This report contains detail for the following vulnerabilities:
CVE Issued by | Tag | CVE ID | CVE Title |
---|---|---|---|
Microsoft | .NET and Visual Studio | CVE-2023-36794 | Visual Studio Remote Code Execution Vulnerability |
Microsoft | .NET and Visual Studio | CVE-2023-36796 | Visual Studio Remote Code Execution Vulnerability |
Microsoft | .NET and Visual Studio | CVE-2023-36792 | Visual Studio Remote Code Execution Vulnerability |
Microsoft | .NET and Visual Studio | CVE-2023-36793 | Visual Studio Remote Code Execution Vulnerability |
Microsoft | .NET Core & Visual Studio | CVE-2023-36799 | .NET Core and Visual Studio Denial of Service Vulnerability |
Microsoft | .NET Framework | CVE-2023-36788 | .NET Framework Remote Code Execution Vulnerability |
Microsoft | 3D Builder | CVE-2023-36772 | 3D Builder Remote Code Execution Vulnerability |
Microsoft | 3D Builder | CVE-2023-36771 | 3D Builder Remote Code Execution Vulnerability |
Microsoft | 3D Builder | CVE-2023-36770 | 3D Builder Remote Code Execution Vulnerability |
Microsoft | 3D Builder | CVE-2023-36773 | 3D Builder Remote Code Execution Vulnerability |
Autodesk | 3D Viewer | CVE-2022-41303 | AutoDesk: CVE-2022-41303 use-after-free vulnerability in Autodesk® FBX® SDK 2020 or prior |
Microsoft | 3D Viewer | CVE-2023-36760 | 3D Viewer Remote Code Execution Vulnerability |
Microsoft | 3D Viewer | CVE-2023-36740 | 3D Viewer Remote Code Execution Vulnerability |
Microsoft | 3D Viewer | CVE-2023-36739 | 3D Viewer Remote Code Execution Vulnerability |
Microsoft | Azure DevOps | CVE-2023-33136 | Azure DevOps Server Remote Code Execution Vulnerability |
Microsoft | Azure DevOps | CVE-2023-38155 | Azure DevOps Server Remote Code Execution Vulnerability |
Microsoft | Azure HDInsights | CVE-2023-38156 | Azure HDInsight Apache Ambari Elevation of Privilege Vulnerability |
Microsoft | Microsoft Azure Kubernetes Service | CVE-2023-29332 | Microsoft Azure Kubernetes Service Elevation of Privilege Vulnerability |
Microsoft | Microsoft Dynamics | CVE-2023-38164 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability |
Microsoft | Microsoft Dynamics | CVE-2023-36886 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability |
Microsoft | Microsoft Dynamics Finance & Operations | CVE-2023-36800 | Dynamics Finance and Operations Cross-site Scripting Vulnerability |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-4863 | Chromium: CVE-2023-4863 Heap buffer overflow in WebP |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-4763 | Chromium: CVE-2023-4763 Use after free in Networks |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-4761 | Chromium: CVE-2023-4761 Out of bounds memory access in FedCM |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-4764 | Chromium: CVE-2023-4764 Incorrect security UI in BFCache |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-4762 | Chromium: CVE-2023-4762 Type Confusion in V8 |
Microsoft | Microsoft Exchange Server | CVE-2023-36744 | Microsoft Exchange Server Remote Code Execution Vulnerability |
Microsoft | Microsoft Exchange Server | CVE-2023-36756 | Microsoft Exchange Server Remote Code Execution Vulnerability |
Microsoft | Microsoft Exchange Server | CVE-2023-36745 | Microsoft Exchange Server Remote Code Execution Vulnerability |
Microsoft | Microsoft Exchange Server | CVE-2023-36777 | Microsoft Exchange Server Information Disclosure Vulnerability |
Microsoft | Microsoft Exchange Server | CVE-2023-36757 | Microsoft Exchange Server Spoofing Vulnerability |
Microsoft | Microsoft Identity Linux Broker | CVE-2023-36736 | Microsoft Identity Linux Broker Remote Code Execution Vulnerability |
Microsoft | Microsoft Office | CVE-2023-36767 | Microsoft Office Security Feature Bypass Vulnerability |
Microsoft | Microsoft Office | CVE-2023-36765 | Microsoft Office Elevation of Privilege Vulnerability |
Microsoft | Microsoft Office | CVE-2023-41764 | Microsoft Office Spoofing Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2023-36766 | Microsoft Excel Information Disclosure Vulnerability |
Microsoft | Microsoft Office Outlook | CVE-2023-36763 | Microsoft Outlook Information Disclosure Vulnerability |
Microsoft | Microsoft Office SharePoint | CVE-2023-36764 | Microsoft SharePoint Server Elevation of Privilege Vulnerability |
Microsoft | Microsoft Office Word | CVE-2023-36761 | Microsoft Word Information Disclosure Vulnerability |
Microsoft | Microsoft Office Word | CVE-2023-36762 | Microsoft Word Remote Code Execution Vulnerability |
Microsoft | Microsoft Streaming Service | CVE-2023-36802 | Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability |
Microsoft | Microsoft Windows Codecs Library | CVE-2023-38147 | Windows Miracast Wireless Display Remote Code Execution Vulnerability |
Microsoft | Visual Studio | CVE-2023-36758 | Visual Studio Elevation of Privilege Vulnerability |
Microsoft | Visual Studio | CVE-2023-36759 | Visual Studio Elevation of Privilege Vulnerability |
Microsoft | Visual Studio Code | CVE-2023-36742 | Visual Studio Code Remote Code Execution Vulnerability |
Electron | Visual Studio Code | CVE-2023-39956 | Electron: CVE-2023-39956 -Visual Studio Code Remote Code Execution Vulnerability |
Microsoft | Windows Cloud Files Mini Filter Driver | CVE-2023-35355 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability |
Microsoft | Windows Common Log File System Driver | CVE-2023-38143 | Windows Common Log File System Driver Elevation of Privilege Vulnerability |
Microsoft | Windows Common Log File System Driver | CVE-2023-38144 | Windows Common Log File System Driver Elevation of Privilege Vulnerability |
Microsoft | Windows Defender | CVE-2023-38163 | Windows Defender Attack Surface Reduction Security Feature Bypass |
Microsoft | Windows DHCP Server | CVE-2023-38152 | DHCP Server Service Information Disclosure Vulnerability |
Microsoft | Windows DHCP Server | CVE-2023-38162 | DHCP Server Service Denial of Service Vulnerability |
