current_release_date": "2024-04-23T06:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-24-051-03", "initial_release_date": "2024-02-20T07:00:00.000000Z", "revision_history": [ { "date": "2024-02-20T07:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "Initial Publication" }, { "date": "2024-04-23T06:00:00.000000Z", "legacy_version": "Update A", "number": "2", "summary": "Added Special Modification Patch BRD-C62W003-A0" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MV Series MV1200S D-CUBES Series Standard system BRD-B60W000: \u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "Wire-cut EDM MV Series MV1200S D-CUBES Series Standard system BRD-B60W000" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MV Series MV2400S D-CUBES Series Standard system BRD-B60W000: \u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Wire-cut EDM MV Series MV2400S D-CUBES Series Standard system BRD-B60W000" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MV Series MV4800S D-CUBES Series Standard system BRD-B60W000: \u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "Wire-cut EDM MV Series MV4800S D-CUBES Series Standard system BRD-B60W000" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MV Series MV1200R D-CUBES Series Standard system BRD-B60W000: \u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "Wire-cut EDM MV Series MV1200R D-CUBES Series Standard system BRD-B60W000" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MV Series MV2400R D-CUBES Series Standard system BRD-B60W000: \u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "Wire-cut EDM MV Series MV2400R D-CUBES Series Standard system BRD-B60W000" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MV Series MV4800R D-CUBES Series Standard system BRD-B60W000: \u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "Wire-cut EDM MV Series MV4800R D-CUBES Series Standard system BRD-B60W000" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MV Series MV1200S D-CUBES Series Special system BRD-B63W000 to W036: vers:all/*", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "Wire-cut EDM MV Series MV1200S D-CUBES Series Special system BRD-B63W000 to W036" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MV Series MV2400S D-CUBES Series Special system BRD-B63W000 to W036: vers:all/*", "product_id": "CSAFPID-0008" } } ], "category": "product_name", "name": "Wire-cut EDM MV Series MV2400S D-CUBES Series Special system BRD-B63W000 to W036" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MV Series MV4800S D-CUBES Series Special system BRD-B63W000 to W036: vers:all/*", "product_id": "CSAFPID-0009" } } ], "category": "product_name", "name": "Wire-cut EDM MV Series MV4800S D-CUBES Series Special system BRD-B63W000 to W036" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MV Series MV1200R D-CUBES Series Special system BRD-B63W000 to W036: vers:all/*", "product_id": "CSAFPID-0010" } } ], "category": "product_name", "name": "Wire-cut EDM MV Series MV1200R D-CUBES Series Special system BRD-B63W000 to W036" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MV Series MV2400R D-CUBES Series Special system BRD-B63W000 to W036: vers:all/*", "product_id": "CSAFPID-0011" } } ], "category": "product_name", "name": "Wire-cut EDM MV Series MV2400R D-CUBES Series Special system BRD-B63W000 to W036" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MV Series MV4800R D-CUBES Series Special system BRD-B63W000 to W036: vers:all/*", "product_id": "CSAFPID-0012" } } ], "category": "product_name", "name": "Wire-cut EDM MV Series MV4800R D-CUBES Series Special system BRD-B63W000 to W036" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MP Series MP1200 D-CUBES Series Standard system BRD-B60W000: \u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product_id": "CSAFPID-0013" } } ], "category": "product_name", "name": "Wire-cut EDM MP Series MP1200 D-CUBES Series Standard system BRD-B60W000" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MP Series MP2400 D-CUBES Series Standard system BRD-B60W000: \u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product_id": "CSAFPID-0014" } } ], "category": "product_name", "name": "Wire-cut EDM MP Series MP2400 D-CUBES Series Standard system BRD-B60W000" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MP Series MP4800 D-CUBES Series Standard system BRD-B60W000: \u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product_id": "CSAFPID-0015" } } ], "category": "product_name", "name": "Wire-cut EDM MP Series MP4800 D-CUBES Series Standard system BRD-B60W000" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MP Series MP1200 D-CUBES Series Special system BRD-B63W000 to W036: vers:all/*", "product_id": "CSAFPID-0016" } } ], "category": "product_name", "name": "Wire-cut EDM MP Series MP1200 D-CUBES Series Special system BRD-B63W000 to W036" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MP Series MP2400 D-CUBES Series Special system BRD-B63W000 to W036: vers:all/*", "product_id": "CSAFPID-0017" } } ], "category": "product_name", "name": "Wire-cut EDM MP Series MP2400 D-CUBES Series Special system BRD-B63W000 to W036" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MP Series MP4800 D-CUBES Series Special system BRD-B63W000 to W036: vers:all/*", "product_id": "CSAFPID-0018" } } ], "category": "product_name", "name": "Wire-cut EDM MP Series MP4800 D-CUBES Series Special system BRD-B63W000 to W036" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MX Series MX900 D-CUBES Series Standard system BRD-B60W000: \u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product_id": "CSAFPID-0019" } } ], "category": "product_name", "name": "Wire-cut EDM MX Series MX900 D-CUBES Series Standard system BRD-B60W000" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MX Series MX2400 D-CUBES Series Standard system BRD-B60W000: \u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product_id": "CSAFPID-0020" } } ], "category": "product_name", "name": "Wire-cut EDM MX Series MX2400 D-CUBES Series Standard system BRD-B60W000" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MX Series MX900 D-CUBES Series Special system BRD-B63W000 to W036: vers:all/*", "product_id": "CSAFPID-0021" } } ], "category": "product_name", "name": "Wire-cut EDM MX Series MX900 D-CUBES Series Special system BRD-B63W000 to W036" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MX Series MX2400 D-CUBES Series Special system BRD-B63W000 to W036: vers:all/*", "product_id": "CSAFPID-0022" } } ], "category": "product_name", "name": "Wire-cut EDM MX Series MX2400 D-CUBES Series Special system BRD-B63W000 to W036" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=A12__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product": { "name": "Mitsubishi Electric Corporation Sinker EDM SV-P Series SV8P D-CUBES Series