Microsoft CVE Summary

This report contains detail for the following vulnerabilities:

CVE Issued by Tag CVE ID CVE Title
Microsoft.NET Core CVE-2023-38178 .NET Core and Visual Studio Denial of Service Vulnerability
Microsoft.NET Core CVE-2023-35390 .NET and Visual Studio Remote Code Execution Vulnerability
Microsoft.NET Framework CVE-2023-36873 .NET Framework Spoofing Vulnerability
MicrosoftASP .NET CVE-2023-38180 .NET and Visual Studio Denial of Service Vulnerability
MicrosoftASP.NET CVE-2023-36899 ASP.NET Elevation of Privilege Vulnerability
MicrosoftASP.NET and Visual Studio CVE-2023-35391 ASP.NET Core SignalR and Visual Studio Information Disclosure Vulnerability
MicrosoftAzure Arc CVE-2023-38176 Azure Arc-Enabled Servers Elevation of Privilege Vulnerability
MicrosoftAzure DevOps CVE-2023-36869 Azure DevOps Server Spoofing Vulnerability
MicrosoftAzure HDInsights CVE-2023-38188 Azure Apache Hadoop Spoofing Vulnerability
MicrosoftAzure HDInsights CVE-2023-35393 Azure Apache Hive Spoofing Vulnerability
MicrosoftAzure HDInsights CVE-2023-35394 Azure HDInsight Jupyter Notebook Spoofing Vulnerability
MicrosoftAzure HDInsights CVE-2023-36881 Azure Apache Ambari Spoofing Vulnerability
MicrosoftAzure HDInsights CVE-2023-36877 Azure Apache Oozie Spoofing Vulnerability
MicrosoftDynamics Business Central Control CVE-2023-38167 Microsoft Dynamics Business Central Elevation Of Privilege Vulnerability
security-advisories@github.comMariner CVE-2023-35945 Unknown
MicrosoftMemory Integrity System Readiness Scan Tool ADV230004 Memory Integrity System Readiness Scan Tool Defense in Depth Update
MicrosoftMicrosoft Dynamics CVE-2023-35389 Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability
MicrosoftMicrosoft Edge (Chromium-based) CVE-2023-38157 Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
ChromeMicrosoft Edge (Chromium-based) CVE-2023-4068 Chromium: CVE-2023-4068 Type Confusion in V8
ChromeMicrosoft Edge (Chromium-based) CVE-2023-4072 Chromium: CVE-2023-4072 Out of bounds read and write in WebGL
ChromeMicrosoft Edge (Chromium-based) CVE-2023-4071 Chromium: CVE-2023-4071 Heap buffer overflow in Visuals
ChromeMicrosoft Edge (Chromium-based) CVE-2023-4073 Chromium: CVE-2023-4073 Out of bounds memory access in ANGLE
ChromeMicrosoft Edge (Chromium-based) CVE-2023-4075 Chromium: CVE-2023-4075 Use after free in Cast
ChromeMicrosoft Edge (Chromium-based) CVE-2023-4074 Chromium: CVE-2023-4074 Use after free in Blink Task Scheduling
ChromeMicrosoft Edge (Chromium-based) CVE-2023-4076 Chromium: CVE-2023-4076 Use after free in WebRTC
ChromeMicrosoft Edge (Chromium-based) CVE-2023-4077 Chromium: CVE-2023-4077 Insufficient data validation in Extensions
ChromeMicrosoft Edge (Chromium-based) CVE-2023-4078 Chromium: CVE-2023-4078 Inappropriate implementation in Extensions
ChromeMicrosoft Edge (Chromium-based) CVE-2023-4070 Chromium: CVE-2023-4070 Type Confusion in V8
ChromeMicrosoft Edge (Chromium-based) CVE-2023-4069 Chromium: CVE-2023-4069 Type Confusion in V8
MicrosoftMicrosoft Exchange Server CVE-2023-38185 Microsoft Exchange Server Remote Code Execution Vulnerability
MicrosoftMicrosoft Exchange Server CVE-2023-35388 Microsoft Exchange Server Remote Code Execution Vulnerability
MicrosoftMicrosoft Exchange Server CVE-2023-35368 Microsoft Exchange Remote Code Execution Vulnerability
MicrosoftMicrosoft Exchange Server CVE-2023-38181 Microsoft Exchange Server Spoofing Vulnerability
MicrosoftMicrosoft Exchange Server CVE-2023-38182 Microsoft Exchange Server Remote Code Execution Vulnerability
MicrosoftMicrosoft Exchange Server CVE-2023-21709 Microsoft Exchange Server Elevation of Privilege Vulnerability
MicrosoftMicrosoft Office ADV230003 Microsoft Office Defense in Depth Update
MicrosoftMicrosoft Office CVE-2023-36897 Visual Studio Tools for Office Runtime Spoofing Vulnerability
MicrosoftMicrosoft Office Excel CVE-2023-36896 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Excel CVE-2023-35371 Microsoft Office Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Outlook CVE-2023-36893 Microsoft Outlook Spoofing Vulnerability
MicrosoftMicrosoft Office Outlook CVE-2023-36895 Microsoft Outlook Remote Code Execution Vulnerability
MicrosoftMicrosoft Office SharePoint CVE-2023-36891 Microsoft SharePoint Server Spoofing Vulnerability
MicrosoftMicrosoft Office SharePoint CVE-2023-36894 Microsoft SharePoint Server Information Disclosure Vulnerability
MicrosoftMicrosoft Office SharePoint CVE-2023-36890 Microsoft SharePoint Server Information Disclosure Vulnerability
MicrosoftMicrosoft Office SharePoint CVE-2023-36892 Microsoft SharePoint Server Spoofing Vulnerability
MicrosoftMicrosoft Office Visio CVE-2023-35372 Microsoft Office Visio Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Visio CVE-2023-36865 Microsoft Office Visio Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Visio CVE-2023-36866 Microsoft Office Visio Remote Code Execution Vulnerability
MicrosoftMicrosoft Teams CVE-2023-29328 Microsoft Teams Remote Code Execution Vulnerability
MicrosoftMicrosoft Teams CVE-2023-29330 Microsoft Teams Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2023-36882 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Advanced Micro Devices Inc.Microsoft Windows CVE-2023-20569 AMD: CVE-2023-20569 Return Address Predictor
MicrosoftMicrosoft Windows Codecs Library CVE-2023-38170 HEVC Video Extensions Remote Code Execution Vulnerability
MicrosoftReliability Analysis Metrics Calculation Engine CVE-2023-36876 Reliability Analysis Metrics Calculation (RacTask) Elevation of Privilege Vulnerability
MicrosoftRole: Windows Hyper-V CVE-2023-36908 Windows Hyper-V Information Disclosure Vulnerability
MicrosoftSQL Server CVE-2023-38169 Microsoft OLE DB Remote Code Execution Vulnerability
MicrosoftTablet Windows User Interface CVE-2023-36898 Tablet Windows User Interface Application Core Remote Code Execution Vulnerability
MicrosoftWindows Bluetooth A2DP driver CVE-2023-35387 Windows Bluetooth A2DP driver Elevation of Privilege Vulnerability
MicrosoftWindows Cloud Files Mini Filter Driver CVE-2023-36904 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
MicrosoftWindows Common Log File System Driver CVE-2023-36900 Windows Common Log File System Driver Elevation of Privilege Vulnerability
MicrosoftWindows Cryptographic Services CVE-2023-36907 Windows Cryptographic Services Information Disclosure Vulnerability
MicrosoftWindows Cryptographic Services CVE-2023-36906 Windows Cryptographic Services Information Disclosure Vulnerability
MicrosoftWindows Defender CVE-2023-38175 Microsoft Windows Defender Elevation of Privilege Vulnerability
MicrosoftWindows Fax and Scan Service CVE-2023-35381 Windows Fax Service Remote Code Execution Vulnerability
MicrosoftWindows Group Policy CVE-2023-36889 Windows Group Policy Security Feature Bypass Vulnerability
MicrosoftWindows HTML Platform CVE-2023-35384 Windows HTML Platforms Security Feature Bypass Vulnerability
MicrosoftWindows Kernel CVE-2023-35359 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2023-38154 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2023-35382 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2023-35386 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2023-35380 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows LDAP - Lightweight Directory Access Protocol CVE-2023-38184 Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
MicrosoftWindows Message Queuing CVE-2023-36909 Microsoft Message Queuing Denial of Service Vulnerability
MicrosoftWindows Message Queuing CVE-2023-35376 Microsoft Message Queuing Denial of Service Vulnerability
MicrosoftWindows Message Queuing CVE-2023-38172 Microsoft Message Queuing Denial of Service Vulnerability
MicrosoftWindows Message Queuing CVE-2023-35385 Microsoft Message Queuing Remote Code Execution Vulnerability
MicrosoftWindows Message Queuing CVE-2023-35383 Microsoft Message Queuing Information Disclosure Vulnerability
MicrosoftWindows Message Queuing CVE-2023-36913 Microsoft Message Queuing Information Disclosure Vulnerability
MicrosoftWindows Message Queuing CVE-2023-35377 Microsoft Message Queuing Denial of Service Vulnerability
MicrosoftWindows Message Queuing CVE-2023-38254 Microsoft Message Queuing Denial of Service Vulnerability
MicrosoftWindows Message Queuing CVE-2023-36911 Microsoft Message Queuing Remote Code Execution Vulnerability
MicrosoftWindows Message Queuing CVE-2023-36910 Microsoft Message Queuing Remote Code Execution Vulnerability
MicrosoftWindows Message Queuing CVE-2023-36912 Microsoft Message Queuing Denial of Service Vulnerability
MicrosoftWindows Mobile Device Management CVE-2023-38186 Windows Mobile Device Management Elevation of Privilege Vulnerability
MicrosoftWindows Projected File System CVE-2023-35378 Windows Projected File System Elevation of Privilege Vulnerability
MicrosoftWindows Reliability Analysis Metrics Calculation Engine CVE-2023-35379 Reliability Analysis Metrics Calculation Engine (RACEng) Elevation of Privilege Vulnerability
MicrosoftWindows Smart Card CVE-2023-36914 Windows Smart Card Resource Management Server Security Feature Bypass Vulnerability
MicrosoftWindows System Assessment Tool CVE-2023-36903 Windows System Assessment Tool Elevation of Privilege Vulnerability
MicrosoftWindows Wireless Wide Area Network Service CVE-2023-36905 Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability

CVE-2023-4068 - Chromium: CVE-2023-4068 Type Confusion in V8

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-4068
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2023-4068 Type Confusion in V8
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
115.0.1901.200 8/07/2023 115.0.5790.170/.171

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-23    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-4068
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
115.0.1901.200 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-4068 None

CVE-2023-4069 - Chromium: CVE-2023-4069 Type Confusion in V8

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-4069
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2023-4069 Type Confusion in V8
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
115.0.1901.200 8/07/2023 115.0.5790.170/.171

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-23    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-4069
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
115.0.1901.200 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-4069 None

CVE-2023-4070 - Chromium: CVE-2023-4070 Type Confusion in V8

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-4070
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2023-4070 Type Confusion in V8
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
115.0.1901.200 8/07/2023 115.0.5790.170/.171

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-23    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-4070
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
115.0.1901.200 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-4070 None

CVE-2023-4071 - Chromium: CVE-2023-4071 Heap buffer overflow in Visuals

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-4071
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2023-4071 Heap buffer overflow in Visuals
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
115.0.1901.200 8/07/2023 115.0.5790.170/.171

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-23    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-4071
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
115.0.1901.200 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-4071 None

CVE-2023-4072 - Chromium: CVE-2023-4072 Out of bounds read and write in WebGL

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-4072
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2023-4072 Out of bounds read and write in WebGL
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
115.0.1901.200 8/07/2023 115.0.5790.170/.171

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-23    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-4072
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
115.0.1901.200 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-4072 None

CVE-2023-4073 - Chromium: CVE-2023-4073 Out of bounds memory access in ANGLE

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-4073
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2023-4073 Out of bounds memory access in ANGLE
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
115.0.1901.200 8/07/2023 115.0.5790.170/.171

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-23    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-4073
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
115.0.1901.200 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-4073 None

CVE-2023-4074 - Chromium: CVE-2023-4074 Use after free in Blink Task Scheduling

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-4074
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2023-4074 Use after free in Blink Task Scheduling
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
115.0.1901.200 8/07/2023 115.0.5790.170/.171

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-23    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-4074
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
115.0.1901.200 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-4074 None

CVE-2023-4075 - Chromium: CVE-2023-4075 Use after free in Cast

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-4075
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2023-4075 Use after free in Cast
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
115.0.1901.200 8/07/2023 115.0.5790.170/.171

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-23    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-4075
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
115.0.1901.200 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-4075 None

CVE-2023-4076 - Chromium: CVE-2023-4076 Use after free in WebRTC

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-4076
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2023-4076 Use after free in WebRTC
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
115.0.1901.200 8/07/2023 115.0.5790.170/.171

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-23    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-4076
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
115.0.1901.200 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-4076 None

CVE-2023-4077 - Chromium: CVE-2023-4077 Insufficient data validation in Extensions

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-4077
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2023-4077 Insufficient data validation in Extensions
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
115.0.1901.200 8/07/2023 115.0.5790.170/.171

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-23    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-4077
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
115.0.1901.200 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-4077 None

CVE-2023-4078 - Chromium: CVE-2023-4078 Inappropriate implementation in Extensions

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-4078
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2023-4078 Inappropriate implementation in Extensions
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
115.0.1901.200 8/07/2023 115.0.5790.170/.171

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-23    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-4078
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
115.0.1901.200 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-4078 None

CVE-2023-29328 - Microsoft Teams Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-29328
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Teams Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

A user would need to join a malicious Microsoft Teams meeting set up by the attacker.


According to the CVSS metric, the attack vector is network (AV:N) and privilege required is none (PR:N). What is the target used in the context of the remote code execution?

An attacker would be required to trick the victim into joining a Teams meeting which would enable them to perform remote code execution in the context of the victim user. The attacker does not need privileges to attempt to exploit this vulnerability.


According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability?

An attacker who successfully exploits this vulnerability could perform a remote attack that could enable access to the victim's information and the ability to alter information. Successful exploitation could also potentially cause downtime for the client machine.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-29328
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Teams for Android Release Notes (Security Update) Critical Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.0.0.2023070204 Maybe None
Microsoft Teams for Desktop Release Notes (Security Update) Critical Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.6.00.18681 Maybe None
Microsoft Teams for iOS Release Notes (Security Update) Critical Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
5.12.1 Maybe None
Microsoft Teams for Mac Release Notes (Security Update) Critical Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.6.00.17554 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-29328 nicolas joly


CVE-2023-29330 - Microsoft Teams Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-29330
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Teams Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

A user would need to join a malicious Microsoft Teams meeting set up by the attacker.


According to the CVSS metric, the attack vector is network (AV:N) and privilege required is none (PR:N). What is the target used in the context of the remote code execution?

An attacker would be required to trick the victim into joining a Teams meeting which would enable them to perform remote code execution in the context of the victim user. The attacker does not need privileges to attempt to exploit this vulnerability.


According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability?

An attacker who successfully exploits this vulnerability could perform a remote attack that could enable access to the victim's information and the ability to alter information. Successful exploitation could also potentially cause downtime for the client machine.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-29330
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Teams for Android Release Notes (Security Update) Critical Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.0.0.2023070204 Maybe None
Microsoft Teams for Desktop Release Notes (Security Update) Critical Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.6.00.18681 Maybe None
Microsoft Teams for iOS Release Notes (Security Update) Critical Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
5.12.1 Maybe None
Microsoft Teams for Mac Release Notes (Security Update) Critical Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.6.00.17554 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-29330 nicolas joly


CVE-2023-35359 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35359
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metrics, the attack vector is local (AV:L) and privilege required is low (PR:L). What does that mean for this vulnerability?

An attacker must have local access to the targeted machine and must be able to create folders and performance traces on the machine, with restricted privileges that normal users have by default.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35359
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5029259 (Security Update) Important Elevation of Privilege 5028186 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 for x64-based Systems 5029259 (Security Update) Important Elevation of Privilege 5028186 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 Version 1607 for 32-bit Systems 5029242 (Security Update) Important Elevation of Privilege 5028169 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1607 for x64-based Systems 5029242 (Security Update) Important Elevation of Privilege 5028169 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1809 for 32-bit Systems 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for ARM64-based Systems 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for x64-based Systems 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 21H2 for 32-bit Systems 5029244 (Security Update) Important Elevation of Privilege 5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for ARM64-based Systems 5029244 (Security Update) Important Elevation of Privilege 5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for x64-based Systems 5029244 (Security Update) Important Elevation of Privilege 5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 22H2 for 32-bit Systems 5029244 (Security Update) Important Elevation of Privilege
5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for ARM64-based Systems 5029244 (Security Update) Important Elevation of Privilege
5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for x64-based Systems 5029244 (Security Update) Important Elevation of Privilege
5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 11 version 21H2 for ARM64-based Systems 5029253 (Security Update) Important Elevation of Privilege 5028182 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 version 21H2 for x64-based Systems 5029253 (Security Update) Important Elevation of Privilege 5028182 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5029263 (Security Update) Important Elevation of Privilege 5028185
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows 11 Version 22H2 for x64-based Systems 5029263 (Security Update) Important Elevation of Privilege 5028185
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows Server 2008 for 32-bit Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Elevation of Privilege 5028222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Elevation of Privilege 5028222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Elevation of Privilege 5028222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Elevation of Privilege 5028222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Elevation of Privilege 5028240
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Elevation of Privilege 5028240
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2012 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Elevation of Privilege 5028232
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 (Server Core installation) 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Elevation of Privilege 5028232
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 R2 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Elevation of Privilege 5028228
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2012 R2 (Server Core installation) 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Elevation of Privilege 5028228
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2016 5029242 (Security Update) Important Elevation of Privilege 5028169 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2016 (Server Core installation) 5029242 (Security Update) Important Elevation of Privilege 5028169 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2019 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2019 (Server Core installation) 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2022 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Elevation of Privilege 5028171
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250
Windows Server 2022 (Server Core installation) 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Elevation of Privilege 5028171
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35359 James Forshaw with Google Project Zero


CVE-2023-35368 - Microsoft Exchange Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35368
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Exchange Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorAdjacent
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H), integrity (I:H) and availability (A:H). What does that mean for this vulnerability?

An attacker who successfully exploited this vulnerability could access a user's Net-NTLMv2 hash which could be used as a basis of an NTLM Relay attack against another service to authenticate as the user.


According to the CVSS metric, the attack vector is adjacent (AV:A), and privilege required is none (PR:N). What does that mean for this vulnerability?

The attacker for this vulnerability could target the server accounts in an arbitrary or remote code execution and attempt to trigger malicious code in the context of the server's account through a network call. The attacker needs no privileges to perform this attack.


How could an attacker exploit this vulnerability?

Successful exploitation of this vulnerability could allow an attacker the ability to gain remote code execution via an in-network attacker calling arbitrary endpoints.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35368
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Exchange Server 2016 Cumulative Update 23 5029388 (Security Update) Important Remote Code Execution
5029388
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

15.01.2507.031
Yes 5029388
Microsoft Exchange Server 2019 Cumulative Update 12 5029388 (Security Update) Important Remote Code Execution
5026261
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

15.02.1118.036
Yes 5029388
Microsoft Exchange Server 2019 Cumulative Update 13 5029388 (Security Update) Important Remote Code Execution 5026261
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.02.1258.023
Yes 5029388

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35368 Daniel F.


CVE-2023-36865 - Microsoft Office Visio Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36865
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Visio Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability?

An attacker who successfully exploits this vulnerability could perform a remote attack that could enable access to the victim's information and the ability to alter information. Successful exploitation could also potentially cause downtime for the targeted environment.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36865
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36865 Kim Dong-Uk (@justlikebono)


CVE-2023-36866 - Microsoft Office Visio Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36866
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Visio Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability?

