At present is Microsoft’s September 2023 Patch Tuesday, with security updates for 59 flaws, together with two actively exploited zero-day vulnerabilities.
Whereas twenty-four RCE bugs had been fastened, Microsoft solely rated 5 as ‘Important’ — 4 distant code execution flaws and Azure Kubernetes Service elevation of privilege vulnerability.
The variety of bugs in every vulnerability class is listed beneath:
- 3 Safety Function Bypass Vulnerabilities
- 24 Distant Code Execution Vulnerabilities
- 9 Data Disclosure Vulnerabilities
- 3 Denial of Service Vulnerabilities
- 5 Spoofing Vulnerabilities
- 5 Edge – Chromium Vulnerabilities
The whole rely of 59 flaws doesn’t embody 5 Microsoft Edge (Chromium) vulnerabilities two non-Microsoft flaws in Electron and Autodesk.
To study extra in regards to the non-security updates launched right now, you may overview our devoted articles on the brand new Home windows 11 KB5030219 cumulative replace and Home windows 10 KB5030211 updates launched.
Two actively exploited zero-day vulnerabilities
This month’s Patch Tuesday fixes two zero-day vulnerabilities, with each exploited in assaults and one in every of them publicly disclosed.
Microsoft classifies a vulnerability as a zero-day whether it is publicly disclosed or actively exploited with no official repair obtainable.
The 2 actively exploited zero-day vulnerabilities in right now’s updates are:
CVE-2023-36802 – Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability
Microsoft has fastened an actively exploited native privilege elevation vulnerability that permits attackers to realize SYSTEM privileges.
The flaw was found by Quan Jin(@jq0904) & ze0r with DBAPPSecurity WeBin Lab, Valentina Palmiotti with IBM X-Power, Microsoft Risk Intelligence, and Microsoft Safety Response Middle.
CVE-2023-36761 – Microsoft Phrase Data Disclosure Vulnerability
Microsoft has fastened an actively exploited vulnerability that can be utilized to steal NTLM hashes when opening a doc, together with within the preview pane.
These NTLM hashes might be cracked or utilized in NTLM Relay assaults to realize entry to the account.
This flaw was found internally by the Microsoft Risk Intelligence group.
Latest updates from different firms
Different distributors who launched updates or advisories in September 2023 embody:
The September 2023 Patch Tuesday Safety Updates
Under is the entire checklist of resolved vulnerabilities within the September 2023 Patch Tuesday updates.
To entry the complete description of every vulnerability and the techniques it impacts, you may view the complete report right here.
Tag | CVE ID | CVE Title | Severity |
---|---|---|---|
.NET and Visible Studio | CVE-2023-36794 | Visible Studio Distant Code Execution Vulnerability | Necessary |
.NET and Visible Studio | CVE-2023-36796 | Visible Studio Distant Code Execution Vulnerability | Important |
.NET and Visible Studio | CVE-2023-36792 | Visible Studio Distant Code Execution Vulnerability | Important |
.NET and Visible Studio | CVE-2023-36793 | Visible Studio Distant Code Execution Vulnerability | Important |
.NET Core & Visible Studio | CVE-2023-36799 | .NET Core and Visible Studio Denial of Service Vulnerability | Necessary |
.NET Framework | CVE-2023-36788 | .NET Framework Distant Code Execution Vulnerability | Necessary |
3D Builder | CVE-2023-36772 | 3D Builder Distant Code Execution Vulnerability | Necessary |
3D Builder | CVE-2023-36771 | 3D Builder Distant Code Execution Vulnerability | Necessary |
3D Builder | CVE-2023-36770 | 3D Builder Distant Code Execution Vulnerability | Necessary |
3D Builder | CVE-2023-36773 | 3D Builder Distant Code Execution Vulnerability | Necessary |
3D Viewer | CVE-2022-41303 | AutoDesk: CVE-2022-41303 use-after-free vulnerability in Autodesk® FBX® SDK 2020 or prior | Necessary |
3D Viewer | CVE-2023-36760 | 3D Viewer Distant Code Execution Vulnerability | Necessary |
3D Viewer | CVE-2023-36740 | 3D Viewer Distant Code Execution Vulnerability | Necessary |
3D Viewer | CVE-2023-36739 | 3D Viewer Distant Code Execution Vulnerability | Necessary |
Azure DevOps | CVE-2023-33136 | Azure DevOps Server Distant Code Execution Vulnerability | Necessary |
Azure DevOps | CVE-2023-38155 | Azure DevOps Server Distant Code Execution Vulnerability | Necessary |
Azure HDInsights | CVE-2023-38156 | Azure HDInsight Apache Ambari Elevation of Privilege Vulnerability | Necessary |
Microsoft Azure Kubernetes Service | CVE-2023-29332 | Microsoft Azure Kubernetes Service Elevation of Privilege Vulnerability | Important |
Microsoft Dynamics | CVE-2023-38164 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | Necessary |
Microsoft Dynamics | CVE-2023-36886 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | Necessary |
Microsoft Dynamics Finance & Operations | CVE-2023-36800 | Dynamics Finance and Operations Cross-site Scripting Vulnerability | Necessary |
Microsoft Edge (Chromium-based) | CVE-2023-4863 | Chromium: CVE-2023-4863 Heap buffer overflow in WebP | Unknown |
