First published: Tue Aug 08 2023(Updated: )
ASP.NET Elevation of Privilege Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft .NET Framework | =3.5 | |
Microsoft .NET Framework 4 | =2.0 | |
Microsoft .NET Framework 4 | =4.6.2 | |
Microsoft .NET Framework 4 | =4.6.2=4.7=4.7.1=4.7.2 | |
Microsoft .NET Framework 4 | =4.8 | |
Microsoft .NET Framework 4 | =4.6.2=4.7=4.7.1=4.7.2 | |
Microsoft .NET Framework 4 | =4.6.2=4.7=4.7.1=4.7.2 | |
Microsoft .NET Framework 4 | =4.8 | |
Microsoft .NET Framework 4 | =4.8 | |
Microsoft .NET Framework 4 | =4.8 | |
Microsoft .NET Framework 4 | =3.5=4.6.2=4.7=4.7.1=4.7.2 | |
Microsoft .NET Framework 4 | =3.5=4.7.2 | |
Microsoft .NET Framework 4 | =3.5=4.8 | |
Microsoft .NET Framework 4 | =3.5=4.8.1 | |
Microsoft .NET Framework 4 | =3.5=4.8.1 | |
Microsoft .NET Framework 4 | =3.5=4.8 | |
Microsoft .NET Framework 4 | =3.5=4.8.1 | |
Microsoft .NET Framework 4 | =3.5=4.8 | |
Microsoft .NET Framework 4 | =3.5=4.8.1 | |
Microsoft .NET Framework 4 | =3.5=4.8 | |
Microsoft .NET Framework 4 | =3.5=4.8 | |
Microsoft .NET Framework 4 | =3.5=4.8.1 | |
All of | ||
Any of | ||
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Server 2016 | ||
Microsoft .NET Framework 4 | =4.8 | |
All of | ||
Any of | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Server 2016 | ||
Any of | ||
Microsoft .NET Framework 4 | =4.6.2 | |
Microsoft .NET Framework 4 | =4.7 | |
Microsoft .NET Framework 4 | =4.7.1 | |
Microsoft .NET Framework 4 | =4.7.2 | |
All of | ||
Any of | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft .NET Framework 4 | =4.6.2 | |
All of | ||
Any of | ||
Microsoft .NET Framework 4 | =3.5 | |
Microsoft .NET Framework 4 | =4.8.1 | |
Any of | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Windows 11 | ||
Windows 11 | ||
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2022 | ||
All of | ||
Any of | ||
Microsoft .NET Framework 4 | =3.5 | |
Microsoft .NET Framework 4 | =4.7.2 | |
Any of | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows Server 2019 | ||
All of | ||
Microsoft .NET Framework 4 | =2.0-sp2 | |
Any of | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft .NET Framework 4 | =4.8 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Server 2016 | ||
Microsoft .NET Framework 4 | =4.6.2 | |
Microsoft .NET Framework 4 | =4.7 | |
Microsoft .NET Framework 4 | =4.7.1 | |
Microsoft .NET Framework 4 | =4.7.2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft .NET Framework 4 | =3.5 | |
Microsoft .NET Framework 4 | =4.8.1 | |
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Windows 11 | ||
Windows 11 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2022 | ||
Microsoft .NET Framework 4 | =2.0-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-36899 is classified as an elevation of privilege vulnerability in Microsoft .NET Framework.
To fix CVE-2023-36899, apply the security updates released by Microsoft for the affected versions of the .NET Framework.
CVE-2023-36899 affects .NET Framework versions 2.0, 3.5, 4.6.2, 4.7, 4.7.1, 4.7.2, and 4.8.
CVE-2023-36899 can potentially be exploited remotely, allowing attackers to elevate privileges.
CVE-2023-36899 does not affect the latest Windows Server and Windows 10/11 releases if they have the latest security updates installed.