This report contains detail for the following vulnerabilities:
CVE Issued by | Tag | CVE ID | CVE Title |
---|---|---|---|
Microsoft | .NET Core | CVE-2023-38178 | .NET Core and Visual Studio Denial of Service Vulnerability |
Microsoft | .NET Core | CVE-2023-35390 | .NET and Visual Studio Remote Code Execution Vulnerability |
Microsoft | .NET Framework | CVE-2023-36873 | .NET Framework Spoofing Vulnerability |
Microsoft | ASP .NET | CVE-2023-38180 | .NET and Visual Studio Denial of Service Vulnerability |
Microsoft | ASP.NET | CVE-2023-36899 | ASP.NET Elevation of Privilege Vulnerability |
Microsoft | ASP.NET and Visual Studio | CVE-2023-35391 | ASP.NET Core SignalR and Visual Studio Information Disclosure Vulnerability |
Microsoft | Azure Arc | CVE-2023-38176 | Azure Arc-Enabled Servers Elevation of Privilege Vulnerability |
Microsoft | Azure DevOps | CVE-2023-36869 | Azure DevOps Server Spoofing Vulnerability |
Microsoft | Azure HDInsights | CVE-2023-38188 | Azure Apache Hadoop Spoofing Vulnerability |
Microsoft | Azure HDInsights | CVE-2023-35393 | Azure Apache Hive Spoofing Vulnerability |
Microsoft | Azure HDInsights | CVE-2023-35394 | Azure HDInsight Jupyter Notebook Spoofing Vulnerability |
Microsoft | Azure HDInsights | CVE-2023-36881 | Azure Apache Ambari Spoofing Vulnerability |
Microsoft | Azure HDInsights | CVE-2023-36877 | Azure Apache Oozie Spoofing Vulnerability |
Microsoft | Dynamics Business Central Control | CVE-2023-38167 | Microsoft Dynamics Business Central Elevation Of Privilege Vulnerability |
security-advisories@github.com | Mariner | CVE-2023-35945 | Unknown |
Microsoft | Memory Integrity System Readiness Scan Tool | ADV230004 | Memory Integrity System Readiness Scan Tool Defense in Depth Update |
Microsoft | Microsoft Dynamics | CVE-2023-35389 | Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability |
Microsoft | Microsoft Edge (Chromium-based) | CVE-2023-38157 | Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-4068 | Chromium: CVE-2023-4068 Type Confusion in V8 |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-4072 | Chromium: CVE-2023-4072 Out of bounds read and write in WebGL |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-4071 | Chromium: CVE-2023-4071 Heap buffer overflow in Visuals |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-4073 | Chromium: CVE-2023-4073 Out of bounds memory access in ANGLE |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-4075 | Chromium: CVE-2023-4075 Use after free in Cast |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-4074 | Chromium: CVE-2023-4074 Use after free in Blink Task Scheduling |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-4076 | Chromium: CVE-2023-4076 Use after free in WebRTC |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-4077 | Chromium: CVE-2023-4077 Insufficient data validation in Extensions |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-4078 | Chromium: CVE-2023-4078 Inappropriate implementation in Extensions |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-4070 | Chromium: CVE-2023-4070 Type Confusion in V8 |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-4069 | Chromium: CVE-2023-4069 Type Confusion in V8 |
Microsoft | Microsoft Exchange Server | CVE-2023-38185 | Microsoft Exchange Server Remote Code Execution Vulnerability |
Microsoft | Microsoft Exchange Server | CVE-2023-35388 | Microsoft Exchange Server Remote Code Execution Vulnerability |
Microsoft | Microsoft Exchange Server | CVE-2023-35368 | Microsoft Exchange Remote Code Execution Vulnerability |
Microsoft | Microsoft Exchange Server | CVE-2023-38181 | Microsoft Exchange Server Spoofing Vulnerability |
Microsoft | Microsoft Exchange Server | CVE-2023-38182 | Microsoft Exchange Server Remote Code Execution Vulnerability |
Microsoft | Microsoft Exchange Server | CVE-2023-21709 | Microsoft Exchange Server Elevation of Privilege Vulnerability |
Microsoft | Microsoft Office | ADV230003 | Microsoft Office Defense in Depth Update |
Microsoft | Microsoft Office | CVE-2023-36897 | Visual Studio Tools for Office Runtime Spoofing Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2023-36896 | Microsoft Excel Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2023-35371 | Microsoft Office Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Outlook | CVE-2023-36893 | Microsoft Outlook Spoofing Vulnerability |
Microsoft | Microsoft Office Outlook | CVE-2023-36895 | Microsoft Outlook Remote Code Execution Vulnerability |
Microsoft | Microsoft Office SharePoint | CVE-2023-36891 | Microsoft SharePoint Server Spoofing Vulnerability |
Microsoft | Microsoft Office SharePoint | CVE-2023-36894 | Microsoft SharePoint Server Information Disclosure Vulnerability |
Microsoft | Microsoft Office SharePoint | CVE-2023-36890 | Microsoft SharePoint Server Information Disclosure Vulnerability |
Microsoft | Microsoft Office SharePoint | CVE-2023-36892 | Microsoft SharePoint Server Spoofing Vulnerability |
Microsoft | Microsoft Office Visio | CVE-2023-35372 | Microsoft Office Visio Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Visio | CVE-2023-36865 | Microsoft Office Visio Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Visio | CVE-2023-36866 | Microsoft Office Visio Remote Code Execution Vulnerability |
Microsoft | Microsoft Teams | CVE-2023-29328 | Microsoft Teams Remote Code Execution Vulnerability |
Microsoft | Microsoft Teams | CVE-2023-29330 | Microsoft Teams Remote Code Execution Vulnerability |
Microsoft | Microsoft WDAC OLE DB provider for SQL | CVE-2023-36882 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability |
Advanced Micro Devices Inc. | Microsoft Windows | CVE-2023-20569 | AMD: CVE-2023-20569 Return Address Predictor |
Microsoft | Microsoft Windows Codecs Library | CVE-2023-38170 | HEVC Video Extensions Remote Code Execution Vulnerability |
Microsoft | Reliability Analysis Metrics Calculation Engine | CVE-2023-36876 | Reliability Analysis Metrics Calculation (RacTask) Elevation of Privilege Vulnerability |
Microsoft | Role: Windows Hyper-V | CVE-2023-36908 | Windows Hyper-V Information Disclosure Vulnerability |
Microsoft | SQL Server | CVE-2023-38169 | Microsoft OLE DB Remote Code Execution Vulnerability |
Microsoft | Tablet Windows User Interface | CVE-2023-36898 | Tablet Windows User Interface Application Core Remote Code Execution Vulnerability |
Microsoft | Windows Bluetooth A2DP driver | CVE-2023-35387 | Windows Bluetooth A2DP driver Elevation of Privilege Vulnerability |
Microsoft | Windows Cloud Files Mini Filter Driver | CVE-2023-36904 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability |
Microsoft | Windows Common Log File System Driver | CVE-2023-36900 | Windows Common Log File System Driver Elevation of Privilege Vulnerability |
Microsoft | Windows Cryptographic Services | CVE-2023-36907 | Windows Cryptographic Services Information Disclosure Vulnerability |
Microsoft | Windows Cryptographic Services | CVE-2023-36906 | Windows Cryptographic Services Information Disclosure Vulnerability |
Microsoft | Windows Defender | CVE-2023-38175 | Microsoft Windows Defender Elevation of Privilege Vulnerability |
Microsoft | Windows Fax and Scan Service | CVE-2023-35381 | Windows Fax Service Remote Code Execution Vulnerability |
Microsoft | Windows Group Policy | CVE-2023-36889 | Windows Group Policy Security Feature Bypass Vulnerability |
Microsoft | Windows HTML Platform | CVE-2023-35384 | Windows HTML Platforms Security Feature Bypass Vulnerability |
Microsoft | Windows Kernel | CVE-2023-35359 | Windows Kernel Elevation of Privilege Vulnerability |
Microsoft | Windows Kernel | CVE-2023-38154 | Windows Kernel Elevation of Privilege Vulnerability |
Microsoft | Windows Kernel | CVE-2023-35382 | Windows Kernel Elevation of Privilege Vulnerability |
Microsoft | Windows Kernel | CVE-2023-35386 | Windows Kernel Elevation of Privilege Vulnerability |
Microsoft | Windows Kernel | CVE-2023-35380 | Windows Kernel Elevation of Privilege Vulnerability |
Microsoft | Windows LDAP - Lightweight Directory Access Protocol | CVE-2023-38184 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability |
Microsoft | Windows Message Queuing | CVE-2023-36909 | Microsoft Message Queuing Denial of Service Vulnerability |
Microsoft | Windows Message Queuing | CVE-2023-35376 | Microsoft Message Queuing Denial of Service Vulnerability |
Microsoft | Windows Message Queuing | CVE-2023-38172 | Microsoft Message Queuing Denial of Service Vulnerability |
Microsoft | Windows Message Queuing | CVE-2023-35385 | Microsoft Message Queuing Remote Code Execution Vulnerability |
Microsoft | Windows Message Queuing | CVE-2023-35383 | Microsoft Message Queuing Information Disclosure Vulnerability |
Microsoft | Windows Message Queuing | CVE-2023-36913 | Microsoft Message Queuing Information Disclosure Vulnerability |
Microsoft | Windows Message Queuing | CVE-2023-35377 | Microsoft Message Queuing Denial of Service Vulnerability |
Microsoft | Windows Message Queuing | CVE-2023-38254 | Microsoft Message Queuing Denial of Service Vulnerability |
Microsoft | Windows Message Queuing | CVE-2023-36911 | Microsoft Message Queuing Remote Code Execution Vulnerability |
Microsoft | Windows Message Queuing | CVE-2023-36910 | Microsoft Message Queuing Remote Code Execution Vulnerability |
Microsoft | Windows Message Queuing | CVE-2023-36912 | Microsoft Message Queuing Denial of Service Vulnerability |
Microsoft | Windows Mobile Device Management | CVE-2023-38186 | Windows Mobile Device Management Elevation of Privilege Vulnerability |
Microsoft | Windows Projected File System | CVE-2023-35378 | Windows Projected File System Elevation of Privilege Vulnerability |
Microsoft | Windows Reliability Analysis Metrics Calculation Engine | CVE-2023-35379 | Reliability Analysis Metrics Calculation Engine (RACEng) Elevation of Privilege Vulnerability |
Microsoft | Windows Smart Card | CVE-2023-36914 | Windows Smart Card Resource Management Server Security Feature Bypass Vulnerability |
Microsoft | Windows System Assessment Tool | CVE-2023-36903 | Windows System Assessment Tool Elevation of Privilege Vulnerability |
Microsoft | Windows Wireless Wide Area Network Service | CVE-2023-36905 | Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2023-4068
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2023-4068 Type Confusion in V8
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    07-Aug-23     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-4068 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
115.0.1901.200 | No | None |
CVE ID | Acknowledgements |
CVE-2023-4068 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2023-4069
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2023-4069 Type Confusion in V8
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    07-Aug-23     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-4069 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
115.0.1901.200 | No | None |
CVE ID | Acknowledgements |
CVE-2023-4069 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2023-4070
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2023-4070 Type Confusion in V8
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    07-Aug-23     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-4070 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
115.0.1901.200 | No | None |
CVE ID | Acknowledgements |
CVE-2023-4070 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2023-4071
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2023-4071 Heap buffer overflow in Visuals
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    07-Aug-23     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-4071 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
115.0.1901.200 | No | None |
CVE ID | Acknowledgements |
CVE-2023-4071 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2023-4072
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2023-4072 Out of bounds read and write in WebGL
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    07-Aug-23     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-4072 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
115.0.1901.200 | No | None |
CVE ID | Acknowledgements |
CVE-2023-4072 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2023-4073
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2023-4073 Out of bounds memory access in ANGLE
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    07-Aug-23     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-4073 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
115.0.1901.200 | No | None |
CVE ID | Acknowledgements |
CVE-2023-4073 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2023-4074
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2023-4074 Use after free in Blink Task Scheduling
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    07-Aug-23     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-4074 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
115.0.1901.200 | No | None |
CVE ID | Acknowledgements |
CVE-2023-4074 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2023-4075
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2023-4075 Use after free in Cast
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    07-Aug-23     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-4075 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
115.0.1901.200 | No | None |
CVE ID | Acknowledgements |
CVE-2023-4075 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2023-4076
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2023-4076 Use after free in WebRTC
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    07-Aug-23     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-4076 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
115.0.1901.200 | No | None |
CVE ID | Acknowledgements |
CVE-2023-4076 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2023-4077
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2023-4077 Insufficient data validation in Extensions
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    07-Aug-23     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-4077 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
115.0.1901.200 | No | None |
CVE ID | Acknowledgements |
CVE-2023-4077 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2023-4078
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2023-4078 Inappropriate implementation in Extensions
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    07-Aug-23     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-4078 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
115.0.1901.200 | No | None |
CVE ID | Acknowledgements |
CVE-2023-4078 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-29328
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Teams Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? A user would need to join a malicious Microsoft Teams meeting set up by the attacker. According to the CVSS metric, the attack vector is network (AV:N) and privilege required is none (PR:N). What is the target used in the context of the remote code execution? An attacker would be required to trick the victim into joining a Teams meeting which would enable them to perform remote code execution in the context of the victim user. The attacker does not need privileges to attempt to exploit this vulnerability. According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability? An attacker who successfully exploits this vulnerability could perform a remote attack that could enable access to the victim's information and the ability to alter information. Successful exploitation could also potentially cause downtime for the client machine. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-29328 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Teams for Android | Release Notes (Security Update) | Critical | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.0.0.2023070204 | Maybe | None |
Microsoft Teams for Desktop | Release Notes (Security Update) | Critical | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.6.00.18681 | Maybe | None |
Microsoft Teams for iOS | Release Notes (Security Update) | Critical | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
5.12.1 | Maybe | None |
Microsoft Teams for Mac | Release Notes (Security Update) | Critical | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.6.00.17554 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-29328 | nicolas joly |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-29330
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Teams Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? A user would need to join a malicious Microsoft Teams meeting set up by the attacker. According to the CVSS metric, the attack vector is network (AV:N) and privilege required is none (PR:N). What is the target used in the context of the remote code execution? An attacker would be required to trick the victim into joining a Teams meeting which would enable them to perform remote code execution in the context of the victim user. The attacker does not need privileges to attempt to exploit this vulnerability. According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability? An attacker who successfully exploits this vulnerability could perform a remote attack that could enable access to the victim's information and the ability to alter information. Successful exploitation could also potentially cause downtime for the client machine. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-29330 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Teams for Android | Release Notes (Security Update) | Critical | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.0.0.2023070204 | Maybe | None |
Microsoft Teams for Desktop | Release Notes (Security Update) | Critical | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.6.00.18681 | Maybe | None |
Microsoft Teams for iOS | Release Notes (Security Update) | Critical | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
5.12.1 | Maybe | None |
Microsoft Teams for Mac | Release Notes (Security Update) | Critical | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.6.00.17554 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-29330 | nicolas joly |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-35359
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metrics, the attack vector is local (AV:L) and privilege required is low (PR:L). What does that mean for this vulnerability? An attacker must have local access to the targeted machine and must be able to create folders and performance traces on the machine, with restricted privileges that normal users have by default. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-35359 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5029259 (Security Update) | Important | Elevation of Privilege | 5028186 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 for x64-based Systems | 5029259 (Security Update) | Important | Elevation of Privilege | 5028186 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5029242 (Security Update) | Important | Elevation of Privilege | 5028169 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5029242 (Security Update) | Important | Elevation of Privilege | 5028169 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for ARM64-based Systems | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for x64-based Systems | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 21H2 for 32-bit Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for x64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for 32-bit Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for x64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 11 version 21H2 for ARM64-based Systems | 5029253 (Security Update) | Important | Elevation of Privilege | 5028182 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5029253 (Security Update) | Important | Elevation of Privilege | 5028182 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5029263 (Security Update) | Important | Elevation of Privilege | 5028185 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows 11 Version 22H2 for x64-based Systems | 5029263 (Security Update) | Important | Elevation of Privilege | 5028185 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Elevation of Privilege | 5028222 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Elevation of Privilege | 5028222 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Elevation of Privilege | 5028222 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Elevation of Privilege | 5028222 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Elevation of Privilege | 5028240 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Elevation of Privilege | 5028240 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2012 | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Elevation of Privilege | 5028232 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 (Server Core installation) | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Elevation of Privilege | 5028232 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 R2 | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Elevation of Privilege | 5028228 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Elevation of Privilege | 5028228 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2016 | 5029242 (Security Update) | Important | Elevation of Privilege | 5028169 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2016 (Server Core installation) | 5029242 (Security Update) | Important | Elevation of Privilege | 5028169 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2019 | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2019 (Server Core installation) | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2022 | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Elevation of Privilege | 5028171 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
Windows Server 2022 (Server Core installation) | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Elevation of Privilege | 5028171 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
CVE ID | Acknowledgements |
CVE-2023-35359 | James Forshaw with Google Project Zero |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-35368
