Patch
CVE-2023-36884
with vRx
Vulnerability Overview
CVE Name
CVE-2023-36884
Severity
7.5
High
CVE Description
Windows Search Remote Code Execution Vulnerability
Show more
Show less
Latest Patch info
Patch Name
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884
Date
11.07.2023
Script

Script Type
Remediation script
Until the CVE-2023-36884 patches are available, Microsoft says that customers using Defender for Office and those who have enabled the Attack Surface Reduction (ASR) rule "Block all Office applications from creating processes child processes" (Block all Office applications from creating child processes ) are protected against phishing attacks that attempt to exploit the bug.
Those who do not use these protections can add the following application names to the registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_CROSS_PROTOCOL_FILE_NAVIGATION as type values REG_DWORDwith 1:
excel.exe
Graph.exe
MSAccess.exe
MSPub.exe
PowerPoint.exe
Visio.exe
WinProj.exe
winword.exe
wordpad.exe
However, it is important to note that setting this registry key to block exploit attempts may also affect some Microsoft Office features linked to the applications listed above.
Read more
Read less
Affected OS & Apps

Word
by
Microsoft
Windows 11 22H2
by
Microsoft
Windows 10 22H2
by
Microsoft
Show more
Patch faster and smarter
with vRx
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Trusted by 600+ customers:




Solution
Patch faster and better with vRx
Patch Management
vRx automatically deploys patches across all systems, cutting patching time by 80%.
Scripting Engine
vRx’s scripting engine solves complex vulnerabilities, like log4j, with built-in or custom scripts.
Patchless Protection
vRx’s Patchless Protection secures vulnerable apps and reduces risk while maintaining functionality.

Automated Patching, Scripting, and more
Talk with our team to get a personal walkthrough
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.