Very High
CVE-2023-28252
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Very High
(1 user assessed)Unknown
(1 user assessed)Unknown
Unknown
Unknown
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Description
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Add Assessment
Ratings
-
Attacker ValueVery High
Technical Analysis
This was discovered because of zero-day exploitation perpetrated by a skilled adversary — final payload was Nokoyawa ransomware in at least one case, as Kaspersky details here. We’ve seen a sustained burst of driver exploitation by a range of threat actors the past two years. The trend continues.
Patched in April 2023 Patch Tuesday, so grab those updates quickly as always!
Would you also like to delete your Exploited in the Wild Report?
Delete Assessment Only Delete Assessment and Exploited in the Wild ReportGeneral Information
Vendors
- Microsoft
Products
- Windows 10 Version 1809,
- Windows Server 2019,
- Windows Server 2019 (Server Core installation),
- Windows Server 2022,
- Windows 10 Version 20H2,
- Windows 11 version 21H2,
- Windows 10 Version 21H2,
- Windows 11 version 22H2,
- Windows 10 Version 22H2,
- Windows 10 Version 1507,
- Windows 10 Version 1607,
- Windows Server 2016,
- Windows Server 2016 (Server Core installation),
- Windows Server 2008 Service Pack 2,
- Windows Server 2008 Service Pack 2 (Server Core installation),
- Windows Server 2008 Service Pack 2,
- Windows Server 2008 R2 Service Pack 1,
- Windows Server 2008 R2 Service Pack 1 (Server Core installation),
- Windows Server 2012,
- Windows Server 2012 (Server Core installation),
- Windows Server 2012 R2,
- Windows Server 2012 R2 (Server Core installation)
Exploited in the Wild
- Vendor Advisory (https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28252)
- Government or Industry Alert (https://www.cisa.gov/known-exploited-vulnerabilities-catalog)
- News Article or Blog (https://securelist.com/nokoyawa-ransomware-attacks-with-windows-zero-day/109483/)
- Other: CISA Gov Alert (https://www.cisa.gov/news-events/alerts/2023/04/11/cisa-adds-one-known-exploited-vulnerability-catalog)
Would you like to delete this Exploited in the Wild Report?
Yes, delete this reportWould you like to delete this Exploited in the Wild Report?
Yes, delete this reportReferences
Additional Info
Technical Analysis
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: