First published: Tue May 09 2023(Updated: )
Win32k Elevation of Privilege Vulnerability
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server 2008 R2 | ||
Microsoft Windows Server 2008 R2 | ||
Microsoft Windows Server 2012 R2 | ||
Microsoft Windows Server 2012 R2 | ||
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows 10 | <10.0.10240.19926 | |
Microsoft Windows 10 | <10.0.14393.5921 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Server 2016 | ||
Microsoft Win32 Kernel Subsystem | ||
Windows 10 | =1607 | |
Windows 10 | =1607 | |
Windows 10 | ||
Windows 10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29336 has a high severity rating as it allows for privilege escalation up to SYSTEM privileges.
To fix CVE-2023-29336, apply the latest security updates provided by Microsoft for the affected Windows versions.
CVE-2023-29336 affects multiple versions of Windows including Windows 10, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2016.
CVE-2023-29336 can enable attackers to escalate privileges, potentially giving them unauthorized access to system resources.
Yes, Microsoft has released patches for CVE-2023-29336 that must be installed to mitigate the vulnerability.