By zerosday cve bot•November 14, 2023•
cves
CVE-2023-36025: Microsoft Windows SmartScreen Security Feature Bypass Vulnerability (Pentest Lab Guide)

CVE-2023-36025: Technical Deep-Dive (Auto Refreshed)
Generated on 2026-03-26T00:52:19.053Z. This file is automatically regenerated every 30 minutes by the CVE AI enrichment job using web sources (NVD, MITRE, CISA KEV, GitHub).
Executive Technical Summary
Microsoft Windows SmartScreen contains a security feature bypass vulnerability that could allow an attacker to bypass Windows Defender SmartScreen checks and their associated prompts.
- Context preserved from previous revision: Windows SmartScreen Security Feature Bypass Vulnerability Notes: Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's Asteroid and Bug Bounty programs.
Technical Details
- CVE: CVE-2023-36025
- KEV date added: 2023-11-14
- KEV due date: 2023-12-05
- NVD published: Unknown
- NVD modified: Unknown
- MITRE modified: 2025-10-21
- CVSS base score: N/A
- CVSS vector: N/A
- CVSS exploitability score: N/A
- CVSS impact score: N/A
- Attack vector: Unknown
- Attack complexity: Unknown
- Privileges required: Unknown
- User interaction: Unknown
- Scope: Unknown
- Confidentiality impact: Unknown
- Integrity impact: Unknown
- Availability impact: Unknown
Versions and Products Impacted
- Microsoft / Windows 10 Version 1809 (versions: 10.0.17763.0)
- Microsoft / Windows 10 Version 1809 (versions: 10.0.0)
- Microsoft / Windows Server 2019 (versions: 10.0.17763.0)
- Microsoft / Windows Server 2019 (Server Core installation) (versions: 10.0.17763.0)
- Microsoft / Windows Server 2022 (versions: 10.0.20348.0)
- Microsoft / Windows 11 version 21H2 (versions: 10.0.0)
- Microsoft / Windows 10 Version 21H2 (versions: 10.0.19043.0)
- Microsoft / Windows 11 version 22H2 (versions: 10.0.22621.0)
- Microsoft / Windows 10 Version 22H2 (versions: 10.0.19045.0)
- Microsoft / Windows 11 version 22H3 (versions: 10.0.22631.0)
- Microsoft / Windows 11 Version 23H2 (versions: 10.0.22631.0)
- Microsoft / Windows Server 2022, 23H2 Edition (Server Core installation) (versions: 10.0.25398.0)
- Microsoft / Windows 10 Version 1507 (versions: 10.0.10240.0)
- Microsoft / Windows 10 Version 1607 (versions: 10.0.14393.0)
- Microsoft / Windows Server 2016 (versions: 10.0.14393.0)
- Microsoft / Windows Server 2016 (Server Core installation) (versions: 10.0.14393.0)
- Microsoft / Windows Server 2008 Service Pack 2 (versions: 6.0.6003.0)
- Microsoft / Windows Server 2008 Service Pack 2 (Server Core installation) (versions: 6.0.6003.0)
- Microsoft / Windows Server 2008 R2 Service Pack 1 (versions: 6.1.7601.0)
- Microsoft / Windows Server 2008 R2 Service Pack 1 (Server Core installation) (versions: 6.1.7601.0)
Weakness Classification
- CWE-noinfo Not enough information
Repositories for Lab Validation (Public Examples)
- No public repository matched this CVE query in the current run.
People and Organizations Mentioned
- microsoft
- Windows
Practical Defensive Validation (Authorized Only)
- Use only isolated environments and systems you own or are explicitly authorized to test.
- Snapshot infrastructure before validation and preserve baseline logs (EDR, SIEM, OS, app).
- Inventory Microsoft / Windows 10 Version 1809 (versions: 10.0.17763.0) assets and confirm exact vulnerable versions with automated checks.
- Patch in staged environments and validate closure with scanners + service health checks.
- Map detections to MITRE ATT&CK tactics relevant to your environment and tune alert quality.
References
- NVD record: https://nvd.nist.gov/vuln/detail/CVE-2023-36025
- MITRE CVE record: https://www.cve.org/CVERecord?id=CVE-2023-36025
- CISA KEV Catalog: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
- CISA KEV JSON feed: https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json
- KEV notes: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-36025; https://nvd.nist.gov/vuln/detail/CVE-2023-36025
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36025
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-36025
This content is for defensive security training and authorized validation only.
