First published: Tue Apr 11 2023(Updated: )
Windows Lock Screen Security Feature Bypass Vulnerability
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 10 | =20H2 | |
Microsoft Windows 10 1809 | <10.0.17763.4252 | |
Microsoft Windows 10 20h2 | <10.0.19042.2846 | |
Microsoft Windows 10 21h2 | <10.0.19044.2846 | |
Microsoft Windows 10 22h2 | <10.0.19045.2846 | |
Microsoft Windows 11 21h2 | <10.0.22000.1817 | |
Microsoft Windows 11 22h2 | <10.0.22621.1555 | |
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2022 | ||
Microsoft Windows 11 | =22H2 | |
Microsoft Windows 11 | =21H2 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows 10 | =22H2 | |
Microsoft Windows 10 | =20H2 | |
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 11 | =21H2 | |
Microsoft Windows 11 | =22H2 | |
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 10 | =22H2 | |
Microsoft Windows Server 2019 | ||
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =20H2 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =22H2 | |
<10.0.17763.4252 | ||
<10.0.19042.2846 | ||
<10.0.19044.2846 | ||
<10.0.19045.2846 | ||
<10.0.22000.1817 | ||
<10.0.22621.1555 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28270 refers to the Windows Lock Screen Security Feature Bypass Vulnerability.
CVE-2023-28270 affects Windows 10 versions 20H2, 21H2, and 22H2, Windows 11 versions 21H2 and 22H2, Windows Server 2016, Windows Server 2019, and Windows Server 2022.
CVE-2023-28270 has a severity rating of 6.8, which is considered high.
To fix CVE-2023-28270, install the relevant patches provided by Microsoft. The patches can be found in the Microsoft Update Catalog.
More information about CVE-2023-28270 can be found on the Microsoft Security Response Center website.