Microsoft CVE Summary

This report contains detail for the following vulnerabilities:

CVE Issued by Tag CVE ID CVE Title
Microsoft.NET and Visual Studio CVE-2023-33127 .NET and Visual Studio Elevation of Privilege Vulnerability
MicrosoftASP.NET and Visual Studio CVE-2023-33170 ASP.NET and Visual Studio Security Feature Bypass Vulnerability
MicrosoftAzure Active Directory CVE-2023-36871 Azure Active Directory Security Feature Bypass Vulnerability
MicrosoftAzure Active Directory CVE-2023-35348 Active Directory Federation Service Security Feature Bypass Vulnerability
MicrosoftMicrosoft Dynamics CVE-2023-33171 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
MicrosoftMicrosoft Dynamics CVE-2023-35335 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
MicrosoftMicrosoft Graphics Component CVE-2023-33149 Microsoft Office Graphics Remote Code Execution Vulnerability
MicrosoftMicrosoft Graphics Component CVE-2023-21756 Windows Win32k Elevation of Privilege Vulnerability
MicrosoftMicrosoft Media-Wiki Extensions CVE-2023-35333 MediaWiki PandocUpload Extension Remote Code Execution Vulnerability
MicrosoftMicrosoft Office CVE-2023-33148 Microsoft Office Elevation of Privilege Vulnerability
MicrosoftMicrosoft Office CVE-2023-36884 Office and Windows HTML Remote Code Execution Vulnerability
MicrosoftMicrosoft Office CVE-2023-33150 Microsoft Office Security Feature Bypass Vulnerability
MicrosoftMicrosoft Office Access CVE-2023-33152 Microsoft ActiveX Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Excel CVE-2023-33158 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Excel CVE-2023-33161 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Excel CVE-2023-33162 Microsoft Excel Information Disclosure Vulnerability
MicrosoftMicrosoft Office Outlook CVE-2023-33151 Microsoft Outlook Spoofing Vulnerability
MicrosoftMicrosoft Office Outlook CVE-2023-33153 Microsoft Outlook Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Outlook CVE-2023-35311 Microsoft Outlook Security Feature Bypass Vulnerability
MicrosoftMicrosoft Office SharePoint CVE-2023-33134 Microsoft SharePoint Server Remote Code Execution Vulnerability
MicrosoftMicrosoft Office SharePoint CVE-2023-33160 Microsoft SharePoint Server Remote Code Execution Vulnerability
MicrosoftMicrosoft Office SharePoint CVE-2023-33165 Microsoft SharePoint Server Security Feature Bypass Vulnerability
MicrosoftMicrosoft Office SharePoint CVE-2023-33157 Microsoft SharePoint Remote Code Execution Vulnerability
MicrosoftMicrosoft Office SharePoint CVE-2023-33159 Microsoft SharePoint Server Spoofing Vulnerability
MicrosoftMicrosoft Power Apps CVE-2023-32052 Microsoft Power Apps Spoofing Vulnerability
MicrosoftMicrosoft Printer Drivers CVE-2023-32085 Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
MicrosoftMicrosoft Printer Drivers CVE-2023-35302 Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
MicrosoftMicrosoft Printer Drivers CVE-2023-35296 Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
MicrosoftMicrosoft Printer Drivers CVE-2023-35324 Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
MicrosoftMicrosoft Printer Drivers CVE-2023-32040 Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
MicrosoftMicrosoft Printer Drivers CVE-2023-35306 Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
MicrosoftMicrosoft Printer Drivers CVE-2023-32039 Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
MicrosoftMicrosoft Windows Codecs Library CVE-2023-35303 USB Audio Class System Driver Remote Code Execution Vulnerability
MicrosoftMicrosoft Windows Codecs Library CVE-2023-36872 VP9 Video Extensions Information Disclosure Vulnerability
MicrosoftMicrosoft Windows Codecs Library CVE-2023-32051 Raw Image Extension Remote Code Execution Vulnerability
MicrosoftMono Authenticode CVE-2023-35373 Mono Authenticode Validation Spoofing Vulnerability
MicrosoftPaint 3D CVE-2023-35374 Paint 3D Remote Code Execution Vulnerability
MicrosoftPaint 3D CVE-2023-32047 Paint 3D Remote Code Execution Vulnerability
MicrosoftRole: DNS Server CVE-2023-35310 Windows DNS Server Remote Code Execution Vulnerability
MicrosoftRole: DNS Server CVE-2023-35346 Windows DNS Server Remote Code Execution Vulnerability
MicrosoftRole: DNS Server CVE-2023-35345 Windows DNS Server Remote Code Execution Vulnerability
MicrosoftRole: DNS Server CVE-2023-35344 Windows DNS Server Remote Code Execution Vulnerability
MicrosoftService Fabric CVE-2023-36868 Azure Service Fabric on Windows Information Disclosure Vulnerability
MicrosoftVisual Studio Code CVE-2023-36867 Visual Studio Code GitHub Pull Requests and Issues Extension Remote Code Execution Vulnerability
MicrosoftWindows Active Directory Certificate Services CVE-2023-35351 Windows Active Directory Certificate Services (AD CS) Remote Code Execution Vulnerability
MicrosoftWindows Active Directory Certificate Services CVE-2023-35350 Windows Active Directory Certificate Services (AD CS) Remote Code Execution Vulnerability
MicrosoftWindows Active Template Library CVE-2023-32055 Active Template Library Elevation of Privilege Vulnerability
MicrosoftWindows Admin Center CVE-2023-29347 Windows Admin Center Spoofing Vulnerability
MicrosoftWindows App Store CVE-2023-35347 Microsoft Install Service Elevation of Privilege Vulnerability
MicrosoftWindows Authentication Methods CVE-2023-35329 Windows Authentication Denial of Service Vulnerability
MicrosoftWindows CDP User Components CVE-2023-35326 Windows CDP User Components Information Disclosure Vulnerability
MicrosoftWindows Certificates ADV230001 Guidance on Microsoft Signed Drivers Being Used Maliciously
MicrosoftWindows Clip Service CVE-2023-35362 Windows Clip Service Elevation of Privilege Vulnerability
MicrosoftWindows Cloud Files Mini Filter Driver CVE-2023-33155 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
MicrosoftWindows Cluster Server CVE-2023-32033 Microsoft Failover Cluster Remote Code Execution Vulnerability
MicrosoftWindows CNG Key Isolation Service CVE-2023-35340 Windows CNG Key Isolation Service Elevation of Privilege Vulnerability
MicrosoftWindows Common Log File System Driver CVE-2023-35299 Windows Common Log File System Driver Elevation of Privilege Vulnerability
MicrosoftWindows Connected User Experiences and Telemetry CVE-2023-35320 Connected User Experiences and Telemetry Elevation of Privilege Vulnerability
MicrosoftWindows Connected User Experiences and Telemetry CVE-2023-35353 Connected User Experiences and Telemetry Elevation of Privilege Vulnerability
MicrosoftWindows CryptoAPI CVE-2023-35339 Windows CryptoAPI Denial of Service Vulnerability
MicrosoftWindows Cryptographic Services CVE-2023-33174 Windows Cryptographic Information Disclosure Vulnerability
MicrosoftWindows Defender CVE-2023-33156 Microsoft Defender Elevation of Privilege Vulnerability
MicrosoftWindows Deployment Services CVE-2023-35322 Windows Deployment Services Remote Code Execution Vulnerability
MicrosoftWindows Deployment Services CVE-2023-35321 Windows Deployment Services Denial of Service Vulnerability
MicrosoftWindows EFI Partition ADV230002 Microsoft Guidance for Addressing Security Feature Bypass in Trend Micro EFI Modules
MicrosoftWindows Error Reporting CVE-2023-36874 Windows Error Reporting Service Elevation of Privilege Vulnerability
MicrosoftWindows Failover Cluster CVE-2023-32083 Microsoft Failover Cluster Information Disclosure Vulnerability
MicrosoftWindows Geolocation Service CVE-2023-35343 Windows Geolocation Service Remote Code Execution Vulnerability
MicrosoftWindows HTTP.sys CVE-2023-32084 HTTP.sys Denial of Service Vulnerability
MicrosoftWindows HTTP.sys CVE-2023-35298 HTTP.sys Denial of Service Vulnerability
MicrosoftWindows Image Acquisition CVE-2023-35342 Windows Image Acquisition Elevation of Privilege Vulnerability
MicrosoftWindows Installer CVE-2023-32053 Windows Installer Elevation of Privilege Vulnerability
MicrosoftWindows Installer CVE-2023-32050 Windows Installer Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2023-35304 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2023-35363 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2023-35305 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2023-35356 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2023-35357 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2023-35358 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Layer 2 Tunneling Protocol CVE-2023-32037 Windows Layer-2 Bridge Network Driver Information Disclosure Vulnerability
MicrosoftWindows Layer-2 Bridge Network Driver CVE-2023-35315 Windows Layer-2 Bridge Network Driver Remote Code Execution Vulnerability
MicrosoftWindows Local Security Authority (LSA) CVE-2023-35331 Windows Local Security Authority (LSA) Denial of Service Vulnerability
MicrosoftWindows Media CVE-2023-35341 Microsoft DirectMusic Information Disclosure Vulnerability
MicrosoftWindows Message Queuing CVE-2023-32057 Microsoft Message Queuing Remote Code Execution Vulnerability
MicrosoftWindows Message Queuing CVE-2023-35309 Microsoft Message Queuing Remote Code Execution Vulnerability
MicrosoftWindows Message Queuing CVE-2023-32045 Microsoft Message Queuing Denial of Service Vulnerability
MicrosoftWindows Message Queuing CVE-2023-32044 Microsoft Message Queuing Denial of Service Vulnerability
MicrosoftWindows MSHTML Platform CVE-2023-32046 Windows MSHTML Platform Elevation of Privilege Vulnerability
MicrosoftWindows MSHTML Platform CVE-2023-35336 Windows MSHTML Platform Security Feature Bypass Vulnerability
MicrosoftWindows MSHTML Platform CVE-2023-35308 Windows MSHTML Platform Security Feature Bypass Vulnerability
MicrosoftWindows Netlogon CVE-2023-21526 Windows Netlogon Information Disclosure Vulnerability
MicrosoftWindows Network Load Balancing CVE-2023-33163 Windows Network Load Balancing Remote Code Execution Vulnerability
MicrosoftWindows NT OS Kernel CVE-2023-35361 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows NT OS Kernel CVE-2023-35364 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows NT OS Kernel CVE-2023-35360 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows ODBC Driver CVE-2023-32038 Microsoft ODBC Driver Remote Code Execution Vulnerability
MicrosoftWindows OLE CVE-2023-32042 OLE Automation Information Disclosure Vulnerability
MicrosoftWindows Online Certificate Status Protocol (OCSP) SnapIn CVE-2023-35323 Windows OLE Remote Code Execution Vulnerability
MicrosoftWindows Online Certificate Status Protocol (OCSP) SnapIn CVE-2023-35313 Windows Online Certificate Status Protocol (OCSP) SnapIn Remote Code Execution Vulnerability
MicrosoftWindows Partition Management Driver CVE-2023-33154 Windows Partition Management Driver Elevation of Privilege Vulnerability
MicrosoftWindows Peer Name Resolution Protocol CVE-2023-35338 Windows Peer Name Resolution Protocol Denial of Service Vulnerability
MicrosoftWindows PGM CVE-2023-35297 Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
MicrosoftWindows Print Spooler Components CVE-2023-35325 Windows Print Spooler Information Disclosure Vulnerability
MicrosoftWindows Remote Desktop CVE-2023-35352 Windows Remote Desktop Security Feature Bypass Vulnerability
MicrosoftWindows Remote Desktop CVE-2023-32043 Windows Remote Desktop Security Feature Bypass Vulnerability
MicrosoftWindows Remote Desktop CVE-2023-35332 Windows Remote Desktop Protocol Security Feature Bypass
MicrosoftWindows Remote Procedure Call CVE-2023-35300 Remote Procedure Call Runtime Remote Code Execution Vulnerability
MicrosoftWindows Remote Procedure Call CVE-2023-33168 Remote Procedure Call Runtime Denial of Service Vulnerability
MicrosoftWindows Remote Procedure Call CVE-2023-33173 Remote Procedure Call Runtime Denial of Service Vulnerability
MicrosoftWindows Remote Procedure Call CVE-2023-33172 Remote Procedure Call Runtime Denial of Service Vulnerability
MicrosoftWindows Remote Procedure Call CVE-2023-32035 Remote Procedure Call Runtime Denial of Service Vulnerability
MicrosoftWindows Remote Procedure Call CVE-2023-33166 Remote Procedure Call Runtime Denial of Service Vulnerability
MicrosoftWindows Remote Procedure Call CVE-2023-32034 Remote Procedure Call Runtime Denial of Service Vulnerability
MicrosoftWindows Remote Procedure Call CVE-2023-33167 Remote Procedure Call Runtime Denial of Service Vulnerability
MicrosoftWindows Remote Procedure Call CVE-2023-33169 Remote Procedure Call Runtime Denial of Service Vulnerability
MicrosoftWindows Remote Procedure Call CVE-2023-35318 Remote Procedure Call Runtime Denial of Service Vulnerability
MicrosoftWindows Remote Procedure Call CVE-2023-33164 Remote Procedure Call Runtime Denial of Service Vulnerability
MicrosoftWindows Remote Procedure Call CVE-2023-35319 Remote Procedure Call Runtime Denial of Service Vulnerability
MicrosoftWindows Remote Procedure Call CVE-2023-35316 Remote Procedure Call Runtime Information Disclosure Vulnerability
MicrosoftWindows Remote Procedure Call CVE-2023-35314 Remote Procedure Call Runtime Denial of Service Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2023-35367 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2023-35366 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2023-35365 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Server Update Service CVE-2023-35317 Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability
MicrosoftWindows Server Update Service CVE-2023-32056 Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability
MicrosoftWindows SmartScreen CVE-2023-32049 Windows SmartScreen Security Feature Bypass Vulnerability
MicrosoftWindows SPNEGO Extended Negotiation CVE-2023-35330 Windows Extended Negotiation Denial of Service Vulnerability
MicrosoftWindows Transaction Manager CVE-2023-35328 Windows Transaction Manager Elevation of Privilege Vulnerability
MicrosoftWindows Update Orchestrator Service CVE-2023-32041 Windows Update Orchestrator Service Information Disclosure Vulnerability
MicrosoftWindows VOLSNAP.SYS CVE-2023-35312 Microsoft VOLSNAP.SYS Elevation of Privilege Vulnerability
MicrosoftWindows Volume Shadow Copy CVE-2023-32054 Volume Shadow Copy Elevation of Privilege Vulnerability
MicrosoftWindows Win32K CVE-2023-35337 Win32k Elevation of Privilege Vulnerability

CVE-2023-21756 - Windows Win32k Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-21756
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Win32k Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-21756
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Elevation of Privilege 5027230 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Elevation of Privilege 5027230 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Elevation of Privilege 5027283
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Elevation of Privilege 5027283
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Elevation of Privilege 5027271
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Elevation of Privilege 5027271
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-21756 Microsoft Input and Composition Servicing team


CVE-2023-33148 - Microsoft Office Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-33148
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could execute RPC functions that are restricted to local clients only.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-33148
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2013 Click-to-Run (C2R) for 32-bit editions Click to Run (Security Update) Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.5571.1000 Maybe None
Microsoft Office 2013 Click-to-Run (C2R) for 64-bit editions Click to Run (Security Update) Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.5571.1000 Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-33148 Ruslan Sayfiev and Denis Faiustov


CVE-2023-33149 - Microsoft Office Graphics Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-33149
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Graphics Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

Is the Preview Pane an attack vector for this vulnerability?

Yes, the Preview Pane is an attack vector.


There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software?

Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-33149
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2013 RT Service Pack 1 5002400 (Security Update)
5001952 (Security Update)
Important Remote Code Execution 5002279
4464542
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.5571.1000 Maybe None
Microsoft Office 2013 Service Pack 1 (32-bit editions) 5002400 (Security Update)
5001952 (Security Update)
Important Remote Code Execution 5002279
4464542
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.5571.1000 Maybe None
Microsoft Office 2013 Service Pack 1 (64-bit editions) 5002400 (Security Update)
5001952 (Security Update)
Important Remote Code Execution 5002279
4464542
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.5571.1000 Maybe None
Microsoft Office 2016 (32-bit edition) 5002419 (Security Update)
4493154 (Security Update)
Important Remote Code Execution 5002288
4011628
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5404.1000 Maybe None
Microsoft Office 2016 (64-bit edition) 5002419 (Security Update)
4493154 (Security Update)
Important Remote Code Execution 5002288
4011628
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5404.1000 Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for Mac Release Notes (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.75.23070901 Maybe None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.75.23070901 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-33149 willJ of vulnerability research institute


CVE-2023-33150 - Microsoft Office Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-33150
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.6/TemporalScore:8.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

Exploitation of the vulnerability requires the victim to open a specially crafted file and click through Office Security Prompt(s). An attacker would have no way to force users to open the file.,

  • In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.
  • In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability.

Is the Attachment Preview Pane an attack vector for this vulnerability?

Yes. The attachment Preview Pane that is accessed when a user clicks to preview an attached file is an attack vector; however, the email Preview Pane itself is not.


What kind of security feature could be bypassed by successfully exploiting this vulnerability?

Successful exploitation of this vulnerability would allow an attacker to escape the Office Protected View.


Is Application Guard for Office affected by this vulnerability?

No. Customers using Application Guard for Office are not affected.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-33150
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Security Feature Bypass None Base: 9.6
Temporal: 8.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Security Feature Bypass None Base: 9.6
Temporal: 8.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Security Feature Bypass None Base: 9.6
Temporal: 8.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Security Feature Bypass None Base: 9.6
Temporal: 8.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Security Feature Bypass None Base: 9.6
Temporal: 8.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Security Feature Bypass None Base: 9.6
Temporal: 8.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Word 2013 RT Service Pack 1 5002411 (Security Update) Important Security Feature Bypass 5002365 Base: 9.6
Temporal: 8.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.5571.1000 Maybe None
Microsoft Word 2013 Service Pack 1 (32-bit editions) 5002411 (Security Update) Important Security Feature Bypass 5002365 Base: 9.6
Temporal: 8.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.5571.1000 Maybe None
Microsoft Word 2013 Service Pack 1 (64-bit editions) 5002411 (Security Update) Important Security Feature Bypass 5002365 Base: 9.6
Temporal: 8.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.5571.1000 Maybe None
Microsoft Word 2016 (32-bit edition) 5002406 (Security Update) Important Security Feature Bypass 5002369 Base: 9.6
Temporal: 8.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5404.1000 Maybe None
Microsoft Word 2016 (64-bit edition) 5002406 (Security Update) Important Security Feature Bypass 5002369 Base: 9.6
Temporal: 8.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5404.1000 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-33150 Ben Lichtman


CVE-2023-33151 - Microsoft Outlook Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-33151
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Outlook Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click on a specially crafted URL to be compromised by the attacker.


Is the Preview Pane an attack vector for this vulnerability?

Yes. The Preview Pane is an attack vector, but additional user interaction is required.


What type of information could be disclosed by this vulnerability?

Exploiting this vulnerability could allow the disclosure of NetNTLMv2 hashes.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-33151
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Spoofing None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Spoofing None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Spoofing None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Spoofing None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Spoofing None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Spoofing None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Outlook 2013 (32-bit editions) 5002432 (Security Update) Important Spoofing 5002382 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
15.0.5571.1000 Maybe None
Microsoft Outlook 2013 (64-bit editions) 5002432 (Security Update) Important Spoofing 5002382 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
15.0.5571.1000 Maybe None
Microsoft Outlook 2013 RT Service Pack 1 5002432 (Security Update) Important Spoofing 5002382 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
15.0.5571.1000 Maybe None
Microsoft Outlook 2016 (32-bit edition) 5002427 (Security Update) Important Spoofing 5002387 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
16.0.5404.1000 Maybe None
Microsoft Outlook 2016 (64-bit edition) 5002427 (Security Update) Important Spoofing 5002387 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
16.0.5404.1000 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-33151 Jordan Hopkins - Rootshell Security


CVE-2023-33152 - Microsoft ActiveX Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-33152
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft ActiveX Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

Exploitation of the vulnerability requires that a user open a specially crafted file.

  • In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.
  • In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability.

An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires the victim to open a document and click through multiple warning popups for the attack to be initiated.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-33152
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2013 RT Service Pack 1 5002069 (Security Update) Important Remote Code Execution 4018332 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.5571.1000 Maybe None
Microsoft Office 2013 Service Pack 1 (32-bit editions) 5002069 (Security Update) Important Remote Code Execution 4018332 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.5571.1000 Maybe None
Microsoft Office 2013 Service Pack 1 (64-bit editions) 5002069 (Security Update) Important Remote Code Execution 4018332 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.5571.1000 Maybe None
Microsoft Office 2016 (32-bit edition) 5002058 (Security Update) Important Remote Code Execution 4461476 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5404.1000 Maybe None
Microsoft Office 2016 (64-bit edition) 5002058 (Security Update) Important Remote Code Execution 4461476 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5404.1000 Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-33152 Greg Linares (@Laughing_Mantis)


CVE-2023-33153 - Microsoft Outlook Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-33153
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Outlook Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

Exploitation of the vulnerability requires that a user open a specially crafted file.

  • In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.
  • In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability.

An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-33153
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2013 RT Service Pack 1 4464506 (Security Update) Important Remote Code Execution None Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
15.0.5571.1000 Maybe None
Microsoft Office 2013 Service Pack 1 (32-bit editions) 4464506 (Security Update) Important Remote Code Execution None Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
15.0.5571.1000 Maybe None
Microsoft Office 2013 Service Pack 1 (64-bit editions) 4464506 (Security Update) Important Remote Code Execution None Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
15.0.5571.1000 Maybe None
Microsoft Office 2016 (32-bit edition) 4475581 (Security Update) Important Remote Code Execution None Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
16.0.5404.1000 Maybe None
Microsoft Office 2016 (64-bit edition) 4475581 (Security Update) Important Remote Code Execution None Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
16.0.5404.1000 Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-33153 Greg Linares (@Laughing_Mantis)


CVE-2023-33165 - Microsoft SharePoint Server Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-33165
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft SharePoint Server Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:4.3/TemporalScore:3.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability?

The attacker who successfully exploits the vulnerability could download files without the access being logged.


What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker could bypass the logging of downloaded files.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-33165
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft SharePoint Server 2019 5002423 (Security Update) Important Security Feature Bypass 5002402 Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
16.0.10400.20008 Maybe None
Microsoft SharePoint Server Subscription Edition 5002424 (Security Update) Important Security Feature Bypass 5002416 Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
16.0.16130.20642 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-33165 Anonymous


Anonymous


CVE-2023-33166 - Remote Procedure Call Runtime Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-33166
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Remote Procedure Call Runtime Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-33166
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Denial of Service 5027275
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Denial of Service 5027275
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Denial of Service 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Denial of Service 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-33166 Microsoft Offensive Research & Security Engineering. with Microsoft


CVE-2023-33167 - Remote Procedure Call Runtime Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-33167
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Remote Procedure Call Runtime Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-33167
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Denial of Service 5027275
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Denial of Service 5027275
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Denial of Service 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Denial of Service 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-33167 Microsoft Offensive Research & Security Engineering with Microsoft


CVE-2023-33168 - Remote Procedure Call Runtime Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-33168
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Remote Procedure Call Runtime Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-33168
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Denial of Service 5027275
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Denial of Service 5027275
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Denial of Service 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Denial of Service 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-33168 Microsoft Offensive Research & Security Engineering with Microsoft


CVE-2023-33169 - Remote Procedure Call Runtime Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-33169
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Remote Procedure Call Runtime Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-33169
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Denial of Service 5027275
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Denial of Service 5027275
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Denial of Service 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Denial of Service 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-33169 Microsoft Offensive Research & Security Engineering with Microsoft


CVE-2023-33172 - Remote Procedure Call Runtime Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-33172
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Remote Procedure Call Runtime Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-33172
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Denial of Service 5027275
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Denial of Service 5027275
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Denial of Service 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Denial of Service 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-33172 Microsoft Offensive Research & Security Engineering with Microsoft


CVE-2023-33173 - Remote Procedure Call Runtime Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-33173
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Remote Procedure Call Runtime Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-33173
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Denial of Service 5027275
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Denial of Service 5027275
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Denial of Service 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Denial of Service 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-33173 Microsoft Offensive Research & Security Engineering with Microsoft


CVE-2023-33174 - Windows Cryptographic Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-33174
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Cryptographic Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-33174
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Information Disclosure 5027230 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Information Disclosure 5027230 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Information Disclosure 5027219 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Information Disclosure 5027219 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Information Disclosure 5027223
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Information Disclosure 5027223
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Information Disclosure 5027231
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Information Disclosure 5027231
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Information Disclosure 5027279
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Information Disclosure 5027279
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Information Disclosure 5027279
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Information Disclosure 5027279
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Information Disclosure 5027275
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Information Disclosure 5027275
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Information Disclosure 5027283
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Information Disclosure 5027283
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Information Disclosure 5027271
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Information Disclosure 5027271
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Information Disclosure 5027219 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Information Disclosure 5027219 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Information Disclosure 5027225
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Information Disclosure 5027225
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-33174 ziming zhang with Ant Security Light-Year Lab


CVE-2023-32033 - Microsoft Failover Cluster Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-32033
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Failover Cluster Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.6/TemporalScore:5.8
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires the attacker or targeted user to have specific elevated privileges. Only users with roles “Cluster Admin” and “Cluster Operator” can access this.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-32033
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Remote Code Execution 5027275
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Remote Code Execution 5027275
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Remote Code Execution 5027283
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Remote Code Execution 5027283
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Remote Code Execution 5027271
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Remote Code Execution 5027271
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Remote Code Execution 5027225
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Remote Code Execution 5027225
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-32033 k0shl with Kunlun Lab


CVE-2023-32034 - Remote Procedure Call Runtime Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-32034
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Remote Procedure Call Runtime Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-32034
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Denial of Service 5027275
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Denial of Service 5027275
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Denial of Service 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Denial of Service 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-32034 Microsoft Offensive Research & Security Engineering with Microsoft


CVE-2023-32035 - Remote Procedure Call Runtime Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-32035
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Remote Procedure Call Runtime Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-32035
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Denial of Service 5027275
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Denial of Service 5027275
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Denial of Service 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Denial of Service 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-32035 Microsoft Offensive Research & Security Engineering with Microsoft


CVE-2023-32037 - Windows Layer-2 Bridge Network Driver Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-32037
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Layer-2 Bridge Network Driver Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorAdjacent
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.


According to the CVSS score, the attack vector is adjacent (AV:A). What does this mean for this vulnerability?

This attack is limited to systems connected to the same network segment as the attacker. The attack cannot be performed across multiple networks (for example, a WAN) and would be limited to systems on the same network switch or virtual network.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-32037
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Information Disclosure 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Information Disclosure 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Information Disclosure 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Information Disclosure 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2019 5028168 (Security Update) Important Information Disclosure 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Information Disclosure 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Information Disclosure 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Information Disclosure 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-32037 greenbamboo


CVE-2023-32038 - Microsoft ODBC Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-32038
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft ODBC Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.


Mitigations:

The following mitigating factors might be helpful in your situation:

Exploitation of this vulnerability requires an attacker to trick or convince the victim into connecting to their malicious server. If your environment only connects to known, trusted servers and there is no ability to reconfigure existing connections to point to another location (e.g., you use TLS encryption with certificate validation), the vulnerability cannot be exploited.


Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-32038
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Remote Code Execution 5027230 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Remote Code Execution 5027230 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Remote Code Execution 5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Remote Code Execution 5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Remote Code Execution 5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Remote Code Execution
5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Remote Code Execution
5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Remote Code Execution
5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Remote Code Execution 5027223
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Remote Code Execution 5027223
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Remote Code Execution 5027231
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Remote Code Execution 5027231
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Remote Code Execution 5027275
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Remote Code Execution 5027275
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Remote Code Execution 5027283
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Remote Code Execution 5027283
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Remote Code Execution 5027271
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Remote Code Execution 5027271
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Remote Code Execution 5027225
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Remote Code Execution 5027225
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-32038 guoxi with Venustech ADLab


CVE-2023-32039 - Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-32039
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could view heap memory from a privileged process running on the server.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-32039
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Information Disclosure 5027230 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Information Disclosure 5027230 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Information Disclosure 5027219 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Information Disclosure 5027219 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Information Disclosure 5027223
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Information Disclosure 5027223
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Information Disclosure 5027231
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Information Disclosure 5027231
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Information Disclosure 5027283
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Information Disclosure 5027283
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Information Disclosure 5027271
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Information Disclosure 5027271
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Information Disclosure 5027219 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Information Disclosure 5027219 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Information Disclosure 5027225
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Information Disclosure 5027225
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-32039 kap0k


CVE-2023-32040 - Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-32040
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could view heap memory from a privileged process running on the server.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-32040
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Information Disclosure 5027230 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Information Disclosure 5027230 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Information Disclosure 5027219 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Information Disclosure 5027219 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Information Disclosure 5027223
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Information Disclosure 5027223
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Information Disclosure 5027231
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Information Disclosure 5027231
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Information Disclosure 5027283
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Information Disclosure 5027283
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Information Disclosure 5027271
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Information Disclosure 5027271
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Information Disclosure 5027219 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Information Disclosure 5027219 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Information Disclosure 5027225
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Information Disclosure 5027225
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-32040 kap0k


CVE-2023-32041 - Windows Update Orchestrator Service Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-32041
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Update Orchestrator Service Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-32041
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Information Disclosure 5027219 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Information Disclosure 5027219 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Information Disclosure 5027223
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Information Disclosure 5027223
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Information Disclosure 5027231
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Information Disclosure 5027231
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2016 5028169 (Security Update) Important Information Disclosure 5027219 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Information Disclosure 5027219 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Information Disclosure 5027225
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Information Disclosure 5027225
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-32041 R4nger and Kap0k


CVE-2023-32042 - OLE Automation Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-32042
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: OLE Automation Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-32042
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Information Disclosure 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Information Disclosure 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Information Disclosure 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Information Disclosure 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Information Disclosure 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Information Disclosure 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Information Disclosure 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Information Disclosure 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Information Disclosure 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Information Disclosure 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Information Disclosure 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Information Disclosure 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Information Disclosure 5027275
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Information Disclosure 5027275
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Information Disclosure 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Information Disclosure 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Information Disclosure 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Information Disclosure 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Information Disclosure 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Information Disclosure 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Information Disclosure 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Information Disclosure 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Information Disclosure 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Information Disclosure 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-32042 R4nger


CVE-2023-32043 - Windows Remote Desktop Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-32043
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Remote Desktop Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What security feature is being bypassed?

An attacker with a machine-in-the-middle (MitM) position who successfully exploited this vulnerability could bypass the certificate validation performed when a targeted user connects to a trusted server.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-32043
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Security Feature Bypass 5027230 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Security Feature Bypass 5027230 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Security Feature Bypass 5027219 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Security Feature Bypass 5027219 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Security Feature Bypass 5027215
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Security Feature Bypass 5027215
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Security Feature Bypass 5027215
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Security Feature Bypass
5027215
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Security Feature Bypass
5027215
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Security Feature Bypass
5027215
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Security Feature Bypass 5027223
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Security Feature Bypass 5027223
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Security Feature Bypass 5027231
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Security Feature Bypass 5027231
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Security Feature Bypass 5027279
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Security Feature Bypass 5027279
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Security Feature Bypass 5027279
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Security Feature Bypass 5027279
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Security Feature Bypass 5027275
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Security Feature Bypass 5027275
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Security Feature Bypass 5027283
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Security Feature Bypass 5027283
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Security Feature Bypass 5027271
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Security Feature Bypass 5027271
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Security Feature Bypass 5027219 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Security Feature Bypass 5027219 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Security Feature Bypass 5027225
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Security Feature Bypass 5027225
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-32043 Lee Riefberg


CVE-2023-32044 - Microsoft Message Queuing Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-32044
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Message Queuing Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-32044
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Denial of Service 5027275
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Denial of Service 5027275
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Denial of Service 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Denial of Service 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Denial of Service 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Denial of Service 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Denial of Service 5027225
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Denial of Service 5027225
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-32044 Yuki Chen with Cyber KunLun


Jarvis_1oop of vulnerability research institute


CVE-2023-32045 - Microsoft Message Queuing Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-32045
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Message Queuing Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-32045
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Denial of Service 5027275
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Denial of Service 5027275
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Denial of Service 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Denial of Service 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Denial of Service 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Denial of Service 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Denial of Service 5027225
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Denial of Service 5027225
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-32045 Jarvis_1oop of vulnerability research institute


CVE-2023-32046 - Windows MSHTML Platform Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-32046
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows MSHTML Platform Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

Exploitation of the vulnerability requires that a user open a specially crafted file.

