Microsoft .NET Framework code execution | CVE-2023-36788

NAME
__________
Microsoft .NET Framework code execution

Platforms Affected:
Microsoft .NET Framework 4.7.2 Developer Pack
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 for 32-bit Systems 1809
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 for ARM64-based Systems 1809
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 for X64-based Systems 1809
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 (Server Core installation)
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 for 32-bit Systems 1809
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 for X64-based Systems 1809
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 (Server Core installation)
Microsoft .NET Framework 3.5.1 on Windows Server 2008 R2 for X64-based Systems SP1
Microsoft .NET Framework 3.5 on Windows Server 2012 R2 (Server Core installation)
Microsoft .NET Framework 3.5 on Windows Server 2012 R2
Microsoft .NET Framework 3.5 on Windows Server 2012 (Server Core installation)
Microsoft .NET Framework 3.5 on Windows Server 2012
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019
Microsoft .NET Framework 2.0 Service Pack 2 on Windows Server 2008 for X64-based Systems Service Pack 2
Microsoft .NET Framework 2.0 Service Pack 2 on Windows Server 2008 for 32-bit Systems Service Pack 2
Microsoft .NET Framework 3.0 Service Pack 2 on Windows Server 2008 for 32-bit Systems Service Pack 2
Microsoft .NET Framework 3.0 Service Pack 2 on Windows Server 2008 for x64-based Systems Service Pack 2
Microsoft .NET Framework 3.5.1 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 for 32-bit Systems 21H2
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 for ARM64-based Systems 21H2
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 for x64-based Systems 21H2
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 for 32-bit Systems 22H2
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 for ARM64-based Systems 22H2
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 for x64-based Systems 22H2
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 for ARM64-based Systems 21H2
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 for x64-based Systems 21H2
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 (Server Core installation)
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 for ARM64-based Systems 21H2
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 for x64-based Systems 21H2
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 for 32-bit Systems 22H2
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 for ARM64-based Systems 22H2
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 for x64-based Systems 22H2
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 for ARM64-based Systems 21H2
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 for x64-based Systems 21H2
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 for ARM64-based Systems 22H2
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 for x64-based Systems 22H2
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 (Server Core installation)

Risk Level:
7.8

Exploitability:
Unproven

Consequences:
Gain Access

DESCRIPTION
__________

Microsoft .NET Framework could allow a remote attacker to execute arbitrary code on the system. By persuading a victim to open a specially crafted content, an attacker could exploit this vulnerability to execute arbitrary code on the system.

CVSS 3.0 Information
__________

Privileges Required:
None

User Interaction:
Required

Scope:
Unchanged

Access Vector:
Local



A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

 To keep up to date follow us on the below channels.