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Exchange Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H), integrity (I:H) and availability (A:H). What does that mean for this vulnerability? An attacker who successfully exploited this vulnerability could access a user's Net-NTLMv2 hash which could be used as a basis of an NTLM Relay attack against another service to authenticate as the user. According to the CVSS metric, the attack vector is adjacent (AV:A), and privilege required is none (PR:N). What does that mean for this vulnerability? The attacker for this vulnerability could target the server accounts in an arbitrary or remote code execution and attempt to trigger malicious code in the context of the server's account through a network call. The attacker needs no privileges to perform this attack. How could an attacker exploit this vulnerability? Successful exploitation of this vulnerability could allow an attacker the ability to gain remote code execution via an in-network attacker calling arbitrary endpoints. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-35368 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Exchange Server 2016 Cumulative Update 23 | 5029388 (Security Update) | Important | Remote Code Execution | 5029388 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.01.2507.031 |
Yes | 5029388 |
Microsoft Exchange Server 2019 Cumulative Update 12 | 5029388 (Security Update) | Important | Remote Code Execution | 5026261 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.02.1118.036 |
Yes | 5029388 |
Microsoft Exchange Server 2019 Cumulative Update 13 | 5029388 (Security Update) | Important | Remote Code Execution | 5026261 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.02.1258.023 |
Yes | 5029388 |
CVE ID | Acknowledgements |
CVE-2023-35368 | Daniel F. |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36865
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Office Visio Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability? An attacker who successfully exploits this vulnerability could perform a remote attack that could enable access to the victim's information and the ability to alter information. Successful exploitation could also potentially cause downtime for the targeted environment. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36865 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
CVE ID | Acknowledgements |
CVE-2023-36865 | Kim Dong-Uk (@justlikebono) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36866
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Office Visio Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability? An attacker who successfully exploits this vulnerability could perform a remote attack that could enable access to the victim's information and the ability to alter information. Successful exploitation could also potentially cause downtime for the targeted environment. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36866 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
CVE ID | Acknowledgements |
CVE-2023-36866 | Kim Dong-Uk (@justlikebono) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||
CVE-2023-36869
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure DevOps Server Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.3/TemporalScore:6.0
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker would have to send the victim a malicious link that the victim would have to click for a successful attack. According to the CVSS metrics, successful exploitation of this vulnerability could lead to minor loss of confidentiality (C:L), integrity (I:L) and availability (A:L). What does that mean for this vulnerability? While we cannot rule out the impact to Confidentiality, Integrity, and Availability, the ability to exploit this vulnerability by itself is limited. The impact to Confidentiality and Integrity is limited to a single Azure DevOps organization or project, depending on the victim's credentials. Impact to Availability is limited to the victim only. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36869 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure DevOps Server 2019.0.1 | Release Notes (Security Update) | Important | Spoofing | None | Base: 6.3 Temporal: 6.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/RL:O/RC:C |
20230721.6 | Maybe | None |
Azure DevOps Server 2019.1.2 | Release Notes (Security Update) | Important | Spoofing | None | Base: 6.3 Temporal: 6.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/RL:O/RC:C |
20230601.1 | Maybe | None |
Azure DevOps Server 2020.1.2 | Release Notes (Security Update) | Important | Spoofing | None | Base: 6.3 Temporal: 6.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/RL:O/RC:C |
20230601.3 | Maybe | None |
Azure DevOps Server 2022.0.1 | Release Notes (Security Update) | Important | Spoofing | None | Base: 6.3 Temporal: 6.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/RL:O/RC:C |
20230602.5 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-36869 | Martin Wrona (martin_jw) with Digitec Galaxus AG |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36873
MITRE NVD Issuing CNA: Microsoft |
CVE Title: .NET Framework Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.4/TemporalScore:6.7
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to create a crafted certificate in order to validate themselves as a trusted source. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36873 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for 32-bit Systems | 5029647 (Security Update) | Important | Spoofing | None | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
3.5.04057.05 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for ARM64-based Systems | 5029647 (Security Update) | Important | Spoofing | None | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.7.4057.05 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for x64-based Systems | 5029647 (Security Update) | Important | Spoofing | None | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
3.5.04057.05 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 | 5029647 (Security Update) | Important | Spoofing | None | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
3.5.04057.05 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 (Server Core installation) | 5029647 (Security Update) | Important | Spoofing | None | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
3.5.04057.05 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for 32-bit Systems | 5029647 (Security Update) | Important | Spoofing | None | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
3.5.4654.08 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for x64-based Systems | 5029647 (Security Update) | Important | Spoofing | None | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.8.04654.08 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for 32-bit Systems | 5029648 (Security Update) | Important | Spoofing | None | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.8.04654.06 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for ARM64-based Systems | 5029648 (Security Update) | Important | Spoofing | None | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.8.04654.06 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for x64-based Systems | 5029648 (Security Update) | Important | Spoofing | None | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.8.04654.06 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for 32-bit Systems | 5029649 (Security Update) | Important | Spoofing | None | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.8.04654.06 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for ARM64-based Systems | 5029649 (Security Update) | Important | Spoofing | None | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.8.04654.06 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for x64-based Systems | 5029649 (Security Update) | Important | Spoofing | None | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.8.04654.06 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for ARM64-based Systems | 5029650 (Security Update) | Important | Spoofing | None | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.8.04654.06 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for x64-based Systems | 5029650 (Security Update) | Important | Spoofing | None | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.8.04654.06 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 | 5029647 (Security Update) | Important | Spoofing | None | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.8.04654.08 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 (Server Core installation) | 5029647 (Security Update) | Important | Spoofing | None | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.8.04654.08 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 | 5029655 (Security Update) | Important | Spoofing | None | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.8.04654.06 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 (Server Core installation) | 5029655 (Security Update) | Important | Spoofing | None | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.8.04654.06 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for 32-bit Systems | 5029648 (Security Update) | Important | Spoofing | None | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.8.09176.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for ARM64-based Systems | 5029648 (Security Update) | Important | Spoofing | None | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.8.09176.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for x64-based Systems | 5029648 (Security Update) | Important | Spoofing | None | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.8.09176.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for 32-bit Systems | 5029649 (Security Update) | Important | Spoofing | None | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.8.09176.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for ARM64-based Systems | 5029649 (Security Update) | Important | Spoofing | None | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.8.09176.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for x64-based Systems | 5029649 (Security Update) | Important | Spoofing | None | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.8.09176.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for ARM64-based Systems | 5029650 (Security Update) | Important | Spoofing | None | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.8.09176.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for x64-based Systems | 5029650 (Security Update) | Important | Spoofing | None | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.8.09176.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for ARM64-based Systems | 5028948 (Security Update) | Important | Spoofing | None | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.8.09176.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for x64-based Systems | 5028948 (Security Update) | Important | Spoofing | None | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.8.09176.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 | 5029655 (Security Update) | Important | Spoofing | None | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
3.5.09176.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 (Server Core installation) | 5029655 (Security Update) | Important | Spoofing | None | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
3.5.09176.01 | Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5029654 (Monthly Rollup) 5029569 (Security Only) |
Important | Spoofing | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.7.04057.05 4.7.4057.04 |
Maybe | None | |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5029654 (Monthly Rollup) 5029569 (Security Only) |
Important | Spoofing | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.7.04057.05 4.7.4057.04 |
Maybe | None | |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5029654 (Monthly Rollup) 5029569 (Security Only) |
Important | Spoofing | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.7.04057.05 4.7.04057.04 |
Maybe | None | |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5029654 (Monthly Rollup) 5029569 (Security Only) |
Important | Spoofing | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.7.04057.05 4.7.04057.04 |
Maybe | None | |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5029651 (Monthly Rollup) 5029566 (Security Only) |
Important | Spoofing | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.7.04057.05 |
Maybe | None | |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5029651 (Monthly Rollup) 5029566 (Security Only) |
Important | Spoofing | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.7.04057.05 |
Maybe | None | |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 | 5029652 (Monthly Rollup) 5029567 (Security Only) |
Important | Spoofing | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.7.04057.05 |
Maybe | None | |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 (Server Core installation) | 5029652 (Monthly Rollup) 5029567 (Security Only) |
Important | Spoofing | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.7.04057.05 |
Maybe | None | |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 | 5029653 (Monthly Rollup) 5029568 (Security Only) |
Important | Spoofing | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.7.04057.07 |
Maybe | None | |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 (Server Core installation) | 5029653 (Monthly Rollup) 5029568 (Security Only) |
Important | Spoofing | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.7.04057.07 |
Maybe | None | |
Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for 32-bit Systems | 5028952 (Security Update) | Important | Spoofing | None | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.8.4654.06 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for x64-based Systems | 5028952 (Security Update) | Important | Spoofing | None | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.8.04654.06 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5029651 (Monthly Rollup) 5029566 (Security Only) |
Important | Spoofing | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.8.4654.06 |
Maybe | None | |
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5029651 (Monthly Rollup) 5029566 (Security Only) |
Important | Spoofing | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.8.4654.06 |
Maybe | None | |
Microsoft .NET Framework 4.8 on Windows Server 2012 | 5029652 (Monthly Rollup) 5029567 (Security Only) |
Important | Spoofing | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.8.04654.06 |
Maybe | None | |
Microsoft .NET Framework 4.8 on Windows Server 2012 (Server Core installation) | 5029652 (Monthly Rollup) 5029567 (Security Only) |
Important | Spoofing | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.8.04654.06 |
Maybe | None | |
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 | 5029653 (Monthly Rollup) 5029568 (Security Only) |
Important | Spoofing | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.8.04654.08 |
Maybe | None | |
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 (Server Core installation) | 5029653 (Monthly Rollup) 5029568 (Security Only) |
Important | Spoofing | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.8.04654.08 |
Maybe | None | |
Microsoft .NET Framework 4.8 on Windows Server 2016 | 5028952 (Security Update) | Important | Spoofing | None | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.8.04654.06 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2016 (Server Core installation) | 5028952 (Security Update) | Important | Spoofing | None | Base: 7.4 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
4.8.04654.06 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-36873 | Bill Demirkapi with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36876
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Reliability Analysis Metrics Calculation (RacTask) Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.2
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could create or delete files in the security context of the “NT AUTHORITY\ LOCAL SERVICE” account. According to the CVSS metrics, successful exploitation of this vulnerability does not impact confidentiality (C:N) but has major impact on integrity (I:H) and availability (A:H). What does that mean for this vulnerability? An attacker who successfully exploits this vulnerability cannot access existing files (C:N) but can write or overwrite file contents (I:H), which potentially may cause the system to become unavailable (A:H). Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36876 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Elevation of Privilege | 5028240 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Elevation of Privilege | 5028240 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
CVE ID | Acknowledgements |
CVE-2023-36876 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36882
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable). Mitigations: The following mitigating factors might be helpful in your situation: Exploitation of this vulnerability requires an attacker to trick or convince the victim into connecting to their malicious server. If your environment only connects to known, trusted servers and there is no ability to reconfigure existing connections to point to another location (for example you use TLS encryption with certificate validation), the vulnerability cannot be exploited. Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36882 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5029259 (Security Update) | Important | Remote Code Execution | 5028186 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 for x64-based Systems | 5029259 (Security Update) | Important | Remote Code Execution | 5028186 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5029242 (Security Update) | Important | Remote Code Execution | 5028169 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5029242 (Security Update) | Important | Remote Code Execution | 5028169 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5029247 (Security Update) | Important | Remote Code Execution | 5028168 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for ARM64-based Systems | 5029247 (Security Update) | Important | Remote Code Execution | 5028168 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for x64-based Systems | 5029247 (Security Update) | Important | Remote Code Execution | 5028168 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 21H2 for 32-bit Systems | 5029244 (Security Update) | Important | Remote Code Execution | 5028166 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Remote Code Execution | 5028166 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for x64-based Systems | 5029244 (Security Update) | Important | Remote Code Execution | 5028166 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for 32-bit Systems | 5029244 (Security Update) | Important | Remote Code Execution | 5028166 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Remote Code Execution | 5028166 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for x64-based Systems | 5029244 (Security Update) | Important | Remote Code Execution | 5028166 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 11 version 21H2 for ARM64-based Systems | 5029253 (Security Update) | Important | Remote Code Execution | 5028182 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5029253 (Security Update) | Important | Remote Code Execution | 5028182 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5029263 (Security Update) | Important | Remote Code Execution | 5028185 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows 11 Version 22H2 for x64-based Systems | 5029263 (Security Update) | Important | Remote Code Execution | 5028185 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Remote Code Execution | 5028222 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Remote Code Execution | 5028222 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Remote Code Execution | 5028222 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Remote Code Execution | 5028222 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Remote Code Execution | 5028240 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Remote Code Execution | 5028240 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2012 | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Remote Code Execution | 5028232 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 (Server Core installation) | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Remote Code Execution | 5028232 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 R2 | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Remote Code Execution | 5028228 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Remote Code Execution | 5028228 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2016 | 5029242 (Security Update) | Important | Remote Code Execution | 5028169 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2016 (Server Core installation) | 5029242 (Security Update) | Important | Remote Code Execution | 5028169 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2019 | 5029247 (Security Update) | Important | Remote Code Execution | 5028168 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2019 (Server Core installation) | 5029247 (Security Update) | Important | Remote Code Execution | 5028168 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2022 | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Remote Code Execution | 5028171 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
Windows Server 2022 (Server Core installation) | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Remote Code Execution | 5028171 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
CVE ID | Acknowledgements |
CVE-2023-36882 | bee13oy with Cyber Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
ADV230003
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Office Defense in Depth Update
CVSS: None Executive Summary: Microsoft has released an update for Microsoft Office that provides enhanced security as a defense in depth measure. FAQ: Is this advisory related to the vulnerability that is documented by CVE-2023-36884 that was issued in July 2023? Yes, this defense in depth update is not a vulnerability, but installing this update stops the attack chain leading to the Windows Search security feature bypass vulnerability (CVE-2023-36884). Microsoft recommends installing the Office updates discussed in this advisory as well as installing the Windows updates from August 2023. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Moderate | Defense in Depth |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Detected | Yes | Yes |
The following tables list the affected software details for the vulnerability.
ADV230003 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Moderate | Defense in Depth | None | Base: N/A Temporal: N/A Vector: N/A |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Moderate | Defense in Depth | None | Base: N/A Temporal: N/A Vector: N/A |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Excel 2013 RT Service Pack 1 | 5002451 (Security Update) | Moderate | Defense in Depth | None | Base: N/A Temporal: N/A Vector: N/A |
15.0.5579.1001 | Maybe | None |
Microsoft Excel 2013 Service Pack 1 (32-bit editions) | 5002451 (Security Update) | Moderate | Defense in Depth | 5002348 | Base: N/A Temporal: N/A Vector: N/A |
15.0.5579.1001 | Maybe | None |
Microsoft Excel 2013 Service Pack 1 (64-bit editions) | 5002451 (Security Update) | Moderate | Defense in Depth | 5002348 | Base: N/A Temporal: N/A Vector: N/A |
15.0.5579.1001 | Maybe | None |
Microsoft Excel 2016 (32-bit edition) | 5002463 (Security Update) | Moderate | Defense in Depth | 5002351 | Base: N/A Temporal: N/A Vector: N/A |
16.0.5408.1002 | Maybe | None |
Microsoft Excel 2016 (64-bit edition) | 5002463 (Security Update) | Moderate | Defense in Depth | 5002351 | Base: N/A Temporal: N/A Vector: N/A |
16.0.5408.1002 | Maybe | None |
Microsoft Office 2013 RT Service Pack 1 | 5002439 (Security Update) | Moderate | Defense in Depth | None | Base: N/A Temporal: N/A Vector: N/A |
15.0.5579.1001 | Maybe | None |
Microsoft Office 2013 Service Pack 1 (32-bit editions) | 5002439 (Security Update) | Moderate | Defense in Depth | None | Base: N/A Temporal: N/A Vector: N/A |
15.0.5579.1001 | Maybe | None |
Microsoft Office 2013 Service Pack 1 (64-bit editions) | 5002439 (Security Update) | Moderate | Defense in Depth | None | Base: N/A Temporal: N/A Vector: N/A |
15.0.5579.1001 | Maybe | None |
Microsoft Office 2016 (32-bit edition) | 5002465 (Security Update) | Moderate | Defense in Depth | 4011126 | Base: N/A Temporal: N/A Vector: N/A |
16.0.5408.1002 | Maybe | None |
Microsoft Office 2016 (64-bit edition) | 5002465 (Security Update) | Moderate | Defense in Depth | 4011126 | Base: N/A Temporal: N/A Vector: N/A |
16.0.5408.1002 | Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Moderate | Defense in Depth | None | Base: N/A Temporal: N/A Vector: N/A |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Moderate | Defense in Depth | None | Base: N/A Temporal: N/A Vector: N/A |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Moderate | Defense in Depth | None | Base: N/A Temporal: N/A Vector: N/A |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Moderate | Defense in Depth | None | Base: N/A Temporal: N/A Vector: N/A |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft PowerPoint 2013 RT Service Pack 1 | 5002399 (Security Update) | Moderate | Defense in Depth | 4493227 | Base: N/A Temporal: N/A Vector: N/A |
15.0.5579.1001 | Maybe | None |
Microsoft PowerPoint 2013 Service Pack 1 (32-bit editions) | 5002399 (Security Update) | Moderate | Defense in Depth | 4493227 | Base: N/A Temporal: N/A Vector: N/A |
15.0.5579.1001 | Maybe | None |
Microsoft PowerPoint 2013 Service Pack 1 (64-bit editions) | 5002399 (Security Update) | Moderate | Defense in Depth | 4493227 | Base: N/A Temporal: N/A Vector: N/A |
16.0.5408.1001 | Maybe | None |
Microsoft PowerPoint 2016 (32-bit edition) | 4504720 (Security Update) | Moderate | Defense in Depth | 4493224 | Base: N/A Temporal: N/A Vector: N/A |
16.0.5408.1001 | Maybe | None |
Microsoft PowerPoint 2016 (64-bit edition) | 4504720 (Security Update) | Moderate | Defense in Depth | 4493224 | Base: N/A Temporal: N/A Vector: N/A |
16.0.5408.1001 | Maybe | None |
Microsoft Project 2013 Service Pack 1 (32-bit editions) | 4484489 (Security Update) | Moderate | Defense in Depth | 4484450 | Base: N/A Temporal: N/A Vector: N/A |
15.0.5579.1001 | Maybe | None |
Microsoft Project 2013 Service Pack 1 (64-bit editions) | 4484489 (Security Update) | Moderate | Defense in Depth | 4484450 | Base: N/A Temporal: N/A Vector: N/A |
15.0.5579.1001 | Maybe | None |
Microsoft Project 2016 (32-bit edition) | 5002328 (Security Update) | Moderate | Defense in Depth | 4484441 | Base: N/A Temporal: N/A Vector: N/A |
16.0.5408.1001 | Maybe | None |
Microsoft Project 2016 (64-bit edition) | 5002328 (Security Update) | Moderate | Defense in Depth | 4484441 | Base: N/A Temporal: N/A Vector: N/A |
16.0.5408.1001 | Maybe | None |
Microsoft Publisher 2013 Service Pack 1 (32-bit editions) | 5002391 (Security Update) | Moderate | Defense in Depth | 4484347 | Base: N/A Temporal: N/A Vector: N/A |
15.0.5579.1001 | Maybe | None |
Microsoft Publisher 2013 Service Pack 1 (64-bit editions) | 5002391 (Security Update) | Moderate | Defense in Depth | 4484347 | Base: N/A Temporal: N/A Vector: N/A |
15.0.5579.1001 | Maybe | None |
Microsoft Publisher 2013 Service Pack 1 RT | 5002391 (Security Update) | Moderate | Defense in Depth | 4484347 | Base: N/A Temporal: N/A Vector: N/A |
15.0.5579.1001 | Maybe | None |
Microsoft Publisher 2016 (32-bit edition) | 5002462 (Security Update) | Moderate | Defense in Depth | 4493152 | Base: N/A Temporal: N/A Vector: N/A |
16.0.5408.1002 | Maybe | None |
Microsoft Publisher 2016 (64-bit edition) | 5002462 (Security Update) | Moderate | Defense in Depth | 4493152 | Base: N/A Temporal: N/A Vector: N/A |
16.0.5408.1002 | Maybe | None |
Microsoft Visio 2013 Service Pack 1 (32-bit editions) | 5002417 (Security Update) | Moderate | Defense in Depth | 5002332 | Base: N/A Temporal: N/A Vector: N/A |
15.0.5579.1001 | Maybe | None |
Microsoft Visio 2013 Service Pack 1 (64-bit editions) | 5002417 (Security Update) | Moderate | Defense in Depth | 5002332 | Base: N/A Temporal: N/A Vector: N/A |
15.0.5579.1001 | Maybe | None |
Microsoft Visio 2016 (32-bit edition) | 5002418 (Security Update) | Moderate | Defense in Depth | 5002337 | Base: N/A Temporal: N/A Vector: N/A |
16.0.5408.1002 | Maybe | None |
Microsoft Visio 2016 (64-bit edition) | 5002418 (Security Update) | Moderate | Defense in Depth | 5002337 | Base: N/A Temporal: N/A Vector: N/A |
16.0.5408.1002 | Maybe | None |
Microsoft Word 2013 RT Service Pack 1 | 5002445 (Security Update) | Moderate | Defense in Depth | 5002316 | Base: N/A Temporal: N/A Vector: N/A |
15.0.5579.1001 | Maybe | None |
Microsoft Word 2013 Service Pack 1 (32-bit editions) | 5002445 (Security Update) | Moderate | Defense in Depth | 5002316 | Base: N/A Temporal: N/A Vector: N/A |
15.0.5579.1001 | Maybe | None |
Microsoft Word 2013 Service Pack 1 (64-bit editions) | 5002445 (Security Update) | Moderate | Defense in Depth | 5002316 | Base: N/A Temporal: N/A Vector: N/A |
15.0.5579.1001 | Maybe | None |
Microsoft Word 2016 (32-bit edition) | 5002464 (Security Update) | Moderate | Defense in Depth | 5002323 | Base: N/A Temporal: N/A Vector: N/A |
16.0.5408.1002 | Maybe | None |
Microsoft Word 2016 (64-bit edition) | 5002464 (Security Update) | Moderate | Defense in Depth | 5002323 | Base: N/A Temporal: N/A Vector: N/A |
16.0.5408.1002 | Maybe | None |
CVE ID | Acknowledgements |
ADV230003 | Microsoft Threat Intelligence Microsoft Threat Intelligence Tom Lancaster with Volexity Paul Rascagneres with Volexity |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36889
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Group Policy Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: None FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An authenticated attacker who successfully exploited this vulnerability could read specific Group Policy configuration settings. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36889 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5029259 (Security Update) | Important | Security Feature Bypass | 5028186 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 for x64-based Systems | 5029259 (Security Update) | Important | Security Feature Bypass | 5028186 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5029242 (Security Update) | Important | Security Feature Bypass | 5028169 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5029242 (Security Update) | Important | Security Feature Bypass | 5028169 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5029247 (Security Update) | Important | Security Feature Bypass | 5028168 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for ARM64-based Systems | 5029247 (Security Update) | Important | Security Feature Bypass | 5028168 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for x64-based Systems | 5029247 (Security Update) | Important | Security Feature Bypass | 5028168 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 21H2 for 32-bit Systems | 5029244 (Security Update) | Important | Security Feature Bypass | 5028166 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Security Feature Bypass | 5028166 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for x64-based Systems | 5029244 (Security Update) | Important | Security Feature Bypass | 5028166 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for 32-bit Systems | 5029244 (Security Update) | Important | Security Feature Bypass | 5028166 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Security Feature Bypass | 5028166 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for x64-based Systems | 5029244 (Security Update) | Important | Security Feature Bypass | 5028166 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 11 version 21H2 for ARM64-based Systems | 5029253 (Security Update) | Important | Security Feature Bypass | 5028182 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5029253 (Security Update) | Important | Security Feature Bypass | 5028182 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5029263 (Security Update) | Important | Security Feature Bypass | 5028185 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows 11 Version 22H2 for x64-based Systems | 5029263 (Security Update) | Important | Security Feature Bypass | 5028185 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Security Feature Bypass | 5028222 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Security Feature Bypass | 5028222 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Security Feature Bypass | 5028222 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Security Feature Bypass | 5028222 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Security Feature Bypass | 5028240 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Security Feature Bypass | 5028240 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2012 | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Security Feature Bypass | 5028232 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 (Server Core installation) | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Security Feature Bypass | 5028232 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 R2 | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Security Feature Bypass | 5028228 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Security Feature Bypass | 5028228 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2016 | 5029242 (Security Update) | Important | Security Feature Bypass | 5028169 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2016 (Server Core installation) | 5029242 (Security Update) | Important | Security Feature Bypass | 5028169 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2019 | 5029247 (Security Update) | Important | Security Feature Bypass | 5028168 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2019 (Server Core installation) | 5029247 (Security Update) | Important | Security Feature Bypass | 5028168 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2022 | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Security Feature Bypass | 5028171 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
Windows Server 2022 (Server Core installation) | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Security Feature Bypass | 5028171 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
CVE ID | Acknowledgements |
CVE-2023-36889 | Alexander Kirk with Viasat |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36898
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Tablet Windows User Interface Application Core Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36898 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 version 21H2 for ARM64-based Systems | 5029253 (Security Update) | Important | Remote Code Execution | 5028182 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5029253 (Security Update) | Important | Remote Code Execution | 5028182 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5029263 (Security Update) | Important | Remote Code Execution | 5028185 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows 11 Version 22H2 for x64-based Systems | 5029263 (Security Update) | Important | Remote Code Execution | 5028185 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
CVE ID | Acknowledgements |
CVE-2023-36898 | wh1tc & Zhiniang Peng with Sangfor |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36899
MITRE NVD Issuing CNA: Microsoft |
CVE Title: ASP.NET Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.7
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? The target environment could be accidentally configured to allow the vulnerability. What privileges could be gained by an attacker who successfully exploited the vulnerability? The attacker would gain the rights of the user that is running the affected application. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36899 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft .NET Framework 2.0 Service Pack 2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5029654 (Monthly Rollup) 5029569 (Security Only) |
Important | Elevation of Privilege | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
2.0.50727.8974 3.0.50727.8974 |
Maybe | None | |
Microsoft .NET Framework 2.0 Service Pack 2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5029654 (Monthly Rollup) 5029569 (Security Only) |
Important | Elevation of Privilege | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
2.0.50727.8974 3.0.50727.8974 |
Maybe | None | |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for 32-bit Systems | 5029647 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
3.5.04057.05 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for ARM64-based Systems | 5029647 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.7.4057.05 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for x64-based Systems | 5029647 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
3.5.04057.05 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 | 5029647 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
3.5.04057.05 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 (Server Core installation) | 5029647 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
3.5.04057.05 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for 32-bit Systems | 5029647 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
3.5.4654.08 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for ARM64-based Systems | 5029647 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.8.04654.08 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for x64-based Systems | 5029647 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.8.04654.08 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for 32-bit Systems | 5029648 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.8.04654.06 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for ARM64-based Systems | 5029648 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.8.04654.06 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for x64-based Systems | 5029648 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.8.04654.06 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for 32-bit Systems | 5029649 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.8.04654.06 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for ARM64-based Systems | 5029649 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.8.04654.06 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for x64-based Systems | 5029649 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.8.04654.06 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for ARM64-based Systems | 5029650 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.8.04654.06 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for x64-based Systems | 5029650 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.8.04654.06 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 | 5029647 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.8.04654.08 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 (Server Core installation) | 5029647 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.8.04654.08 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 | 5029655 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.8.04654.06 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 (Server Core installation) | 5029655 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.8.04654.06 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for 32-bit Systems | 5029648 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.8.09176.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for ARM64-based Systems | 5029648 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.8.09176.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for x64-based Systems | 5029648 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.8.09176.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for 32-bit Systems | 5029649 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.8.09176.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for ARM64-based Systems | 5029649 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.8.09176.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for x64-based Systems | 5029649 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.8.09176.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for ARM64-based Systems | 5029650 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.8.09176.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for x64-based Systems | 5029650 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.8.09176.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for ARM64-based Systems | 5028948 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.8.09176.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for x64-based Systems | 5028948 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.8.09176.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 | 5029655 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
3.5.09176.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 (Server Core installation) | 5029655 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
3.5.09176.01 | Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5029654 (Monthly Rollup) 5029569 (Security Only) |
Important | Elevation of Privilege | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.7.04057.05 4.7.4057.04 |
Maybe | None | |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5029654 (Monthly Rollup) 5029569 (Security Only) |
Important | Elevation of Privilege | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.7.04057.05 4.7.4057.04 |
Maybe | None | |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5029654 (Monthly Rollup) 5029569 (Security Only) |
Important | Elevation of Privilege | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.7.04057.05 4.7.04057.04 |
Maybe | None | |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5029654 (Monthly Rollup) 5029569 (Security Only) |
Important | Elevation of Privilege | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.7.04057.05 4.7.04057.04 |
Maybe | None | |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5029651 (Monthly Rollup) 5029566 (Security Only) |
Important | Elevation of Privilege | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.7.04057.05 |
Maybe | None | |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5029651 (Monthly Rollup) 5029566 (Security Only) |
Important | Elevation of Privilege | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.7.04057.05 |
Maybe | None | |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 | 5029652 (Monthly Rollup) 5029567 (Security Only) |
Important | Elevation of Privilege | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.7.04057.05 |
Maybe | None | |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 (Server Core installation) | 5029652 (Monthly Rollup) 5029567 (Security Only) |
Important | Elevation of Privilege | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.7.04057.05 |
Maybe | None | |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 | 5029653 (Monthly Rollup) 5029568 (Security Only) |
Important | Elevation of Privilege | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.7.04057.07 |
Maybe | None | |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 (Server Core installation) | 5029653 (Monthly Rollup) 5029568 (Security Only) |
Important | Elevation of Privilege | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.7.04057.07 |
Maybe | None | |
Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for 32-bit Systems | 5028952 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.8.4654.06 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for x64-based Systems | 5028952 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.8.04654.06 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5029651 (Monthly Rollup) 5029566 (Security Only) |
Important | Elevation of Privilege | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.8.4654.06 |
Maybe | None | |
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5029651 (Monthly Rollup) 5029566 (Security Only) |
Important | Elevation of Privilege | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.8.4654.06 |
Maybe | None | |
Microsoft .NET Framework 4.8 on Windows Server 2012 | 5029652 (Monthly Rollup) 5029567 (Security Only) |
Important | Elevation of Privilege | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.8.04654.06 |
Maybe | None | |
Microsoft .NET Framework 4.8 on Windows Server 2012 (Server Core installation) | 5029652 (Monthly Rollup) 5029567 (Security Only) |
Important | Elevation of Privilege | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.8.04654.06 |
Maybe | None | |
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 | 5029653 (Monthly Rollup) 5029568 (Security Only) |
Important | Elevation of Privilege | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.8.04654.08 |
Maybe | None | |
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 (Server Core installation) | 5029653 (Monthly Rollup) 5029568 (Security Only) |
Important | Elevation of Privilege | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.8.04654.08 |
Maybe | None | |
Microsoft .NET Framework 4.8 on Windows Server 2016 | 5028952 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.8.04654.06 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2016 (Server Core installation) | 5028952 (Security Update) | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
4.8.04654.06 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-36899 | Soroush Dalili |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36900
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36900 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5029259 (Security Update) | Important | Elevation of Privilege | 5028186 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 for x64-based Systems | 5029259 (Security Update) | Important | Elevation of Privilege | 5028186 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5029242 (Security Update) | Important | Elevation of Privilege | 5028169 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5029242 (Security Update) | Important | Elevation of Privilege | 5028169 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for ARM64-based Systems | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for x64-based Systems | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 21H2 for 32-bit Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for x64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for 32-bit Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for x64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 11 version 21H2 for ARM64-based Systems | 5029253 (Security Update) | Important | Elevation of Privilege | 5028182 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5029253 (Security Update) | Important | Elevation of Privilege | 5028182 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5029263 (Security Update) | Important | Elevation of Privilege | 5028185 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows 11 Version 22H2 for x64-based Systems | 5029263 (Security Update) | Important | Elevation of Privilege | 5028185 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Elevation of Privilege | 5028222 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Elevation of Privilege | 5028222 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Elevation of Privilege | 5028222 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Elevation of Privilege | 5028222 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Elevation of Privilege | 5028240 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Elevation of Privilege | 5028240 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2012 | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Elevation of Privilege | 5028232 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 (Server Core installation) | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Elevation of Privilege | 5028232 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 R2 | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Elevation of Privilege | 5028228 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Elevation of Privilege | 5028228 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2016 | 5029242 (Security Update) | Important | Elevation of Privilege | 5028169 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2016 (Server Core installation) | 5029242 (Security Update) | Important | Elevation of Privilege | 5028169 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2019 | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2019 (Server Core installation) | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2022 | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Elevation of Privilege | 5028171 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
Windows Server 2022 (Server Core installation) | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Elevation of Privilege | 5028171 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
CVE ID | Acknowledgements |
CVE-2023-36900 | Anonymous Anonymous working with Trend Micro Zero Day Initiative |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36903
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows System Assessment Tool Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain specific limited SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36903 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5029259 (Security Update) | Important | Elevation of Privilege | 5028186 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 for x64-based Systems | 5029259 (Security Update) | Important | Elevation of Privilege | 5028186 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5029242 (Security Update) | Important | Elevation of Privilege | 5028169 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5029242 (Security Update) | Important | Elevation of Privilege | 5028169 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for ARM64-based Systems | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for x64-based Systems | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 21H2 for 32-bit Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for x64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for 32-bit Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for x64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 11 version 21H2 for ARM64-based Systems | 5029253 (Security Update) | Important | Elevation of Privilege | 5028182 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5029253 (Security Update) | Important | Elevation of Privilege | 5028182 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5029263 (Security Update) | Important | Elevation of Privilege | 5028185 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows 11 Version 22H2 for x64-based Systems | 5029263 (Security Update) | Important | Elevation of Privilege | 5028185 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Elevation of Privilege | 5028240 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Elevation of Privilege | 5028240 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2012 | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Elevation of Privilege | 5028232 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 (Server Core installation) | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Elevation of Privilege | 5028232 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 R2 | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Elevation of Privilege | 5028228 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Elevation of Privilege | 5028228 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2016 | 5029242 (Security Update) | Important | Elevation of Privilege | 5028169 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2016 (Server Core installation) | 5029242 (Security Update) | Important | Elevation of Privilege | 5028169 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2019 | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2019 (Server Core installation) | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2022 | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Elevation of Privilege | 5028171 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
Windows Server 2022 (Server Core installation) | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Elevation of Privilege | 5028171 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
CVE ID | Acknowledgements |
CVE-2023-36903 | Filip Dragović |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36904
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36904 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for ARM64-based Systems | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for x64-based Systems | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 21H2 for 32-bit Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for x64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for 32-bit Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for x64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 11 version 21H2 for ARM64-based Systems | 5029253 (Security Update) | Important | Elevation of Privilege | 5028182 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5029253 (Security Update) | Important | Elevation of Privilege | 5028182 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5029263 (Security Update) | Important | Elevation of Privilege | 5028185 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows 11 Version 22H2 for x64-based Systems | 5029263 (Security Update) | Important | Elevation of Privilege | 5028185 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows Server 2019 | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2019 (Server Core installation) | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2022 | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Elevation of Privilege | 5028171 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
Windows Server 2022 (Server Core installation) | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Elevation of Privilege | 5028171 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
CVE ID | Acknowledgements |
CVE-2023-36904 | RanchoIce |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36905
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36905 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5029259 (Security Update) | Important | Information Disclosure | 5028186 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 for x64-based Systems | 5029259 (Security Update) | Important | Information Disclosure | 5028186 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5029242 (Security Update) | Important | Information Disclosure | 5028169 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5029242 (Security Update) | Important | Information Disclosure | 5028169 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5029247 (Security Update) | Important | Information Disclosure | 5028168 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for ARM64-based Systems | 5029247 (Security Update) | Important | Information Disclosure | 5028168 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for x64-based Systems | 5029247 (Security Update) | Important | Information Disclosure | 5028168 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 21H2 for 32-bit Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for x64-based Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for 32-bit Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for x64-based Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 11 version 21H2 for ARM64-based Systems | 5029253 (Security Update) | Important | Information Disclosure | 5028182 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5029253 (Security Update) | Important | Information Disclosure | 5028182 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5029263 (Security Update) | Important | Information Disclosure | 5028185 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows 11 Version 22H2 for x64-based Systems | 5029263 (Security Update) | Important | Information Disclosure | 5028185 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows Server 2016 | 5029242 (Security Update) | Important | Information Disclosure | 5028169 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2016 (Server Core installation) | 5029242 (Security Update) | Important | Information Disclosure | 5028169 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2019 | 5029247 (Security Update) | Important | Information Disclosure | 5028168 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2019 (Server Core installation) | 5029247 (Security Update) | Important | Information Disclosure | 5028168 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
