Microsoft – Patch Tuesday – CVE-2023-21674

Date de publication :

Une faille dans le Advanced Local Procedure Call (ALPC) de Microsoft Windows permet à un attaquant local de s’échapper d’une sandbox Chromium et d’obtenir les privilèges du compte SYSTEM.

Informations

La faille est activement exploitée : Oui

Un correctif existe : Oui

Une mesure de contournement existe : Non

Risques

Élévation de privilèges

Exploitation

La vulnérabilité exploitée est du type
En cours de Recherche

Détails sur l’exploitation
•    Vecteur d’attaque : Local.
•    Complexité de l’attaque : Faible.
•    Privilèges nécessaires pour réaliser l’attaque : Authentification utilisateur simple.
•    Interaction d’un utilisateur ayant accès au produit est-elle nécessaire : Non.
•    L’exploitation de la faille permet d’obtenir des droits privilégiés : Oui.

Systèmes ou composants affectés

Produits Microsoft affectés

• Windows Server 2012 R2 (Server Core installation)
• Windows Server 2012 R2
• Windows RT 8.1
• Windows 8.1 for x64-based systems
• Windows 8.1 for 32-bit systems
• Windows Server 2016 (Server Core installation)
• Windows Server 2016
• Windows 10 Version 1607 for x64-based Systems
• Windows 10 Version 1607 for 32-bit Systems
• Windows 10 for x64-based Systems
• Windows 10 for 32-bit Systems
• Windows 10 Version 22H2 for 32-bit Systems
• Windows 10 Version 22H2 for ARM64-based Systems
• Windows 10 Version 22H2 for x64-based Systems
• Windows 11 Version 22H2 for x64-based Systems
• Windows 11 Version 22H2 for ARM64-based Systems
• Windows 10 Version 21H2 for x64-based Systems
• Windows 10 Version 21H2 for ARM64-based Systems
• Windows 10 Version 21H2 for 32-bit Systems
• Windows 11 version 21H2 for ARM64-based Systems
• Windows 11 version 21H2 for x64-based Systems
• Windows 10 Version 20H2 for ARM64-based Systems
• Windows 10 Version 20H2 for 32-bit Systems
• Windows 10 Version 20H2 for x64-based Systems
• Windows Server 2022 (Server Core installation)
• Windows Server 2022
• Windows Server 2019 (Server Core installation)
• Windows Server 2019
• Windows 10 Version 1809 for ARM64-based Systems
• Windows 10 Version 1809 for x64-based Systems
• Windows 10 Version 1809 for 32-bit Systems

Solutions ou recommandations

Appliquer les correctifs suivants :

  • Windows Server 2012 R2 (Server Core installation) : [KB5022346]
  • Windows Server 2012 R2 : [KB5022346]
  • Windows RT 8.1 : [KB5022346]
  • Windows 8.1 for x64-based systems : [KB5022346]
  • Windows 8.1 for 32-bit systems : [KB5022346]
  • Windows Server 2016 (Server Core installation) : [KB5022289]
  • Windows Server 2016 : [KB5022289]
  • Windows 10 Version 1607 for x64-based Systems : [KB5022289]
  • Windows 10 Version 1607 for 32-bit Systems : [KB5022289]
  • Windows 10 for x64-based Systems : [KB5022297]
  • Windows 10 for 32-bit Systems : [KB5022297]
  • Windows 10 Version 22H2 for 32-bit Systems : [KB5022282]
  • Windows 10 Version 22H2 for ARM64-based Systems : [KB5022282
  • Windows 10 Version 22H2 for x64-based Systems : [KB5022282]
  • Windows 10 Version 21H2 for x64-based Systems : : [KB5022282
  • Windows 10 Version 21H2 for ARM64-based Systems : : [KB5022282
  • Windows 10 Version 21H2 for 32-bit Systems : [KB5022282]
  • Windows 10 Version 20H2 for ARM64-based Systems : : [KB5022282
  • Windows 10 Version 20H2 for 32-bit Systems : [KB5022282
  • Windows 10 Version 20H2 for x64-based Systems : [KB5022282
  • Windows 11 Version 22H2 for x64-based Systems : [KB5022303]
  • Windows 11 Version 22H2 for ARM64-based Systems : [KB5022303]
  • Windows 11 for ARM64-based Systems : [KB5022287]
  • Windows 11 for x64-based Systems : [KB5022287]
  • Windows Server 2022 (Server Core installation) : [KB5022291
  • Windows Server 2022 : [KB5022291]
  • Windows Server 2019 (Server Core installation) : [KB5022286]
  • Windows Server 2019 : [KB5022286]
  • Windows 10 Version 1809 for ARM64-based Systems : [KB5022286]
  • Windows 10 Version 1809 for x64-based Systems : [KB5022286]
  • Windows 10 Version 1809 for 32-bit Systems : [KB5022286]

Des informations complémentaires sont disponibles ici.