An attacker who successfully exploits this vulnerability could perform a remote attack that could enable access to the victim's information and the ability to alter information. Successful exploitation could also potentially cause downtime for the targeted environment.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36866
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36866 Kim Dong-Uk (@justlikebono)


CVE-2023-36869 - Azure DevOps Server Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36869
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure DevOps Server Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.3/TemporalScore:6.0
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityLow
Temporal score metrics
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker would have to send the victim a malicious link that the victim would have to click for a successful attack.


According to the CVSS metrics, successful exploitation of this vulnerability could lead to minor loss of confidentiality (C:L), integrity (I:L) and availability (A:L). What does that mean for this vulnerability?

While we cannot rule out the impact to Confidentiality, Integrity, and Availability, the ability to exploit this vulnerability by itself is limited. The impact to Confidentiality and Integrity is limited to a single Azure DevOps organization or project, depending on the victim's credentials. Impact to Availability is limited to the victim only.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36869
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure DevOps Server 2019.0.1 Release Notes (Security Update) Important Spoofing None Base: 6.3
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/RL:O/RC:C
20230721.6 Maybe None
Azure DevOps Server 2019.1.2 Release Notes (Security Update) Important Spoofing None Base: 6.3
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/RL:O/RC:C
20230601.1 Maybe None
Azure DevOps Server 2020.1.2 Release Notes (Security Update) Important Spoofing None Base: 6.3
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/RL:O/RC:C
20230601.3 Maybe None
Azure DevOps Server 2022.0.1 Release Notes (Security Update) Important Spoofing None Base: 6.3
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/RL:O/RC:C
20230602.5 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36869 Martin Wrona (martin_jw) with Digitec Galaxus AG


CVE-2023-36873 - .NET Framework Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36873
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: .NET Framework Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.4/TemporalScore:6.7
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to create a crafted certificate in order to validate themselves as a trusted source.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36873
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for 32-bit Systems 5029647 (Security Update) Important Spoofing None Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
3.5.04057.05 Maybe None
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for ARM64-based Systems 5029647 (Security Update) Important Spoofing None Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.7.4057.05 Maybe None
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for x64-based Systems 5029647 (Security Update) Important Spoofing None Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
3.5.04057.05 Maybe None
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 5029647 (Security Update) Important Spoofing None Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
3.5.04057.05 Maybe None
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 (Server Core installation) 5029647 (Security Update) Important Spoofing None Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
3.5.04057.05 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for 32-bit Systems 5029647 (Security Update) Important Spoofing None Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
3.5.4654.08 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for x64-based Systems 5029647 (Security Update) Important Spoofing None Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.8.04654.08 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for 32-bit Systems 5029648 (Security Update) Important Spoofing None Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.8.04654.06 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for ARM64-based Systems 5029648 (Security Update) Important Spoofing None Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.8.04654.06 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for x64-based Systems 5029648 (Security Update) Important Spoofing None Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.8.04654.06 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for 32-bit Systems 5029649 (Security Update) Important Spoofing None Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.8.04654.06 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for ARM64-based Systems 5029649 (Security Update) Important Spoofing None Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.8.04654.06 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for x64-based Systems 5029649 (Security Update) Important Spoofing None Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.8.04654.06 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for ARM64-based Systems 5029650 (Security Update) Important Spoofing None Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.8.04654.06 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for x64-based Systems 5029650 (Security Update) Important Spoofing None Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.8.04654.06 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 5029647 (Security Update) Important Spoofing None Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.8.04654.08 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 (Server Core installation) 5029647 (Security Update) Important Spoofing None Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.8.04654.08 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 5029655 (Security Update) Important Spoofing None Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.8.04654.06 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 (Server Core installation) 5029655 (Security Update) Important Spoofing None Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.8.04654.06 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for 32-bit Systems 5029648 (Security Update) Important Spoofing None Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.8.09176.01 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for ARM64-based Systems 5029648 (Security Update) Important Spoofing None Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.8.09176.01 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for x64-based Systems 5029648 (Security Update) Important Spoofing None Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.8.09176.01 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for 32-bit Systems 5029649 (Security Update) Important Spoofing None Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.8.09176.01 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for ARM64-based Systems 5029649 (Security Update) Important Spoofing None Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.8.09176.01 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for x64-based Systems 5029649 (Security Update) Important Spoofing None Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.8.09176.01 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for ARM64-based Systems 5029650 (Security Update) Important Spoofing None Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.8.09176.01 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for x64-based Systems 5029650 (Security Update) Important Spoofing None Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.8.09176.01 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for ARM64-based Systems 5028948 (Security Update) Important Spoofing None Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.8.09176.01 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for x64-based Systems 5028948 (Security Update) Important Spoofing None Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.8.09176.01 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 5029655 (Security Update) Important Spoofing None Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
3.5.09176.01 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 (Server Core installation) 5029655 (Security Update) Important Spoofing None Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
3.5.09176.01 Maybe None
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 5029654 (Monthly Rollup)
5029569 (Security Only)
Important Spoofing Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.7.04057.05
4.7.4057.04
Maybe None
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5029654 (Monthly Rollup)
5029569 (Security Only)
Important Spoofing Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.7.04057.05
4.7.4057.04
Maybe None
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 5029654 (Monthly Rollup)
5029569 (Security Only)
Important Spoofing Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.7.04057.05
4.7.04057.04
Maybe None
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5029654 (Monthly Rollup)
5029569 (Security Only)
Important Spoofing Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.7.04057.05
4.7.04057.04
Maybe None
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 5029651 (Monthly Rollup)
5029566 (Security Only)
Important Spoofing Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.7.04057.05
Maybe None
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5029651 (Monthly Rollup)
5029566 (Security Only)
Important Spoofing Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.7.04057.05
Maybe None
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 5029652 (Monthly Rollup)
5029567 (Security Only)
Important Spoofing Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.7.04057.05
Maybe None
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 (Server Core installation) 5029652 (Monthly Rollup)
5029567 (Security Only)
Important Spoofing Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.7.04057.05
Maybe None
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 5029653 (Monthly Rollup)
5029568 (Security Only)
Important Spoofing Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.7.04057.07
Maybe None
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 (Server Core installation) 5029653 (Monthly Rollup)
5029568 (Security Only)
Important Spoofing Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.7.04057.07
Maybe None
Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for 32-bit Systems 5028952 (Security Update) Important Spoofing None Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.8.4654.06 Maybe None
Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for x64-based Systems 5028952 (Security Update) Important Spoofing None Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.8.04654.06 Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 5029651 (Monthly Rollup)
5029566 (Security Only)
Important Spoofing Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.8.4654.06
Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5029651 (Monthly Rollup)
5029566 (Security Only)
Important Spoofing Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.8.4654.06
Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2012 5029652 (Monthly Rollup)
5029567 (Security Only)
Important Spoofing Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.8.04654.06
Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2012 (Server Core installation) 5029652 (Monthly Rollup)
5029567 (Security Only)
Important Spoofing Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.8.04654.06
Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 5029653 (Monthly Rollup)
5029568 (Security Only)
Important Spoofing Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.8.04654.08
Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 (Server Core installation) 5029653 (Monthly Rollup)
5029568 (Security Only)
Important Spoofing Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.8.04654.08
Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2016 5028952 (Security Update) Important Spoofing None Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.8.04654.06 Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2016 (Server Core installation) 5028952 (Security Update) Important Spoofing None Base: 7.4
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
4.8.04654.06 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36873 Bill Demirkapi with Microsoft


CVE-2023-36876 - Reliability Analysis Metrics Calculation (RacTask) Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36876
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Reliability Analysis Metrics Calculation (RacTask) Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.2
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could create or delete files in the security context of the “NT AUTHORITY\ LOCAL SERVICE” account.


According to the CVSS metrics, successful exploitation of this vulnerability does not impact confidentiality (C:N) but has major impact on integrity (I:H) and availability (A:H). What does that mean for this vulnerability?

An attacker who successfully exploits this vulnerability cannot access existing files (C:N) but can write or overwrite file contents (I:H), which potentially may cause the system to become unavailable (A:H).


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36876
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Elevation of Privilege 5028240
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Elevation of Privilege 5028240
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36876 None

CVE-2023-36882 - Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36882
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable).


Mitigations:

The following mitigating factors might be helpful in your situation:

Exploitation of this vulnerability requires an attacker to trick or convince the victim into connecting to their malicious server. If your environment only connects to known, trusted servers and there is no ability to reconfigure existing connections to point to another location (for example you use TLS encryption with certificate validation), the vulnerability cannot be exploited.


Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36882
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5029259 (Security Update) Important Remote Code Execution 5028186 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 for x64-based Systems 5029259 (Security Update) Important Remote Code Execution 5028186 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 Version 1607 for 32-bit Systems 5029242 (Security Update) Important Remote Code Execution 5028169 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1607 for x64-based Systems 5029242 (Security Update) Important Remote Code Execution 5028169 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1809 for 32-bit Systems 5029247 (Security Update) Important Remote Code Execution 5028168
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for ARM64-based Systems 5029247 (Security Update) Important Remote Code Execution 5028168
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for x64-based Systems 5029247 (Security Update) Important Remote Code Execution 5028168
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 21H2 for 32-bit Systems 5029244 (Security Update) Important Remote Code Execution 5028166
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for ARM64-based Systems 5029244 (Security Update) Important Remote Code Execution 5028166
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for x64-based Systems 5029244 (Security Update) Important Remote Code Execution 5028166
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 22H2 for 32-bit Systems 5029244 (Security Update) Important Remote Code Execution
5028166
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for ARM64-based Systems 5029244 (Security Update) Important Remote Code Execution
5028166
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for x64-based Systems 5029244 (Security Update) Important Remote Code Execution
5028166
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 11 version 21H2 for ARM64-based Systems 5029253 (Security Update) Important Remote Code Execution 5028182 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 version 21H2 for x64-based Systems 5029253 (Security Update) Important Remote Code Execution 5028182 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5029263 (Security Update) Important Remote Code Execution 5028185
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows 11 Version 22H2 for x64-based Systems 5029263 (Security Update) Important Remote Code Execution 5028185
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows Server 2008 for 32-bit Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Remote Code Execution 5028222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Remote Code Execution 5028222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Remote Code Execution 5028222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Remote Code Execution 5028222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Remote Code Execution 5028240
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Remote Code Execution 5028240
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2012 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Remote Code Execution 5028232
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 (Server Core installation) 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Remote Code Execution 5028232
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 R2 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Remote Code Execution 5028228
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2012 R2 (Server Core installation) 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Remote Code Execution 5028228
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2016 5029242 (Security Update) Important Remote Code Execution 5028169 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2016 (Server Core installation) 5029242 (Security Update) Important Remote Code Execution 5028169 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2019 5029247 (Security Update) Important Remote Code Execution 5028168
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2019 (Server Core installation) 5029247 (Security Update) Important Remote Code Execution 5028168
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2022 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Remote Code Execution 5028171
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250
Windows Server 2022 (Server Core installation) 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Remote Code Execution 5028171
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36882 bee13oy with Cyber Kunlun Lab


ADV230003 - Microsoft Office Defense in Depth Update

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
ADV230003
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Defense in Depth Update
CVSS:
None
Executive Summary:

Microsoft has released an update for Microsoft Office that provides enhanced security as a defense in depth measure.


FAQ:

Is this advisory related to the vulnerability that is documented by CVE-2023-36884 that was issued in July 2023?

Yes, this defense in depth update is not a vulnerability, but installing this update stops the attack chain leading to the Windows Search security feature bypass vulnerability (CVE-2023-36884). Microsoft recommends installing the Office updates discussed in this advisory as well as installing the Windows updates from August 2023.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Moderate Defense in Depth

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Detected Yes Yes

Affected Software

The following tables list the affected software details for the vulnerability.

ADV230003
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Moderate Defense in Depth None Base: N/A
Temporal: N/A
Vector: N/A
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Moderate Defense in Depth None Base: N/A
Temporal: N/A
Vector: N/A
https://aka.ms/OfficeSecurityReleases No None
Microsoft Excel 2013 RT Service Pack 1 5002451 (Security Update) Moderate Defense in Depth None Base: N/A
Temporal: N/A
Vector: N/A
15.0.5579.1001 Maybe None
Microsoft Excel 2013 Service Pack 1 (32-bit editions) 5002451 (Security Update) Moderate Defense in Depth 5002348 Base: N/A
Temporal: N/A
Vector: N/A
15.0.5579.1001 Maybe None
Microsoft Excel 2013 Service Pack 1 (64-bit editions) 5002451 (Security Update) Moderate Defense in Depth 5002348 Base: N/A
Temporal: N/A
Vector: N/A
15.0.5579.1001 Maybe None
Microsoft Excel 2016 (32-bit edition) 5002463 (Security Update) Moderate Defense in Depth 5002351 Base: N/A
Temporal: N/A
Vector: N/A
16.0.5408.1002 Maybe None
Microsoft Excel 2016 (64-bit edition) 5002463 (Security Update) Moderate Defense in Depth 5002351 Base: N/A
Temporal: N/A
Vector: N/A
16.0.5408.1002 Maybe None
Microsoft Office 2013 RT Service Pack 1 5002439 (Security Update) Moderate Defense in Depth None Base: N/A
Temporal: N/A
Vector: N/A
15.0.5579.1001 Maybe None
Microsoft Office 2013 Service Pack 1 (32-bit editions) 5002439 (Security Update) Moderate Defense in Depth None Base: N/A
Temporal: N/A
Vector: N/A
15.0.5579.1001 Maybe None
Microsoft Office 2013 Service Pack 1 (64-bit editions) 5002439 (Security Update) Moderate Defense in Depth None Base: N/A
Temporal: N/A
Vector: N/A
15.0.5579.1001 Maybe None
Microsoft Office 2016 (32-bit edition) 5002465 (Security Update) Moderate Defense in Depth 4011126 Base: N/A
Temporal: N/A
Vector: N/A
16.0.5408.1002 Maybe None
Microsoft Office 2016 (64-bit edition) 5002465 (Security Update) Moderate Defense in Depth 4011126 Base: N/A
Temporal: N/A
Vector: N/A
16.0.5408.1002 Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Moderate Defense in Depth None Base: N/A
Temporal: N/A
Vector: N/A
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Moderate Defense in Depth None Base: N/A
Temporal: N/A
Vector: N/A
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Moderate Defense in Depth None Base: N/A
Temporal: N/A
Vector: N/A
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Moderate Defense in Depth None Base: N/A
Temporal: N/A
Vector: N/A
https://aka.ms/OfficeSecurityReleases No None
Microsoft PowerPoint 2013 RT Service Pack 1 5002399 (Security Update) Moderate Defense in Depth 4493227 Base: N/A
Temporal: N/A
Vector: N/A
15.0.5579.1001 Maybe None
Microsoft PowerPoint 2013 Service Pack 1 (32-bit editions) 5002399 (Security Update) Moderate Defense in Depth 4493227 Base: N/A
Temporal: N/A
Vector: N/A
15.0.5579.1001 Maybe None
Microsoft PowerPoint 2013 Service Pack 1 (64-bit editions) 5002399 (Security Update) Moderate Defense in Depth 4493227 Base: N/A
Temporal: N/A
Vector: N/A
16.0.5408.1001 Maybe None
Microsoft PowerPoint 2016 (32-bit edition) 4504720 (Security Update) Moderate Defense in Depth 4493224 Base: N/A
Temporal: N/A
Vector: N/A
16.0.5408.1001 Maybe None
Microsoft PowerPoint 2016 (64-bit edition) 4504720 (Security Update) Moderate Defense in Depth 4493224 Base: N/A
Temporal: N/A
Vector: N/A
16.0.5408.1001 Maybe None
Microsoft Project 2013 Service Pack 1 (32-bit editions) 4484489 (Security Update) Moderate Defense in Depth 4484450 Base: N/A
Temporal: N/A
Vector: N/A
15.0.5579.1001 Maybe None
Microsoft Project 2013 Service Pack 1 (64-bit editions) 4484489 (Security Update) Moderate Defense in Depth 4484450 Base: N/A
Temporal: N/A
Vector: N/A
15.0.5579.1001 Maybe None
Microsoft Project 2016 (32-bit edition) 5002328 (Security Update) Moderate Defense in Depth 4484441 Base: N/A
Temporal: N/A
Vector: N/A
16.0.5408.1001 Maybe None
Microsoft Project 2016 (64-bit edition) 5002328 (Security Update) Moderate Defense in Depth 4484441 Base: N/A
Temporal: N/A
Vector: N/A
16.0.5408.1001 Maybe None
Microsoft Publisher 2013 Service Pack 1 (32-bit editions) 5002391 (Security Update) Moderate Defense in Depth 4484347 Base: N/A
Temporal: N/A
Vector: N/A
15.0.5579.1001 Maybe None
Microsoft Publisher 2013 Service Pack 1 (64-bit editions) 5002391 (Security Update) Moderate Defense in Depth 4484347 Base: N/A
Temporal: N/A
Vector: N/A
15.0.5579.1001 Maybe None
Microsoft Publisher 2013 Service Pack 1 RT 5002391 (Security Update) Moderate Defense in Depth 4484347 Base: N/A
Temporal: N/A
Vector: N/A
15.0.5579.1001 Maybe None
Microsoft Publisher 2016 (32-bit edition) 5002462 (Security Update) Moderate Defense in Depth 4493152 Base: N/A
Temporal: N/A
Vector: N/A
16.0.5408.1002 Maybe None
Microsoft Publisher 2016 (64-bit edition) 5002462 (Security Update) Moderate Defense in Depth 4493152 Base: N/A
Temporal: N/A
Vector: N/A
16.0.5408.1002 Maybe None
Microsoft Visio 2013 Service Pack 1 (32-bit editions) 5002417 (Security Update) Moderate Defense in Depth 5002332 Base: N/A
Temporal: N/A
Vector: N/A
15.0.5579.1001 Maybe None
Microsoft Visio 2013 Service Pack 1 (64-bit editions) 5002417 (Security Update) Moderate Defense in Depth 5002332 Base: N/A
Temporal: N/A
Vector: N/A
15.0.5579.1001 Maybe None
Microsoft Visio 2016 (32-bit edition) 5002418 (Security Update) Moderate Defense in Depth 5002337 Base: N/A
Temporal: N/A
Vector: N/A
16.0.5408.1002 Maybe None
Microsoft Visio 2016 (64-bit edition) 5002418 (Security Update) Moderate Defense in Depth 5002337 Base: N/A
Temporal: N/A
Vector: N/A
16.0.5408.1002 Maybe None
Microsoft Word 2013 RT Service Pack 1 5002445 (Security Update) Moderate Defense in Depth 5002316 Base: N/A
Temporal: N/A
Vector: N/A
15.0.5579.1001 Maybe None
Microsoft Word 2013 Service Pack 1 (32-bit editions) 5002445 (Security Update) Moderate Defense in Depth 5002316 Base: N/A
Temporal: N/A
Vector: N/A
15.0.5579.1001 Maybe None
Microsoft Word 2013 Service Pack 1 (64-bit editions) 5002445 (Security Update) Moderate Defense in Depth 5002316 Base: N/A
Temporal: N/A
Vector: N/A
15.0.5579.1001 Maybe None
Microsoft Word 2016 (32-bit edition) 5002464 (Security Update) Moderate Defense in Depth 5002323 Base: N/A
Temporal: N/A
Vector: N/A
16.0.5408.1002 Maybe None
Microsoft Word 2016 (64-bit edition) 5002464 (Security Update) Moderate Defense in Depth 5002323 Base: N/A
Temporal: N/A
Vector: N/A
16.0.5408.1002 Maybe None