CVE ID | Acknowledgements |
CVE-2023-36905 | g0st1 |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36906
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Cryptographic Services Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36906 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5029259 (Security Update) | Important | Information Disclosure | 5028186 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 for x64-based Systems | 5029259 (Security Update) | Important | Information Disclosure | 5028186 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5029242 (Security Update) | Important | Information Disclosure | 5028169 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5029242 (Security Update) | Important | Information Disclosure | 5028169 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5029247 (Security Update) | Important | Information Disclosure | 5028168 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for ARM64-based Systems | 5029247 (Security Update) | Important | Information Disclosure | 5028168 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for x64-based Systems | 5029247 (Security Update) | Important | Information Disclosure | 5028168 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 21H2 for 32-bit Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for x64-based Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for 32-bit Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for x64-based Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 11 version 21H2 for ARM64-based Systems | 5029253 (Security Update) | Important | Information Disclosure | 5028182 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5029253 (Security Update) | Important | Information Disclosure | 5028182 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5029263 (Security Update) | Important | Information Disclosure | 5028185 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows 11 Version 22H2 for x64-based Systems | 5029263 (Security Update) | Important | Information Disclosure | 5028185 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Information Disclosure | 5028222 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Information Disclosure | 5028222 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Information Disclosure | 5028222 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Information Disclosure | 5028222 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Information Disclosure | 5028240 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Information Disclosure | 5028240 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2012 | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Information Disclosure | 5028232 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 (Server Core installation) | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Information Disclosure | 5028232 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 R2 | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Information Disclosure | 5028228 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Information Disclosure | 5028228 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2016 | 5029242 (Security Update) | Important | Information Disclosure | 5028169 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2016 (Server Core installation) | 5029242 (Security Update) | Important | Information Disclosure | 5028169 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2019 | 5029247 (Security Update) | Important | Information Disclosure | 5028168 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2019 (Server Core installation) | 5029247 (Security Update) | Important | Information Disclosure | 5028168 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2022 | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Information Disclosure | 5028171 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
Windows Server 2022 (Server Core installation) | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Information Disclosure | 5028171 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
CVE ID | Acknowledgements |
CVE-2023-36906 | k0shl with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36907
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Cryptographic Services Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36907 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5029259 (Security Update) | Important | Information Disclosure | 5028186 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 for x64-based Systems | 5029259 (Security Update) | Important | Information Disclosure | 5028186 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5029242 (Security Update) | Important | Information Disclosure | 5028169 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5029242 (Security Update) | Important | Information Disclosure | 5028169 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5029247 (Security Update) | Important | Information Disclosure | 5028168 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for ARM64-based Systems | 5029247 (Security Update) | Important | Information Disclosure | 5028168 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for x64-based Systems | 5029247 (Security Update) | Important | Information Disclosure | 5028168 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 21H2 for 32-bit Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for x64-based Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for 32-bit Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for x64-based Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 11 version 21H2 for ARM64-based Systems | 5029253 (Security Update) | Important | Information Disclosure | 5028182 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5029253 (Security Update) | Important | Information Disclosure | 5028182 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5029263 (Security Update) | Important | Information Disclosure | 5028185 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows 11 Version 22H2 for x64-based Systems | 5029263 (Security Update) | Important | Information Disclosure | 5028185 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Information Disclosure | 5028222 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Information Disclosure | 5028222 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Information Disclosure | 5028222 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Information Disclosure | 5028222 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Information Disclosure | 5028240 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Information Disclosure | 5028240 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2012 | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Information Disclosure | 5028232 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 (Server Core installation) | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Information Disclosure | 5028232 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 R2 | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Information Disclosure | 5028228 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Information Disclosure | 5028228 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2016 | 5029242 (Security Update) | Important | Information Disclosure | 5028169 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2016 (Server Core installation) | 5029242 (Security Update) | Important | Information Disclosure | 5028169 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2019 | 5029247 (Security Update) | Important | Information Disclosure | 5028168 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2019 (Server Core installation) | 5029247 (Security Update) | Important | Information Disclosure | 5028168 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2022 | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Information Disclosure | 5028171 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
Windows Server 2022 (Server Core installation) | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Information Disclosure | 5028171 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
CVE ID | Acknowledgements |
CVE-2023-36907 | k0shl with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36908
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Hyper-V Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.7/TemporalScore:5.0
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if a Hyper-V Guest attacker successfully exploited this vulnerability is data from the Hyper-V Host. According to the CVSS metric, the Hyper-V attack vector is adjacent (AV:A). What does that mean for this vulnerability? Where the attack vector metric is Adjacent (A), this represents virtual machines connected via a Hyper-V Network Virtualization (HNV) logical network. This configuration forms an isolation boundary where the virtual machines within the virtual network can only communicate with each other. In this attack vector, the vulnerable component is bound to the network stack, but the attack is limited to systems configured to use the HNV network. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36908 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for x64-based Systems | 5029259 (Security Update) | Important | Information Disclosure | 5028186 | Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5029242 (Security Update) | Important | Information Disclosure | 5028169 | Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5029247 (Security Update) | Important | Information Disclosure | 5028168 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 21H2 for x64-based Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for x64-based Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 11 version 21H2 for ARM64-based Systems | 5029253 (Security Update) | Important | Information Disclosure | 5028182 | Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5029253 (Security Update) | Important | Information Disclosure | 5028182 | Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5029263 (Security Update) | Important | Information Disclosure | 5028185 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows 11 Version 22H2 for x64-based Systems | 5029263 (Security Update) | Important | Information Disclosure | 5028185 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Information Disclosure | 5028240 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Information Disclosure | 5028240 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2012 | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Information Disclosure | 5028232 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 (Server Core installation) | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Information Disclosure | 5028232 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 R2 | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Information Disclosure | 5028228 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Information Disclosure | 5028228 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2016 | 5029242 (Security Update) | Important | Information Disclosure | 5028169 | Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2016 (Server Core installation) | 5029242 (Security Update) | Important | Information Disclosure | 5028169 | Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2019 | 5029247 (Security Update) | Important | Information Disclosure | 5028168 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2019 (Server Core installation) | 5029247 (Security Update) | Important | Information Disclosure | 5028168 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2022 | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Information Disclosure | 5028171 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
Windows Server 2022 (Server Core installation) | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Information Disclosure | 5028171 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
CVE ID | Acknowledgements |
CVE-2023-36908 | linfeng of HeBei HuaCe |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36909
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Message Queuing Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What does that mean for this vulnerability? To exploit this vulnerability, an attacker would need to send a specially crafted malicious MSMQ packet to a MSMQ server. The vulnerability is triggered when a user on the target machine accesses message queuing, which could result in a denial of service. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36909 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5029259 (Security Update) | Important | Denial of Service | 5028186 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 for x64-based Systems | 5029259 (Security Update) | Important | Denial of Service | 5028186 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5029242 (Security Update) | Important | Denial of Service | 5028169 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5029242 (Security Update) | Important | Denial of Service | 5028169 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5029247 (Security Update) | Important | Denial of Service | 5028168 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for ARM64-based Systems | 5029247 (Security Update) | Important | Denial of Service | 5028168 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for x64-based Systems | 5029247 (Security Update) | Important | Denial of Service | 5028168 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 21H2 for 32-bit Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for x64-based Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for 32-bit Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for x64-based Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 11 version 21H2 for ARM64-based Systems | 5029253 (Security Update) | Important | Denial of Service | 5028182 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5029253 (Security Update) | Important | Denial of Service | 5028182 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5029263 (Security Update) | Important | Denial of Service | 5028185 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows 11 Version 22H2 for x64-based Systems | 5029263 (Security Update) | Important | Denial of Service | 5028185 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Denial of Service | 5028222 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Denial of Service | 5028222 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Denial of Service | 5028222 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Denial of Service | 5028222 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Denial of Service | 5028240 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Denial of Service | 5028240 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2012 | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Denial of Service | 5028232 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 (Server Core installation) | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Denial of Service | 5028232 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 R2 | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Denial of Service | 5028228 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Denial of Service | 5028228 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2016 | 5029242 (Security Update) | Important | Denial of Service | 5028169 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2016 (Server Core installation) | 5029242 (Security Update) | Important | Denial of Service | 5028169 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2019 | 5029247 (Security Update) | Important | Denial of Service | 5028168 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2019 (Server Core installation) | 5029247 (Security Update) | Important | Denial of Service | 5028168 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2022 | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Denial of Service | 5028171 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
Windows Server 2022 (Server Core installation) | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Denial of Service | 5028171 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
CVE ID | Acknowledgements |
CVE-2023-36909 | Azure Yang with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36910
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Message Queuing Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Executive Summary: None FAQ: How could an attacker exploit the vulnerability? To exploit this vulnerability, an attacker would need to send a specially crafted malicious MSMQ packet to a MSMQ server. This could result in remote code execution on the server side. Mitigations: Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors might be helpful in your situation: The Windows message queuing service, which is a Windows component, needs to be enabled for a system to be exploitable by this vulnerability. This feature can be added via the Control Panel. You can check to see if there is a service running named Message Queuing and TCP port 1801 is listening on the machine. Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36910 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5029259 (Security Update) | Critical | Remote Code Execution | 5028186 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 for x64-based Systems | 5029259 (Security Update) | Critical | Remote Code Execution | 5028186 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5029242 (Security Update) | Critical | Remote Code Execution | 5028169 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5029242 (Security Update) | Critical | Remote Code Execution | 5028169 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5029247 (Security Update) | Critical | Remote Code Execution | 5028168 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for ARM64-based Systems | 5029247 (Security Update) | Critical | Remote Code Execution | 5028168 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for x64-based Systems | 5029247 (Security Update) | Critical | Remote Code Execution | 5028168 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 21H2 for 32-bit Systems | 5029244 (Security Update) | Critical | Remote Code Execution | 5028166 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for ARM64-based Systems | 5029244 (Security Update) | Critical | Remote Code Execution | 5028166 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for x64-based Systems | 5029244 (Security Update) | Critical | Remote Code Execution | 5028166 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for 32-bit Systems | 5029244 (Security Update) | Critical | Remote Code Execution | 5028166 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for ARM64-based Systems | 5029244 (Security Update) | Critical | Remote Code Execution | 5028166 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for x64-based Systems | 5029244 (Security Update) | Critical | Remote Code Execution | 5028166 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 11 version 21H2 for ARM64-based Systems | 5029253 (Security Update) | Critical | Remote Code Execution | 5028182 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5029253 (Security Update) | Critical | Remote Code Execution | 5028182 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5029263 (Security Update) | Critical | Remote Code Execution | 5028185 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows 11 Version 22H2 for x64-based Systems | 5029263 (Security Update) | Critical | Remote Code Execution | 5028185 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Critical | Remote Code Execution | 5028222 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Critical | Remote Code Execution | 5028222 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Critical | Remote Code Execution | 5028222 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Critical | Remote Code Execution | 5028222 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Critical | Remote Code Execution | 5028240 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Critical | Remote Code Execution | 5028240 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2012 | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Critical | Remote Code Execution | 5028232 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 (Server Core installation) | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Critical | Remote Code Execution | 5028232 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 R2 | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Critical | Remote Code Execution | 5028228 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Critical | Remote Code Execution | 5028228 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2016 | 5029242 (Security Update) | Critical | Remote Code Execution | 5028169 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2016 (Server Core installation) | 5029242 (Security Update) | Critical | Remote Code Execution | 5028169 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2019 | 5029247 (Security Update) | Critical | Remote Code Execution | 5028168 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2019 (Server Core installation) | 5029247 (Security Update) | Critical | Remote Code Execution | 5028168 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2022 | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Critical | Remote Code Execution | 5028171 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
Windows Server 2022 (Server Core installation) | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Critical | Remote Code Execution | 5028171 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
CVE ID | Acknowledgements |
CVE-2023-36910 | Yuki Chen with Cyber KunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36911
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Message Queuing Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? Successful exploitation of this vulnerability could allow an unauthenticated attacker to remotely execute code on the target server. Mitigations: Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors might be helpful in your situation: The Windows message queuing service, which is a Windows component, needs to be enabled for a system to be exploitable by this vulnerability. This feature can be added via the Control Panel. You can check to see if there is a service running named Message Queuing and TCP port 1801 is listening on the machine. Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36911 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5029259 (Security Update) | Critical | Remote Code Execution | 5028186 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 for x64-based Systems | 5029259 (Security Update) | Critical | Remote Code Execution | 5028186 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5029242 (Security Update) | Critical | Remote Code Execution | 5028169 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5029242 (Security Update) | Critical | Remote Code Execution | 5028169 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5029247 (Security Update) | Critical | Remote Code Execution | 5028168 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for ARM64-based Systems | 5029247 (Security Update) | Critical | Remote Code Execution | 5028168 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for x64-based Systems | 5029247 (Security Update) | Critical | Remote Code Execution | 5028168 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 21H2 for 32-bit Systems | 5029244 (Security Update) | Critical | Remote Code Execution | 5028166 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for ARM64-based Systems | 5029244 (Security Update) | Critical | Remote Code Execution | 5028166 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for x64-based Systems | 5029244 (Security Update) | Critical | Remote Code Execution | 5028166 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for 32-bit Systems | 5029244 (Security Update) | Critical | Remote Code Execution | 5028166 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for ARM64-based Systems | 5029244 (Security Update) | Critical | Remote Code Execution | 5028166 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for x64-based Systems | 5029244 (Security Update) | Critical | Remote Code Execution | 5028166 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 11 version 21H2 for ARM64-based Systems | 5029253 (Security Update) | Critical | Remote Code Execution | 5028182 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5029253 (Security Update) | Critical | Remote Code Execution | 5028182 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5029263 (Security Update) | Critical | Remote Code Execution | 5028185 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows 11 Version 22H2 for x64-based Systems | 5029263 (Security Update) | Critical | Remote Code Execution | 5028185 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Critical | Remote Code Execution | 5028222 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Critical | Remote Code Execution | 5028222 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Critical | Remote Code Execution | 5028222 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Critical | Remote Code Execution | 5028222 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Critical | Remote Code Execution | 5028240 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Critical | Remote Code Execution | 5028240 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2012 | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Critical | Remote Code Execution | 5028232 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 (Server Core installation) | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Critical | Remote Code Execution | 5028232 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 R2 | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Critical | Remote Code Execution | 5028228 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Critical | Remote Code Execution | 5028228 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2016 | 5029242 (Security Update) | Critical | Remote Code Execution | 5028169 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2016 (Server Core installation) | 5029242 (Security Update) | Critical | Remote Code Execution | 5028169 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2019 | 5029247 (Security Update) | Critical | Remote Code Execution | 5028168 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2019 (Server Core installation) | 5029247 (Security Update) | Critical | Remote Code Execution | 5028168 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2022 | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Critical | Remote Code Execution | 5028171 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
Windows Server 2022 (Server Core installation) | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Critical | Remote Code Execution | 5028171 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
CVE ID | Acknowledgements |
CVE-2023-36911 | Yuki Chen with Cyber KunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36912
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Message Queuing Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36912 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5029259 (Security Update) | Important | Denial of Service | 5028186 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 for x64-based Systems | 5029259 (Security Update) | Important | Denial of Service | 5028186 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5029242 (Security Update) | Important | Denial of Service | 5028169 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5029242 (Security Update) | Important | Denial of Service | 5028169 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5029247 (Security Update) | Important | Denial of Service | 5028168 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for ARM64-based Systems | 5029247 (Security Update) | Important | Denial of Service | 5028168 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for x64-based Systems | 5029247 (Security Update) | Important | Denial of Service | 5028168 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 21H2 for 32-bit Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for x64-based Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for 32-bit Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for x64-based Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 11 version 21H2 for ARM64-based Systems | 5029253 (Security Update) | Important | Denial of Service | 5028182 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5029253 (Security Update) | Important | Denial of Service | 5028182 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5029263 (Security Update) | Important | Denial of Service | 5028185 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows 11 Version 22H2 for x64-based Systems | 5029263 (Security Update) | Important | Denial of Service | 5028185 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Denial of Service | 5028222 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Denial of Service | 5028222 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Denial of Service | 5028222 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Denial of Service | 5028222 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Denial of Service | 5028240 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Denial of Service | 5028240 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2012 | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Denial of Service | 5028232 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 (Server Core installation) | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Denial of Service | 5028232 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 R2 | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Denial of Service | 5028228 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Denial of Service | 5028228 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2016 | 5029242 (Security Update) | Important | Denial of Service | 5028169 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2016 (Server Core installation) | 5029242 (Security Update) | Important | Denial of Service | 5028169 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2019 | 5029247 (Security Update) | Important | Denial of Service | 5028168 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2019 (Server Core installation) | 5029247 (Security Update) | Important | Denial of Service | 5028168 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2022 | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Denial of Service | 5028171 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
Windows Server 2022 (Server Core installation) | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Denial of Service | 5028171 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
CVE ID | Acknowledgements |
CVE-2023-36912 | Yuki Chen with Cyber KunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36913
