Language:
Severity: Critical
ID: 178168
File Name: smb_nt_ms23_jul_5028224.nasl
Version: 1.7
Type: local
Agent: windows
Family: Windows : Microsoft Bulletins
Published: 7/11/2023
Updated: 6/17/2024
Supported Sensors: Nessus Agent, Nessus
Risk Factor: Critical
Score: 9.4
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.7
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2023-35367
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.4
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CPE: cpe:/o:microsoft:windows_server_2008:r2
Required KB Items: SMB/MS_Bulletin_Checks/Possible
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 7/11/2023
Vulnerability Publication Date: 7/11/2023
CISA Known Exploited Vulnerability Due Dates: 8/1/2023
Core Impact
Metasploit (Microsoft Error Reporting Local Privilege Elevation Vulnerability)
CVE: CVE-2023-21526, CVE-2023-32033, CVE-2023-32034, CVE-2023-32035, CVE-2023-32038, CVE-2023-32042, CVE-2023-32043, CVE-2023-32044, CVE-2023-32045, CVE-2023-32046, CVE-2023-32050, CVE-2023-32053, CVE-2023-32054, CVE-2023-32055, CVE-2023-32057, CVE-2023-33154, CVE-2023-33163, CVE-2023-33164, CVE-2023-33166, CVE-2023-33167, CVE-2023-33168, CVE-2023-33169, CVE-2023-33172, CVE-2023-33173, CVE-2023-33174, CVE-2023-35297, CVE-2023-35299, CVE-2023-35300, CVE-2023-35303, CVE-2023-35309, CVE-2023-35310, CVE-2023-35312, CVE-2023-35314, CVE-2023-35316, CVE-2023-35318, CVE-2023-35319, CVE-2023-35321, CVE-2023-35322, CVE-2023-35328, CVE-2023-35330, CVE-2023-35332, CVE-2023-35338, CVE-2023-35340, CVE-2023-35341, CVE-2023-35342, CVE-2023-35344, CVE-2023-35345, CVE-2023-35346, CVE-2023-35350, CVE-2023-35351, CVE-2023-35365, CVE-2023-35366, CVE-2023-35367, CVE-2023-36874