Acknowledgements

CVE ID Acknowledgements
ADV230003 Microsoft Threat Intelligence


Microsoft Threat Intelligence


Tom Lancaster with Volexity


Paul Rascagneres with Volexity




CVE-2023-36889 - Windows Group Policy Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36889
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Group Policy Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An authenticated attacker who successfully exploited this vulnerability could read specific Group Policy configuration settings.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36889
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5029259 (Security Update) Important Security Feature Bypass 5028186 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 for x64-based Systems 5029259 (Security Update) Important Security Feature Bypass 5028186 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 Version 1607 for 32-bit Systems 5029242 (Security Update) Important Security Feature Bypass 5028169 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1607 for x64-based Systems 5029242 (Security Update) Important Security Feature Bypass 5028169 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1809 for 32-bit Systems 5029247 (Security Update) Important Security Feature Bypass 5028168
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for ARM64-based Systems 5029247 (Security Update) Important Security Feature Bypass 5028168
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for x64-based Systems 5029247 (Security Update) Important Security Feature Bypass 5028168
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 21H2 for 32-bit Systems 5029244 (Security Update) Important Security Feature Bypass 5028166
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for ARM64-based Systems 5029244 (Security Update) Important Security Feature Bypass 5028166
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for x64-based Systems 5029244 (Security Update) Important Security Feature Bypass 5028166
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 22H2 for 32-bit Systems 5029244 (Security Update) Important Security Feature Bypass
5028166
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for ARM64-based Systems 5029244 (Security Update) Important Security Feature Bypass
5028166
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for x64-based Systems 5029244 (Security Update) Important Security Feature Bypass
5028166
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 11 version 21H2 for ARM64-based Systems 5029253 (Security Update) Important Security Feature Bypass 5028182 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 version 21H2 for x64-based Systems 5029253 (Security Update) Important Security Feature Bypass 5028182 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5029263 (Security Update) Important Security Feature Bypass 5028185
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows 11 Version 22H2 for x64-based Systems 5029263 (Security Update) Important Security Feature Bypass 5028185
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows Server 2008 for 32-bit Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Security Feature Bypass 5028222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Security Feature Bypass 5028222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Security Feature Bypass 5028222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Security Feature Bypass 5028222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Security Feature Bypass 5028240
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Security Feature Bypass 5028240
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2012 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Security Feature Bypass 5028232
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 (Server Core installation) 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Security Feature Bypass 5028232
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 R2 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Security Feature Bypass 5028228
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2012 R2 (Server Core installation) 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Security Feature Bypass 5028228
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2016 5029242 (Security Update) Important Security Feature Bypass 5028169 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2016 (Server Core installation) 5029242 (Security Update) Important Security Feature Bypass 5028169 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2019 5029247 (Security Update) Important Security Feature Bypass 5028168
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2019 (Server Core installation) 5029247 (Security Update) Important Security Feature Bypass 5028168
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2022 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Security Feature Bypass 5028171
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250
Windows Server 2022 (Server Core installation) 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Security Feature Bypass 5028171
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36889 Alexander Kirk with Viasat


CVE-2023-36898 - Tablet Windows User Interface Application Core Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36898
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Tablet Windows User Interface Application Core Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36898
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 version 21H2 for ARM64-based Systems 5029253 (Security Update) Important Remote Code Execution 5028182 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 version 21H2 for x64-based Systems 5029253 (Security Update) Important Remote Code Execution 5028182 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5029263 (Security Update) Important Remote Code Execution 5028185
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows 11 Version 22H2 for x64-based Systems 5029263 (Security Update) Important Remote Code Execution 5028185
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36898 wh1tc & Zhiniang Peng with Sangfor


CVE-2023-36899 - ASP.NET Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36899
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: ASP.NET Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.7
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

The target environment could be accidentally configured to allow the vulnerability.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

The attacker would gain the rights of the user that is running the affected application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36899
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft .NET Framework 2.0 Service Pack 2 on Windows Server 2008 for 32-bit Systems Service Pack 2 5029654 (Monthly Rollup)
5029569 (Security Only)
Important Elevation of Privilege Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
2.0.50727.8974
3.0.50727.8974
Maybe None
Microsoft .NET Framework 2.0 Service Pack 2 on Windows Server 2008 for x64-based Systems Service Pack 2 5029654 (Monthly Rollup)
5029569 (Security Only)
Important Elevation of Privilege Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
2.0.50727.8974
3.0.50727.8974
Maybe None
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for 32-bit Systems 5029647 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
3.5.04057.05 Maybe None
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for ARM64-based Systems 5029647 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.7.4057.05 Maybe None
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for x64-based Systems 5029647 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
3.5.04057.05 Maybe None
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 5029647 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
3.5.04057.05 Maybe None
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 (Server Core installation) 5029647 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
3.5.04057.05 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for 32-bit Systems 5029647 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
3.5.4654.08 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for ARM64-based Systems 5029647 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.8.04654.08 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for x64-based Systems 5029647 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.8.04654.08 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for 32-bit Systems 5029648 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.8.04654.06 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for ARM64-based Systems 5029648 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.8.04654.06 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for x64-based Systems 5029648 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.8.04654.06 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for 32-bit Systems 5029649 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.8.04654.06 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for ARM64-based Systems 5029649 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.8.04654.06 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for x64-based Systems 5029649 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.8.04654.06 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for ARM64-based Systems 5029650 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.8.04654.06 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for x64-based Systems 5029650 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.8.04654.06 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 5029647 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.8.04654.08 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 (Server Core installation) 5029647 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.8.04654.08 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 5029655 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.8.04654.06 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 (Server Core installation) 5029655 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.8.04654.06 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for 32-bit Systems 5029648 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.8.09176.01 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for ARM64-based Systems 5029648 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.8.09176.01 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for x64-based Systems 5029648 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.8.09176.01 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for 32-bit Systems 5029649 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.8.09176.01 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for ARM64-based Systems 5029649 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.8.09176.01 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for x64-based Systems 5029649 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.8.09176.01 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for ARM64-based Systems 5029650 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.8.09176.01 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for x64-based Systems 5029650 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.8.09176.01 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for ARM64-based Systems 5028948 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.8.09176.01 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for x64-based Systems 5028948 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.8.09176.01 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 5029655 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
3.5.09176.01 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 (Server Core installation) 5029655 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
3.5.09176.01 Maybe None
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 5029654 (Monthly Rollup)
5029569 (Security Only)
Important Elevation of Privilege Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.7.04057.05
4.7.4057.04
Maybe None
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5029654 (Monthly Rollup)
5029569 (Security Only)
Important Elevation of Privilege Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.7.04057.05
4.7.4057.04
Maybe None
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 5029654 (Monthly Rollup)
5029569 (Security Only)
Important Elevation of Privilege Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.7.04057.05
4.7.04057.04
Maybe None
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5029654 (Monthly Rollup)
5029569 (Security Only)
Important Elevation of Privilege Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.7.04057.05
4.7.04057.04
Maybe None
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 5029651 (Monthly Rollup)
5029566 (Security Only)
Important Elevation of Privilege Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.7.04057.05
Maybe None
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5029651 (Monthly Rollup)
5029566 (Security Only)
Important Elevation of Privilege Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.7.04057.05
Maybe None
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 5029652 (Monthly Rollup)
5029567 (Security Only)
Important Elevation of Privilege Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.7.04057.05
Maybe None
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 (Server Core installation) 5029652 (Monthly Rollup)
5029567 (Security Only)
Important Elevation of Privilege Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.7.04057.05
Maybe None
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 5029653 (Monthly Rollup)
5029568 (Security Only)
Important Elevation of Privilege Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.7.04057.07
Maybe None
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 (Server Core installation) 5029653 (Monthly Rollup)
5029568 (Security Only)
Important Elevation of Privilege Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.7.04057.07
Maybe None
Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for 32-bit Systems 5028952 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.8.4654.06 Maybe None
Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for x64-based Systems 5028952 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.8.04654.06 Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 5029651 (Monthly Rollup)
5029566 (Security Only)
Important Elevation of Privilege Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.8.4654.06
Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5029651 (Monthly Rollup)
5029566 (Security Only)
Important Elevation of Privilege Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.8.4654.06
Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2012 5029652 (Monthly Rollup)
5029567 (Security Only)
Important Elevation of Privilege Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.8.04654.06
Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2012 (Server Core installation) 5029652 (Monthly Rollup)
5029567 (Security Only)
Important Elevation of Privilege Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.8.04654.06
Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 5029653 (Monthly Rollup)
5029568 (Security Only)
Important Elevation of Privilege Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.8.04654.08
Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 (Server Core installation) 5029653 (Monthly Rollup)
5029568 (Security Only)
Important Elevation of Privilege Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.8.04654.08
Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2016 5028952 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.8.04654.06 Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2016 (Server Core installation) 5028952 (Security Update) Important Elevation of Privilege None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
4.8.04654.06 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36899 Soroush Dalili


CVE-2023-36900 - Windows Common Log File System Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36900
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36900
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5029259 (Security Update) Important Elevation of Privilege 5028186 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 for x64-based Systems 5029259 (Security Update) Important Elevation of Privilege 5028186 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 Version 1607 for 32-bit Systems 5029242 (Security Update) Important Elevation of Privilege 5028169 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1607 for x64-based Systems 5029242 (Security Update) Important Elevation of Privilege 5028169 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1809 for 32-bit Systems 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for ARM64-based Systems 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for x64-based Systems 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 21H2 for 32-bit Systems 5029244 (Security Update) Important Elevation of Privilege 5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for ARM64-based Systems 5029244 (Security Update) Important Elevation of Privilege 5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for x64-based Systems 5029244 (Security Update) Important Elevation of Privilege 5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 22H2 for 32-bit Systems 5029244 (Security Update) Important Elevation of Privilege
5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for ARM64-based Systems 5029244 (Security Update) Important Elevation of Privilege
5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for x64-based Systems 5029244 (Security Update) Important Elevation of Privilege
5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 11 version 21H2 for ARM64-based Systems 5029253 (Security Update) Important Elevation of Privilege 5028182 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 version 21H2 for x64-based Systems 5029253 (Security Update) Important Elevation of Privilege 5028182 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5029263 (Security Update) Important Elevation of Privilege 5028185
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows 11 Version 22H2 for x64-based Systems 5029263 (Security Update) Important Elevation of Privilege 5028185
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows Server 2008 for 32-bit Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Elevation of Privilege 5028222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Elevation of Privilege 5028222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Elevation of Privilege 5028222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Elevation of Privilege 5028222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Elevation of Privilege 5028240
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Elevation of Privilege 5028240
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2012 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Elevation of Privilege 5028232
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 (Server Core installation) 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Elevation of Privilege 5028232
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 R2 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Elevation of Privilege 5028228
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2012 R2 (Server Core installation) 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Elevation of Privilege 5028228
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2016 5029242 (Security Update) Important Elevation of Privilege 5028169 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2016 (Server Core installation) 5029242 (Security Update) Important Elevation of Privilege 5028169 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2019 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2019 (Server Core installation) 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2022 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Elevation of Privilege 5028171
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250
Windows Server 2022 (Server Core installation) 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Elevation of Privilege 5028171
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36900 Anonymous


Anonymous working with Trend Micro Zero Day Initiative


CVE-2023-36903 - Windows System Assessment Tool Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36903
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows System Assessment Tool Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain specific limited SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36903
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5029259 (Security Update) Important Elevation of Privilege 5028186 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 for x64-based Systems 5029259 (Security Update) Important Elevation of Privilege 5028186 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 Version 1607 for 32-bit Systems 5029242 (Security Update) Important Elevation of Privilege 5028169 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1607 for x64-based Systems 5029242 (Security Update) Important Elevation of Privilege 5028169 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1809 for 32-bit Systems 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for ARM64-based Systems 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for x64-based Systems 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 21H2 for 32-bit Systems 5029244 (Security Update) Important Elevation of Privilege 5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for ARM64-based Systems 5029244 (Security Update) Important Elevation of Privilege 5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for x64-based Systems 5029244 (Security Update) Important Elevation of Privilege 5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 22H2 for 32-bit Systems 5029244 (Security Update) Important Elevation of Privilege
5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for ARM64-based Systems 5029244 (Security Update) Important Elevation of Privilege
5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for x64-based Systems 5029244 (Security Update) Important Elevation of Privilege
5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 11 version 21H2 for ARM64-based Systems 5029253 (Security Update) Important Elevation of Privilege 5028182 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 version 21H2 for x64-based Systems 5029253 (Security Update) Important Elevation of Privilege 5028182 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5029263 (Security Update) Important Elevation of Privilege 5028185
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows 11 Version 22H2 for x64-based Systems 5029263 (Security Update) Important Elevation of Privilege 5028185
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Elevation of Privilege 5028240
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Elevation of Privilege 5028240
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2012 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Elevation of Privilege 5028232
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 (Server Core installation) 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Elevation of Privilege 5028232
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 R2 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Elevation of Privilege 5028228
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2012 R2 (Server Core installation) 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Elevation of Privilege 5028228
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2016 5029242 (Security Update) Important Elevation of Privilege 5028169 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2016 (Server Core installation) 5029242 (Security Update) Important Elevation of Privilege 5028169 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2019 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2019 (Server Core installation) 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2022 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Elevation of Privilege 5028171
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250
Windows Server 2022 (Server Core installation) 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Elevation of Privilege 5028171
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36903 Filip Dragović


CVE-2023-36904 - Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36904
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36904
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for ARM64-based Systems 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for x64-based Systems 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 21H2 for 32-bit Systems 5029244 (Security Update) Important Elevation of Privilege 5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for ARM64-based Systems 5029244 (Security Update) Important Elevation of Privilege 5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for x64-based Systems 5029244 (Security Update) Important Elevation of Privilege 5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 22H2 for 32-bit Systems 5029244 (Security Update) Important Elevation of Privilege
5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for ARM64-based Systems 5029244 (Security Update) Important Elevation of Privilege
5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for x64-based Systems 5029244 (Security Update) Important Elevation of Privilege
5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 11 version 21H2 for ARM64-based Systems 5029253 (Security Update) Important Elevation of Privilege 5028182 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 version 21H2 for x64-based Systems 5029253 (Security Update) Important Elevation of Privilege 5028182 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5029263 (Security Update) Important Elevation of Privilege 5028185
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows 11 Version 22H2 for x64-based Systems 5029263 (Security Update) Important Elevation of Privilege 5028185
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows Server 2019 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2019 (Server Core installation) 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2022 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Elevation of Privilege 5028171
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250
Windows Server 2022 (Server Core installation) 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Elevation of Privilege 5028171
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36904 RanchoIce


CVE-2023-36905 - Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36905
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36905
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5029259 (Security Update) Important Information Disclosure 5028186 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 for x64-based Systems 5029259 (Security Update) Important Information Disclosure 5028186 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 Version 1607 for 32-bit Systems 5029242 (Security Update) Important Information Disclosure 5028169 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1607 for x64-based Systems 5029242 (Security Update) Important Information Disclosure 5028169 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1809 for 32-bit Systems 5029247 (Security Update) Important Information Disclosure 5028168
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for ARM64-based Systems 5029247 (Security Update) Important Information Disclosure 5028168
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for x64-based Systems 5029247 (Security Update) Important Information Disclosure 5028168
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 21H2 for 32-bit Systems 5029244 (Security Update) Important Information Disclosure 5028166
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for ARM64-based Systems 5029244 (Security Update) Important Information Disclosure 5028166
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for x64-based Systems 5029244 (Security Update) Important Information Disclosure 5028166
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 22H2 for 32-bit Systems 5029244 (Security Update) Important Information Disclosure
5028166
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for ARM64-based Systems 5029244 (Security Update) Important Information Disclosure
5028166
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for x64-based Systems 5029244 (Security Update) Important Information Disclosure
5028166
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 11 version 21H2 for ARM64-based Systems 5029253 (Security Update) Important Information Disclosure 5028182 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 version 21H2 for x64-based Systems 5029253 (Security Update) Important Information Disclosure 5028182 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5029263 (Security Update) Important Information Disclosure 5028185
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows 11 Version 22H2 for x64-based Systems 5029263 (Security Update) Important Information Disclosure 5028185
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows Server 2016 5029242 (Security Update) Important Information Disclosure 5028169 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2016 (Server Core installation) 5029242 (Security Update) Important Information Disclosure 5028169 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2019 5029247 (Security Update) Important Information Disclosure 5028168
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2019 (Server Core installation) 5029247 (Security Update) Important Information Disclosure 5028168
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36905 g0st1


CVE-2023-36906 - Windows Cryptographic Services Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36906
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Cryptographic Services Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36906
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5029259 (Security Update) Important Information Disclosure 5028186 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 for x64-based Systems 5029259 (Security Update) Important Information Disclosure 5028186 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 Version 1607 for 32-bit Systems 5029242 (Security Update) Important Information Disclosure 5028169 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1607 for x64-based Systems 5029242 (Security Update) Important Information Disclosure 5028169 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1809 for 32-bit Systems 5029247 (Security Update) Important Information Disclosure 5028168
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for ARM64-based Systems 5029247 (Security Update) Important Information Disclosure 5028168
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for x64-based Systems 5029247 (Security Update) Important Information Disclosure 5028168
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 21H2 for 32-bit Systems 5029244 (Security Update) Important Information Disclosure 5028166
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for ARM64-based Systems 5029244 (Security Update) Important Information Disclosure 5028166
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for x64-based Systems 5029244 (Security Update) Important Information Disclosure 5028166
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 22H2 for 32-bit Systems 5029244 (Security Update) Important Information Disclosure
5028166
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for ARM64-based Systems 5029244 (Security Update) Important Information Disclosure
5028166
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for x64-based Systems 5029244 (Security Update) Important Information Disclosure
5028166
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 11 version 21H2 for ARM64-based Systems 5029253 (Security Update) Important Information Disclosure 5028182 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 version 21H2 for x64-based Systems 5029253 (Security Update) Important Information Disclosure 5028182 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5029263 (Security Update) Important Information Disclosure 5028185
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows 11 Version 22H2 for x64-based Systems 5029263 (Security Update) Important Information Disclosure 5028185
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows Server 2008 for 32-bit Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Information Disclosure 5028222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Information Disclosure 5028222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Information Disclosure 5028222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Information Disclosure 5028222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Information Disclosure 5028240
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Information Disclosure 5028240
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2012 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Information Disclosure 5028232
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 (Server Core installation) 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Information Disclosure 5028232
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 R2 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Information Disclosure 5028228
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2012 R2 (Server Core installation) 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Information Disclosure 5028228
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2016 5029242 (Security Update) Important Information Disclosure 5028169 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2016 (Server Core installation) 5029242 (Security Update) Important Information Disclosure 5028169 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2019 5029247 (Security Update) Important Information Disclosure 5028168
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2019 (Server Core installation) 5029247 (Security Update) Important Information Disclosure 5028168
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2022 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Information Disclosure 5028171
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250
Windows Server 2022 (Server Core installation) 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Information Disclosure 5028171
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36906 k0shl with Kunlun Lab


CVE-2023-36907 - Windows Cryptographic Services Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36907
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Cryptographic Services Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36907
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5029259 (Security Update) Important Information Disclosure 5028186 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 for x64-based Systems 5029259 (Security Update) Important Information Disclosure 5028186 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 Version 1607 for 32-bit Systems 5029242 (Security Update) Important Information Disclosure 5028169 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1607 for x64-based Systems 5029242 (Security Update) Important Information Disclosure 5028169 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1809 for 32-bit Systems 5029247 (Security Update) Important Information Disclosure 5028168
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for ARM64-based Systems 5029247 (Security Update) Important Information Disclosure 5028168
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for x64-based Systems 5029247 (Security Update) Important Information Disclosure 5028168
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 21H2 for 32-bit Systems 5029244 (Security Update) Important Information Disclosure 5028166
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for ARM64-based Systems 5029244 (Security Update) Important Information Disclosure 5028166
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for x64-based Systems 5029244 (Security Update) Important Information Disclosure 5028166
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 22H2 for 32-bit Systems 5029244 (Security Update) Important Information Disclosure
5028166
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for ARM64-based Systems 5029244 (Security Update) Important Information Disclosure
5028166
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for x64-based Systems 5029244 (Security Update) Important Information Disclosure
5028166
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 11 version 21H2 for ARM64-based Systems 5029253 (Security Update) Important Information Disclosure 5028182 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 version 21H2 for x64-based Systems 5029253 (Security Update) Important Information Disclosure 5028182 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5029263 (Security Update) Important Information Disclosure 5028185
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows 11 Version 22H2 for x64-based Systems 5029263 (Security Update) Important Information Disclosure 5028185
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows Server 2008 for 32-bit Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Information Disclosure 5028222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Information Disclosure 5028222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Information Disclosure 5028222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Information Disclosure 5028222
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Information Disclosure 5028240
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Information Disclosure 5028240
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2012 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Information Disclosure 5028232
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 (Server Core installation) 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Information Disclosure 5028232
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 R2 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Information Disclosure 5028228
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2012 R2 (Server Core installation) 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Information Disclosure 5028228
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2016 5029242 (Security Update) Important Information Disclosure 5028169 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2016 (Server Core installation) 5029242 (Security Update) Important Information Disclosure 5028169 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2019 5029247 (Security Update) Important Information Disclosure 5028168
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2019 (Server Core installation) 5029247 (Security Update) Important Information Disclosure 5028168
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2022 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Information Disclosure 5028171
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250
Windows Server 2022 (Server Core installation) 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Information Disclosure 5028171
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36907 k0shl with Kunlun Lab


CVE-2023-36908 - Windows Hyper-V Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36908
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Hyper-V Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.7/TemporalScore:5.0
Base score metrics
Attack VectorAdjacent
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if a Hyper-V Guest attacker successfully exploited this vulnerability is data from the Hyper-V Host.