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Message Queuing Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36913 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5029259 (Security Update) | Important | Information Disclosure | 5028186 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 for x64-based Systems | 5029259 (Security Update) | Important | Information Disclosure | 5028186 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5029242 (Security Update) | Important | Information Disclosure | 5028169 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5029242 (Security Update) | Important | Information Disclosure | 5028169 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5029247 (Security Update) | Important | Information Disclosure | 5028168 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for ARM64-based Systems | 5029247 (Security Update) | Important | Information Disclosure | 5028168 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for x64-based Systems | 5029247 (Security Update) | Important | Information Disclosure | 5028168 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 21H2 for 32-bit Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for x64-based Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for 32-bit Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for x64-based Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 11 version 21H2 for ARM64-based Systems | 5029253 (Security Update) | Important | Information Disclosure | 5028182 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5029253 (Security Update) | Important | Information Disclosure | 5028182 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5029263 (Security Update) | Important | Information Disclosure | 5028185 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows 11 Version 22H2 for x64-based Systems | 5029263 (Security Update) | Important | Information Disclosure | 5028185 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Information Disclosure | 5028222 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Information Disclosure | 5028222 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Information Disclosure | 5028222 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Information Disclosure | 5028222 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Information Disclosure | 5028240 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Information Disclosure | 5028240 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2012 | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Information Disclosure | 5028232 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 (Server Core installation) | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Information Disclosure | 5028232 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 R2 | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Information Disclosure | 5028228 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Information Disclosure | 5028228 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2016 | 5029242 (Security Update) | Important | Information Disclosure | 5028169 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2016 (Server Core installation) | 5029242 (Security Update) | Important | Information Disclosure | 5028169 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2019 | 5029247 (Security Update) | Important | Information Disclosure | 5028168 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2019 (Server Core installation) | 5029247 (Security Update) | Important | Information Disclosure | 5028168 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2022 | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Information Disclosure | 5028171 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
Windows Server 2022 (Server Core installation) | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Information Disclosure | 5028171 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
CVE ID | Acknowledgements |
CVE-2023-36913 | Jarvis_1oop |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36914
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Smart Card Resource Management Server Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: None FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass the Fast Identity Online (FIDO) secure authentication feature. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36914 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 21H2 for 32-bit Systems | 5029244 (Security Update) | Important | Security Feature Bypass | 5028166 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Security Feature Bypass | 5028166 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for x64-based Systems | 5029244 (Security Update) | Important | Security Feature Bypass | 5028166 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for 32-bit Systems | 5029244 (Security Update) | Important | Security Feature Bypass | 5028166 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Security Feature Bypass | 5028166 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for x64-based Systems | 5029244 (Security Update) | Important | Security Feature Bypass | 5028166 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 11 version 21H2 for ARM64-based Systems | 5029253 (Security Update) | Important | Security Feature Bypass | 5028182 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5029253 (Security Update) | Important | Security Feature Bypass | 5028182 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5029263 (Security Update) | Important | Security Feature Bypass | 5028185 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows 11 Version 22H2 for x64-based Systems | 5029263 (Security Update) | Important | Security Feature Bypass | 5028185 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows Server 2022 | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Security Feature Bypass | 5028171 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
Windows Server 2022 (Server Core installation) | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Security Feature Bypass | 5028171 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
CVE ID | Acknowledgements |
CVE-2023-36914 | Justin Decker |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-35376
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Message Queuing Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What does that mean for this vulnerability? To exploit this vulnerability, an attacker would need to send a specially crafted malicious MSMQ packet to a MSMQ server. The vulnerability is triggered when a user on the target machine accesses message queuing, which could result in a denial of service. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-35376 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5029259 (Security Update) | Important | Denial of Service | 5028186 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 for x64-based Systems | 5029259 (Security Update) | Important | Denial of Service | 5028186 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5029242 (Security Update) | Important | Denial of Service | 5028169 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5029242 (Security Update) | Important | Denial of Service | 5028169 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5029247 (Security Update) | Important | Denial of Service | 5028168 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for ARM64-based Systems | 5029247 (Security Update) | Important | Denial of Service | 5028168 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for x64-based Systems | 5029247 (Security Update) | Important | Denial of Service | 5028168 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 21H2 for 32-bit Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for x64-based Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for 32-bit Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for x64-based Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 11 version 21H2 for ARM64-based Systems | 5029253 (Security Update) | Important | Denial of Service | 5028182 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5029253 (Security Update) | Important | Denial of Service | 5028182 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5029263 (Security Update) | Important | Denial of Service | 5028185 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows 11 Version 22H2 for x64-based Systems | 5029263 (Security Update) | Important | Denial of Service | 5028185 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Denial of Service | 5028222 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Denial of Service | 5028222 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Denial of Service | 5028222 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Denial of Service | 5028222 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Denial of Service | 5028240 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Denial of Service | 5028240 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2012 | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Denial of Service | 5028232 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 (Server Core installation) | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Denial of Service | 5028232 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 R2 | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Denial of Service | 5028228 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Denial of Service | 5028228 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2016 | 5029242 (Security Update) | Important | Denial of Service | 5028169 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2016 (Server Core installation) | 5029242 (Security Update) | Important | Denial of Service | 5028169 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2019 | 5029247 (Security Update) | Important | Denial of Service | 5028168 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2019 (Server Core installation) | 5029247 (Security Update) | Important | Denial of Service | 5028168 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2022 | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Denial of Service | 5028171 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
Windows Server 2022 (Server Core installation) | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Denial of Service | 5028171 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
CVE ID | Acknowledgements |
CVE-2023-35376 | Jarvis_1oop |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-38254
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Message Queuing Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What does that mean for this vulnerability? To exploit this vulnerability, an attacker would need to send a specially crafted malicious MSMQ packet to a MSMQ server. The vulnerability is triggered when a user on the target machine accesses message queuing, which could result in a denial of service. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-38254 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5029259 (Security Update) | Important | Denial of Service | 5028186 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 for x64-based Systems | 5029259 (Security Update) | Important | Denial of Service | 5028186 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5029242 (Security Update) | Important | Denial of Service | 5028169 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5029242 (Security Update) | Important | Denial of Service | 5028169 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5029247 (Security Update) | Important | Denial of Service | 5028168 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for ARM64-based Systems | 5029247 (Security Update) | Important | Denial of Service | 5028168 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for x64-based Systems | 5029247 (Security Update) | Important | Denial of Service | 5028168 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 21H2 for 32-bit Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for x64-based Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for 32-bit Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for x64-based Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 11 version 21H2 for ARM64-based Systems | 5029253 (Security Update) | Important | Denial of Service | 5028182 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5029253 (Security Update) | Important | Denial of Service | 5028182 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5029263 (Security Update) | Important | Denial of Service | 5028185 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows 11 Version 22H2 for x64-based Systems | 5029263 (Security Update) | Important | Denial of Service | 5028185 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Denial of Service | 5028222 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Denial of Service | 5028222 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Denial of Service | 5028222 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Denial of Service | 5028222 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Denial of Service | 5028240 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Denial of Service | 5028240 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2012 | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Denial of Service | 5028232 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 (Server Core installation) | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Denial of Service | 5028232 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 R2 | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Denial of Service | 5028228 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Denial of Service | 5028228 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2016 | 5029242 (Security Update) | Important | Denial of Service | 5028169 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2016 (Server Core installation) | 5029242 (Security Update) | Important | Denial of Service | 5028169 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2019 | 5029247 (Security Update) | Important | Denial of Service | 5028168 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2019 (Server Core installation) | 5029247 (Security Update) | Important | Denial of Service | 5028168 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2022 | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Denial of Service | 5028171 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
Windows Server 2022 (Server Core installation) | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Denial of Service | 5028171 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
CVE ID | Acknowledgements |
CVE-2023-38254 | Jarvis_1oop |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-35377
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Message Queuing Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What does that mean for this vulnerability? To exploit this vulnerability, an attacker would need to send a specially crafted malicious MSMQ packet to a MSMQ server. The vulnerability is triggered when a user on the target machine accesses message queuing, which could result in a denial of service. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-35377 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5029259 (Security Update) | Important | Denial of Service | 5028186 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 for x64-based Systems | 5029259 (Security Update) | Important | Denial of Service | 5028186 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5029242 (Security Update) | Important | Denial of Service | 5028169 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5029242 (Security Update) | Important | Denial of Service | 5028169 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5029247 (Security Update) | Important | Denial of Service | 5028168 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for ARM64-based Systems | 5029247 (Security Update) | Important | Denial of Service | 5028168 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for x64-based Systems | 5029247 (Security Update) | Important | Denial of Service | 5028168 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 21H2 for 32-bit Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for x64-based Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for 32-bit Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for x64-based Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 11 version 21H2 for ARM64-based Systems | 5029253 (Security Update) | Important | Denial of Service | 5028182 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5029253 (Security Update) | Important | Denial of Service | 5028182 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5029263 (Security Update) | Important | Denial of Service | 5028185 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows 11 Version 22H2 for x64-based Systems | 5029263 (Security Update) | Important | Denial of Service | 5028185 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Denial of Service | 5028222 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Denial of Service | 5028222 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Denial of Service | 5028222 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Denial of Service | 5028222 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Denial of Service | 5028240 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Denial of Service | 5028240 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2012 | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Denial of Service | 5028232 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 (Server Core installation) | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Denial of Service | 5028232 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 R2 | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Denial of Service | 5028228 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Denial of Service | 5028228 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2016 | 5029242 (Security Update) | Important | Denial of Service | 5028169 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2016 (Server Core installation) | 5029242 (Security Update) | Important | Denial of Service | 5028169 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2019 | 5029247 (Security Update) | Important | Denial of Service | 5028168 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2019 (Server Core installation) | 5029247 (Security Update) | Important | Denial of Service | 5028168 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2022 | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Denial of Service | 5028171 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
Windows Server 2022 (Server Core installation) | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Denial of Service | 5028171 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
CVE ID | Acknowledgements |
CVE-2023-35377 | Jarvis_1oop |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-35378
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Projected File System Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated user could trigger this vulnerability. It does not require admin or other elevated privileges. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: The following mitigating factors might be helpful in your situation: Exploitation of this issue requires the optional Projected Filesystem component to be enabled, which is not a default configuration. Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-35378 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for ARM64-based Systems | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for x64-based Systems | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 21H2 for 32-bit Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for x64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for 32-bit Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for x64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 11 version 21H2 for ARM64-based Systems | 5029253 (Security Update) | Important | Elevation of Privilege | 5028182 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5029253 (Security Update) | Important | Elevation of Privilege | 5028182 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5029263 (Security Update) | Important | Elevation of Privilege | 5028185 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows 11 Version 22H2 for x64-based Systems | 5029263 (Security Update) | Important | Elevation of Privilege | 5028185 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows Server 2019 | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2019 (Server Core installation) | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2022 | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Elevation of Privilege | 5028171 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
Windows Server 2022 (Server Core installation) | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Elevation of Privilege | 5028171 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
CVE ID | Acknowledgements |
CVE-2023-35378 | ziming zhang with Ant Security Light-Year Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-35379
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Reliability Analysis Metrics Calculation Engine (RACEng) Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain specific limited SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-35379 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Elevation of Privilege | 5028240 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Elevation of Privilege | 5028240 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
CVE ID | Acknowledgements |
CVE-2023-35379 | OUYANG FEI |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-35380
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metrics, the attack vector is local (AV:L) and privilege required is low (PR:L). What does that mean for this vulnerability? An attacker must have local access to the targeted machine and must be able to create folders and performance traces on the machine, with restricted privileges that normal users have by default. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-35380 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5029259 (Security Update) | Important | Elevation of Privilege | 5028186 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 for x64-based Systems | 5029259 (Security Update) | Important | Elevation of Privilege | 5028186 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5029242 (Security Update) | Important | Elevation of Privilege | 5028169 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5029242 (Security Update) | Important | Elevation of Privilege | 5028169 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for ARM64-based Systems | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for x64-based Systems | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 21H2 for 32-bit Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for x64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for 32-bit Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for x64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 11 version 21H2 for ARM64-based Systems | 5029253 (Security Update) | Important | Elevation of Privilege | 5028182 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5029253 (Security Update) | Important | Elevation of Privilege | 5028182 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5029263 (Security Update) | Important | Elevation of Privilege | 5028185 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows 11 Version 22H2 for x64-based Systems | 5029263 (Security Update) | Important | Elevation of Privilege | 5028185 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Elevation of Privilege | 5028222 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Elevation of Privilege | 5028222 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Elevation of Privilege | 5028222 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Elevation of Privilege | 5028222 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Elevation of Privilege | 5028240 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Elevation of Privilege | 5028240 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2012 | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Elevation of Privilege | 5028232 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 (Server Core installation) | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Elevation of Privilege | 5028232 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 R2 | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Elevation of Privilege | 5028228 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Elevation of Privilege | 5028228 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2016 | 5029242 (Security Update) | Important | Elevation of Privilege | 5028169 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2016 (Server Core installation) | 5029242 (Security Update) | Important | Elevation of Privilege | 5028169 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2019 | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2019 (Server Core installation) | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2022 | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Elevation of Privilege | 5028171 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
Windows Server 2022 (Server Core installation) | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Elevation of Privilege | 5028171 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
CVE ID | Acknowledgements |
CVE-2023-35380 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-35381
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Fax Service Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Exploitation of the vulnerability requires that a user open a specially crafted file.
An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-35381 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5029259 (Security Update) | Important | Remote Code Execution | 5028186 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 for x64-based Systems | 5029259 (Security Update) | Important | Remote Code Execution | 5028186 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5029242 (Security Update) | Important | Remote Code Execution | 5028169 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5029242 (Security Update) | Important | Remote Code Execution | 5028169 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5029247 (Security Update) | Important | Remote Code Execution | 5028168 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for ARM64-based Systems | 5029247 (Security Update) | Important | Remote Code Execution | 5028168 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for x64-based Systems | 5029247 (Security Update) | Important | Remote Code Execution | 5028168 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 21H2 for 32-bit Systems | 5029244 (Security Update) | Important | Remote Code Execution | 5028166 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Remote Code Execution | 5028166 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for x64-based Systems | 5029244 (Security Update) | Important | Remote Code Execution | 5028166 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for 32-bit Systems | 5029244 (Security Update) | Important | Remote Code Execution | 5028166 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Remote Code Execution | 5028166 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for x64-based Systems | 5029244 (Security Update) | Important | Remote Code Execution | 5028166 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 11 version 21H2 for ARM64-based Systems | 5029253 (Security Update) | Important | Remote Code Execution | 5028182 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5029253 (Security Update) | Important | Remote Code Execution | 5028182 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5029263 (Security Update) | Important | Remote Code Execution | 5028185 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows 11 Version 22H2 for x64-based Systems | 5029263 (Security Update) | Important | Remote Code Execution | 5028185 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Remote Code Execution | 5028222 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Remote Code Execution | 5028222 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Remote Code Execution | 5028222 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Remote Code Execution | 5028222 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Remote Code Execution | 5028240 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Remote Code Execution | 5028240 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2012 | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Remote Code Execution | 5028232 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 (Server Core installation) | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Remote Code Execution | 5028232 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 R2 | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Remote Code Execution | 5028228 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Remote Code Execution | 5028228 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2016 | 5029242 (Security Update) | Important | Remote Code Execution | 5028169 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2016 (Server Core installation) | 5029242 (Security Update) | Important | Remote Code Execution | 5028169 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2019 | 5029247 (Security Update) | Important | Remote Code Execution | 5028168 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2019 (Server Core installation) | 5029247 (Security Update) | Important | Remote Code Execution | 5028168 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2022 | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Remote Code Execution | 5028171 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
Windows Server 2022 (Server Core installation) | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Remote Code Execution | 5028171 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
CVE ID | Acknowledgements |
CVE-2023-35381 | TJ with FuzzWorks |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-35382
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metrics, the attack vector is local (AV:L) and privilege required is low (PR:L). What does that mean for this vulnerability? An attacker must have local access to the targeted machine and must be able to create folders and performance traces on the machine, with restricted privileges that normal users have by default. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-35382 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for ARM64-based Systems | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for x64-based Systems | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 21H2 for 32-bit Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for x64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for 32-bit Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for x64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 11 version 21H2 for ARM64-based Systems | 5029253 (Security Update) | Important | Elevation of Privilege | 5028182 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5029253 (Security Update) | Important | Elevation of Privilege | 5028182 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5029263 (Security Update) | Important | Elevation of Privilege | 5028185 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows 11 Version 22H2 for x64-based Systems | 5029263 (Security Update) | Important | Elevation of Privilege | 5028185 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows Server 2019 | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2019 (Server Core installation) | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2022 | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Elevation of Privilege | 5028171 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
Windows Server 2022 (Server Core installation) | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Elevation of Privilege | 5028171 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
CVE ID | Acknowledgements |
CVE-2023-35382 | Mateusz Jurczyk of Google Project Zero |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-35383
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Message Queuing Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited the vulnerability could potentially read User Mode Service Memory. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-35383 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5029259 (Security Update) | Important | Information Disclosure | 5028186 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 for x64-based Systems | 5029259 (Security Update) | Important | Information Disclosure | 5028186 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5029242 (Security Update) | Important | Information Disclosure | 5028169 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5029242 (Security Update) | Important | Information Disclosure | 5028169 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5029247 (Security Update) | Important | Information Disclosure | 5028168 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for ARM64-based Systems | 5029247 (Security Update) | Important | Information Disclosure | 5028168 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for x64-based Systems | 5029247 (Security Update) | Important | Information Disclosure | 5028168 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 21H2 for 32-bit Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for x64-based Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for 32-bit Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for x64-based Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 11 version 21H2 for ARM64-based Systems | 5029253 (Security Update) | Important | Information Disclosure | 5028182 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5029253 (Security Update) | Important | Information Disclosure | 5028182 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5029263 (Security Update) | Important | Information Disclosure | 5028185 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows 11 Version 22H2 for x64-based Systems | 5029263 (Security Update) | Important | Information Disclosure | 5028185 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Information Disclosure | 5028222 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Information Disclosure | 5028222 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Information Disclosure | 5028222 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Information Disclosure | 5028222 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Information Disclosure | 5028240 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Information Disclosure | 5028240 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2012 | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Information Disclosure | 5028232 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 (Server Core installation) | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Information Disclosure | 5028232 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 R2 | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Information Disclosure | 5028228 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Information Disclosure | 5028228 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2016 | 5029242 (Security Update) | Important | Information Disclosure | 5028169 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2016 (Server Core installation) | 5029242 (Security Update) | Important | Information Disclosure | 5028169 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2019 | 5029247 (Security Update) | Important | Information Disclosure | 5028168 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2019 (Server Core installation) | 5029247 (Security Update) | Important | Information Disclosure | 5028168 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2022 | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Information Disclosure | 5028171 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
