Microsoft Might 2023 Patch Tuesday fixes 3 zero-days, 38 flaws


Patch Tuesday

Immediately is Microsoft’s Might 2023 Patch Tuesday, and safety updates repair three zero-day vulnerabilities and a complete of 38 flaws.

Six vulnerabilities are labeled as ‘Crucial’ as they permit distant code execution, probably the most extreme kind of vulnerability.

The variety of bugs in every vulnerability class is listed under:

  • 8 Elevation of Privilege Vulnerabilities
  • 4 Safety Characteristic Bypass Vulnerabilities
  • 12 Distant Code Execution Vulnerabilities
  • 8 Data Disclosure Vulnerabilities
  • 5 Denial of Service Vulnerabilities
  • 1 Spoofing Vulnerability

Immediately’s Patch Tuesday is without doubt one of the smallest when it comes to resolved vulnerabilities, with solely thirty-eight vulnerabilities fastened, not together with eleven Microsoft Edge vulnerabilities fastened final week, on Might fifth.

To study extra concerning the non-security updates launched right now, you possibly can evaluate our devoted articles on the brand new Home windows 11 KB5026372 cumulative replace and Home windows 10 KB5026361 and KB5026362 updates.

Three zero-days fastened

This month’s Patch Tuesday fixes three zero-day vulnerabilities, with two exploited in assaults and one other publicly disclosed.

Microsoft classifies a vulnerability as a zero-day whether it is publicly disclosed or actively exploited with no official repair out there.

The 2 actively exploited zero-day vulnerabilities in right now’s updates are:

CVE-2023-29336 – Win32k Elevation of Privilege Vulnerability

Microsoft has fastened a privilege elevation vulnerability within the Win32k Kernel driver that elevates privileges to SYSTEM, Home windows’ highest person privilege stage.

“An attacker who efficiently exploited this vulnerability may achieve SYSTEM privileges,” reads Microsoft’s advisory.

Whereas Microsoft experiences that the bug is actively exploited, there aren’t any particulars on the way it was abused.

Microsoft says that Jan Vojtešek, Milánek, and Luigino Camastra with Avast found the vulnerability.

CVE-2023-24932 – Safe Boot Safety Characteristic Bypass Vulnerability

Microsoft has fastened a Safe Boot bypass flaw utilized by a menace actor to put in the BlackLotus UEFI bootkit.

“To use the vulnerability, an attacker who has bodily entry or Administrative rights to a goal gadget may set up an affected boot coverage,” reads Microsoft’s advisory.

UEFI bootkits are malware planted within the system firmware and are invisible to safety software program working inside the working system as a result of the malware hundreds within the preliminary stage of the booting sequence.

Since October 2022, a menace actor has been promoting the BlackLotus bootkit on hacker boards and continues to evolve its options. For instance, in March, ESET reported that the developed improved the malware to bypass Safe Boot even on absolutely patched Home windows 11 working programs.

Microsoft launched steering final month on how one can detect BlackLotus UEFI bootkit assaults. With right now’s Patch Tuesday, Microsoft fastened the vulnerability utilized by the bootkit however has not enabled it by default.

“The safety replace addresses the vulnerability by updating the Home windows Boot Supervisor, however isn’t enabled by default,” explains Microsoft’s advisory.

“Further steps are required presently to mitigate the vulnerability. Please seek advice from the next for steps to find out affect in your surroundings: KB5025885: Learn how to handle the Home windows Boot Supervisor revocations for Safe Boot adjustments related to CVE-2023-24932.”

Microsoft says this vulnerability is a bypass for the beforehand fastened CVE-2022-21894 vulnerability.

Microsoft has additionally launched safety replace for one publicly disclosed zero-day vulnerabilities that was not actively exploited.

CVE-2023-29325 – Home windows OLE Distant Code Execution Vulnerability

Microsoft has fastened a Home windows OLE flaw in Microsoft Outlook that may be exploited utilizing specifically crafted emails.

