CVE-2023-21674
ENISA EUVD: EUVD-2023-25841 ↗
Exploited in the Wild
✓ Confirmed 0-Day
★ Google Project Zero
Triaged: March 3, 2026
3 articles
Published: 2023-01-10
EPSS Score
Source: FIRST.org · 2026-05-23
11.58%
probability
This CVE has a 11.58% probability
of being exploited in the next 30 days.
0%
Top 93.7th percentile of all CVEs
100%
CVSS v3.1
Source: VulnerabilityLookup (CIRCL)8.8
HIGH
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Temporal
Exploit Code Maturity
Functional
Remediation Level
Official Fix
Report Confidence
Confirmed
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C
Description
NVDWindows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability
Affected Products
Microsoft
Windows 10 Version 1809
10.0.17763.0
Microsoft
Windows 10 Version 1809
10.0.0
Microsoft
Windows Server 2019
10.0.17763.0
Microsoft
Windows Server 2019 (Server Core installation)
10.0.17763.0
Microsoft
Windows Server 2022
10.0.20348.0
Attack Intelligence
CWE-118
· Incorrect Access of Indexable Resource ('Range Error')
CWE-119
· Buffer Overflow
CWE-416
· Use After Free
CWE-664
· Improper Control of a Resource Through its Lifetime
CWE-666
· Operation on Resource in Wrong Phase of Lifetime
CWE-672
· Operation on a Resource after Expiration or Release
CWE-825
· Expired Pointer Dereference
Google Project Zero
Patched
Jan. 10, 2023
Reported by
Jan Vojtěšek, Milánek, and Przemek Gmerek with Avast
Root Cause Analysis
???
Exploits & PoC
39
2024-04-05
1 repo — triés par ⭐
Rechercher sur GitHub ↗
Signal Intelligence
Confidence
82%
EPSS
11.58%
CVSS v3.1
8.8
Mentions
3
Last Seen
Jan 11, 2023
CNA Information
CNA Assigner
microsoft
CNA Title
Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability
Analyst Note
CVE-2023-21674 is confirmed as a legitimate Windows ALPC elevation of privilege vulnerability with a high CVSS score of 8.8, recognized by Google Project Zero and documented in CERT-EU security advisory. The classification is supported by vendor acknowledgment and credible third-party reporting, though limited public coverage (single article) and absence from CISA KEV slightly moderate absolute confidence.
Triage Info
Decided atMar 03, 2026
Published DateJan 10, 2023