THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2023-28278

Windows DNS Server Remote Code Execution Vulnerability

Assignermicrosoft
Reserved2023-03-13
Published2023-04-11
Updated2024-07-05

Description

Windows DNS Server Remote Code Execution Vulnerability



MEDIUM: 6.6CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Problem types

CWE-591: Sensitive Data Storage in Improperly Locked Memory

Product status

10.0.0 before 10.0.17763.4252
affected

10.0.0 before 10.0.17763.4252
affected

10.0.0 before 10.0.20348.1668
affected

10.0.0 before 10.0.14393.5850
affected

10.0.0 before 10.0.14393.5850
affected

6.0.0 before 6.0.6003.22015
affected

6.0.0 before 6.0.6003.22015
affected

6.0.0 before 6.0.6003.22015
affected

6.1.0 before 6.1.7601.26466
affected

6.0.0 before 6.1.7601.26466
affected

6.2.0 before 6.2.9200.24216
affected

6.2.0 before 6.2.9200.24216
affected

6.3.0 before 6.3.9600.20919
affected

6.3.0 before 6.3.9600.20919
affected

References

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28278 (Windows DNS Server Remote Code Execution Vulnerability) vendor-advisory

cve.org CVE-2023-28278

nvd.nist.gov CVE-2023-28278

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-28278
© Copyright 2024 THREATINT. Made in Cyprus with +