Microsoft Windows Graphics component privilege escalation | CVE-2023-24861
NAME
__________
Microsoft Windows Graphics component privilege escalation
Platforms Affected:
Microsoft Windows Server 2012
Microsoft Windows Server 2016
Microsoft Windows Server version 1803
Microsoft Windows 10 1809 for x64-based Systems
Microsoft Windows 10 1607 for 32-bit Systems
Microsoft Windows 10 2004 for 32-bit Systems
Microsoft Windows Server version 20H2
Microsoft Windows 10 20H2 for 32-bit Systems
Microsoft Windows 10 20H2 for ARM64-based Systems
Microsoft Windows Server (Server Core installation) 20H2
Microsoft Windows Server (Server Core installation) 2016
Microsoft Windows Server (Server Core installation) 2012 R2
Microsoft Windows Server for X64-based systems 2008 R2 SP1
Microsoft Windows Server for X64-based systems (Server Core installation) 2008 SP2
Microsoft Windows Server for 32-bit systems (Server Core installation) 2008 SP2
Microsoft Windows Server for 32-bit systems 2008 SP2
Microsoft Windows Server for X64-based systems (Server Core installation) 2008 R2 SP1
Microsoft Windows 10 21H1 for 32-bit Systems
Microsoft Windows 10 21H1 for ARM64-based Systems
Microsoft Windows 10 21H1 for x64-based Systems
Microsoft Windows Server for X64-based systems 2008 SP2
Microsoft Windows 10 21H2 for 32-bit Systems
Microsoft Windows 10 21H2 for ARM64-based Systems
Risk Level:
7
Exploitability:
Unproven
Consequences:
Gain Privileges
DESCRIPTION
__________
Microsoft Windows could allow a local authenticated attacker to gain elevated privileges on the system, caused by a flaw in the Graphics component. By winning a race condition, an authenticated attacker could exploit this vulnerability to obtain limited SYSTEM privileges.
CVSS 3.0 Information
__________
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Access Vector:
Local
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
![Microsoft Windows Graphics component privilege escalation | CVE-2023-24861 1 Buy Me A Coffee](https://www.redpacketsecurity.com/wp-content/uploads/2022/10/buymeacoffee.png)
![Microsoft Windows Graphics component privilege escalation | CVE-2023-24861 2 Patreon](https://www.redpacketsecurity.com/wp-content/uploads/2021/01/Digital-Patreon-Wordmark_FieryCoralv2-1024x209.png)
To keep up to date follow us on the below channels.