Standard system BRD-M60W000: \u003c=A12__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product_id": "CSAFPID-0023" } } ], "category": "product_name", "name": "Sinker EDM SV-P Series SV8P D-CUBES Series Standard system BRD-M60W000" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=A12__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product": { "name": "Mitsubishi Electric Corporation Sinker EDM SV-P Series SV12P D-CUBES Series Standard system BRD-M60W000: \u003c=A12__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product_id": "CSAFPID-0024" } } ], "category": "product_name", "name": "Sinker EDM SV-P Series SV12P D-CUBES Series Standard system BRD-M60W000" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Mitsubishi Electric Corporation Sinker EDM SV-P Series SV8P D-CUBES Series Special system BRD-M63W000 to W022: vers:all/*", "product_id": "CSAFPID-0025" } } ], "category": "product_name", "name": "Sinker EDM SV-P Series SV8P D-CUBES Series Special system BRD-M63W000 to W022" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Mitsubishi Electric Corporation Sinker EDM SV-P Series SV12P D-CUBES Series Special system BRD-M63W000 to W022: vers:all/*", "product_id": "CSAFPID-0026" } } ], "category": "product_name", "name": "Sinker EDM SV-P Series SV12P D-CUBES Series Special system BRD-M63W000 to W022" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=A12__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product": { "name": "Mitsubishi Electric Corporation Sinker EDM SG Series SG8 D-CUBES Series Standard system BRD-M60W000: \u003c=A12__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product_id": "CSAFPID-0027" } } ], "category": "product_name", "name": "Sinker EDM SG Series SG8 D-CUBES Series Standard system BRD-M60W000" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=A12__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product": { "name": "Mitsubishi Electric Corporation Sinker EDM SG Series SG12 D-CUBES Series Standard system BRD-M60W000: \u003c=A12__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product_id": "CSAFPID-0028" } } ], "category": "product_name", "name": "Sinker EDM SG Series SG12 D-CUBES Series Standard system BRD-M60W000" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=A12__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product": { "name": "Mitsubishi Electric Corporation Sinker EDM SG Series SG28 D-CUBES Series Standard system BRD-M60W000: \u003c=A12__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product_id": "CSAFPID-0029" } } ], "category": "product_name", "name": "Sinker EDM SG Series SG28 D-CUBES Series Standard system BRD-M60W000" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Mitsubishi Electric Corporation Sinker EDM SG Series SG8 D-CUBES Series Special system BRD-BRD-M63W000 to W022: vers:all/*", "product_id": "CSAFPID-0030" } } ], "category": "product_name", "name": "Sinker EDM SG Series SG8 D-CUBES Series Special system BRD-BRD-M63W000 to W022" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Mitsubishi Electric Corporation Sinker EDM SG Series SG12 D-CUBES Series Special system BRD-M63W000 to W022: vers:all/*", "product_id": "CSAFPID-0031" } } ], "category": "product_name", "name": "Sinker EDM SG Series SG12 D-CUBES Series Special system BRD-M63W000 to W022" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Mitsubishi Electric Corporation Sinker EDM SG Series SG28 D-CUBES Series Special system BRD-M63W000 to W022: vers:all/*", "product_id": "CSAFPID-0032" } } ], "category": "product_name", "name": "Sinker EDM SG Series SG28 D-CUBES Series Special system BRD-M63W000 to W022" } ], "category": "vendor", "name": "Mitsubishi Electric Corporation" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-21554", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Remote code execution vulnerability due to Microsoft Message Queuing service on Microsoft Windows exists in electrical discharge machines.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-21554" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" } ], "remediations": [ { "category": "mitigation", "details": "Mitsubishi Electric recommends that users install the Special Modification Patch BRD-C62W003-A0 on their system. For information about how to install the update program, please contact your local service center.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032" ] }, { "category": "mitigation", "details": "Mitsubishi Electric recommends taking the mitigations listed below to minimize the risk of exploitation of this vulnerability.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032" ] }, { "category": "mitigation", "details": "Use a firewall, virtual private network (VPN), etc. to prevent unauthorized access when Internet access is required.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032" ] }, { "category": "mitigation", "details": "Use within a LAN and block access from untrusted networks and hosts through firewalls.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032" ] }, { "category": "mitigation", "details": "Restrict physical access to the affected products and to personal computers and network devices that can communicate with them.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032" ] }, { "category": "mitigation", "details": "Install anti-virus software on personal computers that can communicate with the affected products.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032" ] }, { "category": "mitigation", "details": "For specific update instructions and additional details refer to Mitsubishi Electric advisory 2023-022.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-022_en.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032" ] } ] } ] }
ICSA-24-051-03
Vulnerability from csaf_cisa
Published
2024-02-20 07:00
Modified
2024-04-23 06:00
Summary
Mitsubishi Electric Electrical discharge machines
Notes
Legal Notice
All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Risk evaluation
Successful exploitation of this vulnerability could allow an attacker to disclose, tamper with, destroy, or delete information in the products, or cause a denial-of-service condition on the products.
Critical infrastructure sectors
Critical Manufacturing
Countries/areas deployed
Worldwide
Company headquarters location
Japan
Recommended Practices
CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
Recommended Practices
CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices
CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.
Recommended Practices
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Recommended Practices
Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.
Recommended Practices
No known public exploitation specifically targeting this vulnerability) has been reported to CISA at this time.