Microsoft Edge (Chromium-based) | CVE-2023-4763 | Chromium: CVE-2023-4763 Use after free in Networks | Unknown |
Microsoft Edge (Chromium-based) | CVE-2023-4761 | Chromium: CVE-2023-4761 Out of bounds reminiscence entry in FedCM | Unknown |
Microsoft Edge (Chromium-based) | CVE-2023-4764 | Chromium: CVE-2023-4764 Incorrect security UI in BFCache | Unknown |
Microsoft Edge (Chromium-based) | CVE-2023-4762 | Chromium: CVE-2023-4762 Kind Confusion in V8 | Unknown |
Microsoft Trade Server | CVE-2023-36744 | Microsoft Trade Server Distant Code Execution Vulnerability | Necessary |
Microsoft Trade Server | CVE-2023-36756 | Microsoft Trade Server Distant Code Execution Vulnerability | Necessary |
Microsoft Trade Server | CVE-2023-36745 | Microsoft Trade Server Distant Code Execution Vulnerability | Necessary |
Microsoft Trade Server | CVE-2023-36777 | Microsoft Trade Server Data Disclosure Vulnerability | Necessary |
Microsoft Trade Server | CVE-2023-36757 | Microsoft Trade Server Spoofing Vulnerability | Necessary |
Microsoft Id Linux Dealer | CVE-2023-36736 | Microsoft Id Linux Dealer Distant Code Execution Vulnerability | Necessary |
Microsoft Workplace | CVE-2023-36767 | Microsoft Workplace Safety Function Bypass Vulnerability | Necessary |
Microsoft Workplace | CVE-2023-36765 | Microsoft Workplace Elevation of Privilege Vulnerability | Necessary |
Microsoft Workplace | CVE-2023-41764 | Microsoft Workplace Spoofing Vulnerability | Average |
Microsoft Workplace Excel | CVE-2023-36766 | Microsoft Excel Data Disclosure Vulnerability | Necessary |
Microsoft Workplace Outlook | CVE-2023-36763 | Microsoft Outlook Data Disclosure Vulnerability | Necessary |
Microsoft Workplace SharePoint | CVE-2023-36764 | Microsoft SharePoint Server Elevation of Privilege Vulnerability | Necessary |
Microsoft Workplace Phrase | CVE-2023-36761 | Microsoft Phrase Data Disclosure Vulnerability | Necessary |
Microsoft Workplace Phrase | CVE-2023-36762 | Microsoft Phrase Distant Code Execution Vulnerability | Necessary |
Microsoft Streaming Service | CVE-2023-36802 | Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability | Necessary |
Microsoft Home windows Codecs Library | CVE-2023-38147 | Home windows Miracast Wi-fi Show Distant Code Execution Vulnerability | Necessary |
Visible Studio | CVE-2023-36758 | Visible Studio Elevation of Privilege Vulnerability | Necessary |
Visible Studio | CVE-2023-36759 | Visible Studio Elevation of Privilege Vulnerability | Necessary |
Visible Studio Code | CVE-2023-36742 | Visible Studio Code Distant Code Execution Vulnerability | Necessary |
Visible Studio Code | CVE-2023-39956 | Electron: CVE-2023-39956 -Visible Studio Code Distant Code Execution Vulnerability | Necessary |
Home windows Cloud Recordsdata Mini Filter Driver | CVE-2023-35355 | Home windows Cloud Recordsdata Mini Filter Driver Elevation of Privilege Vulnerability | Necessary |
Home windows Frequent Log File System Driver | CVE-2023-38143 | Home windows Frequent Log File System Driver Elevation of Privilege Vulnerability | Necessary |
Home windows Frequent Log File System Driver | CVE-2023-38144 | Home windows Frequent Log File System Driver Elevation of Privilege Vulnerability | Necessary |
Home windows Defender | CVE-2023-38163 | Home windows Defender Attack Floor Discount Safety Function Bypass | Necessary |
Home windows DHCP Server | CVE-2023-38152 | DHCP Server Service Data Disclosure Vulnerability | Necessary |
Home windows DHCP Server | CVE-2023-38162 | DHCP Server Service Denial of Service Vulnerability | Necessary |
Home windows DHCP Server | CVE-2023-36801 | DHCP Server Service Data Disclosure Vulnerability | Necessary |
Home windows GDI | CVE-2023-36804 | Home windows GDI Elevation of Privilege Vulnerability | Necessary |
Home windows GDI | CVE-2023-38161 | Home windows GDI Elevation of Privilege Vulnerability | Necessary |
Home windows Web Connection Sharing (ICS) | CVE-2023-38148 | Web Connection Sharing (ICS) Distant Code Execution Vulnerability | Important |
Home windows Kernel | CVE-2023-38141 | Home windows Kernel Elevation of Privilege Vulnerability | Necessary |
Home windows Kernel | CVE-2023-38142 | Home windows Kernel Elevation of Privilege Vulnerability | Necessary |
Home windows Kernel | CVE-2023-38139 | Home windows Kernel Elevation of Privilege Vulnerability | Necessary |
Home windows Kernel | CVE-2023-38140 | Home windows Kernel Data Disclosure Vulnerability | Necessary |
Home windows Kernel | CVE-2023-38150 | Home windows Kernel Elevation of Privilege Vulnerability | Necessary |
Home windows Kernel | CVE-2023-36803 | Home windows Kernel Data Disclosure Vulnerability | Necessary |
Home windows Scripting | CVE-2023-36805 | Home windows MSHTML Platform Safety Function Bypass Vulnerability | Necessary |
Home windows TCP/IP | CVE-2023-38160 | Home windows TCP/IP Data Disclosure Vulnerability | Necessary |
Home windows TCP/IP | CVE-2023-38149 | Home windows TCP/IP Denial of Service Vulnerability | Necessary |
Home windows Themes | CVE-2023-38146 | Home windows Themes Distant Code Execution Vulnerability | Necessary |