Windows Server 2022 (Server Core installation) | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Information Disclosure | 5028171 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
CVE ID | Acknowledgements |
CVE-2023-35383 | Yuki Chen with Cyber KunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-35384
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows HTML Platforms Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.4/TemporalScore:4.7
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. What kind of security feature could be bypassed by successfully exploiting this vulnerability? A security feature bypass vulnerability exists when the MSHTML platform fails to validate the correct Security Zone of requests for specific URLs. This could allow an attacker to cause a user to access a URL in a less restricted Internet Security Zone than intended. To exploit this vulnerability, an attacker could email or otherwise provide a specially crafted URL to a victim and convince them to click on it. The security update addresses the vulnerability by correcting security feature behavior to properly map affected URLs to the correct Security Zone. The Security Updates table indicates that this vulnerability affects all supported versions of Microsoft Windows except Windows Server 2008, Windows Server 2008 R2, and Windows Server 2012. Why are IE Cumulative updates listed for Windows Server 2012 R2? While Microsoft has announced retirement of the Internet Explorer 11 application on certain platforms and the Microsoft Edge Legacy application is deprecated, the underlying MSHTML, EdgeHTML, and scripting platforms are still supported. The MSHTML platform is used by Internet Explorer mode in Microsoft Edge as well as other applications through WebBrowser control. The EdgeHTML platform is used by WebView and some UWP applications. The scripting platforms are used by MSHTML and EdgeHTML but can also be used by other legacy applications. Updates to address vulnerabilities in the MSHTML platform and scripting engine are included in the IE Cumulative Updates; EdgeHTML and Chakra changes are not applicable to those platforms. To stay fully protected, we recommend that customers who install Security Only updates install the IE Cumulative updates for this vulnerability. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-35384 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5029259 (Security Update) | Important | Security Feature Bypass | 5028186 | Base: 5.4 Temporal: 4.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 for x64-based Systems | 5029259 (Security Update) | Important | Security Feature Bypass | 5028186 | Base: 5.4 Temporal: 4.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5029242 (Security Update) | Important | Security Feature Bypass | 5028169 | Base: 5.4 Temporal: 4.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5029242 (Security Update) | Important | Security Feature Bypass | 5028169 | Base: 5.4 Temporal: 4.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5029247 (Security Update) | Important | Security Feature Bypass | 5028168 |
Base: 5.4 Temporal: 4.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for ARM64-based Systems | 5029247 (Security Update) | Important | Security Feature Bypass | 5028168 |
Base: 5.4 Temporal: 4.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for x64-based Systems | 5029247 (Security Update) | Important | Security Feature Bypass | 5028168 |
Base: 5.4 Temporal: 4.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 21H2 for 32-bit Systems | 5029244 (Security Update) | Important | Security Feature Bypass | 5028166 |
Base: 5.4 Temporal: 4.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Security Feature Bypass | 5028166 |
Base: 5.4 Temporal: 4.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for x64-based Systems | 5029244 (Security Update) | Important | Security Feature Bypass | 5028166 |
Base: 5.4 Temporal: 4.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for 32-bit Systems | 5029244 (Security Update) | Important | Security Feature Bypass | 5028166 |
Base: 5.4 Temporal: 4.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Security Feature Bypass | 5028166 |
Base: 5.4 Temporal: 4.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for x64-based Systems | 5029244 (Security Update) | Important | Security Feature Bypass | 5028166 |
Base: 5.4 Temporal: 4.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 11 version 21H2 for ARM64-based Systems | 5029253 (Security Update) | Important | Security Feature Bypass | 5028182 | Base: 5.4 Temporal: 4.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5029253 (Security Update) | Important | Security Feature Bypass | 5028182 | Base: 5.4 Temporal: 4.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5029263 (Security Update) | Important | Security Feature Bypass | 5028185 |
Base: 5.4 Temporal: 4.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows 11 Version 22H2 for x64-based Systems | 5029263 (Security Update) | Important | Security Feature Bypass | 5028185 |
Base: 5.4 Temporal: 4.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows Server 2012 R2 | 5029312 (Monthly Rollup) 5029304 (Security Only) 5029243 (IE Cumulative) |
Important | Security Feature Bypass | 5028228 |
Base: 5.4 Temporal: 4.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C |
6.3.9600.21503 10.0.0.0 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5029312 (Monthly Rollup) 5029243 (IE Cumulative) |
Important | Security Feature Bypass | 5028228 |
Base: 5.4 Temporal: 4.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C |
6.3.9600.21503 10.0.0.0 |
Yes | None |
Windows Server 2016 | 5029242 (Security Update) | Important | Security Feature Bypass | 5028169 | Base: 5.4 Temporal: 4.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2016 (Server Core installation) | 5029242 (Security Update) | Important | Security Feature Bypass | 5028169 | Base: 5.4 Temporal: 4.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2019 | 5029247 (Security Update) | Important | Security Feature Bypass | 5028168 |
Base: 5.4 Temporal: 4.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2019 (Server Core installation) | 5029247 (Security Update) | Important | Security Feature Bypass | 5028168 |
Base: 5.4 Temporal: 4.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2022 | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Security Feature Bypass | 5028171 |
Base: 5.4 Temporal: 4.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
Windows Server 2022 (Server Core installation) | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Security Feature Bypass | 5028171 |
Base: 5.4 Temporal: 4.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
CVE ID | Acknowledgements |
CVE-2023-35384 | Ben Barnea with Akamai Technologies |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-35385
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Message Queuing Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? Successful exploitation of this vulnerability could allow an unauthenticated attacker to remotely execute code on the target server. Mitigations: Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors might be helpful in your situation: The Windows message queuing service, which is a Windows component, needs to be enabled for a system to be exploitable by this vulnerability. This feature can be added via the Control Panel. You can check to see if there is a service running named Message Queuing and TCP port 1801 is listening on the machine. Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-35385 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5029259 (Security Update) | Critical | Remote Code Execution | 5028186 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 for x64-based Systems | 5029259 (Security Update) | Critical | Remote Code Execution | 5028186 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5029242 (Security Update) | Critical | Remote Code Execution | 5028169 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5029242 (Security Update) | Critical | Remote Code Execution | 5028169 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5029247 (Security Update) | Critical | Remote Code Execution | 5028168 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for ARM64-based Systems | 5029247 (Security Update) | Critical | Remote Code Execution | 5028168 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for x64-based Systems | 5029247 (Security Update) | Critical | Remote Code Execution | 5028168 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 21H2 for 32-bit Systems | 5029244 (Security Update) | Critical | Remote Code Execution | 5028166 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for ARM64-based Systems | 5029244 (Security Update) | Critical | Remote Code Execution | 5028166 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for x64-based Systems | 5029244 (Security Update) | Critical | Remote Code Execution | 5028166 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for 32-bit Systems | 5029244 (Security Update) | Critical | Remote Code Execution | 5028166 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for ARM64-based Systems | 5029244 (Security Update) | Critical | Remote Code Execution | 5028166 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for x64-based Systems | 5029244 (Security Update) | Critical | Remote Code Execution | 5028166 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 11 version 21H2 for ARM64-based Systems | 5029253 (Security Update) | Critical | Remote Code Execution | 5028182 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5029253 (Security Update) | Critical | Remote Code Execution | 5028182 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5029263 (Security Update) | Critical | Remote Code Execution | 5028185 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows 11 Version 22H2 for x64-based Systems | 5029263 (Security Update) | Critical | Remote Code Execution | 5028185 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Critical | Remote Code Execution | 5028222 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Critical | Remote Code Execution | 5028222 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Critical | Remote Code Execution | 5028222 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Critical | Remote Code Execution | 5028222 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Critical | Remote Code Execution | 5028240 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Critical | Remote Code Execution | 5028240 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2012 | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Critical | Remote Code Execution | 5028232 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 (Server Core installation) | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Critical | Remote Code Execution | 5028232 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 R2 | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Critical | Remote Code Execution | 5028228 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Critical | Remote Code Execution | 5028228 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2016 | 5029242 (Security Update) | Critical | Remote Code Execution | 5028169 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2016 (Server Core installation) | 5029242 (Security Update) | Critical | Remote Code Execution | 5028169 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2019 | 5029247 (Security Update) | Critical | Remote Code Execution | 5028168 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2019 (Server Core installation) | 5029247 (Security Update) | Critical | Remote Code Execution | 5028168 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2022 | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Critical | Remote Code Execution | 5028171 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
Windows Server 2022 (Server Core installation) | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Critical | Remote Code Execution | 5028171 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
CVE ID | Acknowledgements |
CVE-2023-35385 | Yuki Chen with Cyber KunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-35386
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-35386 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5029259 (Security Update) | Important | Elevation of Privilege | 5028186 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 for x64-based Systems | 5029259 (Security Update) | Important | Elevation of Privilege | 5028186 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5029242 (Security Update) | Important | Elevation of Privilege | 5028169 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5029242 (Security Update) | Important | Elevation of Privilege | 5028169 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for ARM64-based Systems | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for x64-based Systems | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 21H2 for 32-bit Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for x64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for 32-bit Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for x64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 11 version 21H2 for ARM64-based Systems | 5029253 (Security Update) | Important | Elevation of Privilege | 5028182 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5029253 (Security Update) | Important | Elevation of Privilege | 5028182 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5029263 (Security Update) | Important | Elevation of Privilege | 5028185 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows 11 Version 22H2 for x64-based Systems | 5029263 (Security Update) | Important | Elevation of Privilege | 5028185 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows Server 2016 | 5029242 (Security Update) | Important | Elevation of Privilege | 5028169 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2016 (Server Core installation) | 5029242 (Security Update) | Important | Elevation of Privilege | 5028169 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2019 | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2019 (Server Core installation) | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2022 | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Elevation of Privilege | 5028171 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
Windows Server 2022 (Server Core installation) | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Elevation of Privilege | 5028171 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
CVE ID | Acknowledgements |
CVE-2023-35386 | Mateusz Jurczyk of Google Project Zero |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-35387
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Bluetooth A2DP driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? An authorized attacker could exploit the Windows Bluetooth driver vulnerability by programmatically running certain functions that could lead to elevation of privilege on the Bluetooth component. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? In order to exploit this vulnerability, the victim must pair with the attacker's Bluetooth device. According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? An exploited vulnerability can affect resources beyond the security scope managed by the security authority of the vulnerable component. In this case, the vulnerable component and the impacted component are different and managed by different security authorities. According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires that an attacker will need to first gain access to the restricted network before running an attack. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-35387 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5029259 (Security Update) | Important | Elevation of Privilege | 5028186 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 for x64-based Systems | 5029259 (Security Update) | Important | Elevation of Privilege | 5028186 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5029242 (Security Update) | Important | Elevation of Privilege | 5028169 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5029242 (Security Update) | Important | Elevation of Privilege | 5028169 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for ARM64-based Systems | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for x64-based Systems | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 21H2 for 32-bit Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for x64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for 32-bit Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for x64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 11 version 21H2 for ARM64-based Systems | 5029253 (Security Update) | Important | Elevation of Privilege | 5028182 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5029253 (Security Update) | Important | Elevation of Privilege | 5028182 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5029263 (Security Update) | Important | Elevation of Privilege | 5028185 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows 11 Version 22H2 for x64-based Systems | 5029263 (Security Update) | Important | Elevation of Privilege | 5028185 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows Server 2012 | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Elevation of Privilege | 5028232 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 (Server Core installation) | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Elevation of Privilege | 5028232 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 R2 | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Elevation of Privilege | 5028228 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Elevation of Privilege | 5028228 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2016 | 5029242 (Security Update) | Important | Elevation of Privilege | 5028169 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2016 (Server Core installation) | 5029242 (Security Update) | Important | Elevation of Privilege | 5028169 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2019 | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2019 (Server Core installation) | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
CVE ID | Acknowledgements |
CVE-2023-35387 | Anonymous Trend Micro Zero Day Initiative |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-35389
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? A user would have to open a maliciously crafted email sent to Dynamics 365 Customer Engagement. According to the CVSS metrics, successful exploitation of this vulnerability could lead to minor loss of confidentiality (C:L), integrity (I:L) and availability (A:L). What does that mean for this vulnerability? While we cannot rule out the impact to Confidentiality, Integrity, and Availability, the ability to exploit this vulnerability by itself is limited. An attacker can force a bad response to be cached into a regular URL by having multiple occurrences of the same variable in the query string. The impact depends on the business logic of the user application. According to the CVSS metric, the attack vector is network (AV:N). What is the target used in the context of the remote code execution? As an authenticated user, the attacker could attempt to trigger malicious code in the context of the victim.
An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? A user could be tricked into entering credentials or responding to a pop up after opening a specially crafted file or clicking on a link, typically by way of an enticement in an email or URL. According to the CVSS metric, the attack vector is network (AV:N), and privilege required is low (PR:L). What is the target used in the context of the remote code execution? The attacker for this vulnerability could target the server accounts in an arbitrary or remote code execution. As an authenticated user, the attacker could attempt to trigger malicious code in the context of the server's account through a network call. The privilege requirement is low because the attacker needs to be authenticated as a normal user. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-35389 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Dynamics 365 (on-premises) version 9.0 | 5026500 (Security Update) | Important | Remote Code Execution | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L/E:U/RL:O/RC:C |
9.0.47.08 | Maybe | None |
Microsoft Dynamics 365 (on-premises) version 9.1 | 5026501 (Security Update) | Important | Remote Code Execution | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L/E:U/RL:O/RC:C |
9.1.18.22 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-35389 | Vladimir Egorov |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-35393
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Apache Hive Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:4.5/TemporalScore:3.9
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker would have to send the victim a malicious file that the victim would have to execute. **According to the CVSS metric, user interaction is required (UI:R) and privileges required is high (PR:H). What does that mean for this vulnerability? An authorized attacker with administrator privileges must send a victim a malicious site and convince them to open it. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-35393 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure HDInsights | Release Notes (Security Update) | Important | Spoofing | None | Base: 4.5 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
2307201242 | Yes | None |
CVE ID | Acknowledgements |
CVE-2023-35393 | Lidor B. with Orca Security |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-35394
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure HDInsight Jupyter Notebook Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:4.6/TemporalScore:4.0
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker would have to send the victim a malicious file that the victim would have to execute. According to the CVSS metrics, successful exploitation of this vulnerability could lead to minor loss of confidentiality (C:L), integrity (I:L) and availability (A:N). What does that mean for this vulnerability? There are limited impact to Confidentiality and Integrity and no Avaibility impact from exploiting this vulnerability. An attacker would need to combine this with other vulnerabilities to perform an attack. According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability? An authorized attacker with guest privileges must send a victim a malicious site and convince them to open it. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-35394 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure HDInsights | Release Notes (Security Update) | Important | Spoofing | None | Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C |
2307201242 | Yes | None |
CVE ID | Acknowledgements |
CVE-2023-35394 | Lidor B. with Orca Security |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-38188
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Apache Hadoop Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:4.5/TemporalScore:3.9
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker would have to send the victim a malicious file that the victim would have to execute. **According to the CVSS metric, user interaction is required (UI:R) and privileges required is high (PR:H). What does that mean for this vulnerability? An authorized attacker with administrator privileges must send a victim a malicious site and convince them to open it. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-38188 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure HDInsights | Release Notes (Security Update) | Important | Spoofing | None | Base: 4.5 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
2307201242 | Yes | None |
CVE ID | Acknowledgements |
CVE-2023-38188 | Lidor B. with Orca Security |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-38186
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Mobile Device Management Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-38186 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 21H2 for 32-bit Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for x64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for 32-bit Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for x64-based Systems | 5029244 (Security Update) | Important | Elevation of Privilege | 5028166 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 11 version 21H2 for ARM64-based Systems | 5029253 (Security Update) | Important | Elevation of Privilege | 5028182 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5029253 (Security Update) | Important | Elevation of Privilege | 5028182 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5029263 (Security Update) | Important | Elevation of Privilege | 5028185 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows 11 Version 22H2 for x64-based Systems | 5029263 (Security Update) | Important | Elevation of Privilege | 5028185 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows Server 2022 | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Elevation of Privilege | 5028171 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
Windows Server 2022 (Server Core installation) | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Elevation of Privilege | 5028171 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
CVE ID | Acknowledgements |
CVE-2023-38186 | Marcos Oviedo with FleetDM |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-38185
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Exchange Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, privileges required is low (PR:L). Does the attacker need to be in an authenticated role on the Exchange Server? Yes, the attacker must be authenticated. According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is none (UI:N). What is the target used in the context of the remote code execution? The attacker for this vulnerability could target the server accounts in an arbitrary or remote code execution. As an authenticated user, the attacker could attempt to trigger malicious code in the context of the server's account through a network call. How could an attacker exploit this vulnerability? In a network-based attack, an attacker could trigger malicious code in the context of the server's account through a network call. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-38185 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Exchange Server 2016 Cumulative Update 23 | 5029388 (Security Update) | Important | Remote Code Execution | 5029388 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.01.2507.031 |
Yes | 5029388 |
Microsoft Exchange Server 2019 Cumulative Update 12 | 5029388 (Security Update) | Important | Remote Code Execution | 5026261 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.02.1118.036 |
Yes | 5029388 |
Microsoft Exchange Server 2019 Cumulative Update 13 | 5029388 (Security Update) | Important | Remote Code Execution | 5026261 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.02.1258.023 |
Yes | 5029388 |
CVE ID | Acknowledgements |
CVE-2023-38185 | zcgonvh |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-38184
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. How could an attacker exploit this vulnerability? An authenticated attacker who successfully exploited this vulnerability could gain code execution through a specially crafted LDAP call to execute arbitrary code within the context of the LDAP service. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-38184 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5029259 (Security Update) | Important | Remote Code Execution | 5028186 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 for x64-based Systems | 5029259 (Security Update) | Important | Remote Code Execution | 5028186 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5029242 (Security Update) | Important | Remote Code Execution | 5028169 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5029242 (Security Update) | Important | Remote Code Execution | 5028169 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5029247 (Security Update) | Important | Remote Code Execution | 5028168 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for ARM64-based Systems | 5029247 (Security Update) | Important | Remote Code Execution | 5028168 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for x64-based Systems | 5029247 (Security Update) | Important | Remote Code Execution | 5028168 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 21H2 for 32-bit Systems | 5029244 (Security Update) | Important | Remote Code Execution | 5028166 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Remote Code Execution | 5028166 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for x64-based Systems | 5029244 (Security Update) | Important | Remote Code Execution | 5028166 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for 32-bit Systems | 5029244 (Security Update) | Important | Remote Code Execution | 5028166 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Remote Code Execution | 5028166 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for x64-based Systems | 5029244 (Security Update) | Important | Remote Code Execution | 5028166 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 11 version 21H2 for ARM64-based Systems | 5029253 (Security Update) | Important | Remote Code Execution | 5028182 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5029253 (Security Update) | Important | Remote Code Execution | 5028182 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5029263 (Security Update) | Important | Remote Code Execution | 5028185 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows 11 Version 22H2 for x64-based Systems | 5029263 (Security Update) | Important | Remote Code Execution | 5028185 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Remote Code Execution | 5028222 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Remote Code Execution | 5028222 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Remote Code Execution | 5028222 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Remote Code Execution | 5028222 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Remote Code Execution | 5028240 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Remote Code Execution | 5028240 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2012 | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Remote Code Execution | 5028232 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 (Server Core installation) | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Remote Code Execution | 5028232 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 R2 | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Remote Code Execution | 5028228 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Remote Code Execution | 5028228 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2016 | 5029242 (Security Update) | Important | Remote Code Execution | 5028169 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2016 (Server Core installation) | 5029242 (Security Update) | Important | Remote Code Execution | 5028169 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2019 | 5029247 (Security Update) | Important | Remote Code Execution | 5028168 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2019 (Server Core installation) | 5029247 (Security Update) | Important | Remote Code Execution | 5028168 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2022 | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Remote Code Execution | 5028171 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
Windows Server 2022 (Server Core installation) | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Remote Code Execution | 5028171 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
CVE ID | Acknowledgements |
CVE-2023-38184 | Polar Bear |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||
CVE-2023-38175
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Windows Defender Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker would only be able to delete targeted files on a system.
