NA

CVE-2023-36025

Published: 14/11/2023 Updated: 21/11/2023
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

Windows SmartScreen Security Feature Bypass Vulnerability

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows server 2008 r2

microsoft windows server 2012 r2

microsoft windows server 2016 -

microsoft windows server 2012 -

microsoft windows server 2019 -

microsoft windows server 2008 -

microsoft windows server 2022 -

microsoft windows 11 22h2 -

microsoft windows 10 1607 -

microsoft windows 10 1809 -

microsoft windows 10 21h2 -

microsoft windows 10 22h2 -

microsoft windows 11 21h2 -

microsoft windows 10 1507 -

microsoft windows 11 23h2 -

Vendor Advisories

Check Point Reference: CPAI-2023-1239 Date Published: 23 Nov 2023 Severity: High ...

Github Repositories

Malware that we analyzed on our site.

Malware-Sample PASS is: infected Xdr33 SHA256: f78075951f0272020ca33fee78c3cf9007a0db1842af5cd0eeab518ccc915b16 POST delluxexe SHA256: 67c911510e257b341be77bc2a88cedc99ace2af852f7825d9710016619875e80 POST TrickGate SHA256: fddea1265c29e98f5b679ff034f27124b688f03f2d4c72442ce5f358ddd3eff0 SHA256: 81adbb94cf5758852ad9d3e7ba4d958b1943715c3837074c7fcaeeee22aadb7b SHA256: 6c0f5

This is the code for the following assignment: Write a program targeting the following user behavior: downloading and running an executable file, for example, in a social engineering style cyberattack The program should have several mandatory features: Antivirus evasion against any EDR, including an enterprise EDR at the time, which was early 2022 Silent, in-memory privilege

Quick test for CVE-2023-26025 behaviours

CVE-2023-36025 Simple test for CVE-2023-36025, based on PoC demoed in twittercom/wdormann/status/1725148437115473947 This code is not meant to run out of the box - the ZIP file must be hosted on a server you own, and be accesible to the victim machine on a file:// URL

Windows SmartScreen Security Feature Bypass Vulnerability

[EXPLOIT] CVE-2023-36025 - Description Windows SmartScreen Security Feature Bypass Vulnerability Usage NOTE handler waiting for tcp request for target PS configure CVE-2023-36025vbs file to change the ip and port to machine ip and port that is being used for the TCP handler configure reverse TCP handler msfconsole use exploit/multi/handler set payload windows/shell_reverse_t

This is the code for the following assignment: Write a program targeting the following user behavior: downloading and running an executable file, for example, in a social engineering style cyberattack The program should have several mandatory features: Antivirus evasion against any EDR, including an enterprise EDR at the time, which was early 2022 Silent, in-memory privilege

Recent Articles

Microsoft fixes two Windows zero-days exploited in malware attacks
BleepingComputer • Sergiu Gatlan • 09 Apr 2024

Microsoft fixes two Windows zero-days exploited in malware attacks By Sergiu Gatlan April 9, 2024 06:06 PM 0 Microsoft has fixed two actively exploited zero-day vulnerabilities during the April 2024 Patch Tuesday, although the company failed to initially tag them as such. The first, tracked as CVE-2024-26234 and described as a proxy driver spoofing vulnerability, was issued to track a malicious driver signed using a valid Microsoft Hardware Publisher Certificate that was found by Sophos X-O...

Why we update... Data-thief malware exploits SmartScreen on unpatched Windows PCs
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Phemedrone Stealer loots drives for passwords, cookies, login tokens, etc

Criminals are exploiting a Windows Defender SmartScreen bypass vulnerability to infect PCs with Phemedrone Stealer, a malware strain that scans machines for sensitive information – passwords, cookies, authentication tokens, you name it – to grab and leak. The malware abuses CVE-2023-36025, which Microsoft patched in November. Specifically, the flaw allows Phemedrone and other malicious software to sidestep protections in Windows that are supposed to help users avoid running hostile code. Whe...

Another month, another bunch of fixes for Microsoft security bugs exploited in the wild
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Plus: VMware closes critical hole, Adobe fixes a whopping 76 flaws

Patch Tuesday Heads up: Microsoft's November Patch Tuesday includes fixes for about 60 vulnerabilities – including three that have already been found and abused in the wild. First of that trio is CVE-2023-36033: a Windows Desktop Manager (WDM) Core Library elevation-of-privilege vulnerability. This one, an "important" 7.8-of-10-CVSS-rated bug, is not only listed as exploited by miscreants, the method of exploitation also been publicly disclosed.  "An attacker who successfully exploited th...