Microsoft Patch Tuesday Addresses 59 Vulnerabilities


In the latest release of Microsoft Patch Tuesday September 2023, the tech giant addresses 59 vulnerabilities, including several critical-severity issues. Two actively exploited zero-day vulnerabilities were also addressed with this update.

Microsoft has classified five vulnerabilities as ‘Critical’, including four remote code execution vulnerabilities and one related to the Azure Kubernetes Service elevation.

Here is a quick breakdown of the Microsoft Patch Tuesday September 2023, and the key takeaways, including major vulnerabilities, fixes, updates, and enhancements for Windows 10 and 11 operating systems. 

Microsoft Patch Tuesday September 2023: Major Fixes 

According to Microsoft, the Patch Tuesday September 2023 update covers multiple vulnerabilities, including the ones shared in last month’s update. Visual Studio follows suit with three unique vulnerabilities and five more shared with. NET. 

Other products in the Microsoft Patch Tuesday September 2023 update include 3D Builder and Office, with seven apiece. .NET brings six vulnerabilities to the table, including the five it shares with Visual Studio.

Azure and Dynamics have 4 and 3 vulnerabilities, respectively. The collection is rounded out by Defender, Microsoft Identity Linux Broker, and SharePoint, each with one vulnerability. 

In addition to that, the update also fixes two vulnerabilities that are being exploited in the wild. The first is the Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability, AKA CVE-2023-36802.

The second vulnerability, CVE-2023-36761, an Important-class information-disclosure vulnerability, affects Word through the Preview Panel. 

Microsoft Patch Tuesday, September 2023: More Vulnerability Fixes

The CVE-2023-36762, CVE-2023-36766, and CVE-2023-38146 vulnerabilities are classified as Important-class issues, affecting both Windows and Mac versions.

CVE-2023-36762 is related to Microsoft Word Remote Code Execution, CVE-2023-36766 is related to Microsoft Excel Information Disclosure, and CVE-2023-36767 is related to Microsoft Office Security Feature Bypass. 

The CVE-2023-36767 impacts Microsoft Outlook, where the email Preview Pane is not a vector; the attachment Preview Pane is.

Similarly, CVE-2023-36805 is another Important-class vulnerability affecting the Windows MSHTML Platform Security Feature Bypass for Windows Server 2012 R2 users. 

Lastly, CVE-2023-38146 targets Windows Themes with a Remote Code Execution Vulnerability. It carries a CVSS base score 8.8 and can be triggered by a specially crafted .theme file. 

The list of major vulnerability fixes in new Microsoft Patch Tuesday September 2023 update: 

Tag

CVE

Base Score

Microsoft Azure Kubernetes ServiceCVE-2023-293327.5
Azure DevOpsCVE-2023-331368.8
Windows Cloud Files Mini Filter DriverCVE-2023-353557.8
Microsoft Identity Linux BrokerCVE-2023-367364.4
3D ViewerCVE-2023-367397.8
3D ViewerCVE-2023-367407.8
Visual Studio CodeCVE-2023-367427.8
Microsoft Exchange ServerCVE-2023-367448
Microsoft Exchange ServerCVE-2023-367458
Microsoft Exchange ServerCVE-2023-367568
Microsoft Exchange ServerCVE-2023-367578
Visual StudioCVE-2023-367587.8
Visual StudioCVE-2023-367596.7
3D ViewerCVE-2023-367607.8
Microsoft Office WordCVE-2023-367616.2
Microsoft Office WordCVE-2023-367627.3
Microsoft Office OutlookCVE-2023-367637.5
Microsoft Office SharePointCVE-2023-367648.8
Microsoft OfficeCVE-2023-367657.8
Microsoft Office ExcelCVE-2023-367667.8
Microsoft OfficeCVE-2023-367674.3
3D BuilderCVE-2023-367707.8
3D BuilderCVE-2023-367717.8
3D BuilderCVE-2023-367727.8
3D BuilderCVE-2023-367737.8
Microsoft Exchange ServerCVE-2023-367775.7
.NET FrameworkCVE-2023-367887.8
.NET and Visual StudioCVE-2023-367927.8
.NET and Visual StudioCVE-2023-367937.8
.NET and Visual StudioCVE-2023-367947.8
.NET and Visual StudioCVE-2023-367967.8
.NET Core & Visual StudioCVE-2023-367996.5
Microsoft Dynamics Finance & OperationsCVE-2023-368007.6
Windows DHCP ServerCVE-2023-368015.3
Microsoft Streaming ServiceCVE-2023-368027.8
Windows KernelCVE-2023-368035.5
Windows GDICVE-2023-368047.8
Windows ScriptingCVE-2023-368057
Microsoft DynamicsCVE-2023-368867.6
Windows KernelCVE-2023-381397.8
Windows KernelCVE-2023-381405.5
Windows KernelCVE-2023-381417.8
Windows KernelCVE-2023-381427.8
Windows Common Log File System DriverCVE-2023-381437.8
Windows Common Log File System DriverCVE-2023-381447.8
Windows ThemesCVE-2023-381468.8
Microsoft Windows Codecs LibraryCVE-2023-381478.8
Windows Internet Connection Sharing (ICS)CVE-2023-381488.8
Windows TCP/IPCVE-2023-381497.5
Windows KernelCVE-2023-381507.8
Windows DHCP ServerCVE-2023-381525.3
Azure DevOpsCVE-2023-381557
Azure HDInsightsCVE-2023-381567.2
Windows TCP/IPCVE-2023-381605.5
Windows GDICVE-2023-381617.8
Windows DHCP ServerCVE-2023-381627.5
Windows DefenderCVE-2023-381637.8
Microsoft DynamicsCVE-2023-381647.6
Microsoft OfficeCVE-2023-417645.5

Microsoft Patch Tuesday September 2023: Updates for Windows 10 and 11

Apart from fixing vulnerabilities in Microsoft several products, the Microsoft Patch Tuesday September 2023, also added a few features to Windows 10 and Windows 11.

The features aim to improve the overall system security and fixes several bugs. The Patch Tuesday is relatively small but offers enhancements for Windows 10 and Windows 11 operating systems. 

Windows 10 received builds 19044.3448 and 19045.3448, identified as KB5030211. These updates, however, consisted mainly of minor bug fixes without any substantial alterations to the overall user interface or experience.

In detail, the build 22621.2283 update for Windows 11 incorporated tweaks such as removing a redundant menu item in Sticky Keys and a slight adjustment to the default experience of Microsoft applications. 

Furthermore, it addressed various security issues, including an authentication problem encountered when using a card to connect or reconnect a computer to an Active Directory domain after installing updates dated October 2022 or later. 

Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.





Source link