MSRC compact vulnerability detail

CVE-2023-21823 · Windows Graphics Component Remote Code Execution Vulnerability

No description was published by MSRC.

Severity
Important
Impact
Remote Code Execution
CVSS
7.8 base · 7.5 temporal
Release
2023-02-14
Signals
Microsoft Graphics Component Remote Code Execution Exploited: Yes Publicly disclosed: No Exploitability: Exploitation Detected
CWE
Patch Diff
Loading module diff metadata...
Resolved binary override
Use this when the MSRC module name cannot be mapped automatically or the resolved binary looks wrong.
Old version New version
Description
No description was published by MSRC.
FAQ / Articles
FAQ-Windows App How-to-Get
How do I get the update for a Windows App? The Microsoft Store will automatically update affected customers. It is possible for customers to disable automatic updates for the Microsoft Store. The Microsoft Store will not automatically install this update for those customers. You can get the update through the store by following this guide: Get updates for apps and games in Microsoft Store. Be sure to select the tab for the operating system installed on your device to search for updates.
FAQ
How do I get the update for Office for IOS? Tap the Settings Icon Tap the iTunes & App Store Turn on AUTOMATIC DOWNLOADS for Apps Alternatively Tap the App Store Icon Scroll down to find Microsoft Office Tap the Update button
FAQ
How do I get the update for Office for Android? Please reference How to update the Play Store & apps on Android - Google Play Help for guidance.
FAQ
According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.