  • In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.
  • In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability.

An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

The attacker would gain the rights of the user that is running the affected application.


The Security Updates table indicates that this vulnerability affects all supported versions of Microsoft Windows. Why are IE Cumulative updates listed for Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2?

While Microsoft has announced retirement of the Internet Explorer 11 application on certain platforms and the Microsoft Edge Legacy application is deprecated, the underlying MSHTML, EdgeHTML, and scripting platforms are still supported. The MSHTML platform is used by Internet Explorer mode in Microsoft Edge as well as other applications through WebBrowser control. The EdgeHTML platform is used by WebView and some UWP applications. The scripting platforms are used by MSHTML and EdgeHTML but can also be used by other legacy applications. Updates to address vulnerabilities in the MSHTML platform and scripting engine are included in the IE Cumulative Updates; EdgeHTML and Chakra changes are not applicable to those platforms.

To stay fully protected, we recommend that customers who install Security Only updates install the IE Cumulative updates for this vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Detected No Yes

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-32046
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Elevation of Privilege 5027230 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Elevation of Privilege 5027230 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
5028167 (IE Cumulative)
Important Elevation of Privilege 5027279

5026366
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175

1.001
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
5028167 (IE Cumulative)
Important Elevation of Privilege 5027279

5026366
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175

1.001
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
5028167 (IE Cumulative)
Important Elevation of Privilege 5027279

5026366
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175

1.001
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
5028167 (IE Cumulative)
Important Elevation of Privilege 5027279

5026366
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175

1.001
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028167 (IE Cumulative)
5028240 (Monthly Rollup)
5028224 (Security Only)
Important Elevation of Privilege 5026366
5027275
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.001
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028167 (IE Cumulative)
5028240 (Monthly Rollup)
5028224 (Security Only)
Important Elevation of Privilege 5026366
5027275
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.001
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028167 (IE Cumulative)
5028232 (Monthly Rollup)
5028233 (Security Only)
Important Elevation of Privilege 5026366
5027283
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.001
6.2.9200.24374
Yes None
Windows Server 2012 (Server Core installation) 5028167 (IE Cumulative)
5028232 (Monthly Rollup)
5028233 (Security Only)
Important Elevation of Privilege 5026366
5027283
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.001
6.2.9200.24374
Yes None
Windows Server 2012 R2 5028167 (IE Cumulative)
5028228 (Monthly Rollup)
5028223 (Security Only)
Important Elevation of Privilege 5026366
5027271
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.001
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028167 (IE Cumulative)
5028228 (Monthly Rollup)
5028223 (Security Only)
Important Elevation of Privilege 5026366
5027271
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.001
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-32046 MSTIC


MSTIC


CVE-2023-32047 - Paint 3D Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-32047
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Paint 3D Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


How do I get the updated app?

The Microsoft Store will automatically update affected customers. Alternatively, customers can get the update immediately; see here for details.

It is possible for customers to disable automatic updates for the Microsoft Store. The Microsoft Store will not automatically install this update for those customers.

My system is in a disconnected environment; is it vulnerable?

Customers using the Microsoft Store for Business and Microsoft Store for Education can get this update through their organizations.

How can I check if the update is installed?

App package versions 6.2305.16087.0 and later contain this update.

You can check the package version in PowerShell:

Get-AppxPackage -Name Microsoft.MSPaint


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-32047
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Paint 3D Release Notes (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2305.16087.0 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-32047 Keqi Hu


ADV230002 - Microsoft Guidance for Addressing Security Feature Bypass in Trend Micro EFI Modules

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
ADV230002
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Guidance for Addressing Security Feature Bypass in Trend Micro EFI Modules
CVSS:
None
Executive Summary:

Trend Micro has released CVE-2023-28005 to address a secure boot bypass. Subsequently Microsoft has released the July Windows security updates to block the vulnerable UEFI modules by using the DBX (UEFI Secure Boot Forbidden Signature Database) disallow list.

To exploit this vulnerability, an attacker would need to have administrative privileges or physical access on a system where Secure Boot is configured to trust the Microsoft Unified Extensible Firmware Interface (UEFI) Certificate Authority (CA).

CVEs released for this issue: CVE-2023-28005.

Recommended Actions:

Microsoft recommends that all customers install the latest Windows security updates.

Background Information

In 2012, Microsoft introduced the Secure Boot feature into the then-new, UEFI-based PC ecosystem.  UEFI Secure Boot is an anti-rootkit feature that defends the boot process from untrusted code execution.  As part of enabling this feature, Microsoft signs boot code both for Windows and 3rd-parties including Linux distributions. This boot code allows Linux systems to take advantage of Secure Boot.

What is UEFI?

UEFI (Unified Extensible Firmware Interface) defines the interactions between the operating system and the platform firmware. The Secure Boot feature of UEFI prevents the loading of operating system loaders and firmware drivers that are not signed by a trusted signature.

What is DBX?

DBX is the Forbidden Signature Database and tracks the revoked boot images.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

ADV230002
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Security Feature Bypass 5027230 Base: N/A
Temporal: N/A
Vector: N/A
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Security Feature Bypass 5027230 Base: N/A
Temporal: N/A
Vector: N/A
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Security Feature Bypass 5027219 Base: N/A
Temporal: N/A
Vector: N/A
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Security Feature Bypass 5027219 Base: N/A
Temporal: N/A
Vector: N/A
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: N/A
Temporal: N/A
Vector: N/A
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: N/A
Temporal: N/A
Vector: N/A
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: N/A
Temporal: N/A
Vector: N/A
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Security Feature Bypass 5027215
Base: N/A
Temporal: N/A
Vector: N/A
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Security Feature Bypass 5027215
Base: N/A
Temporal: N/A
Vector: N/A
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Security Feature Bypass 5027215
Base: N/A
Temporal: N/A
Vector: N/A
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Security Feature Bypass
5027215
Base: N/A
Temporal: N/A
Vector: N/A

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Security Feature Bypass
5027215
Base: N/A
Temporal: N/A
Vector: N/A

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Security Feature Bypass
5027215
Base: N/A
Temporal: N/A
Vector: N/A

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Security Feature Bypass 5027223
Base: N/A
Temporal: N/A
Vector: N/A
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Security Feature Bypass 5027223
Base: N/A
Temporal: N/A
Vector: N/A
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Security Feature Bypass 5027231
Base: N/A
Temporal: N/A
Vector: N/A
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Security Feature Bypass 5027231
Base: N/A
Temporal: N/A
Vector: N/A
10.0.22621.1992
Yes 5028185
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Security Feature Bypass 5027283
Base: N/A
Temporal: N/A
Vector: N/A
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Security Feature Bypass 5027283
Base: N/A
Temporal: N/A
Vector: N/A
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Security Feature Bypass 5027271
Base: N/A
Temporal: N/A
Vector: N/A
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Security Feature Bypass 5027271
Base: N/A
Temporal: N/A
Vector: N/A
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Security Feature Bypass 5027219 Base: N/A
Temporal: N/A
Vector: N/A
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Security Feature Bypass 5027219 Base: N/A
Temporal: N/A
Vector: N/A
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: N/A
Temporal: N/A
Vector: N/A
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: N/A
Temporal: N/A
Vector: N/A
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Security Feature Bypass 5027225
Base: N/A
Temporal: N/A
Vector: N/A
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Security Feature Bypass 5027225
Base: N/A
Temporal: N/A
Vector: N/A
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
ADV230002 Zammis Clark


CVE-2023-32049 - Windows SmartScreen Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-32049
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows SmartScreen Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:8.2
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityFunctional
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click on a specially crafted URL to be compromised by the attacker.


What kind of security feature could be bypassed by successfully exploiting this vulnerability?

The attacker would be able to bypass the Open File - Security Warning prompt.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Detected No Yes

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-32049
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Security Feature Bypass 5027219 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Security Feature Bypass 5027219 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Security Feature Bypass 5027215
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Security Feature Bypass 5027215
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Security Feature Bypass 5027215
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Security Feature Bypass
5027215
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Security Feature Bypass
5027215
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Security Feature Bypass
5027215
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Security Feature Bypass 5027223
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Security Feature Bypass 5027223
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Security Feature Bypass 5027231
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Security Feature Bypass 5027231
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2016 5028169 (Security Update) Important Security Feature Bypass 5027219 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Security Feature Bypass 5027219 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Security Feature Bypass 5027225
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Security Feature Bypass 5027225
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-32049 Microsoft Threat Intelligence and Microsoft Office Product Group security team


CVE-2023-32050 - Windows Installer Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-32050
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Installer Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-32050
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Elevation of Privilege 5027279
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Elevation of Privilege 5027279
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Elevation of Privilege 5027279
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Elevation of Privilege 5027279
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Elevation of Privilege 5027275
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Elevation of Privilege 5027275
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224

Acknowledgements

CVE ID Acknowledgements
CVE-2023-32050 JeongOh Kyea of THEORI Trend Micro Zero Day Initiative


CVE-2023-32051 - Raw Image Extension Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-32051
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Raw Image Extension Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-32051
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Raw Image Extension on Windows 10 Version 21H2 for 32-bit Systems Update Information (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2.0.61662.0 Maybe None
Raw Image Extension on Windows 10 Version 21H2 for ARM64-based Systems Update Information (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2.0.61662.0 Maybe None
Raw Image Extension on Windows 10 Version 21H2 for x64-based Systems Update Information (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2.0.61662.0 Maybe None
Raw Image Extension on Windows 10 Version 22H2 for 32-bit Systems Update Information (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2.0.61662.0 Maybe None
Raw Image Extension on Windows 10 Version 22H2 for ARM64-based Systems Update Information (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2.0.61662.0 Maybe None
Raw Image Extension on Windows 10 Version 22H2 for x64-based Systems Update Information (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2.0.61662.0 Maybe None
Raw Image Extension on Windows 11 version 21H2 for ARM64-based Systems Update Information (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2.0.61662.0 Maybe None
Raw Image Extension on Windows 11 version 21H2 for x64-based Systems Update Information (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2.0.61662.0 Maybe None
Raw Image Extension on Windows 11 Version 22H2 for ARM64-based Systems Update Information (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2.1.61661.0 Maybe None
Raw Image Extension on Windows 11 Version 22H2 for x64-based Systems Update Information (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2.1.61661.0 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-32051 Anonymous


CVE-2023-35313 - Windows Online Certificate Status Protocol (OCSP) SnapIn Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35313
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Online Certificate Status Protocol (OCSP) SnapIn Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35313
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Remote Code Execution 5027230 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Remote Code Execution 5027230 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Remote Code Execution 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Remote Code Execution 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Remote Code Execution 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Remote Code Execution
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Remote Code Execution
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Remote Code Execution
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Remote Code Execution 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Remote Code Execution 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Remote Code Execution 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Remote Code Execution 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2016 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Remote Code Execution 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Remote Code Execution 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35313 kap0k


CVE-2023-35314 - Remote Procedure Call Runtime Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35314
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Remote Procedure Call Runtime Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35314
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Denial of Service 5027275
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Denial of Service 5027275
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Denial of Service 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Denial of Service 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35314 Microsoft Offensive Research & Security Engineering with Microsoft


CVE-2023-35315 - Windows Layer-2 Bridge Network Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35315
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Layer-2 Bridge Network Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorAdjacent
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An unauthenticated attacker could exploit the vulnerability by sending a specially crafted request to a Windows Server configured as a Layer-2 Bridge.


According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires that an attacker will need to first gain access to the restricted network before running an attack.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35315
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Critical Remote Code Execution 5027222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Critical Remote Code Execution 5027222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Critical Remote Code Execution 5027222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Critical Remote Code Execution 5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Critical Remote Code Execution 5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Critical Remote Code Execution 5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Critical Remote Code Execution
5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Critical Remote Code Execution
5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Critical Remote Code Execution
5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Critical Remote Code Execution 5027223
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Critical Remote Code Execution 5027223
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Critical Remote Code Execution 5027231
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Critical Remote Code Execution 5027231
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2019 5028168 (Security Update) Critical Remote Code Execution 5027222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Critical Remote Code Execution 5027222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Critical Remote Code Execution 5027225
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Critical Remote Code Execution 5027225
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35315 greenbamboo


CVE-2023-35316 - Remote Procedure Call Runtime Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35316
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Remote Procedure Call Runtime Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35316
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Information Disclosure 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Information Disclosure 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Information Disclosure 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Information Disclosure 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Information Disclosure 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Information Disclosure 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Information Disclosure 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Information Disclosure 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Information Disclosure 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Information Disclosure 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Information Disclosure 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Information Disclosure 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Information Disclosure 5027275
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Information Disclosure 5027275
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Information Disclosure 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Information Disclosure 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Information Disclosure 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Information Disclosure 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Information Disclosure 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Information Disclosure 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Information Disclosure 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Information Disclosure 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Information Disclosure 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Information Disclosure 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35316 Microsoft Offensive Research & Security Engineering with Microsoft


CVE-2023-35317 - Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35317
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain administrator privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35317
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Elevation of Privilege 5027283
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Elevation of Privilege 5027283
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Elevation of Privilege 5027271
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Elevation of Privilege 5027271
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35317 l1k3beef


CVE-2023-35318 - Remote Procedure Call Runtime Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35318
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Remote Procedure Call Runtime Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35318
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Denial of Service 5027275
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Denial of Service 5027275
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Denial of Service 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Denial of Service 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35318 Microsoft Offensive Research & Security Engineering with Microsoft


CVE-2023-35319 - Remote Procedure Call Runtime Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35319
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Remote Procedure Call Runtime Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35319
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Denial of Service 5027275
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Denial of Service 5027275
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Denial of Service 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Denial of Service 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35319 Microsoft Offensive Research & Security Engineering with Microsoft


CVE-2023-35320 - Connected User Experiences and Telemetry Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35320
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Connected User Experiences and Telemetry Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35320
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2016 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35320 JeongOh Kyea with THEORI


CVE-2023-35321 - Windows Deployment Services Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35321
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Deployment Services Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35321
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Denial of Service 5027275
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Denial of Service 5027275
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Denial of Service 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Denial of Service 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35321 Jarvis_1oop of vulnerability research institute


CVE-2023-35322 - Windows Deployment Services Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35322
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Deployment Services Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How can attacker successfully exploit this vulnerability?