Microsoft | Windows DHCP Server | CVE-2023-36801 | DHCP Server Service Information Disclosure Vulnerability |
Microsoft | Windows GDI | CVE-2023-36804 | Windows GDI Elevation of Privilege Vulnerability |
Microsoft | Windows GDI | CVE-2023-38161 | Windows GDI Elevation of Privilege Vulnerability |
Microsoft | Windows Internet Connection Sharing (ICS) | CVE-2023-38148 | Internet Connection Sharing (ICS) Remote Code Execution Vulnerability |
Microsoft | Windows Kernel | CVE-2023-38141 | Windows Kernel Elevation of Privilege Vulnerability |
Microsoft | Windows Kernel | CVE-2023-38142 | Windows Kernel Elevation of Privilege Vulnerability |
Microsoft | Windows Kernel | CVE-2023-38139 | Windows Kernel Elevation of Privilege Vulnerability |
Microsoft | Windows Kernel | CVE-2023-38140 | Windows Kernel Information Disclosure Vulnerability |
Microsoft | Windows Kernel | CVE-2023-38150 | Windows Kernel Elevation of Privilege Vulnerability |
Microsoft | Windows Kernel | CVE-2023-36803 | Windows Kernel Information Disclosure Vulnerability |
Microsoft | Windows Scripting | CVE-2023-36805 | Windows MSHTML Platform Security Feature Bypass Vulnerability |
Microsoft | Windows TCP/IP | CVE-2023-38160 | Windows TCP/IP Information Disclosure Vulnerability |
Microsoft | Windows TCP/IP | CVE-2023-38149 | Windows TCP/IP Denial of Service Vulnerability |
Microsoft | Windows Themes | CVE-2023-38146 | Windows Themes Remote Code Execution Vulnerability |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2023-4761
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2023-4761 Out of bounds memory access in FedCM
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    07-Sep-23     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-4761 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
116.0.1938.76 | No | None |
CVE ID | Acknowledgements |
CVE-2023-4761 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2023-4762
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2023-4762 Type Confusion in V8
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    07-Sep-23     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-4762 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
116.0.1938.76 | No | None |
CVE ID | Acknowledgements |
CVE-2023-4762 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2023-4763
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2023-4763 Use after free in Networks
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    07-Sep-23     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-4763 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
116.0.1938.76 | No | None |
CVE ID | Acknowledgements |
CVE-2023-4763 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2023-4764
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2023-4764 Incorrect security UI in BFCache
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    07-Sep-23     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-4764 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
116.0.1938.76 | No | None |
CVE ID | Acknowledgements |
CVE-2023-4764 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-35355
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-35355 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 11 version 21H2 for ARM64-based Systems | 5030217 (Security Update) | Important | Elevation of Privilege | 5029253 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5030217 (Security Update) | Important | Elevation of Privilege | 5029253 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5030219 (Security Update) | Important | Elevation of Privilege | 5029263 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2275 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5030219 (Security Update) | Important | Elevation of Privilege | 5029263 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2275 | Yes | None |
Windows Server 2019 | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2019 (Server Core installation) | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2022 | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Elevation of Privilege | 5029250 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
Windows Server 2022 (Server Core installation) | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Elevation of Privilege | 5029250 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
CVE ID | Acknowledgements |
CVE-2023-35355 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-38162
MITRE NVD Issuing CNA: Microsoft |
CVE Title: DHCP Server Service Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: None FAQ: None Mitigations: The following mitigating factors might be helpful in your situation: Customers who have not configured their DHCP server as a failover are not affected by this vulnerability. Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-38162 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2012 | 5030278 (Monthly Rollup) 5030279 (Security Only) |
Important | Denial of Service | 5029295 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.24462 | Yes | None |
Windows Server 2012 (Server Core installation) | 5030278 (Monthly Rollup) 5030279 (Security Only) |
Important | Denial of Service | 5029295 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.24462 | Yes | None |
Windows Server 2012 R2 | 5030269 (Monthly Rollup) 5030287 (Security Only) |
Important | Denial of Service | 5029312 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.21563 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5030269 (Monthly Rollup) 5030287 (Security Only) |
Important | Denial of Service | 5029312 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.21563 | Yes | None |
