We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-28223

Windows Domain Name Service Remote Code Execution Vulnerability



Description

Windows Domain Name Service Remote Code Execution Vulnerability

Reserved 2023-03-13 | Published 2023-04-11 | Updated 2025-01-23 | Assigner microsoft


MEDIUM: 6.6CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Problem types

CWE-416: Use After Free

Product status

10.0.17763.0 before 10.0.17763.4252
affected

10.0.17763.0 before 10.0.17763.4252
affected

10.0.20348.0 before 10.0.20348.1668
affected

10.0.14393.0 before 10.0.14393.5850
affected

10.0.14393.0 before 10.0.14393.5850
affected

6.0.6003.0 before 6.0.6003.22015
affected

6.0.6003.0 before 6.0.6003.22015
affected

6.0.6003.0 before 6.0.6003.22015
affected

6.1.7601.0 before 6.1.7601.26466
affected

6.1.7601.0 before 6.1.7601.26466
affected

6.2.9200.0 before 6.2.9200.24216
affected

6.2.9200.0 before 6.2.9200.24216
affected

6.3.9600.0 before 6.3.9600.20919
affected

6.3.9600.0 before 6.3.9600.20919
affected

References

msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28223 (Windows Domain Name Service Remote Code Execution Vulnerability) vendor-advisory

cve.org (CVE-2023-28223)

nvd.nist.gov (CVE-2023-28223)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2023-28223

Support options

Helpdesk Chat, Email, Knowledgebase