Language:
Severity: Critical
ID: 174103
File Name: smb_nt_ms23_apr_5025277.nasl
Version: 1.9
Type: local
Agent: windows
Family: Windows : Microsoft Bulletins
Published: 4/11/2023
Updated: 6/17/2024
Supported Sensors: Nessus
Risk Factor: Critical
Score: 9.4
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.7
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2023-28275
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.4
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CVSS Score Source: CVE-2023-28250
CPE: cpe:/o:microsoft:windows_server_2008:r2
Required KB Items: SMB/MS_Bulletin_Checks/Possible
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 4/11/2023
Vulnerability Publication Date: 4/11/2023
CISA Known Exploited Vulnerability Due Dates: 5/2/2023, 10/25/2023
Core Impact
Metasploit (Windows Common Log File System Driver (clfs.sys) Elevation of Privilege Vulnerability)
CVE: CVE-2023-21554, CVE-2023-21727, CVE-2023-21729, CVE-2023-21769, CVE-2023-24912, CVE-2023-24931, CVE-2023-28216, CVE-2023-28217, CVE-2023-28218, CVE-2023-28219, CVE-2023-28220, CVE-2023-28222, CVE-2023-28223, CVE-2023-28227, CVE-2023-28228, CVE-2023-28229, CVE-2023-28231, CVE-2023-28232, CVE-2023-28238, CVE-2023-28240, CVE-2023-28241, CVE-2023-28244, CVE-2023-28250, CVE-2023-28252, CVE-2023-28253, CVE-2023-28254, CVE-2023-28255, CVE-2023-28256, CVE-2023-28266, CVE-2023-28267, CVE-2023-28268, CVE-2023-28271, CVE-2023-28272, CVE-2023-28275, CVE-2023-28276, CVE-2023-28278, CVE-2023-28293, CVE-2023-28298, CVE-2023-28302, CVE-2023-28305, CVE-2023-28306, CVE-2023-28307, CVE-2023-28308