

Listed as CVE-2023-24941 this is a Windows Network File System (NFS) RCE vulnerability which can be exploited over the network by making an unauthenticated, specially crafted request. Microsoft advises users that can't install the patch immediately to read email messages in plain text format.Īnother vulnerability to keep an eye on is an RCE vulnerability with a CVSS score of 9.8 out of 10. This type of RCE vulnerability is bound to become very popular among malware peddlers, and knowing that it has been publicly disclosed means that it is available for them to use. Microsoft says this vulnerability can be exploited merely by viewing a specially-crafted email in the Outlook Preview Pane. This vulnerability is present in Microsoft Outlook and Explorer and can be exploited by attackers in order to remotely install malware.


The primary benefit to a bootkit infection is that it cannot be detected by standard operating systems processes because all of the components reside outside of the Windows file system. Attaching malicious software in this manner can allow for a malicious program to be executed prior to the loading of the operating system. The vulnerability has been used to install the BlackLotus UEFI bootkit, a type of malicious infection which targets the Master Boot Record located on the physical motherboard of the computer. To exploit the vulnerability, an attacker needs either physical access or administrative rights to a target device to install an affected boot policy.

Exploitation of this vulnerability in the Win32k Kernel driver could provide an attacker with SYSTEM privileges.