An attacker with user permissions could alter specific variables in the CNTCIR Packet of the WDSMA protocol in order to exploit this vulnerability. For more information about CNTCIR Packet see CNTCIR Packet.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35322
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Remote Code Execution 5027275
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Remote Code Execution 5027275
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Remote Code Execution 5027283
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Remote Code Execution 5027283
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Remote Code Execution 5027271
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Remote Code Execution 5027271
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Remote Code Execution 5027225
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Remote Code Execution 5027225
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35322 Jarvis_1oop of vulnerability research institute


CVE-2023-35323 - Windows OLE Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35323
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows OLE Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35323
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Remote Code Execution 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Remote Code Execution 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows Server 2022 5028171 (Security Update) Important Remote Code Execution 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Remote Code Execution 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35323 kap0k


CVE-2023-35324 - Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35324
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35324
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Information Disclosure 5027230 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Information Disclosure 5027230 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Information Disclosure 5027219 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Information Disclosure 5027219 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Information Disclosure 5027223
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Information Disclosure 5027223
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Information Disclosure 5027231
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Information Disclosure 5027231
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Information Disclosure 5027283
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Information Disclosure 5027283
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Information Disclosure 5027271
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Information Disclosure 5027271
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Information Disclosure 5027219 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Information Disclosure 5027219 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Information Disclosure 5027225
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Information Disclosure 5027225
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35324 kap0k


CVE-2023-35325 - Windows Print Spooler Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35325
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Print Spooler Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35325
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Information Disclosure 5027230 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Information Disclosure 5027230 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Information Disclosure 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Information Disclosure 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Information Disclosure 5027223
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Information Disclosure 5027223
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Information Disclosure 5027231
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Information Disclosure 5027231
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Information Disclosure 5027283
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Information Disclosure 5027283
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Information Disclosure 5027271
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Information Disclosure 5027271
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Information Disclosure 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Information Disclosure 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Information Disclosure 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Information Disclosure 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Information Disclosure 5027225
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Information Disclosure 5027225
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35325 R4nger


CVE-2023-35326 - Windows CDP User Components Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35326
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows CDP User Components Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35326
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Information Disclosure 5027223
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Information Disclosure 5027223
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Information Disclosure 5027231
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Information Disclosure 5027231
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2019 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Information Disclosure 5027225
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Information Disclosure 5027225
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35326 R4nger


CVE-2023-35328 - Windows Transaction Manager Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35328
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Transaction Manager Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35328
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Elevation of Privilege 5027230 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Elevation of Privilege 5027230 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Elevation of Privilege 5027279
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Elevation of Privilege 5027279
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Elevation of Privilege 5027279
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Elevation of Privilege 5027279
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Elevation of Privilege 5027275
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Elevation of Privilege 5027275
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Elevation of Privilege 5027283
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Elevation of Privilege 5027283
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Elevation of Privilege 5027271
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Elevation of Privilege 5027271
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35328 eputv


manavoid


CVE-2023-35329 - Windows Authentication Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35329
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Authentication Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35329
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Denial of Service 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Denial of Service 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35329 Anonymous


CVE-2023-35330 - Windows Extended Negotiation Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35330
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Extended Negotiation Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35330
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Denial of Service 5027275
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Denial of Service 5027275
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Denial of Service 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Denial of Service 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Denial of Service 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Denial of Service 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Denial of Service 5027225
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Denial of Service 5027225
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35330 liubenjin with Codesafe Team of Legendsec at QI-ANXIN Group


CVE-2023-35331 - Windows Local Security Authority (LSA) Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35331
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Local Security Authority (LSA) Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorAdjacent
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires that an attacker will need to first gain access to the restricted network before running an attack.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35331
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Denial of Service 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Denial of Service 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35331 Wei in Kunlun Lab with Cyber KunLun


CVE-2023-35332 - Windows Remote Desktop Protocol Security Feature Bypass

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35332
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Remote Desktop Protocol Security Feature Bypass
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What security feature is bypassed with this vulnerability?

The RDP Gateway protocol is enforcing the usage of Datagram Transport Layer Security (DTLS) version 1.0, which is a deprecated (RFC 8996) protocol with known vulnerabilities. An attacker with a machine-in-the-middle (MitM) position who successfully exploited this vulnerability could compromise the confidentiality and integrity of data when the targeted user connects to a trusted server.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35332
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Security Feature Bypass 5027230 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Security Feature Bypass 5027230 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Security Feature Bypass 5027219 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Security Feature Bypass 5027219 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Security Feature Bypass 5027215
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Security Feature Bypass 5027215
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Security Feature Bypass 5027215
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Security Feature Bypass
5027215
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Security Feature Bypass
5027215
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Security Feature Bypass
5027215
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Security Feature Bypass 5027223
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Security Feature Bypass 5027223
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Security Feature Bypass 5027231
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Security Feature Bypass 5027231
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Security Feature Bypass 5027275
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Security Feature Bypass 5027275
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Security Feature Bypass 5027283
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Security Feature Bypass 5027283
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Security Feature Bypass 5027271
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Security Feature Bypass 5027271
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Security Feature Bypass 5027219 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Security Feature Bypass 5027219 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Security Feature Bypass 5027225
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Security Feature Bypass 5027225
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35332 Dor Dali with Cyolo


CVE-2023-35333 - MediaWiki PandocUpload Extension Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35333
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: MediaWiki PandocUpload Extension Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability.


According to the CVSS metric, the attack vector is network (AV:N), and privilege required is low (PR:L). What is the target used in the context of the remote code execution?

The attacker for this vulnerability could target the server accounts in an arbitrary or remote code execution. As an authenticated user, the attacker could attempt to trigger malicious code in the context of the server's account through a network call.

The privilege requirement is low because the attacker needs to be authenticated as a normal user.


How could an attacker exploit this vulnerability?

An authenticated attacker could exploit this vulnerability by uploading a file with the destination name as a malicious payload due to shell arguments not being properly escaped. When successfully exploited this could allow the malicious actor to perform remote code execution.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35333
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
PandocUpload Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.0.1 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35333 bawolff


CVE-2023-35336 - Windows MSHTML Platform Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35336
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows MSHTML Platform Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityLow
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

A security feature bypass vulnerability exists when the MSHTML platform fails to validate the correct Security Zone of requests for specific URLs. This could allow an attacker to cause a user to access a URL in a less restricted Internet Security Zone than intended.

To exploit this vulnerability, an attacker could email or otherwise provide a specially crafted URL to a victim and convince them to click on it.

The security update addresses the vulnerability by correcting security feature behavior to properly map affected URLs to the correct Security Zone.


The Security Updates table indicates that this vulnerability affects all supported versions of Microsoft Windows except Windows Server 2008, Windows Server 2008 R2, and Windows Server 2012. Why are IE Cumulative updates listed for Windows Server 2012 R2?

While Microsoft has announced retirement of the Internet Explorer 11 application on certain platforms and the Microsoft Edge Legacy application is deprecated, the underlying MSHTML, EdgeHTML, and scripting platforms are still supported. The MSHTML platform is used by Internet Explorer mode in Microsoft Edge as well as other applications through WebBrowser control. The EdgeHTML platform is used by WebView and some UWP applications. The scripting platforms are used by MSHTML and EdgeHTML but can also be used by other legacy applications. Updates to address vulnerabilities in the MSHTML platform and scripting engine are included in the IE Cumulative Updates; EdgeHTML and Chakra changes are not applicable to those platforms.

To stay fully protected, we recommend that customers who install Security Only updates install the IE Cumulative updates for this vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35336
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Security Feature Bypass 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Security Feature Bypass 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Security Feature Bypass 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Security Feature Bypass 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Security Feature Bypass 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Security Feature Bypass 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Security Feature Bypass 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Security Feature Bypass
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Security Feature Bypass
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Security Feature Bypass
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Security Feature Bypass 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Security Feature Bypass 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Security Feature Bypass 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Security Feature Bypass 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
5028167 (IE Cumulative)
Important Security Feature Bypass 5027271

5026366
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
1.001
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
5028167 (IE Cumulative)
Important Security Feature Bypass 5027271

5026366
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
1.001
Yes None
Windows Server 2016 5028169 (Security Update) Important Security Feature Bypass 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Security Feature Bypass 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Security Feature Bypass 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Security Feature Bypass 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35336 Roberto Bamberger and Matt Wagenknecht with Microsoft


CVE-2023-35337 - Win32k Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35337
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Win32k Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35337
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2022 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35337 袁子建


CVE-2023-35338 - Windows Peer Name Resolution Protocol Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35338
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Peer Name Resolution Protocol Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35338
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Denial of Service 5027275
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Denial of Service 5027275
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Denial of Service 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Denial of Service 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Denial of Service 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Denial of Service 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Denial of Service 5027225
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Denial of Service 5027225
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35338 Jarvis_1oop of vulnerability research institute


CVE-2023-35339 - Windows CryptoAPI Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35339
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows CryptoAPI Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35339
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2016 5028169 (Security Update) Important Denial of Service 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Denial of Service 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Denial of Service 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Denial of Service 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Denial of Service 5027225
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Denial of Service 5027225
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35339 Polar Bear


CVE-2023-35340 - Windows CNG Key Isolation Service Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35340
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows CNG Key Isolation Service Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

In this case, a successful attack could be performed from a low privilege AppContainer. The attacker could elevate their privileges and execute code or access resources at a higher integrity level than that of the AppContainer execution environment.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35340
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Elevation of Privilege 5027230 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Elevation of Privilege 5027230 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Elevation of Privilege 5027279
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Elevation of Privilege 5027279
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Elevation of Privilege 5027279
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Elevation of Privilege 5027279
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Elevation of Privilege 5027275
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Elevation of Privilege 5027275
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Elevation of Privilege 5027283
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Elevation of Privilege 5027283
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Elevation of Privilege 5027271
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Elevation of Privilege 5027271
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35340 k0shl with Kunlun Lab


CVE-2023-35341 - Microsoft DirectMusic Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35341
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft DirectMusic Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.2/TemporalScore:5.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35341
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Information Disclosure 5027230 Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Information Disclosure 5027230 Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Information Disclosure 5027219 Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Information Disclosure 5027219 Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Information Disclosure 5027223
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Information Disclosure 5027223
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Information Disclosure 5027231
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Information Disclosure 5027231
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Information Disclosure 5027275
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Information Disclosure 5027275
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Information Disclosure 5027283
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Information Disclosure 5027283
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Information Disclosure 5027271
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Information Disclosure 5027271
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Information Disclosure 5027219 Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Information Disclosure 5027219 Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Information Disclosure 5027222
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Information Disclosure 5027222
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Information Disclosure 5027225
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Information Disclosure 5027225
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35341 Vipin Kumar with Microsoft


CVE-2023-35342 - Windows Image Acquisition Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35342
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Image Acquisition Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35342
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Elevation of Privilege 5027230 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Elevation of Privilege 5027230 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Elevation of Privilege 5027275
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Elevation of Privilege 5027275
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Elevation of Privilege 5027283
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Elevation of Privilege 5027283
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Elevation of Privilege 5027271
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Elevation of Privilege 5027271
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35342 OUYANG FEI


T0


CVE-2023-35343 - Windows Geolocation Service Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35343
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Geolocation Service Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious input file and convince the user to open said input file.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35343
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Remote Code Execution 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Remote Code Execution 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Remote Code Execution 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Remote Code Execution
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Remote Code Execution
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Remote Code Execution
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Remote Code Execution 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Remote Code Execution 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Remote Code Execution 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Remote Code Execution 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2019 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Remote Code Execution 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Remote Code Execution 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35343 CHEN QINGYANG with Topsec Alpha Team


CVE-2023-35344 - Windows DNS Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35344
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows DNS Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.6/TemporalScore:5.8
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires the attacker or targeted user to have specific elevated privileges. As is best practice, regular validation and audits of administrative groups should be conducted.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35344
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Remote Code Execution 5027275
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Remote Code Execution 5027275
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Remote Code Execution 5027283
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Remote Code Execution 5027283
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Remote Code Execution 5027271
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Remote Code Execution 5027271
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Remote Code Execution 5027225
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Remote Code Execution 5027225
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35344 George Hughey with MSRC Vulnerabilities and Mitigations


CVE-2023-35345 - Windows DNS Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35345
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows DNS Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.6/TemporalScore:5.8
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires the attacker or targeted user to have specific elevated privileges. As is best practice, regular validation and audits of administrative groups should be conducted.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35345
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Remote Code Execution 5027275
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Remote Code Execution 5027275
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Remote Code Execution 5027283
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Remote Code Execution 5027283
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Remote Code Execution 5027271
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Remote Code Execution 5027271
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Remote Code Execution 5027225
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Remote Code Execution 5027225
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35345 George Hughey with MSRC Vulnerabilities and Mitigations


CVE-2023-35346 - Windows DNS Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35346
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows DNS Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.6/TemporalScore:5.8
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires the attacker or targeted user to have specific elevated privileges. As is best practice, regular validation and audits of administrative groups should be conducted.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35346
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Remote Code Execution 5027275
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Remote Code Execution 5027275
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Remote Code Execution 5027283
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Remote Code Execution 5027283
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Remote Code Execution 5027271
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Remote Code Execution 5027271
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Remote Code Execution 5027225
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Remote Code Execution 5027225
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35346 George Hughey with MSRC Vulnerabilities and Mitigations


CVE-2023-35347 - Microsoft Install Service Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35347
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Install Service Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.2
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metrics, successful exploitation of this vulnerability does not impact confidentiality (C:N) but has major impact on integrity (I:H) and availability (A:H). What does that mean for this vulnerability?

An attacker who successfully exploits this vulnerability cannot access files but can overwrite their contents and potentially cause the service to become unavailable.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35347
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2022 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35347 Filip Dragović with Infigo IS


CVE-2023-35348 - Active Directory Federation Service Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35348
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Active Directory Federation Service Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredHigh
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

An attacker would require access to a low privileged session on the user's device to obtain a JWT (JSON Web Token) which can then be used to craft a long-lived assertion using the Windows Hello for Business Key from the victim's device.


According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of integrity (I:H)? What does that mean for this vulnerability?

By exploiting this vulnerability, an attacker can craft a long-lived assertion and impersonate a victim user affecting the integrity of the assertion.


What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker can bypass Windows Trusted Platform Module by crafting an assertion and using the assertion to request a Primary Refresh Token from another device.


What actions do I need to take to be protected from this vulnerability?

To be protected, apply the fix as follows:

Install Windows updates released on or after July 11, 2023 on all AD FS servers of the farm. Then, enable the setting by running the following PowerShell command on the primary AD FS server of the farm:

Set-AdfsProperties-EnforceNonceInJWT Enabled

Important You may see authentication failures in certain scenarios when there are clients that are not updated and send JWT authentication requests to the AD FS server. In such cases, we recommend updating all clients by installing the Windows update released on or after July 11, 2023. Alternatively, an administrator can disable the EnforceNonceInJWT setting and monitor the AD FS servers for the logging of Event 187 to identify potential requests that could be rejected when EnforceNonceInJWT is set to Enabled. After confirming the absence of Event 187 on AD FS servers for a defined period of time, the EnforceNonceInJWT setting must be updated to Enabled.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35348
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2016 5028169 (Security Update) Important Security Feature Bypass 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Security Feature Bypass 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Security Feature Bypass 5027225
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Security Feature Bypass 5027225
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35348 None

CVE-2023-35350 - Windows Active Directory Certificate Services (AD CS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35350
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Active Directory Certificate Services (AD CS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An attacker with Certificate Authority (CA) read access permissions can send a specially crafted request to a vulnerable Certificate Server. By default, only domain administrators are granted CA read access.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35350
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Remote Code Execution 5027275
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Remote Code Execution 5027275
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Remote Code Execution 5027283
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Remote Code Execution 5027283
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Remote Code Execution 5027271
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Remote Code Execution 5027271
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Remote Code Execution 5027225
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Remote Code Execution 5027225
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35350 k0shl with Kunlun Lab


CVE-2023-35351 - Windows Active Directory Certificate Services (AD CS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35351
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Active Directory Certificate Services (AD CS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.6/TemporalScore:5.8
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


How could an attacker exploit this vulnerability?

An attacker with Certificate Authority (CA) read access permissions can send a specially crafted request to a vulnerable Certificate Server. By default, only domain administrators are granted CA read access.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35351
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Remote Code Execution 5027275
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Remote Code Execution 5027275
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Remote Code Execution 5027283
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Remote Code Execution 5027283
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Remote Code Execution 5027271
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Remote Code Execution 5027271
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Remote Code Execution 5027225
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Remote Code Execution 5027225
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35351 k0shl with Kunlun Lab


CVE-2023-35352 - Windows Remote Desktop Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35352
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Remote Desktop Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited the vulnerability could bypass certificate or private key authentication when establishing a remote desktop protocol session.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Critical Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35352
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Critical Security Feature Bypass 5027283
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Critical Security Feature Bypass 5027283
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Critical Security Feature Bypass 5027271
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Critical Security Feature Bypass 5027271
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Critical Security Feature Bypass 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Critical Security Feature Bypass 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Critical Security Feature Bypass 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Critical Security Feature Bypass 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Critical Security Feature Bypass 5027225
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Critical Security Feature Bypass 5027225
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35352 Dor Dali with Cyolo


CVE-2023-35353 - Connected User Experiences and Telemetry Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35353
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Connected User Experiences and Telemetry Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35353
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2016 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35353 George Hughey with MSRC Vulnerabilities & Mitigations


CVE-2023-35356 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35356
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35356
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2016 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35356 Mateusz Jurczyk of Google Project Zero


CVE-2023-35357 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35357
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35357
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2016 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35357 Mateusz Jurczyk of Google Project Zero


CVE-2023-35358 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35358
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35358
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2016 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35358 Mateusz Jurczyk of Google Project Zero


CVE-2023-35360 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35360
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35360
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Elevation of Privilege 5027230 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Elevation of Privilege 5027230 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Elevation of Privilege 5027283
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Elevation of Privilege 5027283
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Elevation of Privilege 5027271
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Elevation of Privilege 5027271
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35360 Microsoft Offensive Research & Security Engineering


CVE-2023-35361 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35361
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35361
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Elevation of Privilege 5027230 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Elevation of Privilege 5027230 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Elevation of Privilege 5027283
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Elevation of Privilege 5027283
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Elevation of Privilege 5027271
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Elevation of Privilege 5027271
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35361 ziming zhang with Ant Security Light-Year Lab


CVE-2023-35362 - Windows Clip Service Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35362
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Clip Service Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

In this case, a successful attack could be performed from a low privilege AppContainer. The attacker could elevate their privileges and execute code or access resources at a higher integrity level than that of the AppContainer execution environment.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35362
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Elevation of Privilege 5027230 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Elevation of Privilege 5027230 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2016 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35362 ziming zhang with Ant Security Light-Year Lab


CVE-2023-35363 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35363
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35363
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2019 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35363 ziming zhang with Ant Security Light-Year Lab


CVE-2023-35364 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35364
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

In this case, a successful attack could be performed from a low privilege AppContainer. The attacker could elevate their privileges and execute code or access resources at a higher integrity level than that of the AppContainer execution environment.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35364
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2019 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35364 ziming zhang with Ant Security Light-Year Lab


CVE-2023-35365 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35365
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

To exploit this vulnerability, an attacker would need to send specially crafted packets to a server configured with the Routing and Remote Access Service running.


Mitigations:

This vulnerability is only exploitable on Windows Servers that have installed and configured the Routing and Remote Access Service (RRAS) role which is not installed and configured by default.

Please see Routing and Remote Access Server (RRAS) | Microsoft Learn for more information. You might also benefit by reading more about Roles here: Roles, Role Services, and Features included in Windows Server - Server Core | Microsoft Learn


Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35365
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Critical Remote Code Execution 5027230 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Critical Remote Code Execution 5027230 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Critical Remote Code Execution 5027219 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Critical Remote Code Execution 5027219 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Critical Remote Code Execution 5027222
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Critical Remote Code Execution 5027222
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Critical Remote Code Execution 5027222
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Critical Remote Code Execution 5027215
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Critical Remote Code Execution 5027215
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Critical Remote Code Execution 5027215
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Critical Remote Code Execution
5027215
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Critical Remote Code Execution
5027215
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Critical Remote Code Execution
5027215
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Critical Remote Code Execution 5027223
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Critical Remote Code Execution 5027223
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Critical Remote Code Execution 5027231
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Critical Remote Code Execution 5027231
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Critical Remote Code Execution 5027279
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Critical Remote Code Execution 5027279
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Critical Remote Code Execution 5027279
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Critical Remote Code Execution 5027279
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Critical Remote Code Execution 5027275
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Critical Remote Code Execution 5027275
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Critical Remote Code Execution 5027283
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Critical Remote Code Execution 5027283
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Critical Remote Code Execution 5027271
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Critical Remote Code Execution 5027271
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Critical Remote Code Execution 5027219 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Critical Remote Code Execution 5027219 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Critical Remote Code Execution 5027222
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Critical Remote Code Execution 5027222
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Critical Remote Code Execution 5027225
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Critical Remote Code Execution 5027225
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35365 wkai with Codesafe Team of Legendsec at QI-ANXIN Group


CVE-2023-35366 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35366
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

To exploit this vulnerability, an attacker would need to send specially crafted packets to a server configured with the Routing and Remote Access Service running.


Mitigations:

This vulnerability is only exploitable on Windows Servers that have installed and configured the Routing and Remote Access Service (RRAS) role which is not installed and configured by default.

Please see Routing and Remote Access Server (RRAS) | Microsoft Learn for more information. You might also benefit by reading more about Roles here: Roles, Role Services, and Features included in Windows Server - Server Core | Microsoft Learn


Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35366
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Critical Remote Code Execution 5027230 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Critical Remote Code Execution 5027230 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Critical Remote Code Execution 5027219 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Critical Remote Code Execution 5027219 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Critical Remote Code Execution 5027222
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Critical Remote Code Execution 5027222
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Critical Remote Code Execution 5027222
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Critical Remote Code Execution 5027215
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Critical Remote Code Execution 5027215
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Critical Remote Code Execution 5027215
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Critical Remote Code Execution
5027215
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Critical Remote Code Execution
5027215
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Critical Remote Code Execution
5027215
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Critical Remote Code Execution 5027223
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Critical Remote Code Execution 5027223
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Critical Remote Code Execution 5027231
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Critical Remote Code Execution 5027231
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Critical Remote Code Execution 5027279
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Critical Remote Code Execution 5027279
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Critical Remote Code Execution 5027279
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Critical Remote Code Execution 5027279
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Critical Remote Code Execution 5027275
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Critical Remote Code Execution 5027275
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Critical Remote Code Execution 5027283
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Critical Remote Code Execution 5027283
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Critical Remote Code Execution 5027271
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Critical Remote Code Execution 5027271
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Critical Remote Code Execution 5027219 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Critical Remote Code Execution 5027219 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Critical Remote Code Execution 5027222
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Critical Remote Code Execution 5027222
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Critical Remote Code Execution 5027225
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Critical Remote Code Execution 5027225
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35366 wkai with Codesafe Team of Legendsec at QI-ANXIN Group


CVE-2023-35367 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35367
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

To exploit this vulnerability, an attacker would need to send specially crafted packets to a server configured with the Routing and Remote Access Service running.


Mitigations:

This vulnerability is only exploitable on Windows Servers that have installed and configured the Routing and Remote Access Service (RRAS) role which is not installed and configured by default.

Please see Routing and Remote Access Server (RRAS) | Microsoft Learn for more information. You might also benefit by reading more about Roles here: Roles, Role Services, and Features included in Windows Server - Server Core | Microsoft Learn


Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35367
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Critical Remote Code Execution 5027230 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Critical Remote Code Execution 5027230 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Critical Remote Code Execution 5027219 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Critical Remote Code Execution 5027219 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Critical Remote Code Execution 5027222
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Critical Remote Code Execution 5027222
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Critical Remote Code Execution 5027222
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Critical Remote Code Execution 5027215
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Critical Remote Code Execution 5027215
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Critical Remote Code Execution 5027215
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Critical Remote Code Execution
5027215
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Critical Remote Code Execution
5027215
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Critical Remote Code Execution
5027215
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Critical Remote Code Execution 5027223
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Critical Remote Code Execution 5027223
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Critical Remote Code Execution 5027231
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Critical Remote Code Execution 5027231
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Critical Remote Code Execution 5027279
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Critical Remote Code Execution 5027279
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Critical Remote Code Execution 5027279
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Critical Remote Code Execution 5027279
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Critical Remote Code Execution 5027275
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Critical Remote Code Execution 5027275
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Critical Remote Code Execution 5027283
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Critical Remote Code Execution 5027283
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Critical Remote Code Execution 5027271
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Critical Remote Code Execution 5027271
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Critical Remote Code Execution 5027219 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Critical Remote Code Execution 5027219 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Critical Remote Code Execution 5027222
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Critical Remote Code Execution 5027222
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Critical Remote Code Execution 5027225
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Critical Remote Code Execution 5027225
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35367 wkai with Codesafe Team of Legendsec at QI-ANXIN Group


CVE-2023-36872 - VP9 Video Extensions Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36872
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: VP9 Video Extensions Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.


How do I get the updated app?

The Microsoft Store will automatically update affected customers. Alternatively, customers can get the update immediately; see here for details.

My system is in a disconnected environment; is it vulnerable?

It is possible for customers to disable automatic updates for the Microsoft Store. The Microsoft Store will not automatically install this update for those customers. VLSC customers can visit the Volume Licensing Servicing Center to get the update https://www.microsoft.com/Licensing/servicecenter/.

Customers using the Microsoft Store for Business and Microsoft Store for Education can get this update through their organizations.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


How can I check if the update is installed?

App package versions 1.0.61591.0 and later contain this update.

You can check the package version in PowerShell: Get-AppxPackage -Name Microsoft.VP9VideoExtensions


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36872
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
VP9 Video Extensions More Information (Security Update) Important Information Disclosure None Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
1.0.61591.0 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36872 K24 Sec


CVE-2023-36874 - Windows Error Reporting Service Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36874
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Error Reporting Service Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain administrator privileges.


According to the CVSS metrics, the attack vector is local (AV:L) and privilege required is low (PR:L). What does that mean for this vulnerability?

An attacker must have local access to the targeted machine and the user must be able to create folders and performance traces on the machine, with restricted privileges that normal users have by default.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Detected No Yes

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36874
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Elevation of Privilege 5027230 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Elevation of Privilege 5027230 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Elevation of Privilege 5027279
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Elevation of Privilege 5027279
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Elevation of Privilege 5027279
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Elevation of Privilege 5027279
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup) Important Elevation of Privilege 5027275
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup) Important Elevation of Privilege 5027275
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Elevation of Privilege 5027283
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Elevation of Privilege 5027283
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Elevation of Privilege 5027271
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Elevation of Privilege 5027271
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36874 Vlad Stolyarov and Maddie Stone of Googles Threat Analysis Group (TAG)


CVE-2023-36884 - Office and Windows HTML Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36884
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Office and Windows HTML Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.3/TemporalScore:8.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityFunctional
Remediation LevelUnavailable
Report ConfidenceConfirmed

Executive Summary:

Microsoft is investigating reports of a series of remote code execution vulnerabilities impacting Windows and Office products. Microsoft is aware of targeted attacks that attempt to exploit these vulnerabilities by using specially-crafted Microsoft Office documents.

An attacker could create a specially crafted Microsoft Office document that enables them to perform remote code execution in the context of the victim. However, an attacker would have to convince the victim to open the malicious file.

Upon completion of this investigation, Microsoft will take the appropriate action to help protect our customers. This might include providing a security update through our monthly release process or providing an out-of-cycle security update, depending on customer needs.

Please see the Microsoft Threat Intelligence Blog Entry for important information about steps you can take to protect your system from this vulnerability.

This CVE will be updated with new information and links to security updates when they become available.


FAQ:
None
Mitigations:
  • Customers who use Microsoft Defender for Office are protected from attachments that attempt to exploit this vulnerability.
  • In current attack chains, the use of the Block all Office applications from creating child processes Attack Surface Reduction Rule will prevent the vulnerability from being exploited.
  • Organizations who cannot take advantage of these protections can set the FEATURE_BLOCK_CROSS_PROTOCOL_FILE_NAVIGATION registry key to avoid exploitation. Please note that while these registry settings would mitigate exploitation of this issue, it could affect regular functionality for certain use cases related to these applications. Add the following application names to this registry key as values of type REG_DWORD with data 1.:

Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_CROSS_PROTOCOL_FILE_NAVIGATION

  • Excel.exe
  • Graph.exe
  • MSAccess.exe
  • MSPub.exe
  • PowerPoint.exe
  • Visio.exe
  • WinProj.exe
  • WinWord.exe
  • Wordpad.exe

Please see the Microsoft Threat Intelligence Blog Entry for more detailed information.


Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Detected Yes Yes

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36884
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Office 2019 for 32-bit editions Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Microsoft Office 2019 for 64-bit editions Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Microsoft Office LTSC 2021 for 32-bit editions Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Microsoft Office LTSC 2021 for 64-bit editions Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Microsoft Word 2013 Service Pack 1 (32-bit editions) Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Microsoft Word 2013 Service Pack 1 (64-bit editions) Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Microsoft Word 2016 (32-bit edition) Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Microsoft Word 2016 (64-bit edition) Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Windows 10 for 32-bit Systems Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Windows 10 Version 1607 for x64-based Systems Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Windows 10 Version 1809 for 32-bit Systems Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Windows 10 Version 1809 for ARM64-based Systems Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Windows 10 Version 1809 for x64-based Systems Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Windows 10 Version 21H2 for 32-bit Systems Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Windows 10 Version 21H2 for ARM64-based Systems Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Windows 10 Version 21H2 for x64-based Systems Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Windows 10 Version 22H2 for 32-bit Systems Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Windows 10 Version 22H2 for ARM64-based Systems Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Windows 10 Version 22H2 for x64-based Systems Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Windows 11 version 21H2 for ARM64-based Systems Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Windows 11 version 21H2 for x64-based Systems Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Windows 11 Version 22H2 for ARM64-based Systems Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Windows 11 Version 22H2 for x64-based Systems Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Windows Server 2008 for 32-bit Systems Service Pack 2 Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Windows Server 2008 for x64-based Systems Service Pack 2 Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Windows Server 2012 Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Windows Server 2012 (Server Core installation) Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Windows Server 2012 R2 Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Windows Server 2012 R2 (Server Core installation) Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Windows Server 2016 Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Windows Server 2016 (Server Core installation) Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Windows Server 2019 Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Windows Server 2019 (Server Core installation) Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Windows Server 2022 Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None
Windows Server 2022 (Server Core installation) Important Remote Code Execution None Base: 8.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36884 Microsoft Office Product Group Security Team


Tom Lancaster with Volexity


Paul Rascagneres with Volexity


Vlad Stolyarov, Clement Lecigne and Bahare Sabouri of Google’s Threat Analysis Group (TAG)




Microsoft Threat Intelligence


CVE-2023-21526 - Windows Netlogon Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-21526
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Netlogon Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.4/TemporalScore:6.4
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

The attacker must inject themselves into the logical network path between the target and the resource requested by the victim to read or modify network communications. This is called a man-in-the-middle (MITM) attack.


What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could intercept and potentially modify traffic between client and server systems.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-21526
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Information Disclosure 5027230 Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Information Disclosure 5027230 Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Information Disclosure 5027219 Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Information Disclosure 5027219 Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Information Disclosure 5027223
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Information Disclosure 5027223
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Information Disclosure 5027231
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Information Disclosure 5027231
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Information Disclosure 5027279
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Information Disclosure 5027279
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Information Disclosure 5027279
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Information Disclosure 5027279
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Information Disclosure 5027275
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Information Disclosure 5027275
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Information Disclosure 5027283
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Information Disclosure 5027283
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Information Disclosure 5027271
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Information Disclosure 5027271
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Information Disclosure 5027219 Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Information Disclosure 5027219 Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Information Disclosure 5027222
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Information Disclosure 5027222
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Information Disclosure 5027225
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Information Disclosure 5027225
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-21526 None

ADV230001 - Guidance on Microsoft Signed Drivers Being Used Maliciously

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
ADV230001
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Guidance on Microsoft Signed Drivers Being Used Maliciously
CVSS:
None
Executive Summary:

Executive Summary:

Microsoft was recently informed that drivers certified by Microsoft’s Windows Hardware Developer Program (MWHDP) were being used maliciously in post-exploitation activity. In these attacks, the attacker gained administrative privileges on compromised systems before using the drivers.

Microsoft has completed its investigation and determined that the activity was limited to the abuse of several developer program accounts and that no Microsoft account compromise has been identified. We’ve suspended the partners' seller accounts and implemented blocking detections for all the reported malicious drivers to help protect customers from this threat.

Details:

Microsoft was informed that drivers certified by Microsoft’s Windows Hardware Developer Program were being used maliciously in post-exploitation activity. In these attacks, the attacker had already gained administrative privileges on compromised systems prior to use of the drivers. An investigation was performed when we were notified of this activity by Sophos on February 9, 2023; Trend Micro and Cisco subsequently provided reports containing additional details. This investigation revealed that several developer accounts for the Microsoft Partner Center (MPC) were engaged in submitting malicious drivers to obtain a Microsoft signature. All the developer accounts involved in this incident were immediately suspended.

Microsoft has released Window Security updates (see Security Updates table) that untrust drivers and driver signing certificates for the impacted files and has suspended the partners' seller accounts. Additionally, Microsoft has implemented blocking detections (Microsoft Defender 1.391.3822.0 and newer) to help protect customers from legitimately signed drivers that have been used maliciously in post-exploit activity. For more information about how the Windows Code Integrity feature protects Microsoft customers from revoked certificates see: (Notice of additions to the Windows Driver.STL revocation list - Microsoft Support)[https://support.microsoft.com/help/5029033].