According to the CVSS metric, the Hyper-V attack vector is adjacent (AV:A). What does that mean for this vulnerability?

Where the attack vector metric is Adjacent (A), this represents virtual machines connected via a Hyper-V Network Virtualization (HNV) logical network. This configuration forms an isolation boundary where the virtual machines within the virtual network can only communicate with each other. In this attack vector, the vulnerable component is bound to the network stack, but the attack is limited to systems configured to use the HNV network.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36908
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for x64-based Systems 5029259 (Security Update) Important Information Disclosure 5028186 Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 Version 1607 for x64-based Systems 5029242 (Security Update) Important Information Disclosure 5028169 Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1809 for x64-based Systems 5029247 (Security Update) Important Information Disclosure 5028168
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 21H2 for x64-based Systems 5029244 (Security Update) Important Information Disclosure 5028166
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 22H2 for x64-based Systems 5029244 (Security Update) Important Information Disclosure
5028166
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 11 version 21H2 for ARM64-based Systems 5029253 (Security Update) Important Information Disclosure 5028182 Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 version 21H2 for x64-based Systems 5029253 (Security Update) Important Information Disclosure 5028182 Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5029263 (Security Update) Important Information Disclosure 5028185
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows 11 Version 22H2 for x64-based Systems 5029263 (Security Update) Important Information Disclosure 5028185
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Information Disclosure 5028240
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Information Disclosure 5028240
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2012 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Information Disclosure 5028232
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 (Server Core installation) 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Information Disclosure 5028232
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 R2 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Information Disclosure 5028228
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2012 R2 (Server Core installation) 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Information Disclosure 5028228
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2016 5029242 (Security Update) Important Information Disclosure 5028169 Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2016 (Server Core installation) 5029242 (Security Update) Important Information Disclosure 5028169 Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2019 5029247 (Security Update) Important Information Disclosure 5028168
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2019 (Server Core installation) 5029247 (Security Update) Important Information Disclosure 5028168
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2022 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Information Disclosure 5028171
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250
Windows Server 2022 (Server Core installation) 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Information Disclosure 5028171
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36908 linfeng of HeBei HuaCe


CVE-2023-36909 - Microsoft Message Queuing Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36909
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Message Queuing Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What does that mean for this vulnerability?

To exploit this vulnerability, an attacker would need to send a specially crafted malicious MSMQ packet to a MSMQ server. The vulnerability is triggered when a user on the target machine accesses message queuing, which could result in a denial of service.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36909
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5029259 (Security Update) Important Denial of Service 5028186 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 for x64-based Systems 5029259 (Security Update) Important Denial of Service 5028186 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 Version 1607 for 32-bit Systems 5029242 (Security Update) Important Denial of Service 5028169 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1607 for x64-based Systems 5029242 (Security Update) Important Denial of Service 5028169 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1809 for 32-bit Systems 5029247 (Security Update) Important Denial of Service 5028168
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for ARM64-based Systems 5029247 (Security Update) Important Denial of Service 5028168
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for x64-based Systems 5029247 (Security Update) Important Denial of Service 5028168
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 21H2 for 32-bit Systems 5029244 (Security Update) Important Denial of Service 5028166
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for ARM64-based Systems 5029244 (Security Update) Important Denial of Service 5028166
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for x64-based Systems 5029244 (Security Update) Important Denial of Service 5028166
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 22H2 for 32-bit Systems 5029244 (Security Update) Important Denial of Service
5028166
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for ARM64-based Systems 5029244 (Security Update) Important Denial of Service
5028166
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for x64-based Systems 5029244 (Security Update) Important Denial of Service
5028166
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 11 version 21H2 for ARM64-based Systems 5029253 (Security Update) Important Denial of Service 5028182 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 version 21H2 for x64-based Systems 5029253 (Security Update) Important Denial of Service 5028182 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5029263 (Security Update) Important Denial of Service 5028185
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows 11 Version 22H2 for x64-based Systems 5029263 (Security Update) Important Denial of Service 5028185
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows Server 2008 for 32-bit Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Denial of Service 5028222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Denial of Service 5028222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Denial of Service 5028222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Denial of Service 5028222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Denial of Service 5028240
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Denial of Service 5028240
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2012 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Denial of Service 5028232
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 (Server Core installation) 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Denial of Service 5028232
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 R2 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Denial of Service 5028228
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2012 R2 (Server Core installation) 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Denial of Service 5028228
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2016 5029242 (Security Update) Important Denial of Service 5028169 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2016 (Server Core installation) 5029242 (Security Update) Important Denial of Service 5028169 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2019 5029247 (Security Update) Important Denial of Service 5028168
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2019 (Server Core installation) 5029247 (Security Update) Important Denial of Service 5028168
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2022 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Denial of Service 5028171
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250
Windows Server 2022 (Server Core installation) 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Denial of Service 5028171
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36909 Azure Yang with Kunlun Lab


CVE-2023-36910 - Microsoft Message Queuing Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36910
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Message Queuing Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit the vulnerability?

To exploit this vulnerability, an attacker would need to send a specially crafted malicious MSMQ packet to a MSMQ server. This could result in remote code execution on the server side.


Mitigations:

Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors might be helpful in your situation:

The Windows message queuing service, which is a Windows component, needs to be enabled for a system to be exploitable by this vulnerability. This feature can be added via the Control Panel.

You can check to see if there is a service running named Message Queuing and TCP port 1801 is listening on the machine.


Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36910
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5029259 (Security Update) Critical Remote Code Execution 5028186 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 for x64-based Systems 5029259 (Security Update) Critical Remote Code Execution 5028186 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 Version 1607 for 32-bit Systems 5029242 (Security Update) Critical Remote Code Execution 5028169 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1607 for x64-based Systems 5029242 (Security Update) Critical Remote Code Execution 5028169 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1809 for 32-bit Systems 5029247 (Security Update) Critical Remote Code Execution 5028168
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for ARM64-based Systems 5029247 (Security Update) Critical Remote Code Execution 5028168
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for x64-based Systems 5029247 (Security Update) Critical Remote Code Execution 5028168
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 21H2 for 32-bit Systems 5029244 (Security Update) Critical Remote Code Execution 5028166
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for ARM64-based Systems 5029244 (Security Update) Critical Remote Code Execution 5028166
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for x64-based Systems 5029244 (Security Update) Critical Remote Code Execution 5028166
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 22H2 for 32-bit Systems 5029244 (Security Update) Critical Remote Code Execution
5028166
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for ARM64-based Systems 5029244 (Security Update) Critical Remote Code Execution
5028166
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for x64-based Systems 5029244 (Security Update) Critical Remote Code Execution
5028166
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 11 version 21H2 for ARM64-based Systems 5029253 (Security Update) Critical Remote Code Execution 5028182 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 version 21H2 for x64-based Systems 5029253 (Security Update) Critical Remote Code Execution 5028182 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5029263 (Security Update) Critical Remote Code Execution 5028185
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows 11 Version 22H2 for x64-based Systems 5029263 (Security Update) Critical Remote Code Execution 5028185
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows Server 2008 for 32-bit Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Critical Remote Code Execution 5028222
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Critical Remote Code Execution 5028222
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Critical Remote Code Execution 5028222
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Critical Remote Code Execution 5028222
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5029296 (Monthly Rollup)
5029307 (Security Only)
Critical Remote Code Execution 5028240
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5029296 (Monthly Rollup)
5029307 (Security Only)
Critical Remote Code Execution 5028240
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2012 5029295 (Monthly Rollup)
5029308 (Security Only)
Critical Remote Code Execution 5028232
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 (Server Core installation) 5029295 (Monthly Rollup)
5029308 (Security Only)
Critical Remote Code Execution 5028232
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 R2 5029312 (Monthly Rollup)
5029304 (Security Only)
Critical Remote Code Execution 5028228
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2012 R2 (Server Core installation) 5029312 (Monthly Rollup)
5029304 (Security Only)
Critical Remote Code Execution 5028228
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2016 5029242 (Security Update) Critical Remote Code Execution 5028169 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2016 (Server Core installation) 5029242 (Security Update) Critical Remote Code Execution 5028169 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2019 5029247 (Security Update) Critical Remote Code Execution 5028168
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2019 (Server Core installation) 5029247 (Security Update) Critical Remote Code Execution 5028168
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2022 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Critical Remote Code Execution 5028171
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250
Windows Server 2022 (Server Core installation) 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Critical Remote Code Execution 5028171
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36910 Yuki Chen with Cyber KunLun


CVE-2023-36911 - Microsoft Message Queuing Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36911
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Message Queuing Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

Successful exploitation of this vulnerability could allow an unauthenticated attacker to remotely execute code on the target server.


Mitigations:

Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors might be helpful in your situation:

The Windows message queuing service, which is a Windows component, needs to be enabled for a system to be exploitable by this vulnerability. This feature can be added via the Control Panel.

You can check to see if there is a service running named Message Queuing and TCP port 1801 is listening on the machine.


Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36911
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5029259 (Security Update) Critical Remote Code Execution 5028186 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 for x64-based Systems 5029259 (Security Update) Critical Remote Code Execution 5028186 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 Version 1607 for 32-bit Systems 5029242 (Security Update) Critical Remote Code Execution 5028169 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1607 for x64-based Systems 5029242 (Security Update) Critical Remote Code Execution 5028169 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1809 for 32-bit Systems 5029247 (Security Update) Critical Remote Code Execution 5028168
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for ARM64-based Systems 5029247 (Security Update) Critical Remote Code Execution 5028168
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for x64-based Systems 5029247 (Security Update) Critical Remote Code Execution 5028168
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 21H2 for 32-bit Systems 5029244 (Security Update) Critical Remote Code Execution 5028166
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for ARM64-based Systems 5029244 (Security Update) Critical Remote Code Execution 5028166
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for x64-based Systems 5029244 (Security Update) Critical Remote Code Execution 5028166
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 22H2 for 32-bit Systems 5029244 (Security Update) Critical Remote Code Execution
5028166
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for ARM64-based Systems 5029244 (Security Update) Critical Remote Code Execution
5028166
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for x64-based Systems 5029244 (Security Update) Critical Remote Code Execution
5028166
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 11 version 21H2 for ARM64-based Systems 5029253 (Security Update) Critical Remote Code Execution 5028182 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 version 21H2 for x64-based Systems 5029253 (Security Update) Critical Remote Code Execution 5028182 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5029263 (Security Update) Critical Remote Code Execution 5028185
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows 11 Version 22H2 for x64-based Systems 5029263 (Security Update) Critical Remote Code Execution 5028185
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows Server 2008 for 32-bit Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Critical Remote Code Execution 5028222
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Critical Remote Code Execution 5028222
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Critical Remote Code Execution 5028222
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Critical Remote Code Execution 5028222
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5029296 (Monthly Rollup)
5029307 (Security Only)
Critical Remote Code Execution 5028240
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5029296 (Monthly Rollup)
5029307 (Security Only)
Critical Remote Code Execution 5028240
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2012 5029295 (Monthly Rollup)
5029308 (Security Only)
Critical Remote Code Execution 5028232
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 (Server Core installation) 5029295 (Monthly Rollup)
5029308 (Security Only)
Critical Remote Code Execution 5028232
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 R2 5029312 (Monthly Rollup)
5029304 (Security Only)
Critical Remote Code Execution 5028228
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2012 R2 (Server Core installation) 5029312 (Monthly Rollup)
5029304 (Security Only)
Critical Remote Code Execution 5028228
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2016 5029242 (Security Update) Critical Remote Code Execution 5028169 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2016 (Server Core installation) 5029242 (Security Update) Critical Remote Code Execution 5028169 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2019 5029247 (Security Update) Critical Remote Code Execution 5028168
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2019 (Server Core installation) 5029247 (Security Update) Critical Remote Code Execution 5028168
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2022 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Critical Remote Code Execution 5028171
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250
Windows Server 2022 (Server Core installation) 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Critical Remote Code Execution 5028171
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36911 Yuki Chen with Cyber KunLun


CVE-2023-36912 - Microsoft Message Queuing Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36912
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Message Queuing Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36912
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5029259 (Security Update) Important Denial of Service 5028186 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 for x64-based Systems 5029259 (Security Update) Important Denial of Service 5028186 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 Version 1607 for 32-bit Systems 5029242 (Security Update) Important Denial of Service 5028169 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1607 for x64-based Systems 5029242 (Security Update) Important Denial of Service 5028169 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1809 for 32-bit Systems 5029247 (Security Update) Important Denial of Service 5028168
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for ARM64-based Systems 5029247 (Security Update) Important Denial of Service 5028168
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for x64-based Systems 5029247 (Security Update) Important Denial of Service 5028168
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 21H2 for 32-bit Systems 5029244 (Security Update) Important Denial of Service 5028166
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for ARM64-based Systems 5029244 (Security Update) Important Denial of Service 5028166
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for x64-based Systems 5029244 (Security Update) Important Denial of Service 5028166
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 22H2 for 32-bit Systems 5029244 (Security Update) Important Denial of Service
5028166
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for ARM64-based Systems 5029244 (Security Update) Important Denial of Service
5028166
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for x64-based Systems 5029244 (Security Update) Important Denial of Service
5028166
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 11 version 21H2 for ARM64-based Systems 5029253 (Security Update) Important Denial of Service 5028182 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 version 21H2 for x64-based Systems 5029253 (Security Update) Important Denial of Service 5028182 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5029263 (Security Update) Important Denial of Service 5028185
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows 11 Version 22H2 for x64-based Systems 5029263 (Security Update) Important Denial of Service 5028185
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows Server 2008 for 32-bit Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Denial of Service 5028222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Denial of Service 5028222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Denial of Service 5028222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Denial of Service 5028222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Denial of Service 5028240
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Denial of Service 5028240
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2012 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Denial of Service 5028232
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 (Server Core installation) 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Denial of Service 5028232
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 R2 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Denial of Service 5028228
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2012 R2 (Server Core installation) 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Denial of Service 5028228
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2016 5029242 (Security Update) Important Denial of Service 5028169 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2016 (Server Core installation) 5029242 (Security Update) Important Denial of Service 5028169 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2019 5029247 (Security Update) Important Denial of Service 5028168
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2019 (Server Core installation) 5029247 (Security Update) Important Denial of Service 5028168
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2022 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Denial of Service 5028171
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250
Windows Server 2022 (Server Core installation) 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Denial of Service 5028171
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36912 Yuki Chen with Cyber KunLun


CVE-2023-36913 - Microsoft Message Queuing Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36913
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Message Queuing Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36913
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5029259 (Security Update) Important Information Disclosure 5028186 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 for x64-based Systems 5029259 (Security Update) Important Information Disclosure 5028186 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 Version 1607 for 32-bit Systems 5029242 (Security Update) Important Information Disclosure 5028169 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1607 for x64-based Systems 5029242 (Security Update) Important Information Disclosure 5028169 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1809 for 32-bit Systems 5029247 (Security Update) Important Information Disclosure 5028168
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for ARM64-based Systems 5029247 (Security Update) Important Information Disclosure 5028168
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for x64-based Systems 5029247 (Security Update) Important Information Disclosure 5028168
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 21H2 for 32-bit Systems 5029244 (Security Update) Important Information Disclosure 5028166
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for ARM64-based Systems 5029244 (Security Update) Important Information Disclosure 5028166
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for x64-based Systems 5029244 (Security Update) Important Information Disclosure 5028166
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 22H2 for 32-bit Systems 5029244 (Security Update) Important Information Disclosure
5028166
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for ARM64-based Systems 5029244 (Security Update) Important Information Disclosure
5028166
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for x64-based Systems 5029244 (Security Update) Important Information Disclosure
5028166
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 11 version 21H2 for ARM64-based Systems 5029253 (Security Update) Important Information Disclosure 5028182 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 version 21H2 for x64-based Systems 5029253 (Security Update) Important Information Disclosure 5028182 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5029263 (Security Update) Important Information Disclosure 5028185
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows 11 Version 22H2 for x64-based Systems 5029263 (Security Update) Important Information Disclosure 5028185
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows Server 2008 for 32-bit Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Information Disclosure 5028222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Information Disclosure 5028222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Information Disclosure 5028222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Information Disclosure 5028222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Information Disclosure 5028240
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Information Disclosure 5028240
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2012 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Information Disclosure 5028232
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 (Server Core installation) 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Information Disclosure 5028232
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 R2 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Information Disclosure 5028228
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2012 R2 (Server Core installation) 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Information Disclosure 5028228
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2016 5029242 (Security Update) Important Information Disclosure 5028169 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2016 (Server Core installation) 5029242 (Security Update) Important Information Disclosure 5028169 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2019 5029247 (Security Update) Important Information Disclosure 5028168
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2019 (Server Core installation) 5029247 (Security Update) Important Information Disclosure 5028168
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2022 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Information Disclosure 5028171
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250
Windows Server 2022 (Server Core installation) 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Information Disclosure 5028171
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36913 Jarvis_1oop


CVE-2023-36914 - Windows Smart Card Resource Management Server Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36914
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Smart Card Resource Management Server Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass the Fast Identity Online (FIDO) secure authentication feature.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36914
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 21H2 for 32-bit Systems 5029244 (Security Update) Important Security Feature Bypass 5028166
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for ARM64-based Systems 5029244 (Security Update) Important Security Feature Bypass 5028166
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for x64-based Systems 5029244 (Security Update) Important Security Feature Bypass 5028166
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 22H2 for 32-bit Systems 5029244 (Security Update) Important Security Feature Bypass
5028166
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for ARM64-based Systems 5029244 (Security Update) Important Security Feature Bypass
5028166
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for x64-based Systems 5029244 (Security Update) Important Security Feature Bypass
5028166
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 11 version 21H2 for ARM64-based Systems 5029253 (Security Update) Important Security Feature Bypass 5028182 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 version 21H2 for x64-based Systems 5029253 (Security Update) Important Security Feature Bypass 5028182 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5029263 (Security Update) Important Security Feature Bypass 5028185
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows 11 Version 22H2 for x64-based Systems 5029263 (Security Update) Important Security Feature Bypass 5028185
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows Server 2022 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Security Feature Bypass 5028171
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250
Windows Server 2022 (Server Core installation) 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Security Feature Bypass 5028171
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36914 Justin Decker


CVE-2023-35376 - Microsoft Message Queuing Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35376
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Message Queuing Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What does that mean for this vulnerability?

To exploit this vulnerability, an attacker would need to send a specially crafted malicious MSMQ packet to a MSMQ server. The vulnerability is triggered when a user on the target machine accesses message queuing, which could result in a denial of service.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35376
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5029259 (Security Update) Important Denial of Service 5028186 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 for x64-based Systems 5029259 (Security Update) Important Denial of Service 5028186 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 Version 1607 for 32-bit Systems 5029242 (Security Update) Important Denial of Service 5028169 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1607 for x64-based Systems 5029242 (Security Update) Important Denial of Service 5028169 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1809 for 32-bit Systems 5029247 (Security Update) Important Denial of Service 5028168
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for ARM64-based Systems 5029247 (Security Update) Important Denial of Service 5028168
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for x64-based Systems 5029247 (Security Update) Important Denial of Service 5028168
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 21H2 for 32-bit Systems 5029244 (Security Update) Important Denial of Service 5028166
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for ARM64-based Systems 5029244 (Security Update) Important Denial of Service 5028166
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for x64-based Systems 5029244 (Security Update) Important Denial of Service 5028166
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 22H2 for 32-bit Systems 5029244 (Security Update) Important Denial of Service
5028166
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for ARM64-based Systems 5029244 (Security Update) Important Denial of Service
5028166
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for x64-based Systems 5029244 (Security Update) Important Denial of Service
5028166
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 11 version 21H2 for ARM64-based Systems 5029253 (Security Update) Important Denial of Service 5028182 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 version 21H2 for x64-based Systems 5029253 (Security Update) Important Denial of Service 5028182 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5029263 (Security Update) Important Denial of Service 5028185
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows 11 Version 22H2 for x64-based Systems 5029263 (Security Update) Important Denial of Service 5028185
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows Server 2008 for 32-bit Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Denial of Service 5028222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Denial of Service 5028222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Denial of Service 5028222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Denial of Service 5028222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Denial of Service 5028240
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Denial of Service 5028240
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2012 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Denial of Service 5028232
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 (Server Core installation) 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Denial of Service 5028232
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 R2 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Denial of Service 5028228
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2012 R2 (Server Core installation) 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Denial of Service 5028228
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2016 5029242 (Security Update) Important Denial of Service 5028169 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2016 (Server Core installation) 5029242 (Security Update) Important Denial of Service 5028169 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2019 5029247 (Security Update) Important Denial of Service 5028168
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2019 (Server Core installation) 5029247 (Security Update) Important Denial of Service 5028168
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2022 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Denial of Service 5028171
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250
Windows Server 2022 (Server Core installation) 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Denial of Service 5028171
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35376 Jarvis_1oop


CVE-2023-38254 - Microsoft Message Queuing Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-38254
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Message Queuing Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What does that mean for this vulnerability?

To exploit this vulnerability, an attacker would need to send a specially crafted malicious MSMQ packet to a MSMQ server. The vulnerability is triggered when a user on the target machine accesses message queuing, which could result in a denial of service.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-38254
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5029259 (Security Update) Important Denial of Service 5028186 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 for x64-based Systems 5029259 (Security Update) Important Denial of Service 5028186 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 Version 1607 for 32-bit Systems 5029242 (Security Update) Important Denial of Service 5028169 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1607 for x64-based Systems 5029242 (Security Update) Important Denial of Service 5028169 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1809 for 32-bit Systems 5029247 (Security Update) Important Denial of Service 5028168
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for ARM64-based Systems 5029247 (Security Update) Important Denial of Service 5028168
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for x64-based Systems 5029247 (Security Update) Important Denial of Service 5028168
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 21H2 for 32-bit Systems 5029244 (Security Update) Important Denial of Service 5028166
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for ARM64-based Systems 5029244 (Security Update) Important Denial of Service 5028166
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for x64-based Systems 5029244 (Security Update) Important Denial of Service 5028166
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 22H2 for 32-bit Systems 5029244 (Security Update) Important Denial of Service
5028166
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for ARM64-based Systems 5029244 (Security Update) Important Denial of Service
5028166
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for x64-based Systems 5029244 (Security Update) Important Denial of Service
5028166
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 11 version 21H2 for ARM64-based Systems 5029253 (Security Update) Important Denial of Service 5028182 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 version 21H2 for x64-based Systems 5029253 (Security Update) Important Denial of Service 5028182 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5029263 (Security Update) Important Denial of Service 5028185
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows 11 Version 22H2 for x64-based Systems 5029263 (Security Update) Important Denial of Service 5028185
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows Server 2008 for 32-bit Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Denial of Service 5028222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Denial of Service 5028222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Denial of Service 5028222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Denial of Service 5028222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Denial of Service 5028240
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Denial of Service 5028240
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2012 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Denial of Service 5028232
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 (Server Core installation) 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Denial of Service 5028232
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 R2 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Denial of Service 5028228
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2012 R2 (Server Core installation) 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Denial of Service 5028228
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2016 5029242 (Security Update) Important Denial of Service 5028169 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2016 (Server Core installation) 5029242 (Security Update) Important Denial of Service 5028169 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2019 5029247 (Security Update) Important Denial of Service 5028168
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2019 (Server Core installation) 5029247 (Security Update) Important Denial of Service 5028168
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2022 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Denial of Service 5028171
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250
Windows Server 2022 (Server Core installation) 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Denial of Service 5028171
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250

Acknowledgements

CVE ID Acknowledgements
CVE-2023-38254 Jarvis_1oop


CVE-2023-35377 - Microsoft Message Queuing Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35377
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Message Queuing Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What does that mean for this vulnerability?

To exploit this vulnerability, an attacker would need to send a specially crafted malicious MSMQ packet to a MSMQ server. The vulnerability is triggered when a user on the target machine accesses message queuing, which could result in a denial of service.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35377
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5029259 (Security Update) Important Denial of Service 5028186 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 for x64-based Systems 5029259 (Security Update) Important Denial of Service 5028186 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 Version 1607 for 32-bit Systems 5029242 (Security Update) Important Denial of Service 5028169 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1607 for x64-based Systems 5029242 (Security Update) Important Denial of Service 5028169 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1809 for 32-bit Systems 5029247 (Security Update) Important Denial of Service 5028168
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for ARM64-based Systems 5029247 (Security Update) Important Denial of Service 5028168
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for x64-based Systems 5029247 (Security Update) Important Denial of Service 5028168
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 21H2 for 32-bit Systems 5029244 (Security Update) Important Denial of Service 5028166
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for ARM64-based Systems 5029244 (Security Update) Important Denial of Service 5028166
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for x64-based Systems 5029244 (Security Update) Important Denial of Service 5028166
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 22H2 for 32-bit Systems 5029244 (Security Update) Important Denial of Service
5028166
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for ARM64-based Systems 5029244 (Security Update) Important Denial of Service
5028166
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for x64-based Systems 5029244 (Security Update) Important Denial of Service
5028166
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 11 version 21H2 for ARM64-based Systems 5029253 (Security Update) Important Denial of Service 5028182 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 version 21H2 for x64-based Systems 5029253 (Security Update) Important Denial of Service 5028182 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5029263 (Security Update) Important Denial of Service 5028185
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows 11 Version 22H2 for x64-based Systems 5029263 (Security Update) Important Denial of Service 5028185
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows Server 2008 for 32-bit Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Denial of Service 5028222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Denial of Service 5028222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Denial of Service 5028222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Denial of Service 5028222
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Denial of Service 5028240
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Denial of Service 5028240
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2012 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Denial of Service 5028232
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 (Server Core installation) 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Denial of Service 5028232
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 R2 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Denial of Service 5028228
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2012 R2 (Server Core installation) 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Denial of Service 5028228
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2016 5029242 (Security Update) Important Denial of Service 5028169 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2016 (Server Core installation) 5029242 (Security Update) Important Denial of Service 5028169 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2019 5029247 (Security Update) Important Denial of Service 5028168
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2019 (Server Core installation) 5029247 (Security Update) Important Denial of Service 5028168
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2022 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Denial of Service 5028171
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250
Windows Server 2022 (Server Core installation) 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Denial of Service 5028171
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35377 Jarvis_1oop


CVE-2023-35378 - Windows Projected File System Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35378
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Projected File System Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated user could trigger this vulnerability. It does not require admin or other elevated privileges.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:

The following mitigating factors might be helpful in your situation:

Exploitation of this issue requires the optional Projected Filesystem component to be enabled, which is not a default configuration.


Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35378
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for ARM64-based Systems 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for x64-based Systems 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 21H2 for 32-bit Systems 5029244 (Security Update) Important Elevation of Privilege 5028166
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for ARM64-based Systems 5029244 (Security Update) Important Elevation of Privilege 5028166
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for x64-based Systems 5029244 (Security Update) Important Elevation of Privilege 5028166
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 22H2 for 32-bit Systems 5029244 (Security Update) Important Elevation of Privilege
5028166
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for ARM64-based Systems 5029244 (Security Update) Important Elevation of Privilege
5028166
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for x64-based Systems 5029244 (Security Update) Important Elevation of Privilege
5028166
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 11 version 21H2 for ARM64-based Systems 5029253 (Security Update) Important Elevation of Privilege 5028182 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 version 21H2 for x64-based Systems 5029253 (Security Update) Important Elevation of Privilege 5028182 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5029263 (Security Update) Important Elevation of Privilege 5028185
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows 11 Version 22H2 for x64-based Systems 5029263 (Security Update) Important Elevation of Privilege 5028185
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows Server 2019 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2019 (Server Core installation) 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2022 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Elevation of Privilege 5028171
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250
Windows Server 2022 (Server Core installation) 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Elevation of Privilege 5028171
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35378 ziming zhang with Ant Security Light-Year Lab


CVE-2023-35379 - Reliability Analysis Metrics Calculation Engine (RACEng) Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35379
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Reliability Analysis Metrics Calculation Engine (RACEng) Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain specific limited SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35379
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Elevation of Privilege 5028240
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Elevation of Privilege 5028240
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35379 OUYANG FEI


CVE-2023-35380 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35380
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metrics, the attack vector is local (AV:L) and privilege required is low (PR:L). What does that mean for this vulnerability?

An attacker must have local access to the targeted machine and must be able to create folders and performance traces on the machine, with restricted privileges that normal users have by default.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35380
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5029259 (Security Update) Important Elevation of Privilege 5028186 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 for x64-based Systems 5029259 (Security Update) Important Elevation of Privilege 5028186 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 Version 1607 for 32-bit Systems 5029242 (Security Update) Important Elevation of Privilege 5028169 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1607 for x64-based Systems 5029242 (Security Update) Important Elevation of Privilege 5028169 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1809 for 32-bit Systems 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for ARM64-based Systems 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for x64-based Systems 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 21H2 for 32-bit Systems 5029244 (Security Update) Important Elevation of Privilege 5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for ARM64-based Systems 5029244 (Security Update) Important Elevation of Privilege 5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for x64-based Systems 5029244 (Security Update) Important Elevation of Privilege 5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 22H2 for 32-bit Systems 5029244 (Security Update) Important Elevation of Privilege
5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for ARM64-based Systems 5029244 (Security Update) Important Elevation of Privilege
5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for x64-based Systems 5029244 (Security Update) Important Elevation of Privilege
5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 11 version 21H2 for ARM64-based Systems 5029253 (Security Update) Important Elevation of Privilege 5028182 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 version 21H2 for x64-based Systems 5029253 (Security Update) Important Elevation of Privilege 5028182 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5029263 (Security Update) Important Elevation of Privilege 5028185
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows 11 Version 22H2 for x64-based Systems 5029263 (Security Update) Important Elevation of Privilege 5028185
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows Server 2008 for 32-bit Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Elevation of Privilege 5028222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Elevation of Privilege 5028222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Elevation of Privilege 5028222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Elevation of Privilege 5028222
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Elevation of Privilege 5028240
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Elevation of Privilege 5028240
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2012 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Elevation of Privilege 5028232
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 (Server Core installation) 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Elevation of Privilege 5028232
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 R2 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Elevation of Privilege 5028228
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2012 R2 (Server Core installation) 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Elevation of Privilege 5028228
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2016 5029242 (Security Update) Important Elevation of Privilege 5028169 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2016 (Server Core installation) 5029242 (Security Update) Important Elevation of Privilege 5028169 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2019 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2019 (Server Core installation) 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2022 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Elevation of Privilege 5028171
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250
Windows Server 2022 (Server Core installation) 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Elevation of Privilege 5028171
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35380 Anonymous


CVE-2023-35381 - Windows Fax Service Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35381
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Fax Service Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

Exploitation of the vulnerability requires that a user open a specially crafted file.

  • In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.
  • In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability.

An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35381
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5029259 (Security Update) Important Remote Code Execution 5028186 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 for x64-based Systems 5029259 (Security Update) Important Remote Code Execution 5028186 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 Version 1607 for 32-bit Systems 5029242 (Security Update) Important Remote Code Execution 5028169 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1607 for x64-based Systems 5029242 (Security Update) Important Remote Code Execution 5028169 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1809 for 32-bit Systems 5029247 (Security Update) Important Remote Code Execution 5028168
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for ARM64-based Systems 5029247 (Security Update) Important Remote Code Execution 5028168
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for x64-based Systems 5029247 (Security Update) Important Remote Code Execution 5028168
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 21H2 for 32-bit Systems 5029244 (Security Update) Important Remote Code Execution 5028166
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for ARM64-based Systems 5029244 (Security Update) Important Remote Code Execution 5028166
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for x64-based Systems 5029244 (Security Update) Important Remote Code Execution 5028166
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 22H2 for 32-bit Systems 5029244 (Security Update) Important Remote Code Execution
5028166
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for ARM64-based Systems 5029244 (Security Update) Important Remote Code Execution
5028166
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for x64-based Systems 5029244 (Security Update) Important Remote Code Execution
5028166
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 11 version 21H2 for ARM64-based Systems 5029253 (Security Update) Important Remote Code Execution 5028182 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 version 21H2 for x64-based Systems 5029253 (Security Update) Important Remote Code Execution 5028182 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5029263 (Security Update) Important Remote Code Execution 5028185
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows 11 Version 22H2 for x64-based Systems 5029263 (Security Update) Important Remote Code Execution 5028185
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows Server 2008 for 32-bit Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Remote Code Execution 5028222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Remote Code Execution 5028222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Remote Code Execution 5028222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Remote Code Execution 5028222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Remote Code Execution 5028240
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Remote Code Execution 5028240
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2012 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Remote Code Execution 5028232
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 (Server Core installation) 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Remote Code Execution 5028232
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 R2 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Remote Code Execution 5028228
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2012 R2 (Server Core installation) 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Remote Code Execution 5028228
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2016 5029242 (Security Update) Important Remote Code Execution 5028169 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2016 (Server Core installation) 5029242 (Security Update) Important Remote Code Execution 5028169 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2019 5029247 (Security Update) Important Remote Code Execution 5028168
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2019 (Server Core installation) 5029247 (Security Update) Important Remote Code Execution 5028168
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2022 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Remote Code Execution 5028171
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250
Windows Server 2022 (Server Core installation) 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Remote Code Execution 5028171
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35381 TJ with FuzzWorks


CVE-2023-35382 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35382
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metrics, the attack vector is local (AV:L) and privilege required is low (PR:L). What does that mean for this vulnerability?

An attacker must have local access to the targeted machine and must be able to create folders and performance traces on the machine, with restricted privileges that normal users have by default.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35382
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for ARM64-based Systems 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for x64-based Systems 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 21H2 for 32-bit Systems 5029244 (Security Update) Important Elevation of Privilege 5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for ARM64-based Systems 5029244 (Security Update) Important Elevation of Privilege 5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for x64-based Systems 5029244 (Security Update) Important Elevation of Privilege 5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 22H2 for 32-bit Systems 5029244 (Security Update) Important Elevation of Privilege
5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for ARM64-based Systems 5029244 (Security Update) Important Elevation of Privilege
5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for x64-based Systems 5029244 (Security Update) Important Elevation of Privilege
5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 11 version 21H2 for ARM64-based Systems 5029253 (Security Update) Important Elevation of Privilege 5028182 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 version 21H2 for x64-based Systems 5029253 (Security Update) Important Elevation of Privilege 5028182 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5029263 (Security Update) Important Elevation of Privilege 5028185
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows 11 Version 22H2 for x64-based Systems 5029263 (Security Update) Important Elevation of Privilege 5028185
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows Server 2019 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2019 (Server Core installation) 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2022 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Elevation of Privilege 5028171
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250
Windows Server 2022 (Server Core installation) 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Elevation of Privilege 5028171
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35382 Mateusz Jurczyk of Google Project Zero


CVE-2023-35383 - Microsoft Message Queuing Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35383
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Message Queuing Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited the vulnerability could potentially read User Mode Service Memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35383
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5029259 (Security Update) Important Information Disclosure 5028186 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 for x64-based Systems 5029259 (Security Update) Important Information Disclosure 5028186 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 Version 1607 for 32-bit Systems 5029242 (Security Update) Important Information Disclosure 5028169 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1607 for x64-based Systems 5029242 (Security Update) Important Information Disclosure 5028169 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1809 for 32-bit Systems 5029247 (Security Update) Important Information Disclosure 5028168
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for ARM64-based Systems 5029247 (Security Update) Important Information Disclosure 5028168
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for x64-based Systems 5029247 (Security Update) Important Information Disclosure 5028168
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 21H2 for 32-bit Systems 5029244 (Security Update) Important Information Disclosure 5028166
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for ARM64-based Systems 5029244 (Security Update) Important Information Disclosure 5028166
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for x64-based Systems 5029244 (Security Update) Important Information Disclosure 5028166
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 22H2 for 32-bit Systems 5029244 (Security Update) Important Information Disclosure
5028166
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for ARM64-based Systems 5029244 (Security Update) Important Information Disclosure
5028166
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for x64-based Systems 5029244 (Security Update) Important Information Disclosure
5028166
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 11 version 21H2 for ARM64-based Systems 5029253 (Security Update) Important Information Disclosure 5028182 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 version 21H2 for x64-based Systems 5029253 (Security Update) Important Information Disclosure 5028182 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5029263 (Security Update) Important Information Disclosure 5028185
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows 11 Version 22H2 for x64-based Systems 5029263 (Security Update) Important Information Disclosure 5028185
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows Server 2008 for 32-bit Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Information Disclosure 5028222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Information Disclosure 5028222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Information Disclosure 5028222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Information Disclosure 5028222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Information Disclosure 5028240
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Information Disclosure 5028240
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2012 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Information Disclosure 5028232
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 (Server Core installation) 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Information Disclosure 5028232
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 R2 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Information Disclosure 5028228
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2012 R2 (Server Core installation) 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Information Disclosure 5028228
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2016 5029242 (Security Update) Important Information Disclosure 5028169 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2016 (Server Core installation) 5029242 (Security Update) Important Information Disclosure 5028169 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2019 5029247 (Security Update) Important Information Disclosure 5028168
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2019 (Server Core installation) 5029247 (Security Update) Important Information Disclosure 5028168
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2022 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Information Disclosure 5028171
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250
Windows Server 2022 (Server Core installation) 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Information Disclosure 5028171
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35383 Yuki Chen with Cyber KunLun


CVE-2023-35384 - Windows HTML Platforms Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35384
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows HTML Platforms Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.4/TemporalScore:4.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityLow
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


What kind of security feature could be bypassed by successfully exploiting this vulnerability?

A security feature bypass vulnerability exists when the MSHTML platform fails to validate the correct Security Zone of requests for specific URLs. This could allow an attacker to cause a user to access a URL in a less restricted Internet Security Zone than intended.

To exploit this vulnerability, an attacker could email or otherwise provide a specially crafted URL to a victim and convince them to click on it.

The security update addresses the vulnerability by correcting security feature behavior to properly map affected URLs to the correct Security Zone.


The Security Updates table indicates that this vulnerability affects all supported versions of Microsoft Windows except Windows Server 2008, Windows Server 2008 R2, and Windows Server 2012. Why are IE Cumulative updates listed for Windows Server 2012 R2?

While Microsoft has announced retirement of the Internet Explorer 11 application on certain platforms and the Microsoft Edge Legacy application is deprecated, the underlying MSHTML, EdgeHTML, and scripting platforms are still supported. The MSHTML platform is used by Internet Explorer mode in Microsoft Edge as well as other applications through WebBrowser control. The EdgeHTML platform is used by WebView and some UWP applications. The scripting platforms are used by MSHTML and EdgeHTML but can also be used by other legacy applications. Updates to address vulnerabilities in the MSHTML platform and scripting engine are included in the IE Cumulative Updates; EdgeHTML and Chakra changes are not applicable to those platforms.

To stay fully protected, we recommend that customers who install Security Only updates install the IE Cumulative updates for this vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35384
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5029259 (Security Update) Important Security Feature Bypass 5028186 Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 for x64-based Systems 5029259 (Security Update) Important Security Feature Bypass 5028186 Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 Version 1607 for 32-bit Systems 5029242 (Security Update) Important Security Feature Bypass 5028169 Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1607 for x64-based Systems 5029242 (Security Update) Important Security Feature Bypass 5028169 Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1809 for 32-bit Systems 5029247 (Security Update) Important Security Feature Bypass 5028168
Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for ARM64-based Systems 5029247 (Security Update) Important Security Feature Bypass 5028168
Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for x64-based Systems 5029247 (Security Update) Important Security Feature Bypass 5028168
Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 21H2 for 32-bit Systems 5029244 (Security Update) Important Security Feature Bypass 5028166
Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for ARM64-based Systems 5029244 (Security Update) Important Security Feature Bypass 5028166
Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for x64-based Systems 5029244 (Security Update) Important Security Feature Bypass 5028166
Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 22H2 for 32-bit Systems 5029244 (Security Update) Important Security Feature Bypass
5028166
Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for ARM64-based Systems 5029244 (Security Update) Important Security Feature Bypass
5028166
Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for x64-based Systems 5029244 (Security Update) Important Security Feature Bypass
5028166
Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 11 version 21H2 for ARM64-based Systems 5029253 (Security Update) Important Security Feature Bypass 5028182 Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 version 21H2 for x64-based Systems 5029253 (Security Update) Important Security Feature Bypass 5028182 Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5029263 (Security Update) Important Security Feature Bypass 5028185
Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows 11 Version 22H2 for x64-based Systems 5029263 (Security Update) Important Security Feature Bypass 5028185
Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows Server 2012 R2 5029312 (Monthly Rollup)
5029304 (Security Only)
5029243 (IE Cumulative)
Important Security Feature Bypass 5028228
Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
6.3.9600.21503
10.0.0.0
Yes None
Windows Server 2012 R2 (Server Core installation) 5029312 (Monthly Rollup)
5029243 (IE Cumulative)
Important Security Feature Bypass 5028228
Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
6.3.9600.21503
10.0.0.0
Yes None
Windows Server 2016 5029242 (Security Update) Important Security Feature Bypass 5028169 Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2016 (Server Core installation) 5029242 (Security Update) Important Security Feature Bypass 5028169 Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2019 5029247 (Security Update) Important Security Feature Bypass 5028168
Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2019 (Server Core installation) 5029247 (Security Update) Important Security Feature Bypass 5028168
Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2022 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Security Feature Bypass 5028171
Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250
Windows Server 2022 (Server Core installation) 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Security Feature Bypass 5028171
Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35384 Ben Barnea with Akamai Technologies


CVE-2023-35385 - Microsoft Message Queuing Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35385
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Message Queuing Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

Successful exploitation of this vulnerability could allow an unauthenticated attacker to remotely execute code on the target server.


Mitigations:

Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors might be helpful in your situation:

The Windows message queuing service, which is a Windows component, needs to be enabled for a system to be exploitable by this vulnerability. This feature can be added via the Control Panel.

You can check to see if there is a service running named Message Queuing and TCP port 1801 is listening on the machine.


Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35385
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5029259 (Security Update) Critical Remote Code Execution 5028186 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 for x64-based Systems 5029259 (Security Update) Critical Remote Code Execution 5028186 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 Version 1607 for 32-bit Systems 5029242 (Security Update) Critical Remote Code Execution 5028169 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1607 for x64-based Systems 5029242 (Security Update) Critical Remote Code Execution 5028169 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1809 for 32-bit Systems 5029247 (Security Update) Critical Remote Code Execution 5028168
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for ARM64-based Systems 5029247 (Security Update) Critical Remote Code Execution 5028168
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for x64-based Systems 5029247 (Security Update) Critical Remote Code Execution 5028168
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 21H2 for 32-bit Systems 5029244 (Security Update) Critical Remote Code Execution 5028166
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for ARM64-based Systems 5029244 (Security Update) Critical Remote Code Execution 5028166
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for x64-based Systems 5029244 (Security Update) Critical Remote Code Execution 5028166
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 22H2 for 32-bit Systems 5029244 (Security Update) Critical Remote Code Execution
5028166
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for ARM64-based Systems 5029244 (Security Update) Critical Remote Code Execution
5028166
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for x64-based Systems 5029244 (Security Update) Critical Remote Code Execution
5028166
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 11 version 21H2 for ARM64-based Systems 5029253 (Security Update) Critical Remote Code Execution 5028182 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 version 21H2 for x64-based Systems 5029253 (Security Update) Critical Remote Code Execution 5028182 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5029263 (Security Update) Critical Remote Code Execution 5028185
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows 11 Version 22H2 for x64-based Systems 5029263 (Security Update) Critical Remote Code Execution 5028185
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows Server 2008 for 32-bit Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Critical Remote Code Execution 5028222
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Critical Remote Code Execution 5028222
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Critical Remote Code Execution 5028222
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Critical Remote Code Execution 5028222
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5029296 (Monthly Rollup)
5029307 (Security Only)
Critical Remote Code Execution 5028240
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5029296 (Monthly Rollup)
5029307 (Security Only)
Critical Remote Code Execution 5028240
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2012 5029295 (Monthly Rollup)
5029308 (Security Only)
Critical Remote Code Execution 5028232
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 (Server Core installation) 5029295 (Monthly Rollup)
5029308 (Security Only)
Critical Remote Code Execution 5028232
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 R2 5029312 (Monthly Rollup)
5029304 (Security Only)
Critical Remote Code Execution 5028228
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2012 R2 (Server Core installation) 5029312 (Monthly Rollup)
5029304 (Security Only)
Critical Remote Code Execution 5028228
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2016 5029242 (Security Update) Critical Remote Code Execution 5028169 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2016 (Server Core installation) 5029242 (Security Update) Critical Remote Code Execution 5028169 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2019 5029247 (Security Update) Critical Remote Code Execution 5028168
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2019 (Server Core installation) 5029247 (Security Update) Critical Remote Code Execution 5028168
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2022 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Critical Remote Code Execution 5028171
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250
Windows Server 2022 (Server Core installation) 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Critical Remote Code Execution 5028171
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35385 Yuki Chen with Cyber KunLun


CVE-2023-35386 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35386
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35386
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5029259 (Security Update) Important Elevation of Privilege 5028186 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 for x64-based Systems 5029259 (Security Update) Important Elevation of Privilege 5028186 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 Version 1607 for 32-bit Systems 5029242 (Security Update) Important Elevation of Privilege 5028169 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1607 for x64-based Systems 5029242 (Security Update) Important Elevation of Privilege 5028169 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1809 for 32-bit Systems 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for ARM64-based Systems 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for x64-based Systems 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 21H2 for 32-bit Systems 5029244 (Security Update) Important Elevation of Privilege 5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for ARM64-based Systems 5029244 (Security Update) Important Elevation of Privilege 5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for x64-based Systems 5029244 (Security Update) Important Elevation of Privilege 5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 22H2 for 32-bit Systems 5029244 (Security Update) Important Elevation of Privilege
5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for ARM64-based Systems 5029244 (Security Update) Important Elevation of Privilege
5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for x64-based Systems 5029244 (Security Update) Important Elevation of Privilege
5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 11 version 21H2 for ARM64-based Systems 5029253 (Security Update) Important Elevation of Privilege 5028182 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 version 21H2 for x64-based Systems 5029253 (Security Update) Important Elevation of Privilege 5028182 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5029263 (Security Update) Important Elevation of Privilege 5028185
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows 11 Version 22H2 for x64-based Systems 5029263 (Security Update) Important Elevation of Privilege 5028185
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows Server 2016 5029242 (Security Update) Important Elevation of Privilege 5028169 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2016 (Server Core installation) 5029242 (Security Update) Important Elevation of Privilege 5028169 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2019 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2019 (Server Core installation) 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2022 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Elevation of Privilege 5028171
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250
Windows Server 2022 (Server Core installation) 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Elevation of Privilege 5028171
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35386 Mateusz Jurczyk of Google Project Zero


CVE-2023-35387 - Windows Bluetooth A2DP driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35387
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Bluetooth A2DP driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorAdjacent
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An authorized attacker could exploit the Windows Bluetooth driver vulnerability by programmatically running certain functions that could lead to elevation of privilege on the Bluetooth component.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

In order to exploit this vulnerability, the victim must pair with the attacker's Bluetooth device.


According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

An exploited vulnerability can affect resources beyond the security scope managed by the security authority of the vulnerable component. In this case, the vulnerable component and the impacted component are different and managed by different security authorities.


According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires that an attacker will need to first gain access to the restricted network before running an attack.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35387
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5029259 (Security Update) Important Elevation of Privilege 5028186 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 for x64-based Systems 5029259 (Security Update) Important Elevation of Privilege 5028186 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 Version 1607 for 32-bit Systems 5029242 (Security Update) Important Elevation of Privilege 5028169 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1607 for x64-based Systems 5029242 (Security Update) Important Elevation of Privilege 5028169 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1809 for 32-bit Systems 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for ARM64-based Systems 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for x64-based Systems 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 21H2 for 32-bit Systems 5029244 (Security Update) Important Elevation of Privilege 5028166
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for ARM64-based Systems 5029244 (Security Update) Important Elevation of Privilege 5028166
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for x64-based Systems 5029244 (Security Update) Important Elevation of Privilege 5028166
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 22H2 for 32-bit Systems 5029244 (Security Update) Important Elevation of Privilege
5028166
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for ARM64-based Systems 5029244 (Security Update) Important Elevation of Privilege
5028166
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for x64-based Systems 5029244 (Security Update) Important Elevation of Privilege
5028166
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 11 version 21H2 for ARM64-based Systems 5029253 (Security Update) Important Elevation of Privilege 5028182 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 version 21H2 for x64-based Systems 5029253 (Security Update) Important Elevation of Privilege 5028182 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5029263 (Security Update) Important Elevation of Privilege 5028185
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows 11 Version 22H2 for x64-based Systems 5029263 (Security Update) Important Elevation of Privilege 5028185
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows Server 2012 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Elevation of Privilege 5028232
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 (Server Core installation) 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Elevation of Privilege 5028232
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 R2 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Elevation of Privilege 5028228
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2012 R2 (Server Core installation) 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Elevation of Privilege 5028228
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2016 5029242 (Security Update) Important Elevation of Privilege 5028169 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2016 (Server Core installation) 5029242 (Security Update) Important Elevation of Privilege 5028169 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2019 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2019 (Server Core installation) 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35387 Anonymous Trend Micro Zero Day Initiative


CVE-2023-35389 - Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35389
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeChanged
ConfidentialityLow
IntegrityLow
AvailabilityLow
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

A user would have to open a maliciously crafted email sent to Dynamics 365 Customer Engagement.


According to the CVSS metrics, successful exploitation of this vulnerability could lead to minor loss of confidentiality (C:L), integrity (I:L) and availability (A:L). What does that mean for this vulnerability?

While we cannot rule out the impact to Confidentiality, Integrity, and Availability, the ability to exploit this vulnerability by itself is limited. An attacker can force a bad response to be cached into a regular URL by having multiple occurrences of the same variable in the query string. The impact depends on the business logic of the user application.


According to the CVSS metric, the attack vector is network (AV:N). What is the target used in the context of the remote code execution?

As an authenticated user, the attacker could attempt to trigger malicious code in the context of the victim.

  • In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.
  • In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability.

An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.


According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

A user could be tricked into entering credentials or responding to a pop up after opening a specially crafted file or clicking on a link, typically by way of an enticement in an email or URL.


According to the CVSS metric, the attack vector is network (AV:N), and privilege required is low (PR:L). What is the target used in the context of the remote code execution?

The attacker for this vulnerability could target the server accounts in an arbitrary or remote code execution. As an authenticated user, the attacker could attempt to trigger malicious code in the context of the server's account through a network call.

The privilege requirement is low because the attacker needs to be authenticated as a normal user.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35389
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Dynamics 365 (on-premises) version 9.0 5026500 (Security Update) Important Remote Code Execution None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L/E:U/RL:O/RC:C
9.0.47.08 Maybe None
Microsoft Dynamics 365 (on-premises) version 9.1 5026501 (Security Update) Important Remote Code Execution None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L/E:U/RL:O/RC:C
9.1.18.22 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35389 Vladimir Egorov


CVE-2023-35393 - Azure Apache Hive Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35393
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Apache Hive Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:4.5/TemporalScore:3.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker would have to send the victim a malicious file that the victim would have to execute.


**According to the CVSS metric, user interaction is required (UI:R) and privileges required is high (PR:H). What does that mean for this vulnerability?

An authorized attacker with administrator privileges must send a victim a malicious site and convince them to open it.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35393
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure HDInsights Release Notes (Security Update) Important Spoofing None Base: 4.5
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
2307201242 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35393 Lidor B. with Orca Security


CVE-2023-35394 - Azure HDInsight Jupyter Notebook Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35394
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure HDInsight Jupyter Notebook Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:4.6/TemporalScore:4.0
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker would have to send the victim a malicious file that the victim would have to execute.


According to the CVSS metrics, successful exploitation of this vulnerability could lead to minor loss of confidentiality (C:L), integrity (I:L) and availability (A:N). What does that mean for this vulnerability?

There are limited impact to Confidentiality and Integrity and no Avaibility impact from exploiting this vulnerability. An attacker would need to combine this with other vulnerabilities to perform an attack.


According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?

An authorized attacker with guest privileges must send a victim a malicious site and convince them to open it.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35394
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure HDInsights Release Notes (Security Update) Important Spoofing None Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C
2307201242 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35394 Lidor B. with Orca Security


CVE-2023-38188 - Azure Apache Hadoop Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-38188
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Apache Hadoop Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:4.5/TemporalScore:3.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker would have to send the victim a malicious file that the victim would have to execute.


**According to the CVSS metric, user interaction is required (UI:R) and privileges required is high (PR:H). What does that mean for this vulnerability?

An authorized attacker with administrator privileges must send a victim a malicious site and convince them to open it.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-38188
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure HDInsights Release Notes (Security Update) Important Spoofing None Base: 4.5
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
2307201242 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-38188 Lidor B. with Orca Security


CVE-2023-38186 - Windows Mobile Device Management Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-38186
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mobile Device Management Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-38186
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 21H2 for 32-bit Systems 5029244 (Security Update) Important Elevation of Privilege 5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for ARM64-based Systems 5029244 (Security Update) Important Elevation of Privilege 5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for x64-based Systems 5029244 (Security Update) Important Elevation of Privilege 5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 22H2 for 32-bit Systems 5029244 (Security Update) Important Elevation of Privilege
5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for ARM64-based Systems 5029244 (Security Update) Important Elevation of Privilege
5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for x64-based Systems 5029244 (Security Update) Important Elevation of Privilege
5028166
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 11 version 21H2 for ARM64-based Systems 5029253 (Security Update) Important Elevation of Privilege 5028182 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 version 21H2 for x64-based Systems 5029253 (Security Update) Important Elevation of Privilege 5028182 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5029263 (Security Update) Important Elevation of Privilege 5028185
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows 11 Version 22H2 for x64-based Systems 5029263 (Security Update) Important Elevation of Privilege 5028185
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows Server 2022 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Elevation of Privilege 5028171
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250
Windows Server 2022 (Server Core installation) 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Elevation of Privilege 5028171
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250

Acknowledgements

CVE ID Acknowledgements
CVE-2023-38186 Marcos Oviedo with FleetDM


CVE-2023-38185 - Microsoft Exchange Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-38185
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Exchange Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, privileges required is low (PR:L). Does the attacker need to be in an authenticated role on the Exchange Server?

Yes, the attacker must be authenticated.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is none (UI:N). What is the target used in the context of the remote code execution?

The attacker for this vulnerability could target the server accounts in an arbitrary or remote code execution. As an authenticated user, the attacker could attempt to trigger malicious code in the context of the server's account through a network call.


How could an attacker exploit this vulnerability?

In a network-based attack, an attacker could trigger malicious code in the context of the server's account through a network call.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-38185
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Exchange Server 2016 Cumulative Update 23 5029388 (Security Update) Important Remote Code Execution
5029388
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

15.01.2507.031
Yes 5029388
Microsoft Exchange Server 2019 Cumulative Update 12 5029388 (Security Update) Important Remote Code Execution
5026261
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

15.02.1118.036
Yes 5029388
Microsoft Exchange Server 2019 Cumulative Update 13 5029388 (Security Update) Important Remote Code Execution 5026261
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.02.1258.023
Yes 5029388

Acknowledgements

CVE ID Acknowledgements
CVE-2023-38185 zcgonvh


CVE-2023-38184 - Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-38184
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


How could an attacker exploit this vulnerability?

An authenticated attacker who successfully exploited this vulnerability could gain code execution through a specially crafted LDAP call to execute arbitrary code within the context of the LDAP service.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-38184
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5029259 (Security Update) Important Remote Code Execution 5028186 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 for x64-based Systems 5029259 (Security Update) Important Remote Code Execution 5028186 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 Version 1607 for 32-bit Systems 5029242 (Security Update) Important Remote Code Execution 5028169 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1607 for x64-based Systems 5029242 (Security Update) Important Remote Code Execution 5028169 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1809 for 32-bit Systems 5029247 (Security Update) Important Remote Code Execution 5028168
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for ARM64-based Systems 5029247 (Security Update) Important Remote Code Execution 5028168
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for x64-based Systems 5029247 (Security Update) Important Remote Code Execution 5028168
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 21H2 for 32-bit Systems 5029244 (Security Update) Important Remote Code Execution 5028166
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for ARM64-based Systems 5029244 (Security Update) Important Remote Code Execution 5028166
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for x64-based Systems 5029244 (Security Update) Important Remote Code Execution 5028166
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 22H2 for 32-bit Systems 5029244 (Security Update) Important Remote Code Execution
5028166
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for ARM64-based Systems 5029244 (Security Update) Important Remote Code Execution
5028166
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for x64-based Systems 5029244 (Security Update) Important Remote Code Execution
5028166
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 11 version 21H2 for ARM64-based Systems 5029253 (Security Update) Important Remote Code Execution 5028182 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 version 21H2 for x64-based Systems 5029253 (Security Update) Important Remote Code Execution 5028182 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5029263 (Security Update) Important Remote Code Execution 5028185
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows 11 Version 22H2 for x64-based Systems 5029263 (Security Update) Important Remote Code Execution 5028185
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows Server 2008 for 32-bit Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Remote Code Execution 5028222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Remote Code Execution 5028222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Remote Code Execution 5028222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Remote Code Execution 5028222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Remote Code Execution 5028240
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Remote Code Execution 5028240
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2012 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Remote Code Execution 5028232
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 (Server Core installation) 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Remote Code Execution 5028232
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 R2 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Remote Code Execution 5028228
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2012 R2 (Server Core installation) 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Remote Code Execution 5028228
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2016 5029242 (Security Update) Important Remote Code Execution 5028169 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2016 (Server Core installation) 5029242 (Security Update) Important Remote Code Execution 5028169 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2019 5029247 (Security Update) Important Remote Code Execution 5028168
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2019 (Server Core installation) 5029247 (Security Update) Important Remote Code Execution 5028168
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2022 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Remote Code Execution 5028171
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250
Windows Server 2022 (Server Core installation) 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Remote Code Execution 5028171
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250

Acknowledgements

CVE ID Acknowledgements
CVE-2023-38184 Polar Bear


CVE-2023-38175 - Microsoft Windows Defender Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-38175
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Windows Defender Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker would only be able to delete targeted files on a system.


