CVE-2023-36025

high

Description

Windows SmartScreen Security Feature Bypass Vulnerability

From the Tenable Blog

Microsoft’s November 2023 Patch Tuesday Addresses 57 CVEs (CVE-2023-36025)
Microsoft’s November 2023 Patch Tuesday Addresses 57 CVEs (CVE-2023-36025)

Published: 2023-11-14

Microsoft addresses 57 CVEs, including three zero-day vulnerabilities that were exploited in the wild.

References

https://www.bleepingcomputer.com/news/microsoft/new-windows-smartscreen-bypass-exploited-as-zero-day-since-march/

https://research.checkpoint.com/2024/resurrecting-internet-explorer-threat-actors-using-zero-day-tricks-in-internet-shortcut-file-to-lure-victims-cve-2024-38112/

https://thehackernews.com/2024/06/darkgate-malware-replaces-autoit-with.html

https://securelist.com/vulnerability-report-q1-2024/112554/

https://www.mcafee.com/blogs/other-blogs/mcafee-labs/the-darkgate-menace-leveraging-autohotkey-attempt-to-evade-smartscreen/

https://www.trendmicro.com/en_us/research/24/c/cve-2024-21412--darkgate-operators-exploit-microsoft-windows-sma.html

https://www.tenable.com/blog/microsofts-feb-2024-patch-tuesday-cve-2024-21351-cve-2024-21412

https://unit42.paloaltonetworks.com/mispadu-infostealer-variant/?web_view=true

https://www.trendmicro.com/en_us/research/24/a/cve-2023-36025-exploited-for-defense-evasion-in-phemedrone-steal.html?&web_view=true

https://www.proofpoint.com/us/blog/threat-insight/battleroyal-darkgate-cluster-spreads-email-and-fake-browser-updates

https://twitter.com/ffforward/status/1726540034462159165

https://www.tenable.com/blog/microsofts-november-2023-patch-tuesday-addresses-57-cves-cve-2023-36025

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36025

Details

Source: Mitre, NVD

Published: 2023-11-14

Updated: 2023-11-21

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Severity: High