1. Why is no action required to install this update? In response to a constantly changing threat landscape, Microsoft frequently updates malware definitions and the Microsoft Malware Protection Engine. In order to be effective in helping protect against new and prevalent threats, antimalware software must be kept up to date with these updates in a timely manner. For enterprise deployments as well as end users, the default configuration in Microsoft antimalware software helps ensure that malware definitions and the Microsoft Malware Protection Engine are kept up to date automatically. Product documentation also recommends that products are configured for automatic updating. Best practices recommend that customers regularly verify whether software distribution, such as the automatic deployment of Microsoft Malware Protection Engine updates and malware definitions, is working as expected in their environment. 2, How often are the malware definitions updated? Microsoft also typically updates the malware definitions three times daily and can increase the frequency when needed. Depending on which Microsoft antimalware software is used and how it is configured, the software may search for engine and definition updates every day when connected to the Internet, up to multiple times daily. Customers can also choose to manually check for updates at any time. 3. What is the MpSigStub.exe? MpSigStub.exe is a component that’s responsible for installing definition updates. 4. Does this update contain any additional security-related changes to functionality? Yes. In addition to the changes that are listed for this vulnerability, this update includes defense-in-depth updates to help improve security-related features. 5. Where can I find more information about Microsoft antimalware technology? For more information, visit the Microsoft Malware Protection Center website. 6. The definitions are not updating on my system. What do I do? This security update is delivered only through definition updates. This cannot happen if Defender is in a disabled state (such as in the case of a third-party antivirus product providing real time protection). If Defender is disabled, you can delete the vulnerable file from the system: C:\WINDOWS\System32\MpSigStub.exe. If Defender is re-enabled at a later time, MpSigStub.exe will be replaced only when updating signatures via Microsoft Update or WSUS. MpSigStub.exe will not be replaced via the standalone Mpam-fe.exe install or via UNC Path installs. Suggested ActionsVerify that the update is installed Customers should verify that the latest version of the Microsoft Malware Protection Engine and definition updates are being actively downloaded and installed for their Microsoft antimalware products. For more information on how to verify the version number for the Microsoft Malware Protection Engine that your software is currently using, see the section, "Verifying Update Installation", in Microsoft Knowledge Base Article 2510781. If necessary, install the update Administrators of enterprise antimalware deployments should ensure that their update management software is configured to automatically approve and distribute engine updates and new malware definitions. Enterprise administrators should also verify that the latest version of the Microsoft Malware Protection Engine and definition updates are being actively downloaded, approved and deployed in their environment. For end-users, the affected software provides built-in mechanisms for the automatic detection and deployment of this update. For these customers, the update will be applied within 48 hours of its availability. The exact time frame depends on the software used, Internet connection, and infrastructure configuration. End users that do not wish to wait can manually update their antimalware software. For more information on how to manually update the Microsoft Malware Protection Engine and malware definitions, refer to Microsoft Knowledge Base Article 2510781. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-38175 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Defender Antimalware Platform | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.1.23060.3001 | No | None |
CVE ID | Acknowledgements |
CVE-2023-38175 | Filip Dragović |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-38172
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Message Queuing Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-38172 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5029259 (Security Update) | Important | Denial of Service | 5028186 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 for x64-based Systems | 5029259 (Security Update) | Important | Denial of Service | 5028186 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.20107 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5029242 (Security Update) | Important | Denial of Service | 5028169 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5029242 (Security Update) | Important | Denial of Service | 5028169 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5029247 (Security Update) | Important | Denial of Service | 5028168 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for ARM64-based Systems | 5029247 (Security Update) | Important | Denial of Service | 5028168 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for x64-based Systems | 5029247 (Security Update) | Important | Denial of Service | 5028168 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 21H2 for 32-bit Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for x64-based Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for 32-bit Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for x64-based Systems | 5029244 (Security Update) | Important | Denial of Service | 5028166 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.3324 |
Yes | 5029244 |
Windows 11 version 21H2 for ARM64-based Systems | 5029253 (Security Update) | Important | Denial of Service | 5028182 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5029253 (Security Update) | Important | Denial of Service | 5028182 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.2295 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5029263 (Security Update) | Important | Denial of Service | 5028185 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows 11 Version 22H2 for x64-based Systems | 5029263 (Security Update) | Important | Denial of Service | 5028185 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.2134 |
Yes | 5029263 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Denial of Service | 5028222 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Denial of Service | 5028222 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Denial of Service | 5028222 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Denial of Service | 5028222 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Denial of Service | 5028240 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Denial of Service | 5028240 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2012 | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Denial of Service | 5028232 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 (Server Core installation) | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Denial of Service | 5028232 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.24414 | Yes | None |
Windows Server 2012 R2 | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Denial of Service | 5028228 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Denial of Service | 5028228 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.21503 | Yes | None |
Windows Server 2016 | 5029242 (Security Update) | Important | Denial of Service | 5028169 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2016 (Server Core installation) | 5029242 (Security Update) | Important | Denial of Service | 5028169 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6167 | Yes | None |
Windows Server 2019 | 5029247 (Security Update) | Important | Denial of Service | 5028168 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2019 (Server Core installation) | 5029247 (Security Update) | Important | Denial of Service | 5028168 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2022 | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Denial of Service | 5028171 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
Windows Server 2022 (Server Core installation) | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Denial of Service | 5028171 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.1906 |
Yes No |
5029250 |
CVE ID | Acknowledgements |
CVE-2023-38172 | Yuki Chen with Cyber KunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-38170
MITRE NVD Issuing CNA: Microsoft |
CVE Title: HEVC Video Extensions Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. How can I check if the update is installed? If your device manufacturer preinstalled this app, package versions 2.0.61931.0 and later contain this update. If you purchased this app from the Microsoft Store, package versions 2.0.61933.0 and later contain this update. You can check the package version in PowerShell:
Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-38170 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
HEVC Video Extension | VLSC (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
2.0.61931.0 | Maybe | None |
HEVC Video Extensions | Description (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
2.0.61933.0 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-38170 | Wenguang Jiao |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-38169
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft OLE DB Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. If I normally install GDR versions and have not installed the June Cumulative Update, am I affected by the vulnerability? Yes, customers who have installed Microsoft SQL Server 2022 for x64-based Systems (GDR) or Microsoft SQL Server 2019 for x64-based Systems (GDR) are vulnerable. Microsoft recommends updating to the latest cumulative update to be protected from this vulnerability. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. This CVE was addressed by SQL related updates that were released in June 2023, but the CVE was inadvertently omitted from the June 2023 Security Updates. This is an informational change only. Customers who have already installed the June 2023 update do not need to take any further action. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-38169 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft ODBC Driver 17 for SQL Server on Linux | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C |
17.10.4.1 | Maybe | None |
Microsoft ODBC Driver 17 for SQL Server on MacOS | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C |
17.10.4.1 | Maybe | None |
Microsoft ODBC Driver 17 for SQL Server on Windows | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C |
17.10.4.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on Linux | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C |
18.2.1.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on MacOS | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C |
18.2.1.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on Windows | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C |
18.2.2.1 | Maybe | None |
Microsoft OLE DB Driver 18 for SQL Server | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C |
18.6.0006.0 | Maybe | None |
Microsoft OLE DB Driver 19 for SQL Server | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C |
19.3.0001.0 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 21) | 5025808 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C |
15.0.4316.3 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 5) | 5026806 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C |
16.0.4053.3 | Yes | None |
CVE ID | Acknowledgements |
CVE-2023-38169 | bee13oy with Cyber Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-38167
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Dynamics Business Central Elevation Of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Executive Summary: None FAQ: According to the CVSS metric, privileges required is high (PR:H). What privileges does an attacker require to exploit this vulnerability? Successful exploitation of this vulnerability requires an attacker to already have admin or high privilege access to a security group within the tenant. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-38167 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Dynamics 365 Business Central 2023 Release Wave 1 | 5029765 (Security Update) | Important | Elevation of Privilege | None | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Application Build 22.4.59134, Platform Build 22.0. | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-38167 | Darrick Joo |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||
CVE-2023-38157
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? This vulnerability requires a user to open a Web Archive file with spoofed origin of the web content in the affected version of Microsoft Edge (Chromium-based). According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H) but have no effect on integrity (I:N) or on availability (A:N). What does that mean for this vulnerability? An attacker who successfully exploited the vulnerability could view sensitive information (Confidentiality). While the attacker can not make changes to disclosed information (Integrity) and limit access to the resource (Availability). What kind of security feature could be bypassed by successfully exploiting this vulnerability? Attacker who succesfully exploit this vulnerability could cause the Edge browser to share addditional stored cookie when using the share feature. What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    07-Aug-23     Information published. |
Moderate | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-38157 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Moderate | Security Feature Bypass | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
115.0.1901.200 | No | None |
CVE ID | Acknowledgements |
CVE-2023-38157 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-21709
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Exchange Server Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? The attacker would be able to login as another user successfully. How could an attacker exploit this vulnerability? In a network-based attack, an attacker could brute force user account passwords to log in as that user. Microsoft encourages the use of strong passwords that are more difficult for an attacker to brute force. Why is the severity for this CVE rated as Important, but the CVSS score is 9.8? The Microsoft proprietary severity rating does not align with the CVSS scoring system. In this case, the severity rating of Important (rather than Critical) reflects the fact that brute-force attacks are unlikely to succeed against users with strong passwords. The CVSS scoring system doesn't allow for this type of nuance. Are there additional steps needed to protect against this vulnerability? Yes, in addition to installing the updates a script must be run. Alternatively you can accomplish the same by running commands from the command line in a PowerShell window or some other terminal. Follow the following steps:
or
Although Microsoft recommends installing the security updates as soon as possible, running the script or the commands on a supported version of Exchange Server prior to installing the updates will address this vulnerability. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-21709 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Exchange Server 2016 Cumulative Update 23 | 5029388 (Security Update) | Important | Elevation of Privilege | 5029388 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.01.2507.031 |
Yes | 5029388 |
Microsoft Exchange Server 2019 Cumulative Update 12 | 5029388 (Security Update) | Important | Elevation of Privilege | 5026261 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.02.1118.036 |
Yes | 5029388 |
Microsoft Exchange Server 2019 Cumulative Update 13 | 5029388 (Security Update) | Important | Elevation of Privilege | 5026261 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.02.1258.023 |
Yes | 5029388 |
CVE ID | Acknowledgements |
CVE-2023-21709 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-35371
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: Are the updates for the Microsoft Office for Mac currently available? The security update for Microsoft Office 2019 for Mac and Microsoft Office LTSC for Mac 2021 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability? An attacker who successfully exploits this vulnerability could perform a remote attack that could enable access to the victim's information and the ability to alter information. Successful exploitation could also potentially cause downtime for the targeted environment. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-35371 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for Mac | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC for Mac 2021 | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Microsoft Office Online Server | 5002435 (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10401.20022 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-35371 | Rocco Calvi (@TecR0c) with TecSecurity |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-35372
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Office Visio Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability? An attacker who successfully exploits this vulnerability could perform a remote attack that could enable access to the victim's information and the ability to alter information. Successful exploitation could also potentially cause downtime for the targeted environment. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-35372 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
CVE ID | Acknowledgements |
CVE-2023-35372 | Kim Dong-Uk (@justlikebono) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36877
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Apache Oozie Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:4.5/TemporalScore:3.9
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker would have to send the victim a malicious file that the victim would have to execute. **According to the CVSS metric, user interaction is required (UI:R) and privileges required is high (PR:H). What does that mean for this vulnerability? An authorized attacker with administrator privileges must send a victim a malicious site and convince them to open it. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36877 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure HDInsights | Release Notes (Security Update) | Important | Spoofing | None | Base: 4.5 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
2307201242 | Yes | None |
CVE ID | Acknowledgements |
CVE-2023-36877 | Lidor B. with Orca Security |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36881
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Apache Ambari Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:4.5/TemporalScore:3.9
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker would have to send the victim a malicious file that the victim would have to execute. **According to the CVSS metric, user interaction is required (UI:R) and privileges required is high (PR:H). What does that mean for this vulnerability? An authorized attacker with administrator privileges must send a victim a malicious site and convince them to open it. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36881 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure HDInsights | Release Notes (Security Update) | Important | Spoofing | None | Base: 4.5 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
2307201242 | Yes | None |
CVE ID | Acknowledgements |
CVE-2023-36881 | Lidor B. with Orca Security |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36890
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft SharePoint Server Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: None FAQ: There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software? Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order. What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is sensitive information. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? The attacker must be authenticated to the target site as at least a Site Member and have edit permissions for the site. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36890 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft SharePoint Server 2019 | 5002436 (Security Update) 5002422 (Security Update) |
Important | Information Disclosure | 5002423 5002403 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
16.0.10401.20025 |
Maybe | 5002436 5002422 |
Microsoft SharePoint Server Subscription Edition | 5002437 (Security Update) | Important | Information Disclosure | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
16.0.16130.20684 |
Maybe | 5002437 |
CVE ID | Acknowledgements |
CVE-2023-36890 | Christoffer von Sabsay |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36891
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft SharePoint Server Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Executive Summary: None FAQ: There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software? Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? The attacker must be authenticated and possess the permissions for page creation to be able to exploit this vulnerability. According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability? An attacker who successfully exploits this vulnerability could perform a remote attack that could enable access to the victim's information and the ability to alter information. Successful exploitation could also potentially cause downtime for the targeted environment. How could an attacker exploit the vulnerability? An attacker who successfully exploited this vulnerability might be able to run their scripts in the security context of the current user by enticing the user to click on a link resulting in a cross-site scripting attack on the SharePoint Server. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36891 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft SharePoint Server 2019 | 5002436 (Security Update) 5002422 (Security Update) |
Important | Spoofing | 5002423 5002403 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10401.20025 |
Maybe | 5002436 5002422 |
Microsoft SharePoint Server Subscription Edition | 5002437 (Security Update) | Important | Spoofing | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.16130.20684 |
Maybe | 5002437 |
CVE ID | Acknowledgements |
CVE-2023-36891 | Christoffer81 |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36892
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft SharePoint Server Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Executive Summary: None FAQ: There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software? Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? The attacker must be authenticated and possess the permissions for page creation to be able to exploit this vulnerability. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? The user would have to click on a specially crafted URL to be compromised by the attacker. According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability? An attacker who successfully exploits this vulnerability could perform a remote attack that could enable access to the victim's information and the ability to alter information. Successful exploitation could also potentially cause downtime for the targeted environment. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36892 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft SharePoint Server 2019 | 5002436 (Security Update) 5002422 (Security Update) |
Important | Spoofing | 5002423 5002403 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10401.20025 |
Maybe | 5002436 5002422 |
Microsoft SharePoint Server Subscription Edition | 5002437 (Security Update) | Important | Spoofing | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.16130.20684 |
Maybe | 5002437 |
CVE ID | Acknowledgements |
CVE-2023-36892 | Felix Boulet |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36893
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Outlook Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: None FAQ: Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. What type of information could be disclosed by this vulnerability? Exploiting this vulnerability could allow the disclosure of NetNTLMv2 hashes. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? This vulnerability requires that a user with an affected version of Outlook open a malicious meeting or appointment invite from the attacker. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36893 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Spoofing | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Spoofing | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Spoofing | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Spoofing | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Spoofing | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Spoofing | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Outlook 2013 RT Service Pack 1 | 5002449 (Security Update) | Important | Spoofing | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
15.0.5579.1000 | Maybe | None |
Microsoft Outlook 2013 Service Pack 1 (32-bit editions) | 5002449 (Security Update) | Important | Spoofing | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
15.0.5579.1000 | Maybe | None |
Microsoft Outlook 2013 Service Pack 1 (64-bit editions) | 5002449 (Security Update) | Important | Spoofing | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
15.0.5579.1000 | Maybe | None |
Microsoft Outlook 2016 (32-bit edition) | 5002459 (Security Update) | Important | Spoofing | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
16.0.5408.1000 | Maybe | None |
Microsoft Outlook 2016 (64-bit edition) | 5002459 (Security Update) | Important | Spoofing | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
16.0.5408.1000 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-36893 | Richard Clifford with RootshellSecurity |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36894
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft SharePoint Server Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: None FAQ: There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software? Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? The attacker must be authenticated to the target site, with the permission to use Manage Lists within SharePoint. What type of information could be disclosed by this vulnerability? An attacker that successfully exploited this vulnerability could leak private property values. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36894 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft SharePoint Enterprise Server 2016 | 5002453 (Security Update) 5002398 (Security Update) |
Important | Information Disclosure | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
16.0.5408.1000 |
Maybe | 5002453 5002398 |
|
Microsoft SharePoint Server 2019 | 5002436 (Security Update) 5002422 (Security Update) |
Important | Information Disclosure | 5002423 5002403 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
16.0.10401.20025 |
Maybe | 5002436 5002422 |
Microsoft SharePoint Server Subscription Edition | 5002437 (Security Update) | Important | Information Disclosure | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
16.0.16130.20684 |
Maybe | 5002437 |
CVE ID | Acknowledgements |
CVE-2023-36894 | STAR Labs SG Pte. Ltd. |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36895
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Outlook Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: Are the updates for the Microsoft Office for Mac currently available? The security update for Microsoft Office 2019 for Mac and Microsoft Office LTSC for Mac 2021 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36895 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2013 RT Service Pack 1 | 5002445 (Security Update) | Critical | Remote Code Execution | 5002316 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.5579.1001 | Maybe | None |
Microsoft Office 2013 Service Pack 1 (32-bit editions) | 5002445 (Security Update) | Critical | Remote Code Execution | 5002316 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.5579.1001 | Maybe | None |
Microsoft Office 2013 Service Pack 1 (64-bit editions) | 5002445 (Security Update) | Critical | Remote Code Execution | 5002316 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.5579.1001 | Maybe | None |
Microsoft Office 2016 (32-bit edition) | 5002464 (Security Update) | Critical | Remote Code Execution | 5002323 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5408.1002 | Maybe | None |
Microsoft Office 2016 (64-bit edition) | 5002464 (Security Update) | Critical | Remote Code Execution | 5002323 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5408.1002 | Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for Mac | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC for Mac 2021 | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2023-36895 | Dan Cabrera with Cross the Divide |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36896
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: Are the updates for the Microsoft Office for Mac currently available? The security update for Microsoft Office 2019 for Mac and Microsoft Office LTSC for Mac 2021 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36896 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Excel 2013 RT Service Pack 1 | 5002451 (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.5579.1001 | Maybe | None |
Microsoft Excel 2013 Service Pack 1 (32-bit editions) | 5002451 (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.5579.1001 | Maybe | None |
Microsoft Excel 2013 Service Pack 1 (64-bit editions) | 5002451 (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.5579.1001 | Maybe | None |
Microsoft Excel 2016 (32-bit edition) | 5002463 (Security Update) | Important | Remote Code Execution | 5002351 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5408.1002 | Maybe | None |
Microsoft Excel 2016 (64-bit edition) | 5002463 (Security Update) | Important | Remote Code Execution | 5002351 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5408.1002 | Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for Mac | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC for Mac 2021 | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Microsoft Office Online Server | 5002435 (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10401.20022 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-36896 | Office Security Team and Excel Engineering Team |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36897
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Visual Studio Tools for Office Runtime Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.3
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? The user would have to click on install to be compromised by the attacker. How could an attacker exploit this vulnerability? An unauthenticated attacker could bypass validation as a trusted source through a crafted certificate that could mislead a user to believing the file they are installing is legitimate. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36897 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Spoofing | None | Base: 8.1 Temporal: 7.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Spoofing | None | Base: 8.1 Temporal: 7.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Spoofing | None | Base: 8.1 Temporal: 7.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Spoofing | None | Base: 8.1 Temporal: 7.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Spoofing | None | Base: 8.1 Temporal: 7.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Spoofing | None | Base: 8.1 Temporal: 7.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) | Release Notes (Security Update) | Important | Spoofing | None | Base: 8.1 Temporal: 7.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
15.9.56 | Maybe | None |
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | Release Notes (Security Update) | Important | Spoofing | None | Base: 8.1 Temporal: 7.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
16.11.29 | Maybe | None |
Microsoft Visual Studio 2022 version 17.2 | Release Notes (Security Update) | Important | Spoofing | None | Base: 8.1 Temporal: 7.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
17.2.18 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Important | Spoofing | None | Base: 8.1 Temporal: 7.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
17.4.10 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Important | Spoofing | None | Base: 8.1 Temporal: 7.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
17.6.6 | Maybe | None |
Visual Studio 2010 Tools for Office Runtime | 5029497 (Security Update) | Important | Spoofing | None | Base: 8.1 Temporal: 7.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
10.0.60910 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-36897 | Bill Demirkapi with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-35388
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Exchange Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? An authenticated attacker who is on the same intranet as the Exchange server can achieve remote code execution via a PowerShell remoting session. According to the CVSS metric, privileges required is low (PR:L). Does the attacker need to be in an authenticated role on the Exchange Server? Yes, the attacker must be authenticated with LAN-access and have credentials for a valid Exchange user. According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability? An authenticated attacker could exploit this vulnerability with LAN access. What privileges could be gained by an attacker who successfully exploited the vulnerability? An authenticated attacker could gain remote code execution rights on the server mailbox backend as NT AUTHORITY\SYSTEM. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-35388 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Exchange Server 2016 Cumulative Update 23 | 5029388 (Security Update) | Important | Remote Code Execution | 5029388 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.01.2507.031 |
Yes | 5029388 |
Microsoft Exchange Server 2019 Cumulative Update 12 | 5029388 (Security Update) | Important | Remote Code Execution | 5026261 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.02.1118.036 |
Yes | 5029388 |
Microsoft Exchange Server 2019 Cumulative Update 13 | 5029388 (Security Update) | Important | Remote Code Execution | 5026261 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.02.1258.023 |
Yes | 5029388 |
CVE ID | Acknowledgements |
CVE-2023-35388 | m4yfly with TianGong Team of Legendsec at Qi'anxin Group |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2023-20569
MITRE NVD Issuing CNA: Advanced Micro Devices Inc. |
CVE Title: AMD: CVE-2023-20569 Return Address Predictor
CVSS: None Executive Summary: None FAQ: Why is this AMD CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in certain processor models offered by AMD. The mitigation for this vulnerability requires a Windows update. This CVE is being documented in the Security Update Guide to announce that the latest builds of Windows enable the mitigation and provide protection against the vulnerability. Please see the following for more information: Are any additional steps required to protect my system after installing the August Windows updates? Customers who allow untrusted users to execute arbitrary code might wish to implement some extra security features within their systems. These features protect against the intra-process disclosure vectors that this speculative execution vulnerability describes. See the following for more information.
