First published: Tue Nov 14 2023(Updated: )
Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 11 | =21H2 | |
Microsoft Windows Server 2019 | ||
Microsoft Windows 11 | =22H2 | |
Microsoft Windows 11 | =23H2 | |
Microsoft Windows Server 2019 | ||
Microsoft Windows 11 | =21H2 | |
Microsoft Windows 11 | =22H2 | |
Microsoft Windows 11 | =23H2 | |
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 10 | ||
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 10 | ||
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =22H2 | |
Microsoft Windows 10 | =22H2 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =22H2 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2022 23H2 | ||
Microsoft Windows 10 1507 | <10.0.10240.20308 | |
Microsoft Windows 10 1507 | <10.0.10240.20308 | |
Microsoft Windows 10 Version 1607 x86 | <10.0.14393.6452 | |
Microsoft Windows 10 Version 1607 x86 | <10.0.14393.6452 | |
Microsoft Windows 10 1809 | <10.0.17763.5122 | |
Microsoft Windows 10 1809 | <10.0.17763.5122 | |
Microsoft Windows 10 1809 | <10.0.17763.5122 | |
Microsoft Windows 10 21h2 | <10.0.19041.3693 | |
Microsoft Windows 10 21h2 | <10.0.19041.3693 | |
Microsoft Windows 10 21h2 | <10.0.19041.3693 | |
Microsoft Windows 10 22h2 | <10.0.19045.3693 | |
Microsoft Windows 10 22h2 | <10.0.19045.3693 | |
Microsoft Windows 10 22h2 | <10.0.19045.3693 | |
Microsoft Windows 11 21h2 | <10.0.22000.2600 | |
Microsoft Windows 11 21h2 | <10.0.22000.2600 | |
Microsoft Windows 11 22h2 | <10.0.22621.2715 | |
Microsoft Windows 11 22h2 | <10.0.22621.2715 | |
Microsoft Windows 11 23h2 | <10.0.22621.2715 | |
Microsoft Windows 11 23h2 | <10.0.22621.2715 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2022 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-36028 has a critical severity rating due to its potential for remote code execution.
To fix CVE-2023-36028, apply the latest security updates provided by Microsoft for your affected Windows version.
CVE-2023-36028 affects multiple versions of Windows, including Windows 10, Windows 11, and Windows Server 2016, 2019, and 2022.
CVE-2023-36028 is classified as a remote code execution vulnerability related to the Protected Extensible Authentication Protocol.
Yes, CVE-2023-36028 can be exploited remotely without user interaction, making it a significant risk.