CVE-2023-3205011.07.2023, 18:15Windows Installer Elevation of Privilege VulnerabilityLink FollowingEnginsightProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVectorNISTPrimary7 HIGHLOCALHIGHLOWCVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HBase ScoreCVSS 3.xEPSS ScorePercentile: UnknownAffected Products (NVD)VendorProductVersionmicrosoftwindows_server_2008-𝑥= Vulnerable software versionsWindows ReleasesPlatformVersionWindows Server 2008Service Pack 2 (x64, x86)KB5028226Service Pack 2 Server Core (x64, x86)KB5028226Windows Server 2008 R2Service Pack 1 (x64)KB5028240Service Pack 1 Server Core (x64)KB5028240Common Weakness EnumerationCWE-59 - Improper Link Resolution Before File Access ('Link Following')The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.Referenceshttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32050https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32050