First published: Tue Oct 10 2023(Updated: )
Windows Virtual Trusted Platform Module Denial of Service Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2019 | ||
Windows 11 | =22H2 | |
Windows 11 | =22H2 | |
Windows 11 | =21H2 | |
Windows 11 | =21H2 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2022 | ||
Microsoft Windows 10 | <10.0.10240.20232 | |
Microsoft Windows 10 | <10.0.14393.6351 | |
Microsoft Windows 10 | <10.0.17763.4974 | |
Microsoft Windows 10 | <10.0.19041.3570 | |
Microsoft Windows 10 | <10.0.19045.3570 | |
Windows 11 | <10.0.22000.2538 | |
Windows 11 | <10.0.22621.2428 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2022 | ||
Windows 10 | =1809 | |
Windows 10 | =22H2 | |
Windows 10 | =1607 | |
Windows 10 | =21H2 | |
Windows 10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-36717 is a vulnerability in Windows Virtual Trusted Platform Module (vTPM) that could allow an attacker to cause a denial of service by crashing the vTPM.
CVE-2023-36717 has a severity rating of 6.5, which is considered high.
Windows 11 (version 21H2), Windows Server 2022 (Server Core Installation), Windows 10 (version 22H2), Windows Server 2019 (Server Core Installation), Windows Server 2016, Windows 10 (version 1607 and 1809) are affected by CVE-2023-36717.
To fix CVE-2023-36717, apply the relevant security patches provided by Microsoft. You can find the patches and their download links in the Microsoft support articles provided in the software's affected list.
You can find more information about CVE-2023-36717 on the official Microsoft Security Response Center (MSRC) website.