Rapid7 Vulnerability & Exploit Database

Microsoft Windows: CVE-2023-23404: Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Microsoft Windows: CVE-2023-23404: Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
03/14/2023
Created
03/15/2023
Added
03/14/2023
Modified
09/06/2024

Description

Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability

Solution(s)

  • microsoft-windows-windows_10-1507-kb5023713
  • microsoft-windows-windows_10-1607-kb5023697
  • microsoft-windows-windows_10-1809-kb5023702
  • microsoft-windows-windows_10-20h2-kb5023696
  • microsoft-windows-windows_10-21h2-kb5023696
  • microsoft-windows-windows_10-22h2-kb5023696
  • microsoft-windows-windows_11-21h2-kb5023698
  • microsoft-windows-windows_11-22h2-kb5023706
  • microsoft-windows-windows_server_2012-kb5023752
  • microsoft-windows-windows_server_2012_r2-kb5023764
  • microsoft-windows-windows_server_2016-1607-kb5023697
  • microsoft-windows-windows_server_2019-1809-kb5023702
  • microsoft-windows-windows_server_2022-21h2-kb5023705
  • microsoft-windows-windows_server_2022-22h2-kb5023705
  • msft-kb5023752-02603d2a-edd5-431d-a467-26c72af3d174
  • msft-kb5023752-e7ced92e-6978-4fb5-af81-ebdd42ff271d

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;