References Identification
Last version of the MpSigStub.exe affected by this vulnerability 1.1.23060.3000
First version of the MpSigStub.exe with this vulnerability addressed 1.1.23060.3001

1. Why is no action required to install this update?

In response to a constantly changing threat landscape, Microsoft frequently updates malware definitions and the Microsoft Malware Protection Engine. In order to be effective in helping protect against new and prevalent threats, antimalware software must be kept up to date with these updates in a timely manner.

For enterprise deployments as well as end users, the default configuration in Microsoft antimalware software helps ensure that malware definitions and the Microsoft Malware Protection Engine are kept up to date automatically. Product documentation also recommends that products are configured for automatic updating.

Best practices recommend that customers regularly verify whether software distribution, such as the automatic deployment of Microsoft Malware Protection Engine updates and malware definitions, is working as expected in their environment.

2, How often are the malware definitions updated?

Microsoft also typically updates the malware definitions three times daily and can increase the frequency when needed.

Depending on which Microsoft antimalware software is used and how it is configured, the software may search for engine and definition updates every day when connected to the Internet, up to multiple times daily. Customers can also choose to manually check for updates at any time.

3. What is the MpSigStub.exe?

MpSigStub.exe is a component that’s responsible for installing definition updates.

4. Does this update contain any additional security-related changes to functionality?

Yes. In addition to the changes that are listed for this vulnerability, this update includes defense-in-depth updates to help improve security-related features.

5. Where can I find more information about Microsoft antimalware technology?

For more information, visit the Microsoft Malware Protection Center website.

6. The definitions are not updating on my system. What do I do?

This security update is delivered only through definition updates. This cannot happen if Defender is in a disabled state (such as in the case of a third-party antivirus product providing real time protection). If Defender is disabled, you can delete the vulnerable file from the system: C:\WINDOWS\System32\MpSigStub.exe.

If Defender is re-enabled at a later time, MpSigStub.exe will be replaced only when updating signatures via Microsoft Update or WSUS. MpSigStub.exe will not be replaced via the standalone Mpam-fe.exe install or via UNC Path installs.

Suggested Actions

Verify that the update is installed

Customers should verify that the latest version of the Microsoft Malware Protection Engine and definition updates are being actively downloaded and installed for their Microsoft antimalware products.

For more information on how to verify the version number for the Microsoft Malware Protection Engine that your software is currently using, see the section, "Verifying Update Installation", in Microsoft Knowledge Base Article 2510781.

If necessary, install the update

Administrators of enterprise antimalware deployments should ensure that their update management software is configured to automatically approve and distribute engine updates and new malware definitions. Enterprise administrators should also verify that the latest version of the Microsoft Malware Protection Engine and definition updates are being actively downloaded, approved and deployed in their environment.

For end-users, the affected software provides built-in mechanisms for the automatic detection and deployment of this update. For these customers, the update will be applied within 48 hours of its availability. The exact time frame depends on the software used, Internet connection, and infrastructure configuration.

End users that do not wish to wait can manually update their antimalware software.

For more information on how to manually update the Microsoft Malware Protection Engine and malware definitions, refer to Microsoft Knowledge Base Article 2510781.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-38175
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Defender Antimalware Platform Release Notes (Security Update) Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.1.23060.3001 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-38175 Filip Dragović


CVE-2023-38172 - Microsoft Message Queuing Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-38172
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Message Queuing Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-38172
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5029259 (Security Update) Important Denial of Service 5028186 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 for x64-based Systems 5029259 (Security Update) Important Denial of Service 5028186 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20107 Yes None
Windows 10 Version 1607 for 32-bit Systems 5029242 (Security Update) Important Denial of Service 5028169 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1607 for x64-based Systems 5029242 (Security Update) Important Denial of Service 5028169 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows 10 Version 1809 for 32-bit Systems 5029247 (Security Update) Important Denial of Service 5028168
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for ARM64-based Systems 5029247 (Security Update) Important Denial of Service 5028168
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for x64-based Systems 5029247 (Security Update) Important Denial of Service 5028168
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 21H2 for 32-bit Systems 5029244 (Security Update) Important Denial of Service 5028166
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for ARM64-based Systems 5029244 (Security Update) Important Denial of Service 5028166
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for x64-based Systems 5029244 (Security Update) Important Denial of Service 5028166
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.3324
Yes 5029244
Windows 10 Version 22H2 for 32-bit Systems 5029244 (Security Update) Important Denial of Service
5028166
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for ARM64-based Systems 5029244 (Security Update) Important Denial of Service
5028166
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for x64-based Systems 5029244 (Security Update) Important Denial of Service
5028166
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.3324
Yes 5029244
Windows 11 version 21H2 for ARM64-based Systems 5029253 (Security Update) Important Denial of Service 5028182 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 version 21H2 for x64-based Systems 5029253 (Security Update) Important Denial of Service 5028182 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2295 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5029263 (Security Update) Important Denial of Service 5028185
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows 11 Version 22H2 for x64-based Systems 5029263 (Security Update) Important Denial of Service 5028185
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.2134
Yes 5029263
Windows Server 2008 for 32-bit Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Denial of Service 5028222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Denial of Service 5028222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Denial of Service 5028222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Denial of Service 5028222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Denial of Service 5028240
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Denial of Service 5028240
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2012 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Denial of Service 5028232
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 (Server Core installation) 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Denial of Service 5028232
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24414 Yes None
Windows Server 2012 R2 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Denial of Service 5028228
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2012 R2 (Server Core installation) 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Denial of Service 5028228
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21503 Yes None
Windows Server 2016 5029242 (Security Update) Important Denial of Service 5028169 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2016 (Server Core installation) 5029242 (Security Update) Important Denial of Service 5028169 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6167 Yes None
Windows Server 2019 5029247 (Security Update) Important Denial of Service 5028168
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2019 (Server Core installation) 5029247 (Security Update) Important Denial of Service 5028168
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2022 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Denial of Service 5028171
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250
Windows Server 2022 (Server Core installation) 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Denial of Service 5028171
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.1906
Yes
No
5029250

Acknowledgements

CVE ID Acknowledgements
CVE-2023-38172 Yuki Chen with Cyber KunLun


CVE-2023-38170 - HEVC Video Extensions Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-38170
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: HEVC Video Extensions Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


How can I check if the update is installed?

If your device manufacturer preinstalled this app, package versions 2.0.61931.0 and later contain this update.

If you purchased this app from the Microsoft Store, package versions 2.0.61933.0 and later contain this update.

You can check the package version in PowerShell:

Get-AppxPackage -Name Microsoft.HEVCVideoExtension*


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-38170
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
HEVC Video Extension VLSC (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2.0.61931.0 Maybe None
HEVC Video Extensions Description (Security Update) Important Remote Code Execution None Base: N/A
Temporal: N/A
Vector: N/A
2.0.61933.0 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-38170 Wenguang Jiao


CVE-2023-38169 - Microsoft OLE DB Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-38169
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft OLE DB Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelTemporary Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.


If I normally install GDR versions and have not installed the June Cumulative Update, am I affected by the vulnerability?

Yes, customers who have installed Microsoft SQL Server 2022 for x64-based Systems (GDR) or Microsoft SQL Server 2019 for x64-based Systems (GDR) are vulnerable. Microsoft recommends updating to the latest cumulative update to be protected from this vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published. This CVE was addressed by SQL related updates that were released in June 2023, but the CVE was inadvertently omitted from the June 2023 Security Updates. This is an informational change only. Customers who have already installed the June 2023 update do not need to take any further action.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-38169
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft ODBC Driver 17 for SQL Server on Linux Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
17.10.4.1 Maybe None
Microsoft ODBC Driver 17 for SQL Server on MacOS Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
17.10.4.1 Maybe None
Microsoft ODBC Driver 17 for SQL Server on Windows Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
17.10.4.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on Linux Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
18.2.1.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on MacOS Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
18.2.1.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on Windows Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
18.2.2.1 Maybe None
Microsoft OLE DB Driver 18 for SQL Server Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
18.6.0006.0 Maybe None
Microsoft OLE DB Driver 19 for SQL Server Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
19.3.0001.0 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 21) 5025808 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
15.0.4316.3 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 5) 5026806 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
16.0.4053.3 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-38169 bee13oy with Cyber Kunlun Lab


CVE-2023-38167 - Microsoft Dynamics Business Central Elevation Of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-38167
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Dynamics Business Central Elevation Of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, privileges required is high (PR:H). What privileges does an attacker require to exploit this vulnerability?

Successful exploitation of this vulnerability requires an attacker to already have admin or high privilege access to a security group within the tenant.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-38167
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Dynamics 365 Business Central 2023 Release Wave 1 5029765 (Security Update) Important Elevation of Privilege None Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Application Build 22.4.59134, Platform Build 22.0. Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-38167 Darrick Joo


CVE-2023-38157 - Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-38157
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

This vulnerability requires a user to open a Web Archive file with spoofed origin of the web content in the affected version of Microsoft Edge (Chromium-based).


According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H) but have no effect on integrity (I:N) or on availability (A:N). What does that mean for this vulnerability?

An attacker who successfully exploited the vulnerability could view sensitive information (Confidentiality). While the attacker can not make changes to disclosed information (Integrity) and limit access to the resource (Availability).


What kind of security feature could be bypassed by successfully exploiting this vulnerability?

Attacker who succesfully exploit this vulnerability could cause the Edge browser to share addditional stored cookie when using the share feature.


What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
115.0.1901.200 8/07/2023 115.0.5790.170/.171

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-23    

Information published.


Moderate Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-38157
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Moderate Security Feature Bypass None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
115.0.1901.200 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-38157 Anonymous


CVE-2023-21709 - Microsoft Exchange Server Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-21709
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Exchange Server Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

The attacker would be able to login as another user successfully.


How could an attacker exploit this vulnerability?

In a network-based attack, an attacker could brute force user account passwords to log in as that user. Microsoft encourages the use of strong passwords that are more difficult for an attacker to brute force.


Why is the severity for this CVE rated as Important, but the CVSS score is 9.8?

The Microsoft proprietary severity rating does not align with the CVSS scoring system. In this case, the severity rating of Important (rather than Critical) reflects the fact that brute-force attacks are unlikely to succeed against users with strong passwords. The CVSS scoring system doesn't allow for this type of nuance.


Are there additional steps needed to protect against this vulnerability?

Yes, in addition to installing the updates a script must be run. Alternatively you can accomplish the same by running commands from the command line in a PowerShell window or some other terminal.

Follow the following steps:

  1. (Strongly recommended) Install Exchange Server 2016 or 2019 August SU (or later)
  2. Do one of the following:
  • Apply the solution for the CVE automatically on your servers, run the CVE-2023-21709.ps1 script. You can find the script and the documentation here: https://aka.ms/CVE-2023-21709ScriptDoc.

or

  • Apply the solution for the CVE manually on each server, by running the following command from an elevated PowerShell window:

Clear-WebConfiguration -Filter "/system.webServer/globalModules/add[@name='TokenCacheModule']" -PSPath "IIS:\"

  1. To roll-back the solution for the CVE manually on each server, run the following:

New-WebGlobalModule -Name "TokenCacheModule" -Image "%windir%\System32\inetsrv\cachtokn.dll"

Although Microsoft recommends installing the security updates as soon as possible, running the script or the commands on a supported version of Exchange Server prior to installing the updates will address this vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-21709
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Exchange Server 2016 Cumulative Update 23 5029388 (Security Update) Important Elevation of Privilege
5029388
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

15.01.2507.031
Yes 5029388
Microsoft Exchange Server 2019 Cumulative Update 12 5029388 (Security Update) Important Elevation of Privilege 5026261
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.02.1118.036
Yes 5029388
Microsoft Exchange Server 2019 Cumulative Update 13 5029388 (Security Update) Important Elevation of Privilege
5026261
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

15.02.1258.023
Yes 5029388

Acknowledgements

CVE ID Acknowledgements
CVE-2023-21709 None

CVE-2023-35371 - Microsoft Office Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35371
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

Are the updates for the Microsoft Office for Mac currently available?

The security update for Microsoft Office 2019 for Mac and Microsoft Office LTSC for Mac 2021 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability?

An attacker who successfully exploits this vulnerability could perform a remote attack that could enable access to the victim's information and the ability to alter information. Successful exploitation could also potentially cause downtime for the targeted environment.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35371
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for Mac Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC for Mac 2021 Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Microsoft Office Online Server 5002435 (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10401.20022 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35371 Rocco Calvi (@TecR0c) with TecSecurity


CVE-2023-35372 - Microsoft Office Visio Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35372
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Visio Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability?

An attacker who successfully exploits this vulnerability could perform a remote attack that could enable access to the victim's information and the ability to alter information. Successful exploitation could also potentially cause downtime for the targeted environment.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35372
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35372 Kim Dong-Uk (@justlikebono)


CVE-2023-36877 - Azure Apache Oozie Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36877
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Apache Oozie Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:4.5/TemporalScore:3.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker would have to send the victim a malicious file that the victim would have to execute.


**According to the CVSS metric, user interaction is required (UI:R) and privileges required is high (PR:H). What does that mean for this vulnerability?

An authorized attacker with administrator privileges must send a victim a malicious site and convince them to open it.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36877
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure HDInsights Release Notes (Security Update) Important Spoofing None Base: 4.5
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
2307201242 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36877 Lidor B. with Orca Security


CVE-2023-36881 - Azure Apache Ambari Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36881
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Apache Ambari Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:4.5/TemporalScore:3.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker would have to send the victim a malicious file that the victim would have to execute.


**According to the CVSS metric, user interaction is required (UI:R) and privileges required is high (PR:H). What does that mean for this vulnerability?

An authorized attacker with administrator privileges must send a victim a malicious site and convince them to open it.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36881
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure HDInsights Release Notes (Security Update) Important Spoofing None Base: 4.5
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
2307201242 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36881 Lidor B. with Orca Security


CVE-2023-36890 - Microsoft SharePoint Server Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36890
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft SharePoint Server Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software?

Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order.


What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is sensitive information.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

The attacker must be authenticated to the target site as at least a Site Member and have edit permissions for the site.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36890
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft SharePoint Server 2019 5002436 (Security Update)
5002422 (Security Update)
Important Information Disclosure 5002423

5002403
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
16.0.10401.20025
Maybe 5002436
5002422
Microsoft SharePoint Server Subscription Edition 5002437 (Security Update) Important Information Disclosure Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
16.0.16130.20684
Maybe 5002437

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36890 Christoffer von Sabsay


CVE-2023-36891 - Microsoft SharePoint Server Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36891
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft SharePoint Server Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software?

Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

The attacker must be authenticated and possess the permissions for page creation to be able to exploit this vulnerability.


According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability?

An attacker who successfully exploits this vulnerability could perform a remote attack that could enable access to the victim's information and the ability to alter information. Successful exploitation could also potentially cause downtime for the targeted environment.


How could an attacker exploit the vulnerability?

An attacker who successfully exploited this vulnerability might be able to run their scripts in the security context of the current user by enticing the user to click on a link resulting in a cross-site scripting attack on the SharePoint Server.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36891
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft SharePoint Server 2019 5002436 (Security Update)
5002422 (Security Update)
Important Spoofing 5002423

5002403
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10401.20025
Maybe 5002436
5002422
Microsoft SharePoint Server Subscription Edition 5002437 (Security Update) Important Spoofing Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.16130.20684
Maybe 5002437

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36891 Christoffer81


CVE-2023-36892 - Microsoft SharePoint Server Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36892
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft SharePoint Server Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software?

Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

The attacker must be authenticated and possess the permissions for page creation to be able to exploit this vulnerability.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click on a specially crafted URL to be compromised by the attacker.


According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability?

An attacker who successfully exploits this vulnerability could perform a remote attack that could enable access to the victim's information and the ability to alter information. Successful exploitation could also potentially cause downtime for the targeted environment.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36892
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft SharePoint Server 2019 5002436 (Security Update)
5002422 (Security Update)
Important Spoofing 5002423

5002403
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10401.20025
Maybe 5002436
5002422
Microsoft SharePoint Server Subscription Edition 5002437 (Security Update) Important Spoofing Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.16130.20684
Maybe 5002437

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36892 Felix Boulet


CVE-2023-36893 - Microsoft Outlook Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36893
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Outlook Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


What type of information could be disclosed by this vulnerability?

Exploiting this vulnerability could allow the disclosure of NetNTLMv2 hashes.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

This vulnerability requires that a user with an affected version of Outlook open a malicious meeting or appointment invite from the attacker.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36893
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Spoofing None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Spoofing None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Spoofing None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Spoofing None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Spoofing None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Spoofing None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Outlook 2013 RT Service Pack 1 5002449 (Security Update) Important Spoofing None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
15.0.5579.1000 Maybe None
Microsoft Outlook 2013 Service Pack 1 (32-bit editions) 5002449 (Security Update) Important Spoofing None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
15.0.5579.1000 Maybe None
Microsoft Outlook 2013 Service Pack 1 (64-bit editions) 5002449 (Security Update) Important Spoofing None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
15.0.5579.1000 Maybe None
Microsoft Outlook 2016 (32-bit edition) 5002459 (Security Update) Important Spoofing None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
16.0.5408.1000 Maybe None
Microsoft Outlook 2016 (64-bit edition) 5002459 (Security Update) Important Spoofing None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
16.0.5408.1000 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36893 Richard Clifford with RootshellSecurity


CVE-2023-36894 - Microsoft SharePoint Server Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36894
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft SharePoint Server Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software?

Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

The attacker must be authenticated to the target site, with the permission to use Manage Lists within SharePoint.


What type of information could be disclosed by this vulnerability?

An attacker that successfully exploited this vulnerability could leak private property values.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36894
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft SharePoint Enterprise Server 2016 5002453 (Security Update)
5002398 (Security Update)
Important Information Disclosure Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
16.0.5408.1000
Maybe 5002453
5002398
Microsoft SharePoint Server 2019 5002436 (Security Update)
5002422 (Security Update)
Important Information Disclosure 5002423

5002403
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
16.0.10401.20025
Maybe 5002436
5002422
Microsoft SharePoint Server Subscription Edition 5002437 (Security Update) Important Information Disclosure Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
16.0.16130.20684
Maybe 5002437

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36894 STAR Labs SG Pte. Ltd.


CVE-2023-36895 - Microsoft Outlook Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36895
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Outlook Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

Are the updates for the Microsoft Office for Mac currently available?

