We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-36711

Windows Runtime C++ Template Library Elevation of Privilege Vulnerability



Assignermicrosoft
Reserved2023-06-26
Published2023-10-10
Updated2024-08-02

Description

Windows Runtime C++ Template Library Elevation of Privilege Vulnerability



HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Problem types

CWE-59: Improper Link Resolution Before File Access ('Link Following')

Product status

10.0.0 before 10.0.17763.4974
affected

10.0.0 before 10.0.17763.4974
affected

10.0.0 before 10.0.17763.4974
affected

10.0.0 before 10.0.20348.2031
affected

10.0.0 before 10.0.22000.2538
affected

10.0.0 before 10.0.19041.3570
affected

10.0.0 before 10.0.22621.2428
affected

10.0.0 before 10.0.19045.3570
affected

10.0.0 before 10.0.10240.20232
affected

10.0.0 before 10.0.14393.6351
affected

10.0.0 before 10.0.14393.6351
affected

10.0.0 before 10.0.14393.6351
affected

6.2.0 before 6.2.9200.24523
affected

6.2.0 before 6.2.9200.24523
affected

6.3.0 before 6.3.9600.21620
affected

6.3.0 before 6.3.9600.21620
affected

References

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36711 (Windows Runtime C++ Template Library Elevation of Privilege Vulnerability) vendor-advisory

cve.org CVE-2023-36711

nvd.nist.gov CVE-2023-36711

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.