CVE-2023-28252

high

Description

Windows Common Log File System Driver Elevation of Privilege Vulnerability

From the Tenable Blog

Microsoft’s April 2023 Patch Tuesday Addresses 97 CVEs (CVE-2023-28252)
Microsoft’s April 2023 Patch Tuesday Addresses 97 CVEs (CVE-2023-28252)

Published: 2023-04-11

Microsoft addresses 97 CVEs, including one that was exploited in the wild as a zero day.

References

https://thehackernews.com/2025/04/pipemagic-trojan-exploits-windows-clfs.html

https://www.bleepingcomputer.com/news/security/microsoft-windows-clfs-zero-day-exploited-by-ransomware-gang/

https://www.bleepingcomputer.com/news/microsoft/microsoft-patches-windows-kernel-zero-day-exploited-since-2023/

https://www.tenable.com/blog/microsofts-december-2024-patch-tuesday-addresses-70-cves-cve-2024-49138

https://www.bleepingcomputer.com/news/microsoft/microsoft-ransomware-gangs-exploit-vmware-esxi-auth-bypass-in-attacks/

https://securelist.com/vulnerability-report-q1-2024/112554/

https://storage.googleapis.com/gweb-uniblog-publish-prod/documents/Year_in_Review_of_ZeroDays.pdf

https://securelist.com/windows-clfs-exploits-ransomware/111560/

https://www.tenable.com/blog/microsoft-patch-tuesday-2023-year-in-review

https://www.tenable.com/blog/microsofts-november-2023-patch-tuesday-addresses-57-cves-cve-2023-36025

https://www.tenable.com/blog/microsofts-september-2023-patch-tuesday-addresses-61-cves-cve-2023-36761

https://www.tenable.com/blog/microsofts-august-2023-patch-tuesday-addresses-73-cves-cve-2023-38180

https://www.tenable.com/blog/microsofts-april-2023-patch-tuesday-addresses-97-cves-cve-2023-28252

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28252

Details

Source: Mitre, NVD

Published: 2023-04-11

Updated: 2025-03-10

Risk Information

CVSS v2

Base Score: 6.8

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

Severity: Medium

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High