{ "document": { "acknowledgments": [ { "organization": "Mitsubishi Electric", "summary": "reporting this vulnerability to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of this vulnerability could allow an attacker to disclose, tamper with, destroy, or delete information in the products, or cause a denial-of-service condition on the products.", "title": "Risk evaluation" }, { "category": "other", "text": "Critical Manufacturing", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Japan", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "No known public exploitation specifically targeting this vulnerability) has been reported to CISA at this time.", "title": "Recommended Practices" } ], "publisher": { "category": "coordinator", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-24-051-03 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2024/icsa-24-051-03.json" }, { "category": "self", "summary": "ICSA Advisory ICSA-24-051-03 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-051-03" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Mitsubishi Electric Electrical discharge machines", "tracking": { "current_release_date": "2024-04-23T06:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-24-051-03", "initial_release_date": "2024-02-20T07:00:00.000000Z", "revision_history": [ { "date": "2024-02-20T07:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "Initial Publication" }, { "date": "2024-04-23T06:00:00.000000Z", "legacy_version": "Update A", "number": "2", "summary": "Added Special Modification Patch BRD-C62W003-A0" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MV Series MV1200S D-CUBES Series Standard system BRD-B60W000: \u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "Wire-cut EDM MV Series MV1200S D-CUBES Series Standard system BRD-B60W000" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MV Series MV2400S D-CUBES Series Standard system BRD-B60W000: \u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Wire-cut EDM MV Series MV2400S D-CUBES Series Standard system BRD-B60W000" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MV Series MV4800S D-CUBES Series Standard system BRD-B60W000: \u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "Wire-cut EDM MV Series MV4800S D-CUBES Series Standard system BRD-B60W000" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MV Series MV1200R D-CUBES Series Standard system BRD-B60W000: \u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "Wire-cut EDM MV Series MV1200R D-CUBES Series Standard system BRD-B60W000" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MV Series MV2400R D-CUBES Series Standard system BRD-B60W000: \u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "Wire-cut EDM MV Series MV2400R D-CUBES Series Standard system BRD-B60W000" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MV Series MV4800R D-CUBES Series Standard system BRD-B60W000: \u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "Wire-cut EDM MV Series MV4800R D-CUBES Series Standard system BRD-B60W000" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MV Series MV1200S D-CUBES Series Special system BRD-B63W000 to W036: vers:all/*", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "Wire-cut EDM MV Series MV1200S D-CUBES Series Special system BRD-B63W000 to W036" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MV Series MV2400S D-CUBES Series Special system BRD-B63W000 to W036: vers:all/*", "product_id": "CSAFPID-0008" } } ], "category": "product_name", "name": "Wire-cut EDM MV Series MV2400S D-CUBES Series Special system BRD-B63W000 to W036" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MV Series MV4800S D-CUBES Series Special system BRD-B63W000 to W036: vers:all/*", "product_id": "CSAFPID-0009" } } ], "category": "product_name", "name": "Wire-cut EDM MV Series MV4800S D-CUBES Series Special system BRD-B63W000 to W036" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MV Series MV1200R D-CUBES Series Special system BRD-B63W000 to W036: vers:all/*", "product_id": "CSAFPID-0010" } } ], "category": "product_name", "name": "Wire-cut EDM MV Series MV1200R D-CUBES Series Special system BRD-B63W000 to W036" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MV Series MV2400R D-CUBES Series Special system BRD-B63W000 to W036: vers:all/*", "product_id": "CSAFPID-0011" } } ], "category": "product_name", "name": "Wire-cut EDM MV Series MV2400R D-CUBES Series Special system BRD-B63W000 to W036" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MV Series MV4800R D-CUBES Series Special system BRD-B63W000 to W036: vers:all/*", "product_id": "CSAFPID-0012" } } ], "category": "product_name", "name": "Wire-cut EDM MV Series MV4800R D-CUBES Series Special system BRD-B63W000 to W036" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MP Series MP1200 D-CUBES Series Standard system BRD-B60W000: \u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product_id": "CSAFPID-0013" } } ], "category": "product_name", "name": "Wire-cut EDM MP Series MP1200 D-CUBES Series Standard system BRD-B60W000" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MP Series MP2400 D-CUBES Series Standard system BRD-B60W000: \u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product_id": "CSAFPID-0014" } } ], "category": "product_name", "name": "Wire-cut EDM MP Series MP2400 D-CUBES Series Standard system BRD-B60W000" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MP Series MP4800 D-CUBES Series Standard system BRD-B60W000: \u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product_id": "CSAFPID-0015" } } ], "category": "product_name", "name": "Wire-cut EDM MP Series MP4800 D-CUBES Series Standard system BRD-B60W000" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MP Series MP1200 D-CUBES Series Special system BRD-B63W000 to W036: vers:all/*", "product_id": "CSAFPID-0016" } } ], "category": "product_name", "name": "Wire-cut EDM MP Series MP1200 D-CUBES Series Special system BRD-B63W000 to W036" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MP Series MP2400 D-CUBES Series Special system BRD-B63W000 to W036: vers:all/*", "product_id": "CSAFPID-0017" } } ], "category": "product_name", "name": "Wire-cut EDM MP Series MP2400 D-CUBES Series Special system BRD-B63W000 to W036" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MP Series MP4800 D-CUBES Series Special system BRD-B63W000 to W036: vers:all/*", "product_id": "CSAFPID-0018" } } ], "category": "product_name", "name": "Wire-cut EDM MP Series MP4800 D-CUBES Series Special system BRD-B63W000 to W036" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MX Series MX900 D-CUBES Series Standard system BRD-B60W000: \u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product_id": "CSAFPID-0019" } } ], "category": "product_name", "name": "Wire-cut EDM MX Series MX900 D-CUBES Series Standard system BRD-B60W000" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MX Series MX2400 D-CUBES