Microsoft Windows Out-of-Bounds Read Vulnerability (CVE-2023-36424).
Release Date: 13th April 2026
Impact : HIGH / CRITICAL
TLP Rating: Clear 
The Department of Communication and Digital Transformation (DCDT) through CERT Vanuatu (CERTVU), provides the following advisory.
This alert is relevant to Organizations and System/Network administrators that utilize the above products. This alert is intended to be understood by technical users and systems administrators.
What is it?
CVE-2023-36424 is a high-severity elevation of privilege (EoP) vulnerability (CVSS 7.8) in Microsoft Windows. It affects the Windows Common Log File System (CLFS) driver, a core kernel component responsible for handling transactional logging.
What are the systems affected?
The vulnerability impacts a wide range of Microsoft Windows platforms, including:
- Windows 10 (multiple versions: 1507 → 22H2)
- Windows 11 (21H2, 22H2, 23H2)
- Windows Server 2008 / 2012 / 2016 / 2019 / 2022
Because CLFS is a core kernel component, most modern Windows systems are potentially affected if unpatched.
What does this mean?
This is a local privilege escalation (LPE) vulnerability, meaning attackers must already have access to the system (e.g., via malware or compromised credentials).
Typical exploitation flow:
1. Initial access
- The attacker gains a foothold on the system (e.g., phishing, malware infection, or another exploit).
2. Triggering the CLFS flaw
- A specially crafted input or object is passed to the CLFS driver.
3. Memory handling flaw exploited
- The driver improperly validates or reads memory, leading to an out-of-bounds condition.
4. Privilege escalation
- The attacker elevates privileges from a standard user to SYSTEM-level access.
Successful exploitation of this vulnerability may allow attackers to:
- Gain SYSTEM-level privileges
- Execute arbitrary code with full control
- Install malware or persistent backdoors
- Access, modify, or delete sensitive data
- Disable security controls
- Use the system for lateral movement within a network
Mitigation process
CERTVU recommends the following:
1. Apply Microsoft Security Updates (Critical)
- Install the latest Windows security updates (November 2023 Patch Tuesday and later).
- Ensure all endpoints are fully patched and regularly updated.
2. Restrict Local Access
- Minimize user privileges (apply least privilege principle)
- Restrict ability to execute untrusted code
References
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog
- https://www.cve.org/CVERecord?id=CVE-2023-36424
- https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2023-36424
- Download advisory (English): Microsoft Windows Out-of-Bounds Read Vulnerability (CVE-2023-36424).
- Download advisory (French): Vulnérabilité de lecture hors limites dans Microsoft Windows