Microsoft is working with Microsoft Active Protections Program (MAPP) partners to help develop further detections and to better protect our shared customers. Microsoft Partner Center is also working on long-term solutions to address these deceptive practices and prevent future customer impacts.

Recommended Actions:

Microsoft recommends that all customers install the latest Windows updates and ensure their anti-virus and endpoint detection products are up to date with the latest signatures and are enabled to prevent these attacks.

Frequently Asked Questions:

Are any Microsoft services (Azure, M365, XBOX, Etc.) affected by this issue?

Microsoft’s services are not affected by this issue. Our investigation has not identified any instances of malicious drivers affecting any of our services.

How can customers deploy their own Hypervisor-protected Code Integrity (HVCI) policy to perform detections in their own environment?

Updates will be made to the Microsoft Recommended Driver Blocklist - Microsoft recommended driver block rules (Windows 10) - Windows security | Microsoft Docs policy to perform detections in their own environment.

After the full set of malicious files has been locked, customers (enterprise and consumer) can deploy this policy onto devices to block against this malicious file and other malicious and vulnerable drivers on the blocklist. Additionally, enabling Hypervisor-protected Code Integrity (HVCI) will automatically enforce the policy without needing to deploy the policy.

How do I determine if any drivers are affected that were installed prior to the available detections were implemented?

Offline scans will be required to detect malicious drivers which might have been installed prior to March 2, 2023, when new Microsoft detections were implemented. For more information see Remove malware from your Windows PC.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


None Defense in Depth

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Detected No Yes

Affected Software

The following tables list the affected software details for the vulnerability.

ADV230001
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) None Defense in Depth 5027230 Base: N/A
Temporal: N/A
Vector: N/A
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) None Defense in Depth 5027230 Base: N/A
Temporal: N/A
Vector: N/A
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) None Defense in Depth 5027219 Base: N/A
Temporal: N/A
Vector: N/A
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) None Defense in Depth 5027219 Base: N/A
Temporal: N/A
Vector: N/A
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) None Defense in Depth 5027222
Base: N/A
Temporal: N/A
Vector: N/A
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) None Defense in Depth 5027222
Base: N/A
Temporal: N/A
Vector: N/A
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) None Defense in Depth 5027222
Base: N/A
Temporal: N/A
Vector: N/A
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) None Defense in Depth 5027215
Base: N/A
Temporal: N/A
Vector: N/A
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) None Defense in Depth 5027215
Base: N/A
Temporal: N/A
Vector: N/A
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) None Defense in Depth 5027215
Base: N/A
Temporal: N/A
Vector: N/A
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) None Defense in Depth
5027215
Base: N/A
Temporal: N/A
Vector: N/A

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) None Defense in Depth
5027215
Base: N/A
Temporal: N/A
Vector: N/A

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) None Defense in Depth
5027215
Base: N/A
Temporal: N/A
Vector: N/A

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) None Defense in Depth 5027223
Base: N/A
Temporal: N/A
Vector: N/A
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) None Defense in Depth 5027223
Base: N/A
Temporal: N/A
Vector: N/A
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) None Defense in Depth 5027231
Base: N/A
Temporal: N/A
Vector: N/A
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) None Defense in Depth 5027231
Base: N/A
Temporal: N/A
Vector: N/A
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
None Defense in Depth 5027279
Base: N/A
Temporal: N/A
Vector: N/A
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
None Defense in Depth 5027279
Base: N/A
Temporal: N/A
Vector: N/A
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
None Defense in Depth 5027279
Base: N/A
Temporal: N/A
Vector: N/A
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
None Defense in Depth 5027279
Base: N/A
Temporal: N/A
Vector: N/A
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
None Defense in Depth 5027275
Base: N/A
Temporal: N/A
Vector: N/A
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
None Defense in Depth 5027275
Base: N/A
Temporal: N/A
Vector: N/A
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
None Defense in Depth 5027283
Base: N/A
Temporal: N/A
Vector: N/A
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
None Defense in Depth 5027283
Base: N/A
Temporal: N/A
Vector: N/A
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
None Defense in Depth 5027271
Base: N/A
Temporal: N/A
Vector: N/A
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
None Defense in Depth 5027271
Base: N/A
Temporal: N/A
Vector: N/A
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) None Defense in Depth 5027219 Base: N/A
Temporal: N/A
Vector: N/A
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) None Defense in Depth 5027219 Base: N/A
Temporal: N/A
Vector: N/A
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) None Defense in Depth 5027222
Base: N/A
Temporal: N/A
Vector: N/A
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) None Defense in Depth 5027222
Base: N/A
Temporal: N/A
Vector: N/A
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) None Defense in Depth 5027225
Base: N/A
Temporal: N/A
Vector: N/A
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) None Defense in Depth 5027225
Base: N/A
Temporal: N/A
Vector: N/A
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
ADV230001 Sophos X-Ops teams


Chris Neal of Cisco Talos


Trend Micro Research


CVE-2023-29347 - Windows Admin Center Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-29347
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Admin Center Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.7/TemporalScore:7.6
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeChanged
ConfidentialityNone
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

The vulnerability is in the web server, but the malicious scripts execute in the victim’s browser on their machine.


Where can customer obtain the updated software?

Customers can download the latest build of Windows Admin Center by using this link: aka.ms/downloadwac


How could an attacker exploit this vulnerability?

An authenticated attacker could exploit the vulnerability by carrying out any one of the following actions:

  1. Importing a malicious script to the Windows Admin Center (WAC) HTML form.
  2. Importing a .csv file using the Windows Admin Center (WAC) user interface.
  3. Importing a .csv file using the Windows Admin Center (WAC) API.

If the victim who triggers the attack is a highly-privileged administrator the injected scripts could perform operations on the WAC server, thus spoofing the WAC application with the privileges of the victim administrator.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-29347
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Admin Center Release Notes (Security Update) Important Spoofing None Base: 8.7
Temporal: 7.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:H/E:U/RL:O/RC:C
2306 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-29347 Christian Pöschl with usd AG


CVE-2023-33127 - .NET and Visual Studio Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-33127
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: .NET and Visual Studio Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.3
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition and also to take additional actions prior to exploitation to prepare the target environment.


According to the CVSS metric, the attack vector is network (AV:N). How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by abusing the .NET diagnostics server to gain elevation of privileges.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

The attacker would gain the rights of the user that is running the affected application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-33127
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
.NET 6.0 5028705 (Security Update) Important Elevation of Privilege None Base: 8.1
Temporal: 7.3
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
6.0.20 Maybe None
.NET 7.0 5028706 (Security Update) Important Elevation of Privilege None Base: 8.1
Temporal: 7.3
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
7.0.9 Maybe None
Microsoft Visual Studio 2022 version 17.0 Release Notes (Security Update) Important Elevation of Privilege None Base: 8.1
Temporal: 7.3
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
17.0.23 Maybe None
Microsoft Visual Studio 2022 version 17.2 Release Notes (Security Update) Important Elevation of Privilege None Base: 8.1
Temporal: 7.3
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
17.2.17 Maybe None
Microsoft Visual Studio 2022 version 17.4 Release Notes (Security Update) Important Elevation of Privilege None Base: 8.1
Temporal: 7.3
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
17.4.9 Maybe None
Microsoft Visual Studio 2022 version 17.6 Release Notes (Security Update) Important Elevation of Privilege None Base: 8.1
Temporal: 7.3
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
17.6.5 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-33127 Jimmy Bayne


CVE-2023-33134 - Microsoft SharePoint Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-33134
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft SharePoint Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Within a SharePoint site, the attacker must be authenticated, and they would need to have the “Use Remote Interfaces” and “Add and Customize Pages” permissions on a Policy Center site to be able to exploit this vulnerability.


What is the attack vector for this vulnerability?

In a network-based attack, the attacker must be authenticated to a SharePoint Online tenant associated with a hybrid deployment to tamper with data. This tampered data is synchronized down to the on-premises server and exploits the vulnerability. The attackers code will run in the context of the SharePoint timer service on the on-premises server.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-33134
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft SharePoint Enterprise Server 2016 5002425 (Security Update) Important Remote Code Execution 5002404 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5404.1000 Maybe None
Microsoft SharePoint Server 2019 5002423 (Security Update) Important Remote Code Execution 5002402 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10400.20008 Maybe None
Microsoft SharePoint Server Subscription Edition 5002424 (Security Update) Important Remote Code Execution 5002416 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.16130.20642 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-33134 zcgonvh


CVE-2023-33154 - Windows Partition Management Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-33154
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Partition Management Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-33154
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Elevation of Privilege 5027230 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Elevation of Privilege 5027230 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Elevation of Privilege 5027279
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Elevation of Privilege 5027279
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Elevation of Privilege 5027279
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Elevation of Privilege 5027279
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Elevation of Privilege 5027275
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Elevation of Privilege 5027275
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Elevation of Privilege 5027283
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Elevation of Privilege 5027283
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Elevation of Privilege 5027271
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Elevation of Privilege 5027271
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-33154 Fraunhofer FKIE CA&D


CVE-2023-33155 - Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-33155
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-33155
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2019 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-33155 Abdelhamid Naceri


CVE-2023-33156 - Microsoft Defender Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-33156
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Defender Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.3/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


References Identification
Last version of the Microsoft Malware Protection Platform affected by this vulnerability Version 1.1.20300.3
First version of the Microsoft Malware Protection Platform with this vulnerability addressed Version 1.1.23050.3

See Manage Updates Baselines Microsoft Defender Antivirus for more information.

Microsoft Defender is disabled in my environment, why are vulnerability scanners showing that I am vulnerable to this issue?

Vulnerability scanners are looking for specific binaries and version numbers on devices. Microsoft Defender files are still on disk even when disabled. Systems that have disabled Microsoft Defender are not in an exploitable state.

Why is no action required to install this update?

In response to a constantly changing threat landscape, Microsoft frequently updates malware definitions and the Microsoft Malware Protection Platform. In order to be effective in helping protect against new and prevalent threats, antimalware software must be kept up to date with these updates in a timely manner.

For enterprise deployments as well as end users, the default configuration in Microsoft antimalware software helps ensure that malware definitions and the Microsoft Malware Protection Platform are kept up to date automatically. Product documentation also recommends that products are configured for automatic updating.

Best practices recommend that customers regularly verify whether software distribution, such as the automatic deployment of Microsoft Malware Protection Platform updates and malware definitions, is working as expected in their environment.

How often are the Microsoft Malware Protection Platform and malware definitions updated?

Microsoft typically releases an update for the Microsoft Malware Protection Platform once a month or as needed to protect against new threats. Microsoft also typically updates the malware definitions three times daily and can increase the frequency when needed.

Depending on which Microsoft antimalware software is used and how it is configured, the software may search for platform, engine and definition updates every day when connected to the Internet, up to multiple times daily. Customers can also choose to manually check for updates at any time.

What is the Microsoft Malware Protection Platform?

The Microsoft Malware Protection Platform is a collection of user-mode binaries (e.g. MsMpEng.exe) and kernel-mode drivers that run on top of Windows to keep devices protected against new and prevalent threats.

Windows Defender uses the Microsoft Malware Protection Platform. On which products is Defender installed and active by default?

Defender runs on all supported version of Windows.

Are there other products that use the Microsoft Malware Protection Platform?

Yes, Microsoft System Center Endpoint Protection, Microsoft System Center 2012 R2 Endpoint Protection, Microsoft System Center 2012 Endpoint Protection and Microsoft Security Essentials.

Does this update contain any additional security-related changes to functionality?

Yes.  In addition to the changes that are listed for this vulnerability, this update includes defense-in-depth updates to help improve security-related features.

Suggested Actions

Verify that the update is installed

Customers should verify that the latest version of the Microsoft Malware Protection Platform and definition updates are being actively downloaded and installed for their Microsoft antimalware products.

  1. Open the Windows Security program. For example, type Security in the Search bar, and select the Windows Security program.
  2. In the navigation pane, select Virus & threat protection.
  3. Under Virus & threat protection updates in the main window, select Check for updates
  4. Select Check for updates again.
  5. In the navigation pane, select Settings, and then select About.
  6. Examine the Platform Version number. The update was successfully installed if the Malware Protection Platform version number or the signature package version number matches or exceeds the version number that you are trying to verify as installed.

According to the CVSS metrics, successful exploitation of this vulnerability could lead to no loss of confidentiality (C:N) but have major impact on integrity (I:H) and on availability (A:H). What does that mean for this vulnerability?

This vulnerability does not allow disclosure of any confidential information, but could allow an attacker to delete data that could include data that results in the service being unavailable.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-33156
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Malware Protection Engine Release Notes (Security Update) Important Elevation of Privilege None Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
1.1.23050.3 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-33156 Abdelhamid Naceri


CVE-2023-33157 - Microsoft SharePoint Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-33157
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft SharePoint Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit the vulnerability?

In a network-based attack, an authenticated attacker with Manage List permissions could execute code remotely on the SharePoint Server.


According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability?

An attacker who successfully exploits this vulnerability could perform a remote attack that could enable access to the victim's information and the ability to alter information. Successful exploitation could also potentially cause downtime for the targeted environment.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

The attacker must be authenticated to the target site as at least a Site Member.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-33157
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft SharePoint Enterprise Server 2016 5002425 (Security Update) Critical Remote Code Execution 5002404 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5404.1000 Maybe None
Microsoft SharePoint Server 2019 5002423 (Security Update) Critical Remote Code Execution 5002402 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10400.20008 Maybe None
Microsoft SharePoint Server Subscription Edition 5002424 (Security Update) Critical Remote Code Execution 5002416 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.16130.20642 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-33157 zcgonvh


CVE-2023-33158 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-33158
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-33158
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for Mac Release Notes (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.75.23070901 Maybe None
Microsoft Office for Universal Release Notes (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.14326.21502 Maybe None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.75.23070901 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-33158 Michael Heinzl


CVE-2023-33159 - Microsoft SharePoint Server Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-33159
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft SharePoint Server Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click on a specially crafted URL to be compromised by the attacker.


According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability?

An attacker who successfully exploits this vulnerability could perform a remote attack that could enable access to the victim's information and the ability to alter information. Successful exploitation could also potentially cause downtime for the targeted environment.


How could an attacker exploit the vulnerability?

An attacker who successfully exploited this vulnerability might be able to run their scripts in the security context of the current user by enticing the user to click on a link resulting in a cross-site scripting attack on the SharePoint Server.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-33159
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft SharePoint Enterprise Server 2016 5002425 (Security Update) Important Spoofing 5002404 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5404.1000 Maybe None
Microsoft SharePoint Server 2019 5002423 (Security Update) Important Spoofing 5002402 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10400.20008 Maybe None
Microsoft SharePoint Server Subscription Edition 5002424 (Security Update) Important Spoofing 5002416 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.16130.20642 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-33159 Anonymous


CVE-2023-33160 - Microsoft SharePoint Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-33160
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft SharePoint Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability?

An attacker who successfully exploits this vulnerability could perform a remote attack that could enable access to the victim's information and the ability to alter information. Successful exploitation could also potentially cause downtime for the targeted environment.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

The attacker must be authenticated to the target site as at least a Site Member.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by leveraging vulnerable APIs through a deserialization of unsafe data input vulnerability. Exploitation of this vulnerability requires that a user access a susceptible API on an affected version of SharePoint with specially-formatted input, resulting in possible remote code execution on the SharePoint Server.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-33160
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft SharePoint Enterprise Server 2016 5002425 (Security Update) Critical Remote Code Execution 5002404 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5404.1000 Maybe None
Microsoft SharePoint Server 2019 5002423 (Security Update) Critical Remote Code Execution 5002402 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10400.20008 Maybe None
Microsoft SharePoint Server Subscription Edition 5002424 (Security Update) Critical Remote Code Execution 5002416 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.16130.20642 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-33160 Markus Wulftange with CODE WHITE GmbH


CVE-2023-33161 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-33161
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-33161
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for Mac Release Notes (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.75.23070901 Maybe None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.75.23070901 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-33161 Wenguang Jiao


CVE-2023-33162 - Microsoft Excel Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-33162
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is information disclosure?

The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer which could leak data.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-33162
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Information Disclosure None Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Information Disclosure None Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Excel 2013 RT Service Pack 1 5002434 (Security Update) Important Information Disclosure 5002414 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
15.0.5571.1000 Maybe None
Microsoft Excel 2013 Service Pack 1 (32-bit editions) 5002434 (Security Update) Important Information Disclosure 5002414 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
15.0.5571.1000 Maybe None
Microsoft Excel 2013 Service Pack 1 (64-bit editions) 5002434 (Security Update) Important Information Disclosure 5002414 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
15.0.5571.1000 Maybe None
Microsoft Excel 2016 (32-bit edition) 5002426 (Security Update) Important Information Disclosure 5002405 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
16.0.5404.1000 Maybe None
Microsoft Excel 2016 (64-bit edition) 5002426 (Security Update) Important Information Disclosure 5002405 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
16.0.5404.1000 Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Information Disclosure None Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Information Disclosure None Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for Mac Release Notes (Security Update) Important Information Disclosure None Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
16.75.23070901 Maybe None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Information Disclosure None Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Information Disclosure None Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Information Disclosure None Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
16.75.23070901 Maybe None
Microsoft Office Online Server 5002421 (Security Update) Important Information Disclosure 5002401 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
16.0.10400.20000 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-33162 Genwei Jiang with Mandiant, FLARE OTF


Dhanesh Kizhakkinan with Mandiant, FLARE OTF


Li Qi, Dong Kangwei and Zhang Yanping with 360 HuntingZero Lab


CVE-2023-33163 - Windows Network Load Balancing Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-33163
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Network Load Balancing Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorAdjacent
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires that an attacker will need to first gain access to the restricted network before running an attack.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-33163
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Remote Code Execution 5027275
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Remote Code Execution 5027275
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Remote Code Execution 5027283
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Remote Code Execution 5027283
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Remote Code Execution 5027271
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Remote Code Execution 5027271
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Remote Code Execution 5027225
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Remote Code Execution 5027225
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-33163 b2ahex


CVE-2023-33164 - Remote Procedure Call Runtime Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-33164
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Remote Procedure Call Runtime Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-33164
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Denial of Service 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Denial of Service
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Denial of Service 5027279
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Denial of Service 5027275
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Denial of Service 5027275
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Denial of Service 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Denial of Service 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Denial of Service 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Denial of Service 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Denial of Service 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Denial of Service 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-33164 Microsoft Offensive Research & Security Engineering with Microsoft


CVE-2023-33170 - ASP.NET and Visual Studio Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-33170
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: ASP.NET and Visual Studio Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.3
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition and also to take additional actions prior to exploitation to prepare the target environment.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-33170
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
.NET 6.0 5028705 (Security Update) Important Security Feature Bypass None Base: 8.1
Temporal: 7.3
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
6.0.20 Maybe None
.NET 7.0 5028706 (Security Update) Important Security Feature Bypass None Base: 8.1
Temporal: 7.3
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
7.0.9 Maybe None
Microsoft Visual Studio 2022 version 17.0 Release Notes (Security Update) Important Security Feature Bypass None Base: 8.1
Temporal: 7.3
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
17.0.23 Maybe None
Microsoft Visual Studio 2022 version 17.2 Release Notes (Security Update) Important Security Feature Bypass None Base: 8.1
Temporal: 7.3
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
17.2.17 Maybe None
Microsoft Visual Studio 2022 version 17.4 Release Notes (Security Update) Important Security Feature Bypass None Base: 8.1
Temporal: 7.3
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
17.4.9 Maybe None
Microsoft Visual Studio 2022 version 17.6 Release Notes (Security Update) Important Security Feature Bypass None Base: 8.1
Temporal: 7.3
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
17.6.5 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-33170 Jack Moran with ZX Security


Matt Cotterell with ZX Security


Ethan McKee-Harris with ZX Security


CVE-2023-33171 - Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-33171
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.2/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityHigh
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click on a specially crafted URL to be compromised by the attacker.


According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

The vulnerability is in the web server, but the malicious scripts execute in the victim’s browser on their machine.


According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability?

The attacker is only able to modify the content of the vulnerable link to redirect the victim to a malicious site.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-33171
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Dynamics 365 (on-premises) version 9.0 5026500 (Security Update) Important Spoofing None Base: 8.2
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C
9.0.47.08 Maybe None
Microsoft Dynamics 365 (on-premises) version 9.1 5026501 (Security Update) Important Spoofing None Base: 8.2
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C
9.1.18.22 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-33171 batram


CVE-2023-32052 - Microsoft Power Apps Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-32052
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Power Apps Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.4/TemporalScore:4.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.


According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L)? What does that mean for this vulnerability?

Limited information can be disclosed to the attacker through the misuse of the infrastructure, but no sensitive information can be obtained by the attacker.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-32052
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Dynamics 365 (on-premises) version 9.0 5026500 (Security Update) Important Spoofing None Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C
9.0.47.08 Maybe None
Microsoft Dynamics 365 (on-premises) version 9.1 5026501 (Security Update) Important Spoofing None Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C
9.1.18.22 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-32052 Firas Fatnassi


CVE-2023-32053 - Windows Installer Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-32053
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Installer Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-32053
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Elevation of Privilege 5027230 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Elevation of Privilege 5027230 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Elevation of Privilege 5027275
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Elevation of Privilege 5027275
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Elevation of Privilege 5027283
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Elevation of Privilege 5027283
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Elevation of Privilege 5027271
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Elevation of Privilege 5027271
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-32053 Naceri with MSRC V&M


CVE-2023-32054 - Volume Shadow Copy Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-32054
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Volume Shadow Copy Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

The attacker would gain the rights of the user that is running the affected application.


According to the CVSS metrics, user interaction is required (UI:R) and privileges required is low (PR:L). What does that mean for this vulnerability?

An authenticated attacker would need to perform specific actions on a vulnerable system, then convince another user on that system to interact with the Volume Shadow Copy functionality.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-32054
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Elevation of Privilege 5027230 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Elevation of Privilege 5027230 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Elevation of Privilege 5027275
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Elevation of Privilege 5027275
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Elevation of Privilege 5027283
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Elevation of Privilege 5027283
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2016 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-32054 Or Yair with SafeBreach


CVE-2023-32055 - Active Template Library Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-32055
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Active Template Library Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-32055
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Elevation of Privilege 5027230 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Elevation of Privilege 5027230 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Elevation of Privilege 5027279
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Elevation of Privilege 5027279
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Elevation of Privilege 5027279
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Elevation of Privilege 5027279
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Elevation of Privilege 5027275
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Elevation of Privilege 5027275
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Elevation of Privilege 5027283
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Elevation of Privilege 5027283
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Elevation of Privilege 5027271
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Elevation of Privilege 5027271
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-32055 k0shl with Kunlun Lab


CVE-2023-32056 - Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-32056
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-32056
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2019 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-32056 Naceri with MSRC V&M


CVE-2023-32057 - Microsoft Message Queuing Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-32057
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Message Queuing Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit the vulnerability?

To exploit this vulnerability, an attacker would need to send a specially crafted malicious MSMQ packet to a MSMQ server. This could result in remote code execution on the server side.


Mitigations:

Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors might be helpful in your situation:

The Windows message queuing service, which is a Windows component, needs to be enabled for a system to be exploitable by this vulnerability. This feature can be added via the Control Panel.

You can check to see if there is a service running named Message Queuing and TCP port 1801 is listening on the machine.


Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-32057
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Critical Remote Code Execution 5027230 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Critical Remote Code Execution 5027230 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Critical Remote Code Execution 5027219 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Critical Remote Code Execution 5027219 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Critical Remote Code Execution 5027222
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Critical Remote Code Execution 5027222
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Critical Remote Code Execution 5027222
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Critical Remote Code Execution 5027215
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Critical Remote Code Execution 5027215
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Critical Remote Code Execution 5027215
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Critical Remote Code Execution
5027215
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Critical Remote Code Execution
5027215
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Critical Remote Code Execution
5027215
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Critical Remote Code Execution 5027223
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Critical Remote Code Execution 5027223
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Critical Remote Code Execution 5027231
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Critical Remote Code Execution 5027231
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Critical Remote Code Execution 5027279
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Critical Remote Code Execution 5027279
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Critical Remote Code Execution 5027279
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Critical Remote Code Execution 5027279
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Critical Remote Code Execution 5027275
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Critical Remote Code Execution 5027275
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Critical Remote Code Execution 5027283
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Critical Remote Code Execution 5027283
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Critical Remote Code Execution 5027271
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Critical Remote Code Execution 5027271
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Critical Remote Code Execution 5027219 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Critical Remote Code Execution 5027219 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Critical Remote Code Execution 5027222
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Critical Remote Code Execution 5027222
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Critical Remote Code Execution 5027225
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Critical Remote Code Execution 5027225
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-32057 Wayne Low of Fortinet's FortiGuard Lab


CVE-2023-32083 - Microsoft Failover Cluster Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-32083
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Failover Cluster Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.


According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires the attacker or targeted user to have specific elevated privileges. Only users with roles “Cluster Admin” and “Cluster Operator” can access this.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-32083
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2016 5028169 (Security Update) Important Information Disclosure 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Information Disclosure 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Information Disclosure 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Information Disclosure 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Information Disclosure 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Information Disclosure 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-32083 k0shl with Kunlun Lab


CVE-2023-32084 - HTTP.sys Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-32084
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: HTTP.sys Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-32084
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Denial of Service 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2019 5028168 (Security Update) Important Denial of Service 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Denial of Service 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Denial of Service 5027225
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Denial of Service 5027225
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-32084 Dragana Damjanovic


CVE-2023-32085 - Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-32085
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.


How could an attacker exploit this vulnerability?

An authenticated attacker with normal user permissions could use the Microsoft PS Class Driver to print a malicious XPS file, which could enable an information disclosure attack on the machine.

Please see Standard XPS Filters for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-32085
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Information Disclosure 5027230 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Information Disclosure 5027230 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Information Disclosure 5027219 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Information Disclosure 5027219 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Information Disclosure 5027223
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Information Disclosure 5027223
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Information Disclosure 5027231
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Information Disclosure 5027231
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Information Disclosure 5027283
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Information Disclosure 5027283
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Information Disclosure 5027271
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Information Disclosure 5027271
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Information Disclosure 5027219 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Information Disclosure 5027219 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Information Disclosure 5027225
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Information Disclosure 5027225
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-32085 kap0k


CVE-2023-35296 - Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35296
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35296
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Information Disclosure 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Information Disclosure 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Information Disclosure 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Information Disclosure 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Information Disclosure 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Information Disclosure 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Information Disclosure 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Information Disclosure 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Information Disclosure 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Information Disclosure 5027283
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Information Disclosure 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Information Disclosure 5027271
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Information Disclosure 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Information Disclosure 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Information Disclosure 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Information Disclosure 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Information Disclosure 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Information Disclosure 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35296 kap0k


CVE-2023-35297 - Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35297
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorAdjacent
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.


According to the CVSS score, the attack vector is adjacent (AV:A). What does this mean for this vulnerability?

This attack is limited to systems connected to the same network segment as the attacker. The attack cannot be performed across multiple networks (for example, a WAN) and would be limited to systems on the same network switch or virtual network.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35297
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Critical Remote Code Execution 5027230 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Critical Remote Code Execution 5027230 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Critical Remote Code Execution 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Critical Remote Code Execution 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Critical Remote Code Execution 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Critical Remote Code Execution 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Critical Remote Code Execution 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Critical Remote Code Execution 5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Critical Remote Code Execution 5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Critical Remote Code Execution 5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Critical Remote Code Execution
5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Critical Remote Code Execution
5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Critical Remote Code Execution
5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Critical Remote Code Execution 5027223
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Critical Remote Code Execution 5027223
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Critical Remote Code Execution 5027231
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Critical Remote Code Execution 5027231
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Critical Remote Code Execution 5027279
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Critical Remote Code Execution 5027279
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Critical Remote Code Execution 5027279
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Critical Remote Code Execution 5027279
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Critical Remote Code Execution 5027275
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Critical Remote Code Execution 5027275
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Critical Remote Code Execution 5027283
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Critical Remote Code Execution 5027283
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Critical Remote Code Execution 5027271
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Critical Remote Code Execution 5027271
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Critical Remote Code Execution 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Critical Remote Code Execution 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Critical Remote Code Execution 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Critical Remote Code Execution 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Critical Remote Code Execution 5027225
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Critical Remote Code Execution 5027225
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35297 Anonymous


CVE-2023-35298 - HTTP.sys Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35298
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: HTTP.sys Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

In most situations, an unauthenticated attacker could send a specially crafted packet to a targeted server utilizing the Server Name Indication (SNI) over HTTP Protocol Stack (http.sys) to process packets, causing a denial of service (DOS).


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35298
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Denial of Service 5027223
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Denial of Service 5027231
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2022 5028171 (Security Update) Important Denial of Service 5027225
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Denial of Service 5027225
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35298 Hong Hai with Alibaba Orion Security Lab


CVE-2023-35299 - Windows Common Log File System Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35299
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35299
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Elevation of Privilege 5027230 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Elevation of Privilege 5027230 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Elevation of Privilege 5027279
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Elevation of Privilege 5027279
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Elevation of Privilege 5027279
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Elevation of Privilege 5027279
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Elevation of Privilege 5027275
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Elevation of Privilege 5027275
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Elevation of Privilege 5027283
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Elevation of Privilege 5027283
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Elevation of Privilege 5027271
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Elevation of Privilege 5027271
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35299 ThunderJ with KunlunLab


CVE-2023-35300 - Remote Procedure Call Runtime Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35300
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

The authenticated attacker could take advantage of this vulnerability to execute malicious code through the RPC runtime.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35300
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Remote Code Execution 5027230 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Remote Code Execution 5027230 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Remote Code Execution 5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Remote Code Execution 5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Remote Code Execution 5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Remote Code Execution
5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Remote Code Execution
5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Remote Code Execution
5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Remote Code Execution 5027223
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Remote Code Execution 5027223
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Remote Code Execution 5027231
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Remote Code Execution 5027231
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Remote Code Execution 5027275
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Remote Code Execution 5027275
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Remote Code Execution 5027283
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Remote Code Execution 5027283
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Remote Code Execution 5027271
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Remote Code Execution 5027271
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Remote Code Execution 5027225
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Remote Code Execution 5027225
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35300 Microsoft Offensive Research & Security Engineering with Microsoft


CVE-2023-35302 - Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35302
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An authenticated attacker with normal privileges could send a modified XPS file to a shared printer, which can result in a remote code execution.


Mitigations:
None
Workarounds:

Determine if the Print Spooler service is running

Run the following in Windows PowerShell:

Get-Service -Name Spooler

If the Print Spooler is running or if the service is not set to disabled, select one of the following options to either disable the Print Spooler service, or to Disable inbound remote printing through Group Policy:

Option 1 - Disable the Print Spooler service

If disabling the Print Spooler service is appropriate for your enterprise, use the following PowerShell commands:

Stop-Service -Name Spooler -Force

Set-Service -Name Spooler -StartupType Disabled

Impact of workaround Disabling the Print Spooler service disables the ability to print both locally and remotely.

Option 2 - Disable inbound remote printing through Group Policy

You can also configure the settings via Group Policy as follows:

Computer Configuration / Administrative Templates / Printers

Disable the “Allow Print Spooler to accept client connections:” policy to block remote attacks.

You must restart the Print Spooler service for the group policy to take effect.

Impact of workaround This policy will block the remote attack vector by preventing inbound remote printing operations. The system will no longer function as a print server, but local printing to a directly attached device will still be possible.

For more information see: Use Group Policy settings to control printers.


Revision:
1.0    11-Jul-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35302
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Remote Code Execution 5027230 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Remote Code Execution 5027230 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Remote Code Execution 5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Remote Code Execution 5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Remote Code Execution 5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Remote Code Execution
5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Remote Code Execution
5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Remote Code Execution
5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Remote Code Execution 5027223
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Remote Code Execution 5027223
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Remote Code Execution 5027231
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Remote Code Execution 5027231
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Remote Code Execution 5027283
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Remote Code Execution 5027283
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Remote Code Execution 5027271
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Remote Code Execution 5027271
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Remote Code Execution 5027225
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Remote Code Execution 5027225
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35302 kap0k


CVE-2023-35303 - USB Audio Class System Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35303
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: USB Audio Class System Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An authenticated attacker could use Remote Desktop to connect to a vulnerable system that has Plug and Play device redirection enabled.

Alternatively, an attacker could plug a specially crafted USB device into the port of a vulnerable system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35303
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Remote Code Execution 5027230 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Remote Code Execution 5027230 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Remote Code Execution 5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Remote Code Execution 5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Remote Code Execution 5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Remote Code Execution
5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Remote Code Execution
5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Remote Code Execution
5027215
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Remote Code Execution 5027223
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Remote Code Execution 5027223
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Remote Code Execution 5027231
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Remote Code Execution 5027231
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Remote Code Execution 5027275
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Remote Code Execution 5027275
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Remote Code Execution 5027283
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Remote Code Execution 5027283
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Remote Code Execution 5027271
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Remote Code Execution 5027271
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Remote Code Execution 5027225
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Remote Code Execution 5027225
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35303 B1aN


CVE-2023-35304 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35304
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35304
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2016 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35304 B1aN


CVE-2023-35305 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35305
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35305
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2016 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35305 B1aN


CVE-2023-35306 - Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35306
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could view heap memory from a privileged process running on the server.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35306
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Information Disclosure 5027230 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Information Disclosure 5027230 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Information Disclosure 5027219 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Information Disclosure 5027219 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Information Disclosure 5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Information Disclosure
5027215
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Information Disclosure 5027223
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Information Disclosure 5027223
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Information Disclosure 5027231
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Information Disclosure 5027231
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Information Disclosure 5027283
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Information Disclosure 5027283
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Information Disclosure 5027271
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Information Disclosure 5027271
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Information Disclosure 5027219 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Information Disclosure 5027219 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Information Disclosure 5027222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Information Disclosure 5027225
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Information Disclosure 5027225
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35306 kap0k


CVE-2023-35308 - Windows MSHTML Platform Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35308
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows MSHTML Platform Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityLow
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


What kind of security feature could be bypassed by successfully exploiting this vulnerability?

A security feature bypass vulnerability exists when the MSHTML platform fails to validate the correct Security Zone of requests for specific URLs. This could allow an attacker to cause a user to access a URL in a less restricted Internet Security Zone than intended.

To exploit this vulnerability, an attacker could email or otherwise provide a specially crafted URL to a victim and convince them to click on it.

The security update addresses the vulnerability by correcting security feature behavior to properly map affected URLs to the correct Security Zone.


According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L) and some loss of availability (A:L). What does that mean for this vulnerability?

An attacker can craft a malicious file that would evade Mark of the Web (MOTW) defenses, resulting in a limited loss of integrity and availability of security features such as Protected View in Microsoft Office, which rely on MOTW tagging.


The Security Updates table indicates that this vulnerability affects all supported versions of Microsoft Windows except Windows Server 2008, Windows Server 2008 R2, and Windows Server 2012. Why are IE Cumulative updates listed for Windows Server 2012 R2?

While Microsoft has announced retirement of the Internet Explorer 11 application on certain platforms and the Microsoft Edge Legacy application is deprecated, the underlying MSHTML, EdgeHTML, and scripting platforms are still supported. The MSHTML platform is used by Internet Explorer mode in Microsoft Edge as well as other applications through WebBrowser control. The EdgeHTML platform is used by WebView and some UWP applications. The scripting platforms are used by MSHTML and EdgeHTML but can also be used by other legacy applications. Updates to address vulnerabilities in the MSHTML platform and scripting engine are included in the IE Cumulative Updates; EdgeHTML and Chakra changes are not applicable to those platforms.

To stay fully protected, we recommend that customers who install Security Only updates install the IE Cumulative updates for this vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35308
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Security Feature Bypass 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Security Feature Bypass 5027230 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Security Feature Bypass 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Security Feature Bypass 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Security Feature Bypass 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Security Feature Bypass 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Security Feature Bypass 5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Security Feature Bypass
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Security Feature Bypass
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Security Feature Bypass
5027215
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Security Feature Bypass 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Security Feature Bypass 5027223
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Security Feature Bypass 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Security Feature Bypass 5027231
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
5028167 (IE Cumulative)
Important Security Feature Bypass 5027271

5026366
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
1.001
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
5028167 (IE Cumulative)
Important Security Feature Bypass 5027271

5026366
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
1.001
Yes None
Windows Server 2016 5028169 (Security Update) Important Security Feature Bypass 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Security Feature Bypass 5027219 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Security Feature Bypass 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Security Feature Bypass 5027225
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35308 Ben Faull with Microsoft


CVE-2023-35309 - Microsoft Message Queuing Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35309
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Message Queuing Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


How could an attacker exploit this vulnerability?

In order to successfully exploit this vulnerability, the target server must be configured to allow remote activation of the COM object as well as the attacker having sufficient user privileges on that server.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35309
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Remote Code Execution 5027230 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Remote Code Execution 5027230 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Remote Code Execution 5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Remote Code Execution 5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Remote Code Execution 5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Remote Code Execution
5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Remote Code Execution
5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Remote Code Execution
5027215
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Remote Code Execution 5027223
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Remote Code Execution 5027223
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Remote Code Execution 5027231
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Remote Code Execution 5027231
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Remote Code Execution 5027275
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Remote Code Execution 5027275
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Remote Code Execution 5027283
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Remote Code Execution 5027283
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Remote Code Execution 5027271
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Remote Code Execution 5027271
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Remote Code Execution 5027225
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Remote Code Execution 5027225
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35309 k0shl with Kunlun Lab


CVE-2023-35310 - Windows DNS Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35310
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows DNS Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.6/TemporalScore:5.8
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires the attacker or targeted user to have specific elevated privileges. As is best practice, regular validation and audits of administrative groups should be conducted.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35310
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5028222 (Monthly Rollup)
5028226 (Security Only)
Important Remote Code Execution 5027279
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22175
Yes 5028222
5028226
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Remote Code Execution 5027275
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Remote Code Execution 5027275
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Remote Code Execution 5027283
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Remote Code Execution 5027283
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Remote Code Execution 5027271
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Remote Code Execution 5027271
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Remote Code Execution 5027219 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Remote Code Execution 5027222
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Remote Code Execution 5027225
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Remote Code Execution 5027225
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35310 George Hughey with MSRC Vulnerabilities and Mitigations


CVE-2023-35311 - Microsoft Outlook Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35311
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Outlook Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:8.2
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityFunctional
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click on a specially crafted URL to be compromised by the attacker.


What kind of security feature could be bypassed by successfully exploiting this vulnerability?

The attacker would be able to bypass the Microsoft Outlook Security Notice prompt.


Is the Preview Pane an attack vector for this vulnerability?

Yes. The Preview Pane is an attack vector, but additional user interaction is required.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Detected No Yes

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35311
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Security Feature Bypass None Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Security Feature Bypass None Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Security Feature Bypass None Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Security Feature Bypass None Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Security Feature Bypass None Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Security Feature Bypass None Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Outlook 2013 (32-bit editions) 5002432 (Security Update) Important Security Feature Bypass 5002382 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
15.0.5571.1000 Maybe None
Microsoft Outlook 2013 (64-bit editions) 5002432 (Security Update) Important Security Feature Bypass 5002382 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
15.0.5571.1000 Maybe None
Microsoft Outlook 2013 RT Service Pack 1 5002432 (Security Update) Important Security Feature Bypass 5002382 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
15.0.5571.1000 Maybe None
Microsoft Outlook 2016 (32-bit edition) 5002427 (Security Update) Important Security Feature Bypass 5002387 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
16.0.5404.1000 Maybe None
Microsoft Outlook 2016 (64-bit edition) 5002427 (Security Update) Important Security Feature Bypass 5002387 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
16.0.5404.1000 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35311 Anonymous


CVE-2023-35312 - Microsoft VOLSNAP.SYS Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35312
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft VOLSNAP.SYS Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain administrator privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35312
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Elevation of Privilege 5027230 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Elevation of Privilege 5027230 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege 5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Elevation of Privilege
5027215
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Elevation of Privilege 5027223
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Elevation of Privilege 5027231
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Elevation of Privilege 5027275
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5028240 (Monthly Rollup)
5028224 (Security Only)
Important Elevation of Privilege 5027275
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26623
Yes 5028240
5028224
Windows Server 2012 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Elevation of Privilege 5027283
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 (Server Core installation) 5028232 (Monthly Rollup)
5028233 (Security Only)
Important Elevation of Privilege 5027283
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24374 Yes None
Windows Server 2012 R2 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Elevation of Privilege 5027271
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2012 R2 (Server Core installation) 5028228 (Monthly Rollup)
5028223 (Security Only)
Important Elevation of Privilege 5027271
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21063
6.3.9600.21075
Yes None
Windows Server 2016 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Elevation of Privilege 5027219 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Elevation of Privilege 5027222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Elevation of Privilege 5027225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35312 Anonymous


CVE-2023-35335 - Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35335
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.2/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityHigh
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click on a specially crafted URL to be compromised by the attacker.


According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

The vulnerability is in the web server, but the malicious scripts execute in the victim’s browser on their machine.


According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H)? What does that mean for this vulnerability?

There could be a loss of confidentiality if an unaware user clicked on a popup therefore creating an opportunity for an attacker to retrieve cookies or present the user with a dialog box to enter user credentials.


According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability?

The attacker is only able to modify the content of the vulnerable link to redirect the victim to a malicious site.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35335
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Dynamics 365 (on-premises) version 9.0 5026500 (Security Update) Important Spoofing None Base: 8.2
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C
9.0.47.08 Maybe None
Microsoft Dynamics 365 (on-premises) version 9.1 5026501 (Security Update) Important Spoofing None Base: 8.2
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C
9.1.18.22 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35335 Erik Donker


CVE-2023-35373 - Mono Authenticode Validation Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35373
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Mono Authenticode Validation Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.3/TemporalScore:4.8
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35373
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Mono 6.12.0 Release Notes (Security Update) Important Spoofing None Base: 5.3
Temporal: 4.8
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
6.XX.X Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35373 Bill Demirkapi with Microsoft


CVE-2023-35374 - Paint 3D Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35374
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Paint 3D Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


How do I get the updated app?

The Microsoft Store will automatically update affected customers. Alternatively, customers can get the update immediately; see here for details.

It is possible for customers to disable automatic updates for the Microsoft Store. The Microsoft Store will not automatically install this update for those customers.

My system is in a disconnected environment; is it vulnerable?

Customers using the Microsoft Store for Business and Microsoft Store for Education can get this update through their organizations.

How can I check if the update is installed?

App package versions 6.2305.16087.0 and later contain this update.

You can check the package version in PowerShell:

Get-AppxPackage -Name Microsoft.MSPaint


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35374
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Paint 3D Release Notes (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2305.16087.0 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35374 Anonymous


CVE-2023-36867 - Visual Studio Code GitHub Pull Requests and Issues Extension Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36867
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Visual Studio Code GitHub Pull Requests and Issues Extension Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.0
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36867
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Visual Studio Code - GitHub Pull Requests and Issues Extension Release Notes (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
0.66.2 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36867 Paul Gerste with Sonar


CVE-2023-36868 - Azure Service Fabric on Windows Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36868
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Service Fabric on Windows Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorAdjacent
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.


According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?

This vulnerability's attack is limited at the protocol level to a logically adjacent topology. This means it cannot simply be done across the internet, but instead needs something specific tied to the target. Good examples would include the same shared physical network (such as Bluetooth or IEEE 802.11), logical network (local IP subnet), or from within a secure or otherwise limited administrative domain (MPLS, secure VPN to an administrative network zone). This is common to many attacks that require man-in-the-middle type setups or that rely on initially gaining a foothold in another environment.


Mitigations:

Does Azure Service Fabric provide any additional protections which can help reduce or mitigate the risks posed by this vulnerability?

A user must explicitly configure the virtual network associated with an Azure Service Fabric resource, to expose the endpoints to be accessible by a potential attacker. Resources configured as described in the Azure Service Fabric Best Practices are at a lower risk of exploitation.


Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36868
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Service Fabric 9.0 for Windows Release Notes (Security Update) Important Information Disclosure None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
9.0.1526.9590 Maybe None
Azure Service Fabric 9.1 for Windows Release Notes (Security Update) Important Information Disclosure None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
9.1.1799.9590 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36868 Carolina Hatanpaa with Azure Red Team


CVE-2023-36871 - Azure Active Directory Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36871
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Active Directory Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.0
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityFunctional
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

An attacker would require access to a low privileged session on the user's device to obtain a JWT (JSON Web Token) which can then be used to craft a long-lived assertion using the Windows Hello for Business Key from the victim's device.


According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of integrity (I:H)? What does that mean for this vulnerability?

By exploiting this vulnerability, an attacker can craft a long-lived assertion and impersonate a victim user affecting the integrity of the assertion.


What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker can bypass Windows Trusted Platform Module by crafting an assertion and using the assertion to request a Primary Refresh Token from another device.


What actions do I need to take to be protected from this vulnerability?

To be protected, apply the fix as follows:

Install Windows updates released on or after July 11, 2023 on all AD FS servers of the farm. Then, enable the setting by running the following PowerShell command on the primary AD FS server of the farm:

Set-AdfsProperties-EnforceNonceInJWT Enabled

Important You may see authentication failures in certain scenarios when there are clients that are not updated and send JWT authentication requests to the AD FS server. In such cases, we recommend updating all clients by installing the Windows update released on or after July 11, 2023. Alternatively, an administrator can disable the EnforceNonceInJWT setting and monitor the AD FS servers for the logging of Event 187 to identify potential requests that could be rejected when EnforceNonceInJWT is set to Enabled. After confirming the absence of Event 187 on AD FS servers for a defined period of time, the EnforceNonceInJWT setting must be updated to Enabled.


What actions do I need to take to be protected from this vulnerability?

Customers should install Windows updates released on or after July 11, 2023 on client devices with Windows OS. Please refer the affected software section to apply the update.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-23    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36871
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5028186 (Security Update) Important Security Feature Bypass 5027230 Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 for x64-based Systems 5028186 (Security Update) Important Security Feature Bypass 5027230 Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.10240.20048 Yes None
Windows 10 Version 1607 for 32-bit Systems 5028169 (Security Update) Important Security Feature Bypass 5027219 Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1607 for x64-based Systems 5028169 (Security Update) Important Security Feature Bypass 5027219 Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.14393.6085 Yes None
Windows 10 Version 1809 for 32-bit Systems 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for ARM64-based Systems 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 1809 for x64-based Systems 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows 10 Version 21H2 for 32-bit Systems 5028166 (Security Update) Important Security Feature Bypass 5027215
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for ARM64-based Systems 5028166 (Security Update) Important Security Feature Bypass 5027215
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 21H2 for x64-based Systems 5028166 (Security Update) Important Security Feature Bypass 5027215
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.19041.3208
Yes 5028166
Windows 10 Version 22H2 for 32-bit Systems 5028166 (Security Update) Important Security Feature Bypass
5027215
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for ARM64-based Systems 5028166 (Security Update) Important Security Feature Bypass
5027215
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 10 Version 22H2 for x64-based Systems 5028166 (Security Update) Important Security Feature Bypass
5027215
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C

10.0.19045.3208
Yes 5028166
Windows 11 version 21H2 for ARM64-based Systems 5028182 (Security Update) Important Security Feature Bypass 5027223
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 version 21H2 for x64-based Systems 5028182 (Security Update) Important Security Feature Bypass 5027223
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.22000.2176
Yes 5028182
Windows 11 Version 22H2 for ARM64-based Systems 5028185 (Security Update) Important Security Feature Bypass 5027231
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows 11 Version 22H2 for x64-based Systems 5028185 (Security Update) Important Security Feature Bypass 5027231
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.22621.1992
Yes 5028185
Windows Server 2016 5028169 (Security Update) Important Security Feature Bypass 5027219 Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2016 (Server Core installation) 5028169 (Security Update) Important Security Feature Bypass 5027219 Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.14393.6085 Yes None
Windows Server 2019 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2019 (Server Core installation) 5028168 (Security Update) Important Security Feature Bypass 5027222
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.17763.4645
Yes 5028168
Windows Server 2022 5028171 (Security Update) Important Security Feature Bypass 5027225
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.20348.1850
Yes 5028171
Windows Server 2022 (Server Core installation) 5028171 (Security Update) Important Security Feature Bypass 5027225
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.20348.1850
Yes 5028171

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36871 Dirk-jan Mollema with Outsider Security