Lyrie
active-exploitation
ACTIVELY EXPLOITED3 sources verified·4 min read
By Lyrie Threat Intelligence·4/13/2026

What happened

CISA added CVE-2023-36424 to the Known Exploited Vulnerabilities (KEV) catalog, flagging active exploitation of a Windows Common Log File System (CLFS) driver flaw that can enable privilege escalation (CVE added 2026-04-13) (CISA KEV). The vulnerability is an out-of-bounds read in Microsoft Windows, mapped to CWE-125, and tied to the CLFS driver component (NVD entry). The KEV listing obligates federal agencies to remediate on an accelerated timeline; the entry indicates a due date of 2026-04-27 and directs teams to apply vendor mitigations or discontinue use if none are available (CISA KEV). The CVE record is published in the MITRE corpus, confirming the identifier and baseline metadata for tracking and correlation (MITRE CVE).

Why it matters

Inclusion in KEV means exploitation has been observed in the wild, shifting this issue from theoretical to operational risk for Windows fleets (CISA KEV). Out-of-bounds read bugs can expose memory outside intended bounds, often enabling information disclosure that operators can leverage to bypass mitigations or stabilize local privilege escalation chains (NVD entry). Because the vulnerable code is in the Windows CLFS driver context, a successful exploit can translate a low-privilege foothold into system-level control on impacted hosts (NVD entry). For defenders, that means post-compromise dwell time can shrink dramatically once an attacker lands on an endpoint, especially when paired with initial access from commodity vectors like phishing or browser exploits (CISA KEV).

Technical detail

CVE-2023-36424 is categorized as an out-of-bounds read (CWE-125), indicating the code path reads memory past buffer boundaries in the CLFS driver, a kernel-mode Windows component for log file management (NVD entry). While out-of-bounds reads are often framed as information disclosure, in kernel attack development they can be pivotal: leaking kernel pointers, structure layouts, or randomized addresses can neutralize KASLR and harden a write-primitive later in the chain, ultimately enabling elevation of privilege on the local system (NVD entry). CISA’s decision to place this CVE in KEV explicitly signals observed real-world abuse, which raises priority for mitigation over purely theoretical kernel bugs (CISA KEV). The authoritative CVE record at MITRE corroborates the identifier and scope, allowing teams to align SBOM and ticketing systems on the same CVE key (MITRE CVE).

Key points for operators:

  • Component: Windows Common Log File System (CLFS) driver, kernel-mode (NVD entry).
  • Weakness: Out-of-bounds read (CWE-125) (NVD entry).
  • Impact: Potential privilege escalation on affected Windows systems under active exploitation conditions (CISA KEV).

Defense

  • Patch/mitigate now: CISA directs agencies to apply vendor mitigations per the KEV guidance or discontinue use if none are available, with a remediation due date of 2026-04-27 for this entry (CISA KEV). Tie your change window to the KEV SLA and track completion against the CVE identifier to verify closure (MITRE CVE).
  • Prioritize by exposure: Treat Windows systems with untrusted code execution paths (RDS/VDI, developer endpoints, browsers) as high priority, as local footholds can turn into kernel-level EoP via this class of bug (NVD entry).
  • Compensating controls: Harden least-privilege on endpoints and remove local admin wherever possible to reduce immediate blast radius if a local exploit is attempted (CISA KEV).
  • Detection considerations: OOB read exploitation commonly aims for stealth and may leave sparse logs; emphasize telemetry that correlates suspicious post-exploitation behavior (e.g., unexpected token elevation, service manipulation) after low-privilege execution to catch the consequences of a kernel EoP (NVD entry).

Lyrie Verdict

This is a live-fire Windows kernel exploitation problem, not a paper CVE. KEV placement means adversaries are already operationalizing CVE-2023-36424 in the wild (CISA KEV). Lyrie’s position: assume the initial foothold is a given and hunt for the automation signature of fast privilege ascent. Our autonomous models correlate low-privilege execution with near-immediate system-level behaviors that match EoP consequences—credential materialization, high-integrity process spawns, and rapid service/control manager changes—so we don’t wait for a single kernel exploit IOC to surface (NVD entry). Against rogue-AI-driven operators that chain kernel bugs at machine speed, you need machine-speed detection that reasons over sequences, not singular alerts. We wire KEV-prioritized CVEs like CVE-2023-36424 into scoring so any endpoint showing post-exploit privilege inflation is automatically isolated for triage before lateral movement can materialize (CISA KEV).

Lyrie Verdict

CVE-2023-36424 is being exploited in the wild per CISA KEV; Lyrie pivots from kernel-IOC chasing to sequence-based, machine-speed detection of rapid privilege ascent and auto-isolates endpoints showing EoP consequences tied to KEV-prioritized risk.