Microsoft Windows Admin Center Spoofing (July 2023)

medium Nessus Plugin ID 178153

Synopsis

The remote Windows host is contains an application that is affected by a security spoofing vulnerability.

Description

The remote Windows host is running a version of Microsoft Windows Admin Center that is missing a security update. It is, therefore, affected by a security spoofing vulnerability. An authenticated, remote attacker can exploit this to bypass security features.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Apply the appropriate update referenced in the Microsoft advisory.

See Also

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29347

http://www.nessus.org/u?64e0663b

Plugin Details

Severity: Medium

ID: 178153

File Name: smb_nt_ms23_jul_windows_admin_center.nasl

Version: 1.5

Type: local

Agent: windows

Family: Windows

Published: 7/11/2023

Updated: 8/11/2023

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:C/A:N

CVSS Score Source: CVE-2023-29347

CVSS v3

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.9

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:windows_admin_center

Required KB Items: installed_sw/Windows Admin Center

Exploit Ease: No known exploits are available

Patch Publication Date: 7/11/2023

Vulnerability Publication Date: 7/11/2023

Reference Information

CVE: CVE-2023-29347

IAVA: 2023-A-0345-S