5.4
CVE-2023-36584
- EPSS 20.09%
- Published 10.10.2023 18:15:14
- Last modified 23.01.2025 18:17:31
- Source secure@microsoft.com
- Teams watchlist Login
- Open Login
Windows Mark of the Web Security Feature Bypass Vulnerability
Data is provided by the National Vulnerability Database (NVD)
Microsoft ≫ Windows 10 1507 HwPlatformx64 Version < 10.0.10240.20232
Microsoft ≫ Windows 10 1507 HwPlatformx86 Version < 10.0.10240.20232
Microsoft ≫ Windows 10 1809 HwPlatformarm64 Version < 10.0.17763.4974
Microsoft ≫ Windows 10 1809 HwPlatformx64 Version < 10.0.17763.4974
Microsoft ≫ Windows 10 1809 HwPlatformx86 Version < 10.0.17763.4974
Microsoft ≫ Windows 10 21h1 HwPlatformarm64 Version < 10.0.19041.3570
Microsoft ≫ Windows 10 21h1 HwPlatformx64 Version < 10.0.19041.3570
Microsoft ≫ Windows 10 21h1 HwPlatformx86 Version < 10.0.19041.3570
Microsoft ≫ Windows 10 22h2 HwPlatformarm64 Version < 10.0.19041.3570
Microsoft ≫ Windows 10 22h2 HwPlatformx64 Version < 10.0.19041.3570
Microsoft ≫ Windows 10 22h2 HwPlatformx86 Version < 10.0.19041.3570
Microsoft ≫ Windows 11 21h2 HwPlatformarm64 Version < 10.0.22000.2538
Microsoft ≫ Windows 11 21h2 HwPlatformx64 Version < 10.0.22000.2538
Microsoft ≫ Windows 11 22h2 HwPlatformarm64 Version < 10.0.22621.2428
Microsoft ≫ Windows 11 22h2 HwPlatformx64 Version < 10.0.22621.2428
Microsoft ≫ Windows Server 2008 Version- Updatesp2 HwPlatformx64
Microsoft ≫ Windows Server 2008 Version- Updatesp2 HwPlatformx86
Microsoft ≫ Windows Server 2008 Versionr2 Updatesp1 HwPlatformx64
Microsoft ≫ Windows Server 2012 Version-
Microsoft ≫ Windows Server 2012 Versionr2
Microsoft ≫ Windows Server 2016 Version < 10.0.14393.6351
Microsoft ≫ Windows Server 2019 Version < 10.0.17763.4974
Microsoft ≫ Windows Server 2022 Version < 10.0.20348.2031
16.11.2023: CISA Known Exploited Vulnerabilities (KEV) Catalog
Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability
VulnerabilityMicrosoft Windows Mark of the Web (MOTW) contains a security feature bypass vulnerability resulting in a limited loss of integrity and availability of security features.
DescriptionApply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Required actionsType | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 20.09% | 0.953 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
secure@microsoft.com | 5.4 | 2.8 | 2.5 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
|