CVE-2023-21803: Windows iSCSI Discovery Service Remote Code Execution Vulnerability
Overview
- Severity
- Critical (CVSS 9.8)
- CVSS Vector
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
- Category
- Remote Code Execution
- Exploit Status
- Not Exploited
- Exploitation Likelihood
- Less Likely
- Patch Tuesday
- 2023-Feb
- Released
- 2023-02-14
- EPSS Score
- 13.93% (percentile: 94.3%)
FAQ
How could an attacker exploit the vulnerability?
An attacker could exploit the vulnerability by sending a specially crafted malicious DHCP discovery request to the iSCSI Discovery Service on 32-bit machines. An attacker who successfully exploited the vulnerability could then gain the ability to execute code on the target system.
Affected Products (8)
Windows
- Windows 10 Version 1809 for 32-bit Systems
- Windows 10 Version 20H2 for 32-bit Systems
- Windows 10 Version 21H2 for 32-bit Systems
- Windows 10 Version 22H2 for 32-bit Systems
- Windows 10 for 32-bit Systems
- Windows 10 Version 1607 for 32-bit Systems
ESU
- Windows Server 2008 for 32-bit Systems Service Pack 2
- Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Security Updates (6)
Acknowledgments
<a href="https://twitter.com/4zure9">Azure Yang</a> with <a href="http://www.cyberkl.com/">Kunlun Lab</a>
Revision History
- 2023-02-14: Information published.