The security update for Microsoft Office 2019 for Mac and Microsoft Office LTSC for Mac 2021 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36895
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Critical Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Critical Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2013 RT Service Pack 1 5002445 (Security Update) Critical Remote Code Execution 5002316 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.5579.1001 Maybe None
Microsoft Office 2013 Service Pack 1 (32-bit editions) 5002445 (Security Update) Critical Remote Code Execution 5002316 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.5579.1001 Maybe None
Microsoft Office 2013 Service Pack 1 (64-bit editions) 5002445 (Security Update) Critical Remote Code Execution 5002316 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.5579.1001 Maybe None
Microsoft Office 2016 (32-bit edition) 5002464 (Security Update) Critical Remote Code Execution 5002323 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5408.1002 Maybe None
Microsoft Office 2016 (64-bit edition) 5002464 (Security Update) Critical Remote Code Execution 5002323 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5408.1002 Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for Mac Critical Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC for Mac 2021 Critical Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36895 Dan Cabrera with Cross the Divide


CVE-2023-36896 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36896
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

Are the updates for the Microsoft Office for Mac currently available?

The security update for Microsoft Office 2019 for Mac and Microsoft Office LTSC for Mac 2021 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36896
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Excel 2013 RT Service Pack 1 5002451 (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.5579.1001 Maybe None
Microsoft Excel 2013 Service Pack 1 (32-bit editions) 5002451 (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.5579.1001 Maybe None
Microsoft Excel 2013 Service Pack 1 (64-bit editions) 5002451 (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.5579.1001 Maybe None
Microsoft Excel 2016 (32-bit edition) 5002463 (Security Update) Important Remote Code Execution 5002351 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5408.1002 Maybe None
Microsoft Excel 2016 (64-bit edition) 5002463 (Security Update) Important Remote Code Execution 5002351 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5408.1002 Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for Mac Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC for Mac 2021 Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Microsoft Office Online Server 5002435 (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10401.20022 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36896 Office Security Team and Excel Engineering Team


CVE-2023-36897 - Visual Studio Tools for Office Runtime Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-36897
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Visual Studio Tools for Office Runtime Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click on install to be compromised by the attacker.


How could an attacker exploit this vulnerability?

An unauthenticated attacker could bypass validation as a trusted source through a crafted certificate that could mislead a user to believing the file they are installing is legitimate.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-36897
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Spoofing None Base: 8.1
Temporal: 7.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Spoofing None Base: 8.1
Temporal: 7.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Spoofing None Base: 8.1
Temporal: 7.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Spoofing None Base: 8.1
Temporal: 7.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Spoofing None Base: 8.1
Temporal: 7.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Spoofing None Base: 8.1
Temporal: 7.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) Release Notes (Security Update) Important Spoofing None Base: 8.1
Temporal: 7.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
15.9.56 Maybe None
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Release Notes (Security Update) Important Spoofing None Base: 8.1
Temporal: 7.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
16.11.29 Maybe None
Microsoft Visual Studio 2022 version 17.2 Release Notes (Security Update) Important Spoofing None Base: 8.1
Temporal: 7.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
17.2.18 Maybe None
Microsoft Visual Studio 2022 version 17.4 Release Notes (Security Update) Important Spoofing None Base: 8.1
Temporal: 7.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
17.4.10 Maybe None
Microsoft Visual Studio 2022 version 17.6 Release Notes (Security Update) Important Spoofing None Base: 8.1
Temporal: 7.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
17.6.6 Maybe None
Visual Studio 2010 Tools for Office Runtime 5029497 (Security Update) Important Spoofing None Base: 8.1
Temporal: 7.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
10.0.60910 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-36897 Bill Demirkapi with Microsoft


CVE-2023-35388 - Microsoft Exchange Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35388
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Exchange Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Base score metrics
Attack VectorAdjacent
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An authenticated attacker who is on the same intranet as the Exchange server can achieve remote code execution via a PowerShell remoting session.


According to the CVSS metric, privileges required is low (PR:L). Does the attacker need to be in an authenticated role on the Exchange Server?

Yes, the attacker must be authenticated with LAN-access and have credentials for a valid Exchange user.


According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?

An authenticated attacker could exploit this vulnerability with LAN access.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

An authenticated attacker could gain remote code execution rights on the server mailbox backend as NT AUTHORITY\SYSTEM.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35388
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Exchange Server 2016 Cumulative Update 23 5029388 (Security Update) Important Remote Code Execution
5029388
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

15.01.2507.031
Yes 5029388
Microsoft Exchange Server 2019 Cumulative Update 12 5029388 (Security Update) Important Remote Code Execution
5026261
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

15.02.1118.036
Yes 5029388
Microsoft Exchange Server 2019 Cumulative Update 13 5029388 (Security Update) Important Remote Code Execution 5026261
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.02.1258.023
Yes 5029388

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35388 m4yfly with TianGong Team of Legendsec at Qi'anxin Group


CVE-2023-20569 - AMD: CVE-2023-20569 Return Address Predictor

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-20569
MITRE
NVD

Issuing CNA: Advanced Micro Devices Inc.

CVE Title: AMD: CVE-2023-20569 Return Address Predictor
CVSS:
None
Executive Summary:
None
FAQ:

Why is this AMD CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in certain processor models offered by AMD. The mitigation for this vulnerability requires a Windows update. This CVE is being documented in the Security Update Guide to announce that the latest builds of Windows enable the mitigation and provide protection against the vulnerability.

Please see the following for more information:


Are any additional steps required to protect my system after installing the August Windows updates?

Customers who allow untrusted users to execute arbitrary code might wish to implement some extra security features within their systems. These features protect against the intra-process disclosure vectors that this speculative execution vulnerability describes. See the following for more information.

Microsoft Azure has taken steps to address the security vulnerabilities at the hypervisor level to protect VMs running in Azure. More information can be found here.

Can I expect any performance impact after I configure the registry keys?

In some cases, installing these updates will have a performance impact. In testing Microsoft has seen some performance impact with these mitigations, in particular when hyperthreading is disabled. Microsoft values the security of its software and services and has made the decision to implement certain mitigation strategies in an effort to better secure our products. In some cases, mitigations are not enabled by default to allow users and administrators to evaluate the performance impact and risk exposure before deciding to enable the mitigations. We continue to work with hardware vendors to improve performance while maintaining a high level of security.

Are Microsoft Azure assets protected?

Microsoft is in the process of deploying mitigations across our cloud services and we expect this work to be complete soon. More information is available here.

How do I know if I am affected?

Please refer to AMD advisory AMD-SB-7005 to determine which AMD CPUs are affected.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-20569
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5029259 (Security Update) Important Information Disclosure 5028186 Base: N/A
Temporal: N/A
Vector: N/A
10.0.10240.20107 Yes None
Windows 10 for x64-based Systems 5029259 (Security Update) Important Information Disclosure 5028186 Base: N/A
Temporal: N/A
Vector: N/A
10.0.10240.20107 Yes None
Windows 10 Version 1607 for 32-bit Systems 5029242 (Security Update) Important Information Disclosure 5028169 Base: N/A
Temporal: N/A
Vector: N/A
10.0.14393.6167 Yes None
Windows 10 Version 1607 for x64-based Systems 5029242 (Security Update) Important Information Disclosure 5028169 Base: N/A
Temporal: N/A
Vector: N/A
10.0.14393.6167 Yes None
Windows 10 Version 1809 for 32-bit Systems 5029247 (Security Update) Important Information Disclosure 5028168
Base: N/A
Temporal: N/A
Vector: N/A
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for ARM64-based Systems 5029247 (Security Update) Important Information Disclosure 5028168
Base: N/A
Temporal: N/A
Vector: N/A
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for x64-based Systems 5029247 (Security Update) Important Information Disclosure 5028168
Base: N/A
Temporal: N/A
Vector: N/A
10.0.17763.4737
Yes 5029247
Windows 10 Version 21H2 for 32-bit Systems 5029244 (Security Update) Important Information Disclosure 5028166
Base: N/A
Temporal: N/A
Vector: N/A
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for ARM64-based Systems 5029244 (Security Update) Important Information Disclosure 5028166
Base: N/A
Temporal: N/A
Vector: N/A
10.0.19044.3324
Yes 5029244
Windows 10 Version 21H2 for x64-based Systems 5029244 (Security Update) Important Information Disclosure 5028166
Base: N/A
Temporal: N/A
Vector: N/A
10.0.19044.3324
Yes 5029244
Windows 10 Version 22H2 for 32-bit Systems 5029244 (Security Update) Important Information Disclosure
5028166
Base: N/A
Temporal: N/A
Vector: N/A

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for ARM64-based Systems 5029244 (Security Update) Important Information Disclosure
5028166
Base: N/A
Temporal: N/A
Vector: N/A

10.0.19045.3324
Yes 5029244
Windows 10 Version 22H2 for x64-based Systems 5029244 (Security Update) Important Information Disclosure
5028166
Base: N/A
Temporal: N/A
Vector: N/A

10.0.19045.3324
Yes 5029244
Windows 11 version 21H2 for ARM64-based Systems 5029253 (Security Update) Important Information Disclosure 5028182 Base: N/A
Temporal: N/A
Vector: N/A
10.0.22000.2295 Yes None
Windows 11 version 21H2 for x64-based Systems 5029253 (Security Update) Important Information Disclosure 5028182 Base: N/A
Temporal: N/A
Vector: N/A
10.0.22000.2295 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5029263 (Security Update) Important Information Disclosure 5028185
Base: N/A
Temporal: N/A
Vector: N/A
10.0.22621.2134
Yes 5029263
Windows 11 Version 22H2 for x64-based Systems 5029263 (Security Update) Important Information Disclosure 5028185
Base: N/A
Temporal: N/A
Vector: N/A
10.0.22621.2134
Yes 5029263
Windows Server 2008 for 32-bit Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Information Disclosure 5028222
Base: N/A
Temporal: N/A
Vector: N/A
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Information Disclosure 5028222
Base: N/A
Temporal: N/A
Vector: N/A
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Information Disclosure 5028222
Base: N/A
Temporal: N/A
Vector: N/A
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5029318 (Monthly Rollup)
5029301 (Security Only)
Important Information Disclosure 5028222
Base: N/A
Temporal: N/A
Vector: N/A
6.0.6003.22216
Yes 5029318
5029301
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Information Disclosure 5028240
Base: N/A
Temporal: N/A
Vector: N/A
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5029296 (Monthly Rollup)
5029307 (Security Only)
Important Information Disclosure 5028240
Base: N/A
Temporal: N/A
Vector: N/A
6.1.7601.26664
Yes 5029296
5029307
Windows Server 2012 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Information Disclosure 5028232
Base: N/A
Temporal: N/A
Vector: N/A
6.2.9200.24414 Yes None
Windows Server 2012 (Server Core installation) 5029295 (Monthly Rollup)
5029308 (Security Only)
Important Information Disclosure 5028232
Base: N/A
Temporal: N/A
Vector: N/A
6.2.9200.24414 Yes None
Windows Server 2012 R2 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Information Disclosure 5028228
Base: N/A
Temporal: N/A
Vector: N/A
6.3.9600.21503 Yes None
Windows Server 2012 R2 (Server Core installation) 5029312 (Monthly Rollup)
5029304 (Security Only)
Important Information Disclosure 5028228
Base: N/A
Temporal: N/A
Vector: N/A
6.3.9600.21503 Yes None
Windows Server 2016 5029242 (Security Update) Important Information Disclosure 5028169 Base: N/A
Temporal: N/A
Vector: N/A
10.0.14393.6167 Yes None
Windows Server 2016 (Server Core installation) 5029242 (Security Update) Important Information Disclosure 5028169 Base: N/A
Temporal: N/A
Vector: N/A
10.0.14393.6167 Yes None
Windows Server 2019 5029247 (Security Update) Important Information Disclosure 5028168
Base: N/A
Temporal: N/A
Vector: N/A
10.0.17763.4737
Yes 5029247
Windows Server 2019 (Server Core installation) 5029247 (Security Update) Important Information Disclosure 5028168
Base: N/A
Temporal: N/A
Vector: N/A
10.0.17763.4737
Yes 5029247
Windows Server 2022 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Information Disclosure 5028171
Base: N/A
Temporal: N/A
Vector: N/A
10.0.20348.1906
Yes
No
5029250
Windows Server 2022 (Server Core installation) 5029250 (Security Update)
5029367 (Security Hotpatch Update)
Important Information Disclosure 5028171
Base: N/A
Temporal: N/A
Vector: N/A
10.0.20348.1906
Yes
No
5029250

Acknowledgements

CVE ID Acknowledgements
CVE-2023-20569

CVE-2023-35390 - .NET and Visual Studio Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35390
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: .NET and Visual Studio Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.0
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.

Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


How could an attacker exploit this vulnerability?

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.

Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35390
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
.NET 6.0 5029688 (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
6.0.21 Maybe None
.NET 7.0 5029689 (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
7.0.10 Maybe None
Microsoft Visual Studio 2022 version 17.2 Release Notes (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
17.2.18 Maybe None
Microsoft Visual Studio 2022 version 17.4 Release Notes (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
17.4.10 Maybe None
Microsoft Visual Studio 2022 version 17.6 Release Notes (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
17.6.6 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35390 ycdxsb with VARAS@IIE


CVE-2023-35391 - ASP.NET Core SignalR and Visual Studio Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35391
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: ASP.NET Core SignalR and Visual Studio Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

This vulnerability makes it possible to listen to any group or user with a specially crafted group/username. By exploiting this vulnerability, the attacker can now receive messages for group(s) that they are unauthorized to view.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35391
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
.NET 6.0 5029688 (Security Update) Important Information Disclosure None Base: 7.1
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
6.0.21 Maybe None
.NET 7.0 5029689 (Security Update) Important Information Disclosure None Base: 7.1
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
7.0.10 Maybe None
ASP.NET Core 2.1 Release Notes (Security Update) Important Information Disclosure None Base: 7.1
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
2.1.40 Maybe None
Microsoft Visual Studio 2022 version 17.2 Release Notes (Security Update) Important Information Disclosure None Base: 7.1
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
17.2.18 Maybe None
Microsoft Visual Studio 2022 version 17.4 Release Notes (Security Update) Important Information Disclosure None Base: 7.1
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
17.4.10 Maybe None
Microsoft Visual Studio 2022 version 17.6 Release Notes (Security Update) Important Information Disclosure None Base: 7.1
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
17.6.6 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35391 Brennan Conroy


CVE-2023-38182 - Microsoft Exchange Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-38182
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Exchange Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Base score metrics
Attack VectorAdjacent
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An authenticated attacker who is on the same intranet as the Exchange server can achieve remote code execution via a PowerShell remoting session.


According to the CVSS metric, privileges required is low (PR:L). Does the attacker need to be in an authenticated role on the Exchange Server?

Yes, the attacker must be authenticated with LAN-access and have credentials for a valid Exchange user.


According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?

An authenticated attacker could exploit this vulnerability with LAN access.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-38182
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Exchange Server 2016 Cumulative Update 23 5029388 (Security Update) Important Remote Code Execution
5029388
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

15.01.2507.031
Yes 5029388
Microsoft Exchange Server 2019 Cumulative Update 12 5029388 (Security Update) Important Remote Code Execution
5026261
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

15.02.1118.036
Yes 5029388
Microsoft Exchange Server 2019 Cumulative Update 13 5029388 (Security Update) Important Remote Code Execution 5026261
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.02.1258.023
Yes 5029388

Acknowledgements

CVE ID Acknowledgements
CVE-2023-38182 Anonymous


CVE-2023-38181 - Microsoft Exchange Server Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-38181
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Exchange Server Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H), integrity (I:H) and availability (A:H). What does that mean for this vulnerability?

An attacker who successfully exploited this vulnerability could access a user's Net-NTLMv2 hash which could be used as a basis of an NTLM Relay attack against another service to authenticate as the user.


How could an attacker exploit this vulnerability?

An authenticated attacker could achieve exploitation given a PowerShell remoting session to the server.


According to the CVSS metric, the attack vector is network (AV:N) and the attack complexity is low (AC:L). What does that mean for this vulnerability?

The attack vector is set to Network because this vulnerability is remotely exploitable and can be exploited from the internet.

The attack complexity is set to Low because an attacker does not require significant prior knowledge of the cluster/system and can achieve repeatable success when attempting to exploit this vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-38181
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Exchange Server 2016 Cumulative Update 23 5029388 (Security Update) Important Spoofing
5029388
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

15.01.2507.031
Yes 5029388
Microsoft Exchange Server 2019 Cumulative Update 12 5029388 (Security Update) Important Spoofing 5026261
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.02.1118.036
Yes 5029388
Microsoft Exchange Server 2019 Cumulative Update 13 5029388 (Security Update) Important Spoofing
5026261
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

15.02.1258.023
Yes 5029388

Acknowledgements

CVE ID Acknowledgements
CVE-2023-38181 Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative


Andrew Ruddick with Microsoft Security Response Center


CVE-2023-38180 - .NET and Visual Studio Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-38180
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: .NET and Visual Studio Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No Yes

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-38180
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
.NET 6.0 5029688 (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
6.0.21 Maybe None
.NET 7.0 5029689 (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
7.0.10 Maybe None
ASP.NET Core 2.1 Release Notes (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
2.1.40 Maybe None
Microsoft Visual Studio 2022 version 17.2 Release Notes (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
17.2.18 Maybe None
Microsoft Visual Studio 2022 version 17.4 Release Notes (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
17.4.10 Maybe None
Microsoft Visual Studio 2022 version 17.6 Release Notes (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
17.6.6 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-38180 None

CVE-2023-38178 - .NET Core and Visual Studio Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-38178
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: .NET Core and Visual Studio Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-38178
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
.NET 6.0 5029688 (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.21 Maybe None
Microsoft Visual Studio 2022 version 17.2 Release Notes (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
17.2.18 Maybe None
Microsoft Visual Studio 2022 version 17.4 Release Notes (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
17.4.10 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-38178 Benoit Foucher


CVE-2023-38176 - Azure Arc-Enabled Servers Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-38176
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Arc-Enabled Servers Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain administrator privileges.


What can an attacker do with this vulnerability?

An elevation of privilege vulnerability exists in the Azure Connected Machine Agent used with the Azure Arc-Enabled Servers service. This impacts both Linux and Windows servers. A low privilege user on the machine where the agent is installed can chain two vulnerabilities in HIMDS to get root/admin access on the server.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to exploit two separate vulnerabilities to gain elevated privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-38176
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Arc-Enabled Servers Release Notes (Security Update) Important Elevation of Privilege None Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.33.02399.0 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-38176 Guy Arazi with Microsoft


Vladimir Abramzon with Microsoft


CVE-2023-38154 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-38154
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-38154
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for ARM64-based Systems 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows 10 Version 1809 for x64-based Systems 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2019 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247
Windows Server 2019 (Server Core installation) 5029247 (Security Update) Important Elevation of Privilege 5028168
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.4737
Yes 5029247

Acknowledgements

CVE ID Acknowledgements
CVE-2023-38154 Mateusz Jurczyk of Google Project Zero


ADV230004 - Memory Integrity System Readiness Scan Tool Defense in Depth Update

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
ADV230004
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Memory Integrity System Readiness Scan Tool Defense in Depth Update
CVSS:
None
Executive Summary:

The Memory Integrity System Readiness Scan Tool (hvciscan_amd64.exe and hvciscan_arm64.exe) is used to check for compatibility issues with memory integrity, also known as hypervisor-protected code integrity (HVCI). The original version was published without a RSRC section, which contains resource information for a module. The new version addresses this issue. Please see Driver compatibility with memory integrity and VBS for more information.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


Moderate Defense in Depth

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely Yes No

Affected Software

The following tables list the affected software details for the vulnerability.

ADV230004
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Memory Integrity System Readiness Scan Tool Release Notes (Update) Moderate Defense in Depth None Base: N/A
Temporal: N/A
Vector: N/A
10.0.25884.1000 No None

Acknowledgements

CVE ID Acknowledgements
ADV230004 None

CVE-2023-35945 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35945
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    01-Aug-23    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35945
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM nghttp2 (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.46.0-3 Unknown None
CBL Mariner 2.0 x64 nghttp2 (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.46.0-3 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35945 None