Rapid7 Vulnerability & Exploit Database

Microsoft Windows: CVE-2023-36591: Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Microsoft Windows: CVE-2023-36591: Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability

Severity
7
CVSS
(AV:L/AC:M/Au:S/C:C/I:C/A:C)
Published
10/10/2023
Created
10/11/2023
Added
10/10/2023
Modified
09/06/2024

Description

Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability

Solution(s)

  • microsoft-windows-windows_10-1507-kb5031377
  • microsoft-windows-windows_10-1607-kb5031362
  • microsoft-windows-windows_10-1809-kb5031361
  • microsoft-windows-windows_10-21h2-kb5031356
  • microsoft-windows-windows_10-22h2-kb5031356
  • microsoft-windows-windows_11-21h2-kb5031358
  • microsoft-windows-windows_11-22h2-kb5031354
  • microsoft-windows-windows_server_2012-kb5031427
  • microsoft-windows-windows_server_2012_r2-kb5031407
  • microsoft-windows-windows_server_2016-1607-kb5031362
  • microsoft-windows-windows_server_2019-1809-kb5031361
  • microsoft-windows-windows_server_2022-21h2-kb5031364
  • microsoft-windows-windows_server_2022-22h2-kb5031364
  • msft-kb5031411-6ff09e07-29d8-4561-a6a3-72286549d09e
  • msft-kb5031411-ae877d0e-9c3e-4875-b882-770428331f79
  • msft-kb5031441-05f3d465-ad6d-4abd-bde5-91142eeedb50

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;