Windows Common Log File System Driver Elevation of Privilege Vulnerability CVE-2023-36424
Summary
CISA has added CVE-2023-36424 to its Known Exploited Vulnerabilities catalog. The vulnerability is a Windows Common Log File System Driver elevation of privilege flaw with a CVSS 3.1 score of 7.8 (HIGH). It affects numerous Windows versions including Windows 10, 11, Server 2019-2022, and legacy systems. CISA has determined this vulnerability has been actively exploited in the wild, triggering remediation requirements for federal agencies under Binding Operational Directive 22-01.
What changed
CISA added CVE-2023-36424 to its Known Exploited Vulnerabilities catalog. The vulnerability is a Windows Common Log File System Driver elevation of privilege flaw that allows an authenticated user to gain SYSTEM-level privileges. With a CVSS 3.1 score of 7.8 (HIGH), it affects multiple Windows versions from Windows 8.1 through Windows 11 and Windows Server 2019-2022.
Organizations running affected Windows systems should treat this as urgent priority given CISA's determination of active exploitation. Federal agencies face mandatory remediation timelines under BOD 22-01. Private organizations should immediately review their asset inventories for affected versions and deploy Microsoft security updates. The vulnerability stems from an out-of-bounds read (CWE-125).
What to do next
- Review CVE-2023-36424 details on the CVE Program website
- Apply Microsoft security updates to affected Windows systems
- Prioritize patching based on CISA KEV remediation timelines
Archived snapshot
Apr 14, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
Required CVE Record Information
CNA: Microsoft Corporation
Description
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CWE 1 Total
Learn more
- CWE-125: CWE-125: Out-of-bounds Read
CVSS 1 Total
Learn more
| Score | Severity | Version | Vector String |
| --- | --- | --- | --- |
| 7.8 | HIGH | 3.1 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Product Status
Learn more Versions 1 Total
Default Status: unknown
affected
- affected from 10.0.22631.0 before 10.0.22631.2715 Versions 1 Total
Default Status: unknown
affected
- affected from 10.0.25398.0 before 10.0.25398.531 Versions 1 Total
Default Status: unknown
affected
- affected from 10.0.22631.0 before 10.0.22631.2715 Versions 1 Total
Default Status: unknown
affected
- affected from 10.0.17763.0 before 10.0.17763.5122 Versions 1 Total
Default Status: unknown
affected
- affected from 10.0.0 before 10.0.17763.5122 Versions 1 Total
Default Status: unknown
affected
- affected from 10.0.17763.0 before 10.0.17763.5122 Versions 1 Total
Default Status: unknown
affected
- affected from 10.0.17763.0 before 10.0.17763.5122 Versions 1 Total
Default Status: unknown
affected
- affected from 10.0.20348.0 before 10.0.20348.2113 Versions 1 Total
Default Status: unknown
affected
- affected from 10.0.0 before 10.0.22000.2600 Versions 1 Total
Default Status: unknown
affected
- affected from 10.0.19043.0 before 10.0.19043.3693 Versions 1 Total
Default Status: unknown
affected
- affected from 10.0.22621.0 before 10.0.22621.2715 Versions 1 Total
Default Status: unknown
affected
- affected from 10.0.19045.0 before 10.0.19045.3693 Versions 1 Total
Default Status: unknown
affected
- affected from 10.0.10240.0 before 10.0.10240.20308 Versions 1 Total
Default Status: unknown
affected
- affected from 10.0.14393.0 before 10.0.14393.6452 Versions 1 Total
Default Status: unknown
affected
- affected from 10.0.14393.0 before 10.0.14393.6452 Versions 1 Total
Default Status: unknown
affected
- affected from 10.0.14393.0 before 10.0.14393.6452 Versions 1 Total
Default Status: unknown
affected
- affected from 6.0.6003.0 before 6.0.6003.22367 Versions 1 Total
Default Status: unknown
affected
- affected from 6.0.6003.0 before 6.0.6003.22367 Versions 1 Total
Default Status: unknown
affected
- affected from 6.0.6003.0 before 6.0.6003.22367 Versions 1 Total
Default Status: unknown
affected
- affected from 6.1.7601.0 before 6.1.7601.26816 Versions 1 Total
Default Status: unknown
affected
- affected from 6.1.7601.0 before 6.1.7601.26816 Versions 1 Total
Default Status: unknown
affected
- affected from 6.2.9200.0 before 6.2.9200.24569 Versions 1 Total
Default Status: unknown
affected
- affected from 6.2.9200.0 before 6.2.9200.24569 Versions 1 Total
Default Status: unknown
affected
- affected from 6.3.9600.0 before 6.3.9600.21668 Versions 1 Total
Default Status: unknown
affected
- affected from 6.3.9600.0 before 6.3.9600.21668
References 1 Total
- msrc.microsoft.com: Windows Common Log File System Driver Elevation of Privilege Vulnerability vendor-advisory
CVE Program
Updated:
2024-08-02
This container includes required additional information provided by the CVE Program for this vulnerability.
References 1 Total
- msrc.microsoft.com: Windows Common Log File System Driver Elevation of Privilege Vulnerability vendor-advisory x_transferred
Authorized Data Publishers
CISA-ADP
Updated:
2026-04-14
SSVC and KEV, plus CVSS and CWE if not provided by the CNA.
SSVC 1 Total
Learn more
| Exploitation | Automatable | Technical Impact | Version | Date Accessed |
| --- | --- | --- | --- | --- |
| active | no | total | 2.0.3 | 2023-11-13 |
KEV 1 Total
Learn more
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-36424 (2026-04-13)
Related changes
Get daily alerts for CISA Known Exploited Vulnerabilities (KEV)
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Source
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from CISA.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when CISA Known Exploited Vulnerabilities (KEV) publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.