Series Standard system BRD-B60W000: \u003c=B13__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product_id": "CSAFPID-0020" } } ], "category": "product_name", "name": "Wire-cut EDM MX Series MX2400 D-CUBES Series Standard system BRD-B60W000" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MX Series MX900 D-CUBES Series Special system BRD-B63W000 to W036: vers:all/*", "product_id": "CSAFPID-0021" } } ], "category": "product_name", "name": "Wire-cut EDM MX Series MX900 D-CUBES Series Special system BRD-B63W000 to W036" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Mitsubishi Electric Corporation Wire-cut EDM MX Series MX2400 D-CUBES Series Special system BRD-B63W000 to W036: vers:all/*", "product_id": "CSAFPID-0022" } } ], "category": "product_name", "name": "Wire-cut EDM MX Series MX2400 D-CUBES Series Special system BRD-B63W000 to W036" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=A12__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product": { "name": "Mitsubishi Electric Corporation Sinker EDM SV-P Series SV8P D-CUBES Series Standard system BRD-M60W000: \u003c=A12__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product_id": "CSAFPID-0023" } } ], "category": "product_name", "name": "Sinker EDM SV-P Series SV8P D-CUBES Series Standard system BRD-M60W000" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=A12__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product": { "name": "Mitsubishi Electric Corporation Sinker EDM SV-P Series SV12P D-CUBES Series Standard system BRD-M60W000: \u003c=A12__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product_id": "CSAFPID-0024" } } ], "category": "product_name", "name": "Sinker EDM SV-P Series SV12P D-CUBES Series Standard system BRD-M60W000" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Mitsubishi Electric Corporation Sinker EDM SV-P Series SV8P D-CUBES Series Special system BRD-M63W000 to W022: vers:all/*", "product_id": "CSAFPID-0025" } } ], "category": "product_name", "name": "Sinker EDM SV-P Series SV8P D-CUBES Series Special system BRD-M63W000 to W022" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Mitsubishi Electric Corporation Sinker EDM SV-P Series SV12P D-CUBES Series Special system BRD-M63W000 to W022: vers:all/*", "product_id": "CSAFPID-0026" } } ], "category": "product_name", "name": "Sinker EDM SV-P Series SV12P D-CUBES Series Special system BRD-M63W000 to W022" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=A12__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product": { "name": "Mitsubishi Electric Corporation Sinker EDM SG Series SG8 D-CUBES Series Standard system BRD-M60W000: \u003c=A12__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product_id": "CSAFPID-0027" } } ], "category": "product_name", "name": "Sinker EDM SG Series SG8 D-CUBES Series Standard system BRD-M60W000" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=A12__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product": { "name": "Mitsubishi Electric Corporation Sinker EDM SG Series SG12 D-CUBES Series Standard system BRD-M60W000: \u003c=A12__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product_id": "CSAFPID-0028" } } ], "category": "product_name", "name": "Sinker EDM SG Series SG12 D-CUBES Series Standard system BRD-M60W000" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=A12__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product": { "name": "Mitsubishi Electric Corporation Sinker EDM SG Series SG28 D-CUBES Series Standard system BRD-M60W000: \u003c=A12__without_Special_Modification_Patch_BRD-C62W003-A0_installed", "product_id": "CSAFPID-0029" } } ], "category": "product_name", "name": "Sinker EDM SG Series SG28 D-CUBES Series Standard system BRD-M60W000" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Mitsubishi Electric Corporation Sinker EDM SG Series SG8 D-CUBES Series Special system BRD-BRD-M63W000 to W022: vers:all/*", "product_id": "CSAFPID-0030" } } ], "category": "product_name", "name": "Sinker EDM SG Series SG8 D-CUBES Series Special system BRD-BRD-M63W000 to W022" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Mitsubishi Electric Corporation Sinker EDM SG Series SG12 D-CUBES Series Special system BRD-M63W000 to W022: vers:all/*", "product_id": "CSAFPID-0031" } } ], "category": "product_name", "name": "Sinker EDM SG Series SG12 D-CUBES Series Special system BRD-M63W000 to W022" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Mitsubishi Electric Corporation Sinker EDM SG Series SG28 D-CUBES Series Special system BRD-M63W000 to W022: vers:all/*", "product_id": "CSAFPID-0032" } } ], "category": "product_name", "name": "Sinker EDM SG Series SG28 D-CUBES Series Special system BRD-M63W000 to W022" } ], "category": "vendor", "name": "Mitsubishi Electric Corporation" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-21554", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Remote code execution vulnerability due to Microsoft Message Queuing service on Microsoft Windows exists in electrical discharge machines.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-21554" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" } ], "remediations": [ { "category": "mitigation", "details": "Mitsubishi Electric recommends that users install the Special Modification Patch BRD-C62W003-A0 on their system. For information about how to install the update program, please contact your local service center.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032" ] }, { "category": "mitigation", "details": "Mitsubishi Electric recommends taking the mitigations listed below to minimize the risk of exploitation of this vulnerability.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032" ] }, { "category": "mitigation", "details": "Use a firewall, virtual private network (VPN), etc. to prevent unauthorized access when Internet access is required.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032" ] }, { "category": "mitigation", "details": "Use within a LAN and block access from untrusted networks and hosts through firewalls.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032" ] }, { "category": "mitigation", "details": "Restrict physical access to the affected products and to personal computers and network devices that can communicate with them.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032" ] }, { "category": "mitigation", "details": "Install anti-virus software on personal computers that can communicate with the affected products.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032" ] }, { "category": "mitigation", "details": "For specific update instructions and additional details refer to Mitsubishi Electric advisory 2023-022.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-022_en.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032" ] } ] } ] }
ghsa-xvhr-xr27-hpmq
Vulnerability from github
Published
2023-04-11 21:31
Modified
2023-04-11 21:31
Severity ?
