CVE-2023-21674

ENISA EUVD: EUVD-2023-25841 ↗
Exploited in the Wild ✓ Confirmed 0-Day ★ Google Project Zero
Triaged: March 3, 2026 3 articles Published: 2023-01-10

EPSS Score

Source: FIRST.org · 2026-05-23
11.58%
probability
This CVE has a 11.58% probability of being exploited in the next 30 days.
0% Top 93.7th percentile of all CVEs 100%

CVSS v3.1

Source: VulnerabilityLookup (CIRCL)
8.8
HIGH
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Temporal
Exploit Code Maturity
Functional
Remediation Level
Official Fix
Report Confidence
Confirmed
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C

Description

NVD
Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability

Affected Products

Microsoft
Windows 10 Version 1809
10.0.17763.0
Microsoft
Windows 10 Version 1809
10.0.0
Microsoft
Windows Server 2019
10.0.17763.0
Microsoft
Windows Server 2019 (Server Core installation)
10.0.17763.0
Microsoft
Windows Server 2022
10.0.20348.0

Attack Intelligence

Google Project Zero

Patched
Jan. 10, 2023
Reported by
Jan Vojtěšek, Milánek, and Przemek Gmerek with Avast
Root Cause Analysis
???

Exploits & PoC

1 repo — triés par ⭐ Rechercher sur GitHub ↗

Signal Intelligence

Confidence
82%
EPSS 11.58%
CVSS v3.1 8.8
Mentions 3
Last Seen Jan 11, 2023

CNA Information

CNA Assigner
microsoft
CNA Title
Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability

Analyst Note

CVE-2023-21674 is confirmed as a legitimate Windows ALPC elevation of privilege vulnerability with a high CVSS score of 8.8, recognized by Google Project Zero and documented in CERT-EU security advisory. The classification is supported by vendor acknowledgment and credible third-party reporting, though limited public coverage (single article) and absence from CISA KEV slightly moderate absolute confidence.

Triage Info

Decided atMar 03, 2026
Published DateJan 10, 2023