Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2023-36391 Explained : Impact and Mitigation

Learn about CVE-2023-36391, a HIGH severity vulnerability in Windows 11 Local Security Authority Subsystem Service, allowing privilege escalation and execution of arbitrary code.

This article discusses the Local Security Authority Subsystem Service Elevation of Privilege Vulnerability impacting Windows 11 versions 22H3 and 23H2.

Understanding CVE-2023-36391

This CVE involves an elevation of privilege vulnerability in the Local Security Authority Subsystem Service, affecting specific versions of Windows 11.

What is CVE-2023-36391?

The CVE-2023-36391, also known as the Local Security Authority Subsystem Service Elevation of Privilege Vulnerability, allows attackers to gain elevated privileges on the system.

The Impact of CVE-2023-36391

This vulnerability has a base severity rating of HIGH with a CVSS Base Score of 7.8. Attackers exploiting this vulnerability can potentially take control of affected systems and execute arbitrary code.

Technical Details of CVE-2023-36391

This section covers the vulnerability description, affected systems and versions, and the exploitation mechanism.

Vulnerability Description

The vulnerability lies in the Local Security Authority Subsystem Service, which, when exploited, allows threat actors to escalate privileges on the target system.

Affected Systems and Versions

Windows 11 versions 22H3 and 23H2 are affected. Specifically, Windows 11 version 22H3 with build number 10.0.22631.2861 for ARM64-based systems and Windows 11 version 23H2 with the same build number for x64-based systems.

Exploitation Mechanism

By leveraging this vulnerability, attackers can bypass security restrictions and gain unauthorized access, potentially leading to a complete system compromise.

Mitigation and Prevention

In this section, we discuss the immediate steps to take and long-term security practices to mitigate the risk associated with CVE-2023-36391.

Immediate Steps to Take

Users are advised to apply security updates provided by Microsoft promptly to address the vulnerability. Implementing the necessary patches and fixes is crucial in preventing exploitation.

Long-Term Security Practices

To bolster the overall security posture, users should follow security best practices, such as regular software updates, conducting security assessments, and implementing the principle of least privilege.

Patching and Updates

Regularly check for updates from Microsoft and apply patches diligently to ensure that the system is protected against known vulnerabilities.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now