Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability
References
Link | Resource |
---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21674 | Patch Vendor Advisory |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21674 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:43
Type | Values Removed | Values Added |
---|---|---|
References | () https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21674 - Patch, Vendor Advisory |
28 Jun 2024, 13:45
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:arm64:* |
cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* |
References | () https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21674 - Patch, Vendor Advisory | |
CWE | ||
First Time |
Microsoft windows Rt 8.1
Microsoft windows 10 1507 |
29 May 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-416 | |
Summary |
|
Information
Published : 2023-01-10 22:15
Updated : 2024-11-21 07:43
NVD link : CVE-2023-21674
Mitre link : CVE-2023-21674
CVE.ORG link : CVE-2023-21674
JSON object : View
Products Affected
microsoft
- windows_10_1507
- windows_11_21h2
- windows_server_2022
- windows_10_20h2
- windows_rt_8.1
- windows_10_1809
- windows_10_1607
- windows_server_2016
- windows_server_2019
- windows_server_2012
- windows_10_22h2
- windows_10_21h2
- windows_11_22h2
CWE
CWE-416
Use After Free