CVE Vulnerabilities

CVE-2023-28229

Improper Synchronization

Published: Apr 11, 2023 | Modified: Aug 14, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

Windows CNG Key Isolation Service Elevation of Privilege Vulnerability

Weakness

The product utilizes multiple threads or processes to allow temporary access to a shared resource that can only be exclusive to one process at a time, but it does not properly synchronize these actions, which might cause simultaneous accesses of this resource by multiple threads or processes.

Affected Software

Name Vendor Start Version End Version
Windows_10_1507 Microsoft * 10.0.10240.19869 (excluding)
Windows_10_1607 Microsoft * 10.0.14393.5850 (excluding)
Windows_10_1809 Microsoft * 10.0.17763.4252 (excluding)
Windows_10_20h2 Microsoft * 10.0.19042.2846 (excluding)
Windows_10_21h2 Microsoft * 10.0.19044.2846 (excluding)
Windows_10_22h2 Microsoft * 10.0.19045.2846 (excluding)
Windows_11_21h2 Microsoft * 10.0.22000.1817 (excluding)
Windows_11_22h2 Microsoft * 10.0.22621.1555 (excluding)
Windows_server_2008 Microsoft –sp2 (including) –sp2 (including)
Windows_server_2008 Microsoft r2-sp1 (including) r2-sp1 (including)
Windows_server_2012 Microsoft - (including) - (including)
Windows_server_2012 Microsoft r2 (including) r2 (including)
Windows_server_2016 Microsoft - (including) - (including)
Windows_server_2019 Microsoft - (including) - (including)
Windows_server_2022 Microsoft - (including) - (including)

Extended Description

Synchronization refers to a variety of behaviors and mechanisms that allow two or more independently-operating processes or threads to ensure that they operate on shared resources in predictable ways that do not interfere with each other. Some shared resource operations cannot be executed atomically; that is, multiple steps must be guaranteed to execute sequentially, without any interference by other processes. Synchronization mechanisms vary widely, but they may include locking, mutexes, and semaphores. When a multi-step operation on a shared resource cannot be guaranteed to execute independent of interference, then the resulting behavior can be unpredictable. Improper synchronization could lead to data or memory corruption, denial of service, etc.

Potential Mitigations

References