“In an e-mail assault state of affairs, an attacker may exploit the vulnerability by sending the specifically crafted e-mail to the sufferer,” warns Microsoft’s advisory.

“Exploitation of the vulnerability may contain both a sufferer opening a specifically crafted e-mail with an affected model of Microsoft Outlook software program, or a sufferer’s Outlook utility displaying a preview of a specifically crafted e-mail.”

“This might consequence within the attacker executing distant code on the sufferer’s machine.”

Nevertheless, an attacker should win a ‘race’ situation and take further actions to use the flaw efficiently.

Microsoft says that customers can mitigate this vulnerability by studying all messages in plain textual content format.

Will Dormann of Vuln Labs found the vulnerability.

Current updates from different corporations

Different distributors who launched updates or advisories in Might 2023 embody:

The Might 2023 Patch Tuesday Safety Updates

Under is the entire record of resolved vulnerabilities within the Might 2023 Patch Tuesday updates.

To entry the total description of every vulnerability and the programs it impacts, you possibly can view the total report right here.

Tag CVE ID CVE Title Severity
Microsoft Bluetooth Driver CVE-2023-24947 Home windows Bluetooth Driver Distant Code Execution Vulnerability Necessary
Microsoft Bluetooth Driver CVE-2023-24948 Home windows Bluetooth Driver Elevation of Privilege Vulnerability Necessary
Microsoft Bluetooth Driver CVE-2023-24944 Home windows Bluetooth Driver Data Disclosure Vulnerability Necessary
Microsoft Edge (Chromium-based) CVE-2023-29354 Microsoft Edge (Chromium-based) Safety Characteristic Bypass Vulnerability Reasonable
Microsoft Edge (Chromium-based) CVE-2023-2468 Chromium: CVE-2023-2468 Inappropriate implementation in PictureInPicture Unknown
Microsoft Edge (Chromium-based) CVE-2023-2459 Chromium: CVE-2023-2459 Inappropriate implementation in Prompts Unknown
Microsoft Edge (Chromium-based) CVE-2023-29350 Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability Necessary
Microsoft Edge (Chromium-based) CVE-2023-2467 Chromium: CVE-2023-2467 Inappropriate implementation in Prompts Unknown
Microsoft Edge (Chromium-based) CVE-2023-2463 Chromium: CVE-2023-2463 Inappropriate implementation in Full Display screen Mode Unknown
Microsoft Edge (Chromium-based) CVE-2023-2462 Chromium: CVE-2023-2462 Inappropriate implementation in Prompts Unknown
Microsoft Edge (Chromium-based) CVE-2023-2460 Chromium: CVE-2023-2460 Inadequate validation of untrusted enter in Extensions Unknown
Microsoft Edge (Chromium-based) CVE-2023-2465 Chromium: CVE-2023-2465 Inappropriate implementation in CORS Unknown
Microsoft Edge (Chromium-based) CVE-2023-2466 Chromium: CVE-2023-2466 Inappropriate implementation in Prompts Unknown
Microsoft Edge (Chromium-based) CVE-2023-2464 Chromium: CVE-2023-2464 Inappropriate implementation in PictureInPicture Unknown
Microsoft Graphics Part CVE-2023-24899 Home windows Graphics Part Elevation of Privilege Vulnerability Necessary
Microsoft Workplace CVE-2023-29344 Microsoft Workplace Distant Code Execution Vulnerability Necessary
Microsoft Workplace Entry CVE-2023-29333 Microsoft Entry Denial of Service Vulnerability Necessary
Microsoft Workplace Excel CVE-2023-24953 Microsoft Excel Distant Code Execution Vulnerability Necessary
Microsoft Workplace SharePoint CVE-2023-24955 Microsoft SharePoint Server Distant Code Execution Vulnerability Crucial
