{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-38171","assignerOrgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","state":"PUBLISHED","assignerShortName":"microsoft","dateReserved":"2023-07-12T23:41:45.863Z","datePublished":"2023-10-10T17:07:23.843Z","dateUpdated":"2025-04-14T22:45:47.105Z"},"containers":{"cna":{"title":"Microsoft QUIC Denial of Service Vulnerability","datePublic":"2023-10-10T07:00:00.000Z","cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*","versionStartIncluding":"17.2.0","versionEndExcluding":"17.2.21"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*","versionStartIncluding":"17.4.0","versionEndExcluding":"17.4.13"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*","versionStartIncluding":"17.6.0","versionEndExcluding":"17.6.9"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*","versionStartIncluding":"17.7.0","versionEndExcluding":"17.7.6"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*","versionStartIncluding":"10.0.20348.0","versionEndExcluding":"10.0.20348.2031"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*","versionStartIncluding":"10.0.0","versionEndExcluding":"10.0.22000.2538"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*","versionStartIncluding":"10.0.22621.0","versionEndExcluding":"10.0.22621.2428"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*","versionStartIncluding":"7.0.0","versionEndExcluding":"7.0.13"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:powershell:*:-:*:*:*:*:*:*","versionStartIncluding":"7.3.0","versionEndExcluding":"7.3.9"}]}]}],"affected":[{"vendor":"Microsoft","product":"Microsoft Visual Studio 2022 version 17.2","platforms":["Unknown"],"versions":[{"version":"17.2.0","lessThan":"17.2.21","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Microsoft Visual Studio 2022 version 17.4","platforms":["Unknown"],"versions":[{"version":"17.4.0","lessThan":"17.4.13","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Microsoft Visual Studio 2022 version 17.6","platforms":["Unknown"],"versions":[{"version":"17.6.0","lessThan":"17.6.9","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Microsoft Visual Studio 2022 version 17.7","platforms":["Unknown"],"versions":[{"version":"17.7.0","lessThan":"17.7.6","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows Server 2022","platforms":["x64-based Systems"],"versions":[{"version":"10.0.20348.0","lessThan":"10.0.20348.2031","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows 11 version 21H2","platforms":["x64-based Systems","ARM64-based Systems"],"versions":[{"version":"10.0.0","lessThan":"10.0.22000.2538","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows 11 version 22H2","platforms":["ARM64-based Systems","x64-based Systems"],"versions":[{"version":"10.0.22621.0","lessThan":"10.0.22621.2428","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":".NET 7.0","platforms":["Unknown"],"versions":[{"version":"7.0.0","lessThan":"7.0.13","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"PowerShell 7.3","platforms":["Unknown"],"versions":[{"version":"7.3.0","lessThan":"7.3.9","versionType":"custom","status":"affected"}]}],"descriptions":[{"value":"Microsoft QUIC Denial of Service Vulnerability","lang":"en-US"}],"problemTypes":[{"descriptions":[{"description":"CWE-476: NULL Pointer Dereference","lang":"en-US","type":"CWE","cweId":"CWE-476"}]}],"providerMetadata":{"orgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","shortName":"microsoft","dateUpdated":"2025-04-14T22:45:47.105Z"},"references":[{"name":"Microsoft QUIC Denial of Service Vulnerability","tags":["vendor-advisory"],"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38171"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en-US","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","baseSeverity":"HIGH","baseScore":7.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C"}}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T17:30:14.169Z"},"title":"CVE Program Container","references":[{"name":"Microsoft QUIC Denial of Service Vulnerability","tags":["vendor-advisory","x_transferred"],"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38171"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-02-26T21:50:15.369465Z","id":"CVE-2023-38171","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-27T20:44:45.977Z"}}]}}