CVE-2023-21803: Windows iSCSI Discovery Service Remote Code Execution Vulnerability

Overview

Severity
Critical (CVSS 9.8)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Category
Remote Code Execution
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2023-Feb
Released
2023-02-14
EPSS Score
13.93% (percentile: 94.3%)

FAQ

How could an attacker exploit the vulnerability? An attacker could exploit the vulnerability by sending a specially crafted malicious DHCP discovery request to the iSCSI Discovery Service on 32-bit machines. An attacker who successfully exploited the vulnerability could then gain the ability to execute code on the target system.

Affected Products (8)

Windows

  • Windows 10 Version 1809 for 32-bit Systems
  • Windows 10 Version 20H2 for 32-bit Systems
  • Windows 10 Version 21H2 for 32-bit Systems
  • Windows 10 Version 22H2 for 32-bit Systems
  • Windows 10 for 32-bit Systems
  • Windows 10 Version 1607 for 32-bit Systems

ESU

  • Windows Server 2008 for 32-bit Systems Service Pack 2
  • Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)

Security Updates (6)

Acknowledgments

<a href="https://twitter.com/4zure9">Azure Yang</a> with <a href="http://www.cyberkl.com/">Kunlun Lab</a>

Revision History

  • 2023-02-14: Information published.