7.8
CVSSv3

CVE-2023-36900

Published: 08/08/2023 Updated: 29/05/2024
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

This vulnerability allows local malicious users to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the clfs.sys driver. A crafted BLF file can trigger an incorrect integer calculation before allocating a buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel.

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows server 2008 r2

microsoft windows server 2012 r2

microsoft windows server 2016 -

microsoft windows server 2008 -

microsoft windows server 2012 -

microsoft windows server 2019 -

microsoft windows server 2022 -

microsoft windows 10 1809

microsoft windows 10 21h2

microsoft windows 11 21h2

microsoft windows 10

microsoft windows 10 1607

microsoft windows 11 22h2

microsoft windows 10 22h2

Github Repositories

Denial-of-Service PoC | Writeup | Header with CLFS structures | Imhex pattern for .blf extension

CVE-2023-36900 About this vulnerability: msrcmicrosoftcom/update-guide/vulnerability/CVE-2023-36900 Writeup Imhex pattern for blf extension Header with declaration of CLFS structures Denial-of-Service proof of concept Imhex pattern for blf extension Before: After: The pattern is far from ideal, but it can be useful Link How to use: File->Import->

Patch analysis: CVE-2024-20698 - vulnerability in ntoskrnlexe (ntkrnlmpexe) CVE-2023-36900 - vulnerability in CLFSsys Exploits: Norland_unlimited_days_in_demo - allows you to bypass 15-days restriction in Norland demo game IDA plugins: Copy_RVA - plugin for coping RVA under cursor navigation_plugin - helps to navigate among the large number of unexplored functions Tool