Microsoft Workplace SharePoint CVE-2023-24954 Microsoft SharePoint Server Data Disclosure Vulnerability Necessary
Microsoft Workplace SharePoint CVE-2023-24950 Microsoft SharePoint Server Spoofing Vulnerability Necessary
Microsoft Workplace Phrase CVE-2023-29335 Microsoft Phrase Safety Characteristic Bypass Vulnerability Necessary
Microsoft Groups CVE-2023-24881 Microsoft Groups Data Disclosure Vulnerability Necessary
Microsoft Home windows Codecs Library CVE-2023-29340 AV1 Video Extension Distant Code Execution Vulnerability Necessary
Microsoft Home windows Codecs Library CVE-2023-29341 AV1 Video Extension Distant Code Execution Vulnerability Necessary
Distant Desktop Consumer CVE-2023-24905 Distant Desktop Consumer Distant Code Execution Vulnerability Necessary
SysInternals CVE-2023-29343 SysInternals Sysmon for Home windows Elevation of Privilege Vulnerability Necessary
Visible Studio Code CVE-2023-29338 Visible Studio Code Data Disclosure Vulnerability Necessary
Home windows Backup Engine CVE-2023-24946 Home windows Backup Service Elevation of Privilege Vulnerability Necessary
Home windows Installer CVE-2023-24904 Home windows Installer Elevation of Privilege Vulnerability Necessary
Home windows iSCSI Goal Service CVE-2023-24945 Home windows iSCSI Goal Service Data Disclosure Vulnerability Necessary
Home windows Kernel CVE-2023-24949 Home windows Kernel Elevation of Privilege Vulnerability Necessary
Home windows LDAP – Light-weight Listing Entry Protocol CVE-2023-28283 Home windows Light-weight Listing Entry Protocol (LDAP) Distant Code Execution Vulnerability Crucial
Home windows MSHTML Platform CVE-2023-29324 Home windows MSHTML Platform Safety Characteristic Bypass Vulnerability Necessary
Home windows Community File System CVE-2023-24941 Home windows Community File System Distant Code Execution Vulnerability Crucial
Home windows NFS Portmapper CVE-2023-24901 Home windows NFS Portmapper Data Disclosure Vulnerability Necessary
Home windows NFS Portmapper CVE-2023-24939 Server for NFS Denial of Service Vulnerability Necessary
Home windows NTLM CVE-2023-24900 Home windows NTLM Safety Assist Supplier Data Disclosure Vulnerability Necessary
Home windows OLE CVE-2023-29325 Home windows OLE Distant Code Execution Vulnerability Crucial
Home windows PGM CVE-2023-24940 Home windows Pragmatic Normal Multicast (PGM) Denial of Service Vulnerability Necessary
Home windows PGM CVE-2023-24943 Home windows Pragmatic Normal Multicast (PGM) Distant Code Execution Vulnerability Crucial
Home windows RDP Consumer CVE-2023-28290 Microsoft Distant Desktop app for Home windows Data Disclosure Vulnerability Necessary
Home windows Distant Process Name Runtime CVE-2023-24942 Distant Process Name Runtime Denial of Service Vulnerability Necessary
Home windows Safe Boot CVE-2023-28251 Home windows Driver Revocation Listing Safety Characteristic Bypass Vulnerability Necessary
Home windows Safe Boot CVE-2023-24932 Safe Boot Safety Characteristic Bypass Vulnerability Necessary
Home windows Safe Socket Tunneling Protocol (SSTP) CVE-2023-24903 Home windows Safe Socket Tunneling Protocol (SSTP) Distant Code Execution Vulnerability Crucial
Home windows SMB CVE-2023-24898 Home windows SMB Denial of Service Vulnerability Necessary
Home windows Win32K CVE-2023-29336 Win32k Elevation of Privilege Vulnerability Necessary
Home windows Win32K CVE-2023-24902 Win32k Elevation of Privilege Vulnerability Necessary

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles