Language:
Severity: Critical
ID: 174110
File Name: smb_nt_ms23_apr_5025234.nasl
Version: 1.8
Type: local
Agent: windows
Family: Windows : Microsoft Bulletins
Published: 4/11/2023
Updated: 6/17/2024
Supported Sensors: Nessus
Risk Factor: Critical
Score: 9.4
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.7
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2023-28275
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.4
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CVSS Score Source: CVE-2023-28250
CPE: cpe:/o:microsoft:windows_10_1507
Required KB Items: SMB/MS_Bulletin_Checks/Possible
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 4/11/2023
Vulnerability Publication Date: 4/11/2023
CISA Known Exploited Vulnerability Due Dates: 5/2/2023, 10/25/2023
Core Impact
Metasploit (Windows Common Log File System Driver (clfs.sys) Elevation of Privilege Vulnerability)
CVE: CVE-2023-21554, CVE-2023-21727, CVE-2023-21729, CVE-2023-21769, CVE-2023-24883, CVE-2023-24884, CVE-2023-24885, CVE-2023-24886, CVE-2023-24887, CVE-2023-24912, CVE-2023-24924, CVE-2023-24925, CVE-2023-24926, CVE-2023-24927, CVE-2023-24928, CVE-2023-24929, CVE-2023-24931, CVE-2023-28216, CVE-2023-28217, CVE-2023-28218, CVE-2023-28219, CVE-2023-28220, CVE-2023-28221, CVE-2023-28222, CVE-2023-28224, CVE-2023-28225, CVE-2023-28226, CVE-2023-28227, CVE-2023-28228, CVE-2023-28229, CVE-2023-28232, CVE-2023-28236, CVE-2023-28237, CVE-2023-28238, CVE-2023-28241, CVE-2023-28243, CVE-2023-28249, CVE-2023-28250, CVE-2023-28252, CVE-2023-28253, CVE-2023-28266, CVE-2023-28267, CVE-2023-28269, CVE-2023-28271, CVE-2023-28272, CVE-2023-28275, CVE-2023-28276, CVE-2023-28293, CVE-2023-28298, CVE-2023-28302