First published: Tue Oct 10 2023(Updated: )
Microsoft AllJoyn API Denial of Service Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2019 | ||
Windows 11 | =22H2 | |
Windows 11 | =22H2 | |
Windows 11 | =21H2 | |
Windows 11 | =21H2 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2022 | ||
Microsoft Windows 10 | <10.0.10240.20232 | |
Microsoft Windows 10 | <10.0.10240.20232 | |
Microsoft Windows 10 | <10.0.17763.4974 | |
Microsoft Windows 10 | <10.0.19041.3570 | |
Microsoft Windows 10 | <10.0.19045.3570 | |
Windows 11 | <10.0.22000.2538 | |
Windows 11 | <10.0.22621.2428 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2022 | ||
Windows 10 | =1809 | |
Windows 10 | =1809 | |
Windows 10 | =1809 | |
Windows 10 | =22H2 | |
Windows 10 | =22H2 | |
Windows 10 | =22H2 | |
Windows 10 | =1607 | |
Windows 10 | =1607 | |
Windows 10 | =21H2 | |
Windows 10 | =21H2 | |
Windows 10 | =21H2 | |
Windows 10 | ||
Windows 10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-36709 is high with a severity value of 7.5.
The affected software products include Windows Server 2019, Windows 10 (versions 22H2 and 21H2), Windows Server 2016, Windows 11 (versions 21H2 and 22H2), and Windows Server 2022.
To fix CVE-2023-36709, apply the relevant patches provided by Microsoft. Links to the patches can be found in the remediation URLs provided in the affected software section.
You can find more information about CVE-2023-36709 on the Microsoft Security Response Center website. The link is provided in the reference section.