Microsoft Azure has taken steps to address the security vulnerabilities at the hypervisor level to protect VMs running in Azure. More information can be found here. Can I expect any performance impact after I configure the registry keys? In some cases, installing these updates will have a performance impact. In testing Microsoft has seen some performance impact with these mitigations, in particular when hyperthreading is disabled. Microsoft values the security of its software and services and has made the decision to implement certain mitigation strategies in an effort to better secure our products. In some cases, mitigations are not enabled by default to allow users and administrators to evaluate the performance impact and risk exposure before deciding to enable the mitigations. We continue to work with hardware vendors to improve performance while maintaining a high level of security. Are Microsoft Azure assets protected? Microsoft is in the process of deploying mitigations across our cloud services and we expect this work to be complete soon. More information is available here. How do I know if I am affected? Please refer to AMD advisory AMD-SB-7005 to determine which AMD CPUs are affected. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-20569 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5029259 (Security Update) | Important | Information Disclosure | 5028186 | Base: N/A Temporal: N/A Vector: N/A |
10.0.10240.20107 | Yes | None |
Windows 10 for x64-based Systems | 5029259 (Security Update) | Important | Information Disclosure | 5028186 | Base: N/A Temporal: N/A Vector: N/A |
10.0.10240.20107 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5029242 (Security Update) | Important | Information Disclosure | 5028169 | Base: N/A Temporal: N/A Vector: N/A |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5029242 (Security Update) | Important | Information Disclosure | 5028169 | Base: N/A Temporal: N/A Vector: N/A |
10.0.14393.6167 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5029247 (Security Update) | Important | Information Disclosure | 5028168 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for ARM64-based Systems | 5029247 (Security Update) | Important | Information Disclosure | 5028168 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for x64-based Systems | 5029247 (Security Update) | Important | Information Disclosure | 5028168 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 21H2 for 32-bit Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 21H2 for x64-based Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.19044.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for 32-bit Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for ARM64-based Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.19045.3324 |
Yes | 5029244 |
Windows 10 Version 22H2 for x64-based Systems | 5029244 (Security Update) | Important | Information Disclosure | 5028166 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.19045.3324 |
Yes | 5029244 |
Windows 11 version 21H2 for ARM64-based Systems | 5029253 (Security Update) | Important | Information Disclosure | 5028182 | Base: N/A Temporal: N/A Vector: N/A |
10.0.22000.2295 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5029253 (Security Update) | Important | Information Disclosure | 5028182 | Base: N/A Temporal: N/A Vector: N/A |
10.0.22000.2295 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5029263 (Security Update) | Important | Information Disclosure | 5028185 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.22621.2134 |
Yes | 5029263 |
Windows 11 Version 22H2 for x64-based Systems | 5029263 (Security Update) | Important | Information Disclosure | 5028185 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.22621.2134 |
Yes | 5029263 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Information Disclosure | 5028222 |
Base: N/A Temporal: N/A Vector: N/A |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Information Disclosure | 5028222 |
Base: N/A Temporal: N/A Vector: N/A |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Information Disclosure | 5028222 |
Base: N/A Temporal: N/A Vector: N/A |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5029318 (Monthly Rollup) 5029301 (Security Only) |
Important | Information Disclosure | 5028222 |
Base: N/A Temporal: N/A Vector: N/A |
6.0.6003.22216 |
Yes | 5029318 5029301 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Information Disclosure | 5028240 |
Base: N/A Temporal: N/A Vector: N/A |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5029296 (Monthly Rollup) 5029307 (Security Only) |
Important | Information Disclosure | 5028240 |
Base: N/A Temporal: N/A Vector: N/A |
6.1.7601.26664 |
Yes | 5029296 5029307 |
Windows Server 2012 | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Information Disclosure | 5028232 |
Base: N/A Temporal: N/A Vector: N/A |
6.2.9200.24414 | Yes | None |
Windows Server 2012 (Server Core installation) | 5029295 (Monthly Rollup) 5029308 (Security Only) |
Important | Information Disclosure | 5028232 |
Base: N/A Temporal: N/A Vector: N/A |
6.2.9200.24414 | Yes | None |
Windows Server 2012 R2 | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Information Disclosure | 5028228 |
Base: N/A Temporal: N/A Vector: N/A |
6.3.9600.21503 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5029312 (Monthly Rollup) 5029304 (Security Only) |
Important | Information Disclosure | 5028228 |
Base: N/A Temporal: N/A Vector: N/A |
6.3.9600.21503 | Yes | None |
Windows Server 2016 | 5029242 (Security Update) | Important | Information Disclosure | 5028169 | Base: N/A Temporal: N/A Vector: N/A |
10.0.14393.6167 | Yes | None |
Windows Server 2016 (Server Core installation) | 5029242 (Security Update) | Important | Information Disclosure | 5028169 | Base: N/A Temporal: N/A Vector: N/A |
10.0.14393.6167 | Yes | None |
Windows Server 2019 | 5029247 (Security Update) | Important | Information Disclosure | 5028168 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2019 (Server Core installation) | 5029247 (Security Update) | Important | Information Disclosure | 5028168 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2022 | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Information Disclosure | 5028171 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.20348.1906 |
Yes No |
5029250 |
Windows Server 2022 (Server Core installation) | 5029250 (Security Update) 5029367 (Security Hotpatch Update) |
Important | Information Disclosure | 5028171 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.20348.1906 |
Yes No |
5029250 |
CVE ID | Acknowledgements |
CVE-2023-20569 |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-35390
MITRE NVD Issuing CNA: Microsoft |
CVE Title: .NET and Visual Studio Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.0
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. How could an attacker exploit this vulnerability? To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-35390 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
.NET 6.0 | 5029688 (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
6.0.21 | Maybe | None |
.NET 7.0 | 5029689 (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
7.0.10 | Maybe | None |
Microsoft Visual Studio 2022 version 17.2 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
17.2.18 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
17.4.10 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
17.6.6 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-35390 | ycdxsb with VARAS@IIE |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-35391
MITRE NVD Issuing CNA: Microsoft |
CVE Title: ASP.NET Core SignalR and Visual Studio Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.4
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? This vulnerability makes it possible to listen to any group or user with a specially crafted group/username. By exploiting this vulnerability, the attacker can now receive messages for group(s) that they are unauthorized to view. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-35391 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
.NET 6.0 | 5029688 (Security Update) | Important | Information Disclosure | None | Base: 7.1 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
6.0.21 | Maybe | None |
.NET 7.0 | 5029689 (Security Update) | Important | Information Disclosure | None | Base: 7.1 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
7.0.10 | Maybe | None |
ASP.NET Core 2.1 | Release Notes (Security Update) | Important | Information Disclosure | None | Base: 7.1 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
2.1.40 | Maybe | None |
Microsoft Visual Studio 2022 version 17.2 | Release Notes (Security Update) | Important | Information Disclosure | None | Base: 7.1 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
17.2.18 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Important | Information Disclosure | None | Base: 7.1 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
17.4.10 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Important | Information Disclosure | None | Base: 7.1 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
17.6.6 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-35391 | Brennan Conroy |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-38182
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Exchange Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? An authenticated attacker who is on the same intranet as the Exchange server can achieve remote code execution via a PowerShell remoting session. According to the CVSS metric, privileges required is low (PR:L). Does the attacker need to be in an authenticated role on the Exchange Server? Yes, the attacker must be authenticated with LAN-access and have credentials for a valid Exchange user. According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability? An authenticated attacker could exploit this vulnerability with LAN access. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-38182 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Exchange Server 2016 Cumulative Update 23 | 5029388 (Security Update) | Important | Remote Code Execution | 5029388 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.01.2507.031 |
Yes | 5029388 |
Microsoft Exchange Server 2019 Cumulative Update 12 | 5029388 (Security Update) | Important | Remote Code Execution | 5026261 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.02.1118.036 |
Yes | 5029388 |
Microsoft Exchange Server 2019 Cumulative Update 13 | 5029388 (Security Update) | Important | Remote Code Execution | 5026261 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.02.1258.023 |
Yes | 5029388 |
CVE ID | Acknowledgements |
CVE-2023-38182 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-38181
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Exchange Server Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H), integrity (I:H) and availability (A:H). What does that mean for this vulnerability? An attacker who successfully exploited this vulnerability could access a user's Net-NTLMv2 hash which could be used as a basis of an NTLM Relay attack against another service to authenticate as the user. How could an attacker exploit this vulnerability? An authenticated attacker could achieve exploitation given a PowerShell remoting session to the server. According to the CVSS metric, the attack vector is network (AV:N) and the attack complexity is low (AC:L). What does that mean for this vulnerability? The attack vector is set to Network because this vulnerability is remotely exploitable and can be exploited from the internet. The attack complexity is set to Low because an attacker does not require significant prior knowledge of the cluster/system and can achieve repeatable success when attempting to exploit this vulnerability. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-38181 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Exchange Server 2016 Cumulative Update 23 | 5029388 (Security Update) | Important | Spoofing | 5029388 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.01.2507.031 |
Yes | 5029388 |
Microsoft Exchange Server 2019 Cumulative Update 12 | 5029388 (Security Update) | Important | Spoofing | 5026261 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.02.1118.036 |
Yes | 5029388 |
Microsoft Exchange Server 2019 Cumulative Update 13 | 5029388 (Security Update) | Important | Spoofing | 5026261 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.02.1258.023 |
Yes | 5029388 |
CVE ID | Acknowledgements |
CVE-2023-38181 | Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative Andrew Ruddick with Microsoft Security Response Center |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-38180
MITRE NVD Issuing CNA: Microsoft |
CVE Title: .NET and Visual Studio Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.7
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | Yes |
The following tables list the affected software details for the vulnerability.
CVE-2023-38180 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
.NET 6.0 | 5029688 (Security Update) | Important | Denial of Service | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
6.0.21 | Maybe | None |
.NET 7.0 | 5029689 (Security Update) | Important | Denial of Service | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
7.0.10 | Maybe | None |
ASP.NET Core 2.1 | Release Notes (Security Update) | Important | Denial of Service | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
2.1.40 | Maybe | None |
Microsoft Visual Studio 2022 version 17.2 | Release Notes (Security Update) | Important | Denial of Service | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
17.2.18 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Important | Denial of Service | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
17.4.10 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Important | Denial of Service | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
17.6.6 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-38180 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-38178
MITRE NVD Issuing CNA: Microsoft |
CVE Title: .NET Core and Visual Studio Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-38178 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
.NET 6.0 | 5029688 (Security Update) | Important | Denial of Service | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.21 | Maybe | None |
Microsoft Visual Studio 2022 version 17.2 | Release Notes (Security Update) | Important | Denial of Service | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
17.2.18 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Important | Denial of Service | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
17.4.10 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-38178 | Benoit Foucher |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-38176
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Arc-Enabled Servers Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain administrator privileges. What can an attacker do with this vulnerability? An elevation of privilege vulnerability exists in the Azure Connected Machine Agent used with the Azure Arc-Enabled Servers service. This impacts both Linux and Windows servers. A low privilege user on the machine where the agent is installed can chain two vulnerabilities in HIMDS to get root/admin access on the server. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to exploit two separate vulnerabilities to gain elevated privileges. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-38176 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Arc-Enabled Servers | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.33.02399.0 | No | None |
CVE ID | Acknowledgements |
CVE-2023-38176 | Guy Arazi with Microsoft Vladimir Abramzon with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-38154
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-38154 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for ARM64-based Systems | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows 10 Version 1809 for x64-based Systems | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2019 | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
Windows Server 2019 (Server Core installation) | 5029247 (Security Update) | Important | Elevation of Privilege | 5028168 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4737 |
Yes | 5029247 |
CVE ID | Acknowledgements |
CVE-2023-38154 | Mateusz Jurczyk of Google Project Zero |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
ADV230004
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Memory Integrity System Readiness Scan Tool Defense in Depth Update
CVSS: None Executive Summary: The Memory Integrity System Readiness Scan Tool (hvciscan_amd64.exe and hvciscan_arm64.exe) is used to check for compatibility issues with memory integrity, also known as hypervisor-protected code integrity (HVCI). The original version was published without a RSRC section, which contains resource information for a module. The new version addresses this issue. Please see Driver compatibility with memory integrity and VBS for more information. FAQ: None Mitigations: None Workarounds: None Revision: 1.0    08-Aug-23     Information published. |
Moderate | Defense in Depth |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | Yes | No |
The following tables list the affected software details for the vulnerability.
ADV230004 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Memory Integrity System Readiness Scan Tool | Release Notes (Update) | Moderate | Defense in Depth | None | Base: N/A Temporal: N/A Vector: N/A |
10.0.25884.1000 | No | None |
CVE ID | Acknowledgements |
ADV230004 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2023-35945
MITRE NVD Issuing CNA: security-advisories@github.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    01-Aug-23     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-35945 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | nghttp2 (CBL-Mariner) | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
1.46.0-3 | Unknown | None |
CBL Mariner 2.0 x64 | nghttp2 (CBL-Mariner) | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
1.46.0-3 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2023-35945 | None |