The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2023-36903

CVE-2023-36903: Windows 10 Privilege Escalation Flaw

CVE-2023-36903 is a privilege escalation vulnerability in Windows System Assessment Tool affecting Windows 10 systems. Attackers can exploit this flaw to gain elevated privileges. This article covers technical details, affected versions, impact analysis, and mitigation strategies.

Published: February 4, 2026

CVE-2023-36903 Overview

CVE-2023-36903 is a critical elevation of privilege vulnerability affecting the Windows System Assessment Tool (WinSAT). This vulnerability allows attackers to escalate privileges on affected Windows systems through improper handling of symbolic links (symlinks). The Windows System Assessment Tool is a built-in Windows component used to measure system performance capabilities and is present across virtually all modern Windows desktop and server installations.

Critical Impact

Successful exploitation of this vulnerability could allow an attacker to gain elevated SYSTEM-level privileges on the target machine, potentially leading to complete system compromise including data theft, malware installation, and lateral movement within enterprise networks.

Affected Products

  • Microsoft Windows 10 (all versions including 1607, 1809, 21H2, 22H2)
  • Microsoft Windows 11 (21H2 and 22H2 for both x64 and ARM64)
  • Microsoft Windows Server 2008 R2 SP1
  • Microsoft Windows Server 2012 and 2012 R2
  • Microsoft Windows Server 2016
  • Microsoft Windows Server 2019
  • Microsoft Windows Server 2022

Discovery Timeline

  • August 8, 2023 - CVE-2023-36903 published to NVD
  • November 21, 2024 - Last updated in NVD database

Technical Details for CVE-2023-36903

Vulnerability Analysis

This elevation of privilege vulnerability exists in the Windows System Assessment Tool (WinSAT.exe) due to improper link resolution before file access (CWE-59). The vulnerability occurs when the WinSAT component follows symbolic links or file junctions without proper validation, allowing attackers to redirect file operations to privileged locations.

When WinSAT performs its system assessment operations, it creates and accesses temporary files with elevated privileges. An attacker can exploit this behavior by creating carefully crafted symbolic links that redirect these file operations to sensitive system locations, effectively hijacking the privileged write operations to overwrite or create arbitrary files with SYSTEM-level privileges.

Root Cause

The root cause of CVE-2023-36903 is classified as CWE-59: Improper Link Resolution Before File Access ('Link Following'). The Windows System Assessment Tool does not adequately validate symbolic links, hard links, or junction points when performing file operations. This allows a low-privileged attacker to create symbolic links that redirect privileged file operations to arbitrary locations on the file system.

When WinSAT executes with elevated privileges (which is common during system performance assessments), file operations that follow attacker-controlled symbolic links can result in arbitrary file writes or overwrites with SYSTEM privileges.

Attack Vector

The attack can be initiated over a network without requiring authentication or user interaction. An attacker would typically:

  1. Gain initial access to a target system with low-privileged credentials
  2. Identify the temporary directories or file paths used by WinSAT during operation
  3. Create symbolic links or junction points in these locations pointing to privileged system directories
  4. Trigger or wait for the Windows System Assessment Tool to execute
  5. The privileged file operations follow the symbolic links, writing to attacker-specified locations
  6. Leverage the arbitrary file write to achieve code execution as SYSTEM

The vulnerability affects the standard Windows component located at C:\Windows\System32\WinSAT.exe and associated libraries. Since this tool can be invoked programmatically or through scheduled system assessments, the attack surface is significant across enterprise environments.

Detection Methods for CVE-2023-36903

Indicators of Compromise

  • Unexpected symbolic links or junction points created in WinSAT working directories (typically under C:\Windows\Performance\WinSAT\)
  • Unusual WinSAT.exe process spawning patterns or execution at unexpected times
  • File system audit logs showing symbolic link creation followed by privileged file operations
  • Modifications to sensitive system files coinciding with WinSAT execution

Detection Strategies

  • Enable Windows Security Event logging for process creation (Event ID 4688) and monitor for WinSAT.exe executions with suspicious parent processes
  • Implement file integrity monitoring on critical system directories to detect unauthorized modifications
  • Monitor for symbolic link and junction point creation events, particularly in system performance directories
  • Deploy behavioral analytics to detect privilege escalation patterns associated with link-following attacks

Monitoring Recommendations

  • Configure SentinelOne agents to monitor for suspicious WinSAT.exe activity and associated file system operations
  • Enable auditing of symbolic link creation through Windows Advanced Audit Policy settings
  • Implement alerts for any modifications to system binaries or configuration files following WinSAT execution
  • Correlate WinSAT execution events with subsequent privileged file operations across endpoints

How to Mitigate CVE-2023-36903

Immediate Actions Required

  • Apply the Microsoft security update for CVE-2023-36903 immediately on all affected Windows systems
  • Prioritize patching for systems running Windows 10, Windows 11, and Windows Server versions listed in the affected products
  • Restrict unnecessary access to WinSAT functionality through Group Policy where operationally feasible
  • Implement the principle of least privilege to limit potential damage from exploitation

Patch Information

Microsoft has released security updates to address this vulnerability as part of their August 2023 Patch Tuesday release. The official security guidance and patch information is available through the Microsoft Security Update Guide for CVE-2023-36903. Organizations should apply the appropriate cumulative update for their Windows version through Windows Update, WSUS, or Microsoft Update Catalog.

Workarounds

  • Restrict access to the Windows System Assessment Tool by modifying NTFS permissions on WinSAT.exe for non-administrative users
  • Disable scheduled WinSAT assessments through Group Policy if system performance benchmarking is not required
  • Implement application whitelisting to control execution of WinSAT.exe and related components
  • Deploy endpoint protection solutions like SentinelOne that can detect and block privilege escalation attempts in real-time
bash
# Restrict WinSAT execution permissions (run as Administrator)
icacls "C:\Windows\System32\WinSAT.exe" /deny "Users:(X)"

# Disable Windows System Assessment scheduled task
schtasks /Change /TN "\Microsoft\Windows\Maintenance\WinSAT" /Disable

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechWindows

  • SeverityCRITICAL

  • CVSS Score9.8

  • EPSS Probability0.77%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-59

  • NVD-CWE-noinfo
  • Vendor Resources
  • Microsoft Security Update CVE-2023-36903
  • Related CVEs
  • CVE-2026-23672: Windows UDFS Privilege Escalation Flaw

  • CVE-2026-25178: Windows WinSock Driver Privilege Escalation

  • CVE-2026-24283: Windows File Server Privilege Escalation

  • CVE-2026-24294: Windows SMB Server Privilege Escalation
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English