Language:
Severity: Critical
ID: 182856
File Name: smb_nt_ms23_oct_5031427.nasl
Version: 1.9
Type: local
Agent: windows
Family: Windows : Microsoft Bulletins
Published: 10/10/2023
Updated: 6/17/2024
Supported Sensors: Nessus
Risk Factor: High
Score: 7.4
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.7
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2023-36577
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.4
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CVSS Score Source: CVE-2023-36434
CPE: cpe:/o:microsoft:windows_server_2012
Required KB Items: SMB/MS_Bulletin_Checks/Possible
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 10/10/2023
Vulnerability Publication Date: 10/10/2023
CISA Known Exploited Vulnerability Due Dates: 10/31/2023, 12/7/2023
Core Impact
CVE: CVE-2023-29348, CVE-2023-35349, CVE-2023-36431, CVE-2023-36434, CVE-2023-36436, CVE-2023-36438, CVE-2023-36563, CVE-2023-36564, CVE-2023-36567, CVE-2023-36570, CVE-2023-36571, CVE-2023-36572, CVE-2023-36573, CVE-2023-36574, CVE-2023-36575, CVE-2023-36577, CVE-2023-36578, CVE-2023-36579, CVE-2023-36581, CVE-2023-36582, CVE-2023-36583, CVE-2023-36584, CVE-2023-36585, CVE-2023-36589, CVE-2023-36590, CVE-2023-36591, CVE-2023-36592, CVE-2023-36593, CVE-2023-36594, CVE-2023-36596, CVE-2023-36598, CVE-2023-36602, CVE-2023-36606, CVE-2023-36697, CVE-2023-36701, CVE-2023-36702, CVE-2023-36703, CVE-2023-36706, CVE-2023-36707, CVE-2023-36710, CVE-2023-36711, CVE-2023-36712, CVE-2023-36713, CVE-2023-36722, CVE-2023-36724, CVE-2023-36726, CVE-2023-36731, CVE-2023-36732, CVE-2023-36743, CVE-2023-36776, CVE-2023-38166, CVE-2023-41765, CVE-2023-41766, CVE-2023-41767, CVE-2023-41768, CVE-2023-41769, CVE-2023-41770, CVE-2023-41771, CVE-2023-41773, CVE-2023-41774