CVE-2023-23376

Vulnerability updated 4 months ago (2024-05-04T16:51:24.627Z)
Download STIX
Preview STIX
CVE-2023-23376 is a software vulnerability, specifically an elevation-of-privilege flaw found in the Windows Common Log File System Driver. This vulnerability allows an attacker to gain system-level privileges, posing a significant risk to unpatched Windows systems. It is similar to another exploit, CVE-2023-28252, indicating a pattern of potential weaknesses within this system component. The impact of this vulnerability is severe, as it enables attackers to escalate their privileges on unpatched Windows systems by exploiting flaws in the Common Log File System Driver. Moreover, when combined with another vulnerability, CVE-2023-21823, which permits remote execution, the security threat becomes even more critical. These two vulnerabilities together allow for a potent attack vector, where an attacker could potentially gain remote access and then escalate their privileges to system level. Check Point IPS provides protection against these threats, including CVE-2023-23376 and other related vulnerabilities such as Microsoft Windows Graphics Component Elevation of Privilege (CVE-2023-21823) and Microsoft Office Security Feature Bypass (CVE-2023-21715). It's crucial for organizations to ensure that their Windows systems are updated and patched regularly to mitigate the risks associated with these vulnerabilities.
Description last updated: 2024-05-04T16:45:41.630Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Vulnerability
Windows
Microsoft
Kaspersky
Exploits
Ransomware
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Vulnerabilities
To see the evidence that has resulted in these vulnerability associations, create a free account
IDTypeVotesProfile Description
CVE-2022-24521Unspecified
3
CVE-2022-24521 is a software vulnerability discovered in 2022, characterized by a flaw in the software design or implementation. This specific vulnerability was exploited through modifications to BLF files and was one of four vulnerabilities (including CVE-2022-37969, CVE-2023-23376, and CVE-2023-28
Source Document References
Information about the CVE-2023-23376 Vulnerability was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
CERT-EU
8 months ago
Windows CLFS Driver zero-days leveraged in ransomware attacks | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
CERT-EU
8 months ago
Carbanak Banking Malware Resurfaces with New Ransomware Tactics | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
CERT-EU
8 months ago
Windows CLFS and five exploits used by ransomware operators | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
CERT-EU
9 months ago
Ransomware Attackers Abuse Multiple Windows CLFS Driver Zero-Days | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
DARKReading
9 months ago
Ransomware Attackers Abuse Multiple Windows CLFS Driver Zero-Days
CERT-EU
9 months ago
Windows CLFS and five exploits used by ransomware operators (Exploit #2 – September 2022)
Securelist
9 months ago
Windows CLFS and five exploits used by ransomware operators (Exploit #4 – CVE-2023-23376)
Securelist
9 months ago
Windows CLFS and five exploits used by ransomware operators (Exploit #1 – CVE-2022-24521)
Securelist
9 months ago
Windows CLFS and five exploits used by ransomware operators (Exploit #2 – September 2022)
Securelist
9 months ago
Windows CLFS and five exploits used by ransomware operators (Exploit #5 – CVE-2023-28252)
Securelist
9 months ago
Windows CLFS and five exploits used by ransomware operators
CERT-EU
9 months ago
Windows CLFS and five exploits used by ransomware operators – GIXtools
CERT-EU
a year ago
Heimdal®’s Semiannual Rundown of the Most Exploited Vulnerabilities of 2023
Securelist
a year ago
Non-mobile malware statistics, Q1 2023
Krebs on Security
2 years ago
Microsoft Patch Tuesday, February 2023 Edition
SANS ISC
2 years ago
InfoSec Handlers Diary Blog - SANS Internet Storm Center
Securityaffairs
2 years ago
Microsoft Patch Tuesday for February 2023 fixed actively exploited zero-days
Canadian Centre for Cyber Security
2 years ago
Microsoft security advisory – February 2023 monthly rollup (AV23-088) - Canadian Centre for Cyber Security
BankInfoSecurity
2 years ago
Microsoft's February Patch Tuesday Fixes 3 Zero-Days
DARKReading
2 years ago
9 New Microsoft Bugs to Patch Now