Security Updates for Windows Defender (March 2023)

medium Nessus Plugin ID 172577


An antimalware application installed on the remote host is affected by a privilege escalation vulnerability.


The Malware Protection Engine version of Microsoft Windows Defender installed on the remote Windows host is prior to 1.1.20000.2. It is, therefore, affected by a privilege escalation vulnerability. An authenticated attacker can exploit this to gain elevated privileges.


Microsoft has released KB4052623 to address this issue.

See Also

Plugin Details

Severity: Medium

ID: 172577

File Name: smb_nt_ms23_mar_win_defender.nasl

Version: 1.1

Type: local

Agent: windows

Published: 3/15/2023

Updated: 3/16/2023

Risk Information


Risk Factor: Medium

Score: 6.0


Risk Factor: Medium

Base Score: 5.5

Temporal Score: 4.1

Vector: CVSS2#AV:L/AC:H/Au:S/C:N/I:C/A:C

CVSS Score Source: CVE-2023-23389


Risk Factor: Medium

Base Score: 6.3

Temporal Score: 5.5

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows, cpe:/a:microsoft:windows_defender

Required KB Items: installed_sw/Windows Defender

Exploit Ease: No known exploits are available

Patch Publication Date: 3/14/2023

Vulnerability Publication Date: 3/14/2023

Reference Information

CVE: CVE-2023-23389

MSFT: MS22-4052623

MSKB: 4052623