Details
Microsoft Message Queuing Remote Code Execution Vulnerability
{ "affected": [], "aliases": [ "CVE-2023-21554" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2023-04-11T21:15:00Z", "severity": "CRITICAL" }, "details": "Microsoft Message Queuing Remote Code Execution Vulnerability", "id": "GHSA-xvhr-xr27-hpmq", "modified": "2023-04-11T21:31:02Z", "published": "2023-04-11T21:31:02Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21554" }, { "type": "WEB", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21554" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
gsd-2023-21554
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
Microsoft Message Queuing Remote Code Execution Vulnerability
Aliases
Aliases
{ "GSD": { "alias": "CVE-2023-21554", "id": "GSD-2023-21554" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2023-21554" ], "details": "Microsoft Message Queuing Remote Code Execution Vulnerability", "id": "GSD-2023-21554", "modified": "2023-12-13T01:20:25.502405Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2023-21554", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Windows 10 Version 1809", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "10.0.0", "version_value": "10.0.17763.4252" } ] } }, { "product_name": "Windows Server 2019", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "10.0.0", "version_value": "10.0.17763.4252" } ] } }, { "product_name": "Windows Server 2019 (Server Core installation)", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "10.0.0", "version_value": "10.0.17763.4252" } ] } }, { "product_name": "Windows Server 2022", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "10.0.0", "version_value": "10.0.20348.1668" } ] } }, { "product_name": "Windows 10 Version 20H2", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "10.0.0", "version_value": "10.0.19042.2846" } ] } }, { "product_name": "Windows 11 version 21H2", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "10.0.0", "version_value": "10.0.22000.1817" } ] } }, { "product_name": "Windows 10 Version 21H2", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "10.0.0", "version_value": "10.0.19044.2846" } ] } }, { "product_name": "Windows 11 version 22H2", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "10.0.0", "version_value": "10.0.22621.1555" } ] } }, { "product_name": "Windows 10 Version 22H2", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "10.0.0", "version_value": "10.0.19045.2846" } ] } }, { "product_name": "Windows 10 Version 1507", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "10.0.0", "version_value": "10.0.10240.19869" } ] } }, { "product_name": "Windows 10 Version 1607", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "10.0.0", "version_value": "10.0.14393.5850" } ] } }, { "product_name": "Windows Server 2016", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "10.0.0", "version_value": "10.0.14393.5850" } ] } }, { "product_name": "Windows Server 2016 (Server Core installation)", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "10.0.0", "version_value": "10.0.14393.5850" } ] } }, { "product_name": "Windows Server 2008 Service Pack 2", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "6.0.0", "version_value": "6.0.6003.22015" } ] } }, { "product_name": "Windows Server 2008 Service Pack 2 (Server Core installation)", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "6.0.0", "version_value": "6.0.6003.22015" } ] } }, { "product_name": "Windows Server 2008 Service Pack 2", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "6.0.0", "version_value": "6.0.6003.22015" } ] } }, { "product_name": "Windows Server 2008 R2 Service Pack 1", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "6.1.0", "version_value": "6.1.7601.26466" } ] } }, { "product_name": "Windows Server 2012", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "6.2.0", "version_value": "6.2.9200.24216" } ] } }, { "product_name": "Windows Server 2012 (Server Core installation)", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "6.2.0", "version_value": "6.2.9200.24216" } ] } }, { "product_name": "Windows Server 2012 R2", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "6.3.0", "version_value": "6.3.9600.20919" } ] } }, { "product_name": "Windows Server 2012 R2 (Server Core installation)", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "6.3.0", "version_value": "6.3.9600.20919" } ] } } ] }, "vendor_name": "Microsoft" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Microsoft Message Queuing Remote Code Execution Vulnerability" } ] }, "impact": { "cvss": [ { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Remote Code Execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21554", "refsource": "MISC", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21554" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.0.19042.2846", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.0.22000.1817", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.0.19044.2846", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.0.22621.1555", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.0.19045.2846", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.0.17763.4252", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.0.14393.5850", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2023-21554" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Microsoft Message Queuing Remote Code Execution Vulnerability" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ] }, "references": { "reference_data": [ { "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21554", "refsource": "MISC", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21554" } ] } }, "impact": { "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } }, "lastModifiedDate": "2023-04-19T16:05Z", "publishedDate": "2023-04-11T21:15Z" } } }
wid-sec-w-2023-0944
Vulnerability from csaf_certbund
Published
2023-04-11 22:00
Modified
2023-10-04 22:00
Summary
Microsoft Windows: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Windows ist ein Betriebssystem von Microsoft.
Angriff
Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Microsoft Windows und Microsoft Windows Server ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuführen.
Betroffene Betriebssysteme
- Windows
{ "document": { "aggregate_severity": { "text": "kritisch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Windows ist ein Betriebssystem von Microsoft.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Microsoft Windows und Microsoft Windows Server ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0944 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0944.json" }, { "category": "self", "summary": "WID-SEC-2023-0944 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0944" }, { "category": "external", "summary": "Known Exploited Vulnerabilities Catalog vom 2023-09-25", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "external", "summary": "Hitachi Vulnerability Information HITACHI-SEC-2023-304 vom 2023-09-26", "url": "https://www.hitachi.com/products/it/storage-solutions/sec_info/2023/04.html" }, { "category": "external", "summary": "Checkpoint Research vom 2023-04-11", "url": "https://research.checkpoint.com/2023/queuejumper-critical-unauthorized-rce-vulnerability-in-msmq-service/" }, { "category": "external", "summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2023-04-11", "url": "https://msrc.microsoft.com/update-guide" } ], "source_lang": "en-US", "title": "Microsoft Windows: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-10-04T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:23:25.748+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-0944", "initial_release_date": "2023-04-11T22:00:00.000+00:00", "revision_history": [ { "date": "2023-04-11T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-04-12T22:00:00.000+00:00", "number": "2", "summary": "Vulname erg\u00e4nzt" }, { "date": "2023-09-25T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von HITACHI aufgenommen" }, { "date": "2023-10-04T22:00:00.000+00:00", "number": "4", "summary": "Weitere Ausnutzung aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Hitachi Storage Virtual Storage Platform", "product": { "name": "Hitachi Storage Virtual Storage