Windows Server 2016 | 5030213 (Security Update) | Important | Denial of Service | 5029242 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows Server 2016 (Server Core installation) | 5030213 (Security Update) | Important | Denial of Service | 5029242 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows Server 2019 | 5030214 (Security Update) | Important | Denial of Service | 5029247 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2019 (Server Core installation) | 5030214 (Security Update) | Important | Denial of Service | 5029247 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2022 | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Denial of Service | 5029250 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
Windows Server 2022 (Server Core installation) | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Denial of Service | 5029250 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
CVE ID | Acknowledgements |
CVE-2023-38162 | LIU An, WANG Zimeng State Grid Information & Telecommunication Co.,Ltd. |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-38161
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows GDI Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-38161 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5030220 (Security Update) | Important | Elevation of Privilege | 5029259 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20162 | Yes | None |
Windows 10 for x64-based Systems | 5030220 (Security Update) | Important | Elevation of Privilege | 5029259 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20162 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5030213 (Security Update) | Important | Elevation of Privilege | 5029242 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5030213 (Security Update) | Important | Elevation of Privilege | 5029242 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 11 version 21H2 for ARM64-based Systems | 5030217 (Security Update) | Important | Elevation of Privilege | 5029253 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5030217 (Security Update) | Important | Elevation of Privilege | 5029253 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5030219 (Security Update) | Important | Elevation of Privilege | 5029263 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2275 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5030219 (Security Update) | Important | Elevation of Privilege | 5029263 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2275 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Elevation of Privilege | 5029318 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22264 |
Yes | 5030271 5030286 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Elevation of Privilege | 5029318 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22264 |
Yes | 5030271 5030286 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Elevation of Privilege | 5029318 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22264 6.0.6003.22262 |
Yes | 5030271 5030286 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Elevation of Privilege | 5029318 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22264 6.0.6003.22262 |
Yes | 5030271 5030286 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5030265 (Monthly Rollup) 5030261 (Security Only) |
Important | Elevation of Privilege | 5029296 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26713 |
Yes | 5030265 5030261 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5030265 (Monthly Rollup) 5030261 (Security Only) |
Important | Elevation of Privilege | 5029296 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26713 |
Yes | 5030265 5030261 |
Windows Server 2012 | 5030278 (Monthly Rollup) 5030279 (Security Only) |
Important | Elevation of Privilege | 5029295 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24462 | Yes | None |
Windows Server 2012 (Server Core installation) | 5030278 (Monthly Rollup) 5030279 (Security Only) |
Important | Elevation of Privilege | 5029295 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24462 | Yes | None |
Windows Server 2012 R2 | 5030269 (Monthly Rollup) 5030287 (Security Only) |
Important | Elevation of Privilege | 5029312 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21563 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5030269 (Monthly Rollup) 5030287 (Security Only) |
Important | Elevation of Privilege | 5029312 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21563 | Yes | None |
Windows Server 2016 | 5030213 (Security Update) | Important | Elevation of Privilege | 5029242 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows Server 2016 (Server Core installation) | 5030213 (Security Update) | Important | Elevation of Privilege | 5029242 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows Server 2019 | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2019 (Server Core installation) | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2022 | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Elevation of Privilege | 5029250 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
Windows Server 2022 (Server Core installation) | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Elevation of Privilege | 5029250 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
CVE ID | Acknowledgements |
CVE-2023-38161 | Marcin Wiazowski working with Trend Micro Zero Day Initiative |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-38156
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure HDInsight Apache Ambari Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain domain administrator privileges. How could an attacker exploit this vulnerability? An authenticated attacker with access to the target HDI cluster could send a specially crafted network request to create and assign themselves as a Cluster Administrator. Cluster Administrators can read/write/delete and perform all resource service management operations. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-38156 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure HDInsights | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
2308221128 | Yes | None |
CVE ID | Acknowledgements |
CVE-2023-38156 | Lidor B. with Orca Security |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-38152
