High severity7.8CISA KEVNVD Advisory· Published Nov 14, 2023· Updated Apr 14, 2026
CVE-2023-36424
CVE-2023-36424
Description
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Affected products
21cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*+ 1 more
- cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*range: <10.0.10240.20308
- cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*range: <10.0.10240.20308
cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*+ 1 more
- cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*range: <10.0.14393.6452
- cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*range: <10.0.14393.6452
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*+ 2 more
- cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*range: <10.0.17763.5122
- cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*range: <10.0.17763.5122
- cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*range: <10.0.17763.5122
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*+ 2 more
- cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
- cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*
- cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*Range: <10.0.14393.6452
- cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*Range: <10.0.17763.5122
- cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*Range: <10.0.20348.2091
- cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*Range: <10.0.25398.531
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36424nvdPatchVendor Advisory
- www.cisa.gov/known-exploited-vulnerabilities-catalognvdUS Government Resource
News mentions
0No linked articles in our index yet.