Platform", "product_id": "T020487", "product_identification_helper": { "cpe": "cpe:/h:hitachi:storage:virtual_storage_platform" } } } ], "category": "vendor", "name": "Hitachi" }, { "branches": [ { "category": "product_name", "name": "Microsoft Windows Remote Desktop client for Desktop", "product": { "name": "Microsoft Windows Remote Desktop client for Desktop", "product_id": "T023160", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows:remote_desktop_client_for_desktop" } } }, { "branches": [ { "category": "product_name", "name": "Microsoft Windows 10", "product": { "name": "Microsoft Windows 10", "product_id": "T005617", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_10:-" } } }, { "category": "product_name", "name": "Microsoft Windows 10 Version 1607", "product": { "name": "Microsoft Windows 10 Version 1607", "product_id": "T011520", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_10:version_1607" } } }, { "category": "product_name", "name": "Microsoft Windows 10 Version 1809", "product": { "name": "Microsoft Windows 10 Version 1809", "product_id": "T019780", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_10:version_1809" } } }, { "category": "product_name", "name": "Microsoft Windows 10 Version 20H2", "product": { "name": "Microsoft Windows 10 Version 20H2", "product_id": "T020373", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_10:version_20h2" } } }, { "category": "product_name", "name": "Microsoft Windows 10 Version 21H2", "product": { "name": "Microsoft Windows 10 Version 21H2", "product_id": "T021306", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_10:version_21h2" } } }, { "category": "product_name", "name": "Microsoft Windows 10 Version 22H2", "product": { "name": "Microsoft Windows 10 Version 22H2", "product_id": "T025256", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_10:version_22h2" } } } ], "category": "product_name", "name": "Windows 10" }, { "branches": [ { "category": "product_name", "name": "Microsoft Windows 11 Version 22H2", "product": { "name": "Microsoft Windows 11 Version 22H2", "product_id": "T024880", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_11:version_22h2" } } }, { "category": "product_name", "name": "Microsoft Windows 11 version 21H2", "product": { "name": "Microsoft Windows 11 version 21H2", "product_id": "T025777", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_11:version_21h2" } } } ], "category": "product_name", "name": "Windows 11" }, { "category": "product_name", "name": "Microsoft Windows Server 2008 SP2", "product": { "name": "Microsoft Windows Server 2008 SP2", "product_id": "1064169", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_server_2008:sp2" } } }, { "category": "product_name", "name": "Microsoft Windows Server 2008 R2 SP1", "product": { "name": "Microsoft Windows Server 2008 R2 SP1", "product_id": "T013769", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_server_2008_r2:sp_1" } } }, { "category": "product_name", "name": "Microsoft Windows Server 2012", "product": { "name": "Microsoft Windows Server 2012", "product_id": "T005923", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_server_2012:-" } } }, { "category": "product_name", "name": "Microsoft Windows Server 2012 R2", "product": { "name": "Microsoft Windows Server 2012 R2", "product_id": "T014786", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_server_2012_r2:-" } } }, { "category": "product_name", "name": "Microsoft Windows Server 2016", "product": { "name": "Microsoft Windows Server 2016", "product_id": "T008880", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_server_2016:-" } } }, { "category": "product_name", "name": "Microsoft Windows Server 2019", "product": { "name": "Microsoft Windows Server 2019", "product_id": "T012979", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_server_2019:-" } } }, { "category": "product_name", "name": "Microsoft Windows Server 2022", "product": { "name": "Microsoft Windows Server 2022", "product_id": "T020315", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_server_2022:-" } } } ], "category": "vendor", "name": "Microsoft" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-28308", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28308" }, { "cve": "CVE-2023-28307", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28307" }, { "cve": "CVE-2023-28306", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28306" }, { "cve": "CVE-2023-28305", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28305" }, { "cve": "CVE-2023-28302", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28302" }, { "cve": "CVE-2023-28298", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28298" }, { "cve": "CVE-2023-28297", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28297" }, { "cve": "CVE-2023-28293", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28293" }, { "cve": "CVE-2023-28292", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28292" }, { "cve": "CVE-2023-28291", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28291" }, { "cve": "CVE-2023-28278", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28278" }, { "cve": "CVE-2023-28277", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28277" }, { "cve": "CVE-2023-28276", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28276" }, { "cve": "CVE-2023-28275", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28275" }, { "cve": "CVE-2023-28274", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28274" }, { "cve": "CVE-2023-28273", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28273" }, { "cve": "CVE-2023-28272", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28272" }, { "cve": "CVE-2023-28271", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28271" }, { "cve": "CVE-2023-28270", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28270" }, { "cve": "CVE-2023-28269", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28269" }, { "cve": "CVE-2023-28268", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28268" }, { "cve": "CVE-2023-28267", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28267" }, { "cve": "CVE-2023-28266", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28266" }, { "cve": "CVE-2023-28256", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28256" }, { "cve": "CVE-2023-28255", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28255" }, { "cve": "CVE-2023-28254", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28254" }, { "cve": "CVE-2023-28253", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28253" }, { "cve": "CVE-2023-28252", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28252" }, { "cve": "CVE-2023-28250", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28250" }, { "cve": "CVE-2023-28249", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28249" }, { "cve": "CVE-2023-28248", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28248" }, { "cve": "CVE-2023-28247", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28247" }, { "cve": "CVE-2023-28246", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28246" }, { "cve": "CVE-2023-28244", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28244" }, { "cve": "CVE-2023-28243", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28243" }, { "cve": "CVE-2023-28241", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28241" }, { "cve": "CVE-2023-28240", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28240" }, { "cve": "CVE-2023-28238", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28238" }, { "cve": "CVE-2023-28237", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28237" }, { "cve": "CVE-2023-28236", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28236" }, { "cve": "CVE-2023-28235", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28235" }, { "cve": "CVE-2023-28234", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28234" }, { "cve": "CVE-2023-28233", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28233" }, { "cve": "CVE-2023-28232", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28232" }, { "cve": "CVE-2023-28231", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28231" }, { "cve": "CVE-2023-28229", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28229" }, { "cve": "CVE-2023-28228", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28228" }, { "cve": "CVE-2023-28227", