Jul 2023: Windows Search Remote Code Execution Vulnerability
CVE-2023-36884 Published on July 11, 2023

Windows Search Remote Code Execution Vulnerability
Windows Search Remote Code Execution Vulnerability

Vendor Advisory NVD

Known Exploited Vulnerability

This Microsoft Office and Windows HTML Remote Code Execution Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Microsoft Office and Windows contain an unspecified vulnerability that allows an attacker to perform remote code execution via a specially crafted Microsoft Office document.

The following remediation steps are recommended / required by August 7, 2023: Follow "CVE-2023-36884 Specific Recommendations" per vendor instructions. [https://www.microsoft.com/en-us/security/blog/2023/07/11/storm-0978-attacks-reveal-financial-and-espionage-motives/]

Weakness Type

What is a Race Condition Vulnerability?

The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.

CVE-2023-36884 has been classified to as a Race Condition vulnerability or weakness.


Products Associated with CVE-2023-36884

Want to know whenever a new CVE is published for Microsoft products? stack.watch will email you.

 
 
 
 
 
 
 
 
 
 
 
 
 

Affected Versions

Microsoft Windows 10 Version 1809: Microsoft Windows 10 Version 1809: Microsoft Windows Server 2019: Microsoft Windows Server 2019 (Server Core installation): Microsoft Windows Server 2022: Microsoft Windows 11 version 21H2: Microsoft Windows 10 Version 21H2: Microsoft Windows 11 version 22H2: Microsoft Windows 10 Version 22H2: Microsoft Windows 10 Version 1507: Microsoft Windows 10 Version 1607: Microsoft Windows Server 2016: Microsoft Windows Server 2016 (Server Core installation): Microsoft Windows Server 2008 Service Pack 2: Microsoft Windows Server 2008 Service Pack 2 (Server Core installation): Microsoft Windows Server 2008 Service Pack 2: Microsoft Windows Server 2008 R2 Service Pack 1: Microsoft Windows Server 2008 R2 Service Pack 1 (Server Core installation): Microsoft Windows Server 2012: Microsoft Windows Server 2012 (Server Core installation): Microsoft Windows Server 2012 R2: Microsoft Windows Server 2012 R2 (Server Core installation):

Exploit Probability

EPSS
93.22%
Percentile
99.79%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.