Security Updates for Windows Defender (March 2023)

medium Nessus Plugin ID 172577

Synopsis

An antimalware application installed on the remote host is affected by a privilege escalation vulnerability.

Description

The Malware Protection Engine version of Microsoft Windows Defender installed on the remote Windows host is prior to 1.1.20000.2. It is, therefore, affected by a privilege escalation vulnerability. An authenticated attacker can exploit this to gain elevated privileges.

Solution

Microsoft has released KB4052623 to address this issue.

See Also

http://www.nessus.org/u?3bed4ba6

Plugin Details

Severity: Medium

ID: 172577

File Name: smb_nt_ms23_mar_win_defender.nasl

Version: 1.1

Type: local

Agent: windows

Published: 3/15/2023

Updated: 3/16/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 4.1

Vector: CVSS2#AV:L/AC:H/Au:S/C:N/I:C/A:C

CVSS Score Source: CVE-2023-23389

CVSS v3

Risk Factor: Medium

Base Score: 6.3

Temporal Score: 5.5

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows, cpe:/a:microsoft:windows_defender

Required KB Items: installed_sw/Windows Defender

Exploit Ease: No known exploits are available

Patch Publication Date: 3/14/2023

Vulnerability Publication Date: 3/14/2023

Reference Information

CVE: CVE-2023-23389

MSFT: MS22-4052623

MSKB: 4052623