First published: Tue Jul 11 2023(Updated: )
Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =22H2 | |
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 10 | =22H2 | |
Microsoft Windows 10 | =22H2 | |
Microsoft Windows 10 | =21H2 | |
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2019 | ||
Windows 11 | =22H2 | |
Windows 11 | =22H2 | |
Windows 11 | =21H2 | |
Windows 11 | =21H2 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2022 | ||
Microsoft Windows 10 | <10.0.17763.4645 | |
Microsoft Windows 10 | <10.0.19041.3208 | |
Microsoft Windows 10 | <10.0.19045.3208 | |
Windows 11 | <10.0.22000.2176 | |
Windows 11 | <10.0.22621.1992 | |
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2022 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-32056 is critical, with a severity value of 9.
You can fix CVE-2023-32056 by applying the relevant patches provided by Microsoft.
CVE-2023-32056 affects Windows Server 2019, Windows Server 2022, Windows 10 (1809 and 21H2), and Windows 11 (21H2 and 22H2).
You can find the patches for CVE-2023-32056 on the Microsoft website.
Currently, there is no known workaround for CVE-2023-32056. It is recommended to apply the patches as soon as possible.