Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2023-36028 : Security Advisory and Response

Learn about the Critical Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution vulnerability affecting Windows 10, Windows 11, and Windows Server. Mitigation strategies and immediate steps included.

Microsoft has reported a Critical vulnerability known as Protected Extensible Authentication Protocol (PEAP) Remote Code Execution. This CVE affects various versions of Windows operating systems, including Windows 10, Windows 11, and Windows Server.

Understanding CVE-2023-36028

This section provides details about the impact, affected systems, exploitation mechanism, and mitigation strategies related to the CVE.

What is CVE-2023-36028?

CVE-2023-36028 is a Critical vulnerability in Microsoft's Protected Extensible Authentication Protocol (PEAP) that allows remote attackers to execute arbitrary code on vulnerable systems.

The Impact of CVE-2023-36028

The impact of this vulnerability is categorized as a Critical severity with a CVSS base score of 9.8. It enables attackers to execute malicious code remotely, leading to potential compromise of the affected systems.

Technical Details of CVE-2023-36028

This section dives into the vulnerability description, affected systems, and the exploitation mechanism of CVE-2023-36028.

Vulnerability Description

The vulnerability lies in the PEAP implementation, allowing remote attackers to execute arbitrary code on systems that use affected versions of Windows operating systems.

Affected Systems and Versions

        Windows 10 Version 1809
        Windows Server 2019
        Windows Server 2022
        Windows 11 versions 21H2 and 22H2
        Windows Server 2016 and more

Exploitation Mechanism

Attackers can exploit this vulnerability remotely without requiring user interaction, making it a severe risk for organizations using the impacted Windows versions.

Mitigation and Prevention

As an organization or user, it is crucial to take immediate steps to mitigate the risks posed by CVE-2023-36028, implement long-term security practices, and stay updated with patch releases.

Immediate Steps to Take

        Apply security patches provided by Microsoft promptly.
        Restrict network access to vulnerable systems.
        Monitor network traffic for any suspicious activities.

Long-Term Security Practices

        Employ network segmentation to limit the impact of potential attacks.
        Conduct regular security audits and assessments to identify vulnerabilities.
        Educate users on safe internet practices and the importance of cybersecurity.

Patching and Updates

Regularly check for updates from Microsoft and apply patches to ensure your systems are protected against known vulnerabilities.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now