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28227" }, { "cve": "CVE-2023-28226", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28226" }, { "cve": "CVE-2023-28225", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28225" }, { "cve": "CVE-2023-28224", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28224" }, { "cve": "CVE-2023-28223", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28223" }, { "cve": "CVE-2023-28222", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28222" }, { "cve": "CVE-2023-28221", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28221" }, { "cve": "CVE-2023-28220", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28220" }, { "cve": "CVE-2023-28219", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28219" }, { "cve": "CVE-2023-28218", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28218" }, { "cve": "CVE-2023-28217", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28217" }, { "cve": "CVE-2023-28216", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28216" }, { "cve": "CVE-2023-24931", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-24931" }, { "cve": "CVE-2023-24929", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-24929" }, { "cve": "CVE-2023-24928", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-24928" }, { "cve": "CVE-2023-24927", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-24927" }, { "cve": "CVE-2023-24926", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-24926" }, { "cve": "CVE-2023-24925", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-24925" }, { "cve": "CVE-2023-24924", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-24924" }, { "cve": "CVE-2023-24914", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-24914" }, { "cve": "CVE-2023-24912", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-24912" }, { "cve": "CVE-2023-24887", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-24887" }, { "cve": "CVE-2023-24886", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-24886" }, { "cve": "CVE-2023-24885", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-24885" }, { "cve": "CVE-2023-24884", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-24884" }, { "cve": "CVE-2023-24883", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-24883" }, { "cve": "CVE-2023-21769", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-21769" }, { "cve": "CVE-2023-21729", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-21729" }, { "cve": "CVE-2023-21727", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-21727" }, { "cve": "CVE-2023-21554", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-21554" } ] }
WID-SEC-W-2023-0944
Vulnerability from csaf_certbund
Published
2023-04-11 22:00
Modified
2023-10-04 22:00
Summary
Microsoft Windows: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Windows ist ein Betriebssystem von Microsoft.
Angriff
Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Microsoft Windows und Microsoft Windows Server ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuführen.
Betroffene Betriebssysteme
- Windows
{ "document": { "aggregate_severity": { "text": "kritisch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Windows ist ein Betriebssystem von Microsoft.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Microsoft Windows und Microsoft Windows Server ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0944 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0944.json" }, { "category": "self", "summary": "WID-SEC-2023-0944 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0944" }, { "category": "external", "summary": "Known Exploited Vulnerabilities Catalog vom 2023-09-25", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "external", "summary": "Hitachi Vulnerability Information HITACHI-SEC-2023-304 vom 2023-09-26", "url": "https://www.hitachi.com/products/it/storage-solutions/sec_info/2023/04.html" }, { "category": "external", "summary": "Checkpoint Research vom 2023-04-11", "url": "https://research.checkpoint.com/2023/queuejumper-critical-unauthorized-rce-vulnerability-in-msmq-service/" }, { "category": "external", "summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2023-04-11", "url": "https://msrc.microsoft.com/update-guide" } ], "source_lang": "en-US", "title": "Microsoft Windows: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-10-04T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:23:25.748+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-0944", "initial_release_date": "2023-04-11T22:00:00.000+00:00", "revision_history": [ { "date": "2023-04-11T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-04-12T22:00:00.000+00:00", "number": "2", "summary": "Vulname erg\u00e4nzt" }, { "date": "2023-09-25T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von HITACHI aufgenommen" }, { "date": "2023-10-04T22:00:00.000+00:00", "number": "4", "summary": "Weitere Ausnutzung aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Hitachi Storage Virtual Storage Platform", "product": { "name": "Hitachi Storage Virtual Storage Platform", "product_id": "T020487", "product_identification_helper": { "cpe": "cpe:/h:hitachi:storage:virtual_storage_platform" } } } ], "category": "vendor", "name": "Hitachi" }, { "branches": [ { "category": "product_name", "name": "Microsoft Windows Remote Desktop client for Desktop", "product": { "name": "Microsoft Windows Remote Desktop client for Desktop", "product_id": "T023160", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows:remote_desktop_client_for_desktop" } } }, { "branches": [ { "category": "product_name", "name": "Microsoft Windows 10", "product": { "name": "Microsoft Windows 10", "product_id": "T005617", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_10:-" } } }, { "category": "product_name", "name": "Microsoft Windows 10 Version 1607", "product": { "name": "Microsoft Windows 10 Version 1607", "product_id": "T011520", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_10:version_1607" } } }, { "category": "product_name", "name": "Microsoft Windows 10 Version 1809", "product": { "name": "Microsoft Windows 10 Version 1809", "product_id": "T019780", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_10:version_1809" } } }, { "category": "product_name", "name": "Microsoft Windows 10 Version 20H2", "product": { "name": "Microsoft Windows 10 Version 20H2", "product_id": "T020373", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_10:version_20h2" } } }, { "category": "product_name", "name": "Microsoft Windows 10 Version 21H2", "product": { "name": "Microsoft Windows 10 Version 21H2", "product_id": "T021306", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_10:version_21h2" } } }, { "category": "product_name", "name": "Microsoft Windows 10 Version 22H2", "product": { "name": "Microsoft Windows 10 Version 22H2", "product_id": "T025256", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_10:version_22h2" } } } ], "category": "product_name", "name": "Windows 10" }, { "branches": [ { "category": "product_name", "name": "Microsoft Windows 11 Version 22H2", "product": { "name": "Microsoft Windows 11 Version 22H2", "product_id": "T024880", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_11:version_22h2" } } }, { "category": "product_name", "name": "Microsoft Windows 11 version 21H2", "product": { "name": "Microsoft Windows 11 version 21H2", "product_id": "T025777", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_11:version_21h2" } } } ], "category": "product_name", "name": "Windows 11" }, { "category": "product_name", "name": "Microsoft Windows Server 2008 SP2", "product": { "name": "Microsoft Windows Server 2008 SP2", "product_id": "1064169", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_server_2008:sp2" } } }, { "category": "product_name", "name": "Microsoft Windows Server 2008 R2 SP1", "product": { "name": "Microsoft Windows Server 2008 R2 SP1", "product_id": "T013769", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_server_2008_r2:sp_1" } } }, { "category": "product_name", "name": "Microsoft Windows Server 2012", "product": { "name": "Microsoft Windows Server 2012", "product_id": "T005923", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_server_2012:-" } } }, { "category": "product_name", "name": "Microsoft Windows Server 2012 