CVE-2023-36590

Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*

History

21 Nov 2024, 08:10

Type Values Removed Values Added
References () https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36590 - Patch, Vendor Advisory () https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36590 - Patch, Vendor Advisory

29 May 2024, 02:16

Type Values Removed Values Added
Summary (en) Microsoft Message Queuing Remote Code Execution Vulnerability (en) Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability

13 Oct 2023, 19:43

Type Values Removed Values Added
References (MISC) https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36590 - (MISC) https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36590 - Patch, Vendor Advisory
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*
First Time Microsoft
Microsoft windows Server 2016
Microsoft windows 10
Microsoft windows Server 2022
Microsoft windows 10 1809
Microsoft windows 10 22h2
Microsoft windows 10 21h2
Microsoft windows 10 1607
Microsoft windows Server 2019
Microsoft windows 11 22h2
Microsoft windows Server 2012
Microsoft windows Server 2008
Microsoft windows 11 21h2

10 Oct 2023, 18:21

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-10 18:15

Updated : 2024-11-21 08:10


NVD link : CVE-2023-36590

Mitre link : CVE-2023-36590

CVE.ORG link : CVE-2023-36590


JSON object : View

Products Affected

microsoft

  • windows_server_2008
  • windows_11_21h2
  • windows_server_2022
  • windows_10_1809
  • windows_10_1607
  • windows_server_2016
  • windows_server_2019
  • windows_server_2012
  • windows_10_22h2
  • windows_10_21h2
  • windows_10
  • windows_11_22h2