R2", "product": { "name": "Microsoft Windows Server 2012 R2", "product_id": "T014786", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_server_2012_r2:-" } } }, { "category": "product_name", "name": "Microsoft Windows Server 2016", "product": { "name": "Microsoft Windows Server 2016", "product_id": "T008880", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_server_2016:-" } } }, { "category": "product_name", "name": "Microsoft Windows Server 2019", "product": { "name": "Microsoft Windows Server 2019", "product_id": "T012979", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_server_2019:-" } } }, { "category": "product_name", "name": "Microsoft Windows Server 2022", "product": { "name": "Microsoft Windows Server 2022", "product_id": "T020315", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_server_2022:-" } } } ], "category": "vendor", "name": "Microsoft" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-28308", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28308" }, { "cve": "CVE-2023-28307", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28307" }, { "cve": "CVE-2023-28306", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28306" }, { "cve": "CVE-2023-28305", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28305" }, { "cve": "CVE-2023-28302", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28302" }, { "cve": "CVE-2023-28298", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28298" }, { "cve": "CVE-2023-28297", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28297" }, { "cve": "CVE-2023-28293", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28293" }, { "cve": "CVE-2023-28292", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28292" }, { "cve": "CVE-2023-28291", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28291" }, { "cve": "CVE-2023-28278", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28278" }, { "cve": "CVE-2023-28277", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28277" }, { "cve": "CVE-2023-28276", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28276" }, { "cve": "CVE-2023-28275", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28275" }, { "cve": "CVE-2023-28274", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28274" }, { "cve": "CVE-2023-28273", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28273" }, { "cve": "CVE-2023-28272", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28272" }, { "cve": "CVE-2023-28271", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28271" }, { "cve": "CVE-2023-28270", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28270" }, { "cve": "CVE-2023-28269", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28269" }, { "cve": "CVE-2023-28268", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28268" }, { "cve": "CVE-2023-28267", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28267" }, { "cve": "CVE-2023-28266", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28266" }, { "cve": "CVE-2023-28256", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28256" }, { "cve": "CVE-2023-28255", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28255" }, { "cve": "CVE-2023-28254", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28254" }, { "cve": "CVE-2023-28253", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28253" }, { "cve": "CVE-2023-28252", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28252" }, { "cve": "CVE-2023-28250", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28250" }, { "cve": "CVE-2023-28249", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28249" }, { "cve": "CVE-2023-28248", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28248" }, { "cve": "CVE-2023-28247", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28247" }, { "cve": "CVE-2023-28246", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28246" }, { "cve": "CVE-2023-28244", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28244" }, { "cve": "CVE-2023-28243", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28243" }, { "cve": "CVE-2023-28241", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28241" }, { "cve": "CVE-2023-28240", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28240" }, { "cve": "CVE-2023-28238", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28238" }, { "cve": "CVE-2023-28237", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28237" }, { "cve": "CVE-2023-28236", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28236" }, { "cve": "CVE-2023-28235", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28235" }, { "cve": "CVE-2023-28234", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28234" }, { "cve": "CVE-2023-28233", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28233" }, { "cve": "CVE-2023-28232", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28232" }, { "cve": "CVE-2023-28231", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28231" }, { "cve": "CVE-2023-28229", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28229" }, { "cve": "CVE-2023-28228", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28228" }, { "cve": "CVE-2023-28227", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28227" }, { "cve": "CVE-2023-28226", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28226" }, { "cve": "CVE-2023-28225", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28225" }, { "cve": "CVE-2023-28224", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28224" }, { "cve": "CVE-2023-28223", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28223" }, { "cve": "CVE-2023-28222", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28222" }, { "cve": "CVE-2023-28221", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28221" }, { "cve": "CVE-2023-28220", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28220" }, { "cve": "CVE-2023-28219", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28219" }, { "cve": "CVE-2023-28218", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28218" }, { "cve": "CVE-2023-28217", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28217" }, { "cve": "CVE-2023-28216", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-28216" }, { "cve": "CVE-2023-24931", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-24931" }, { "cve": "CVE-2023-24929", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-24929" }, { "cve": "CVE-2023-24928", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-24928" }, { "cve": "CVE-2023-24927", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-24927" }, { "cve": "CVE-2023-24926", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-24926" }, { "cve": "CVE-2023-24925", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-24925" }, { "cve": "CVE-2023-24924", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-24924" }, { "cve": "CVE-2023-24914", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-24914" }, { "cve": "CVE-2023-24912", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-24912" }, { "cve": "CVE-2023-24887", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-24887" }, { "cve": "CVE-2023-24886", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-24886" }, { "cve": "CVE-2023-24885", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-24885" }, { "cve": "CVE-2023-24884", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-24884" }, { "cve": "CVE-2023-24883", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-24883" }, { "cve": "CVE-2023-21769", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-21769" }, { "cve": "CVE-2023-21729", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-21729" }, { "cve": "CVE-2023-21727", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-21727" }, { "cve": "CVE-2023-21554", "notes": [ { "category": "description", "text": "In verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Ein Angreifer kann dies ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsmechanismen zu umgehen, seine Privilegien zu erweitern und um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T012979", "T013769", "T023160", "T005923", "T014786", "T005617", "T011520", "T019780", "T020487", "T021306", "T025777", "T020315", "T025256", "1064169", "T008880", "T020373", "T024880" ] }, "release_date": "2023-04-11T22:00:00Z", "title": "CVE-2023-21554" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.