MITRE NVD Issuing CNA: Microsoft |
CVE Title: DHCP Server Service Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.3/TemporalScore:4.6
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? Exploiting this vulnerability could allow the disclosure of initialized or uninitialized memory in the process heap. According to the CVSS metrics, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L) but have no effect on integrity (I:N) or on availability (A:N). What does that mean for this vulnerability? An attacker who successfully exploited the vulnerability could view some sensitive information (Confidentiality) but not all resources within the impacted component may be divulged to the attacker. While the attacker cannot make changes to disclosed information (Integrity) or limit access to the resource (Availability). Mitigations: The following mitigating factors might be helpful in your situation: Customers who have not installed the DHCP Server Role to their server are not affected by this vulnerability. Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-38152 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Information Disclosure | 5029318 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22264 |
Yes | 5030271 5030286 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Information Disclosure | 5029318 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22264 |
Yes | 5030271 5030286 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Information Disclosure | 5029318 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22264 6.0.6003.22262 |
Yes | 5030271 5030286 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Information Disclosure | 5029318 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22264 6.0.6003.22262 |
Yes | 5030271 5030286 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5030265 (Monthly Rollup) 5030261 (Security Only) |
Important | Information Disclosure | 5029296 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.26713 |
Yes | 5030265 5030261 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5030265 (Monthly Rollup) 5030261 (Security Only) |
Important | Information Disclosure | 5029296 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.26713 |
Yes | 5030265 5030261 |
Windows Server 2012 | 5030278 (Monthly Rollup) 5030279 (Security Only) |
Important | Information Disclosure | 5029295 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.24462 | Yes | None |
Windows Server 2012 (Server Core installation) | 5030278 (Monthly Rollup) 5030279 (Security Only) |
Important | Information Disclosure | 5029295 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.24462 | Yes | None |
Windows Server 2012 R2 | 5030269 (Monthly Rollup) 5030287 (Security Only) |
Important | Information Disclosure | 5029312 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21563 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5030269 (Monthly Rollup) 5030287 (Security Only) |
Important | Information Disclosure | 5029312 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21563 | Yes | None |
Windows Server 2016 | 5030213 (Security Update) | Important | Information Disclosure | 5029242 | Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows Server 2016 (Server Core installation) | 5030213 (Security Update) | Important | Information Disclosure | 5029242 | Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows Server 2019 | 5030214 (Security Update) | Important | Information Disclosure | 5029247 | Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2019 (Server Core installation) | 5030214 (Security Update) | Important | Information Disclosure | 5029247 | Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2022 | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Information Disclosure | 5029250 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
Windows Server 2022 (Server Core installation) | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Information Disclosure | 5029250 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
CVE ID | Acknowledgements |
CVE-2023-38152 | YanZiShuang@BigCJTeam of cyberkl |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-38150
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.0
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-38150 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 version 21H2 for ARM64-based Systems | 5030217 (Security Update) | Important | Elevation of Privilege | 5029253 | Base: 7.8 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5030217 (Security Update) | Important | Elevation of Privilege | 5029253 | Base: 7.8 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5030219 (Security Update) | Important | Elevation of Privilege | 5029263 | Base: 7.8 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.22621.2275 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5030219 (Security Update) | Important | Elevation of Privilege | 5029263 | Base: 7.8 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.22621.2275 | Yes | None |
CVE ID | Acknowledgements |
CVE-2023-38150 | ziming zhang with Ant Security Light-Year Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-38149
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows TCP/IP Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: None FAQ: None Mitigations: Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors might be helpful in your situation:
Workarounds: The following workaround may be helpful in your situation. In all cases, Microsoft strongly recommends that you install the updates for this vulnerability as soon as they become available even if you plan to leave this workaround in place: Disable router discovery on IPv6 interface. You can disable router discovery on the IPv6 interface to prevent attackers from exploiting the vulnerability, with the following PowerShell command:
You can disable router discovery on the IPv6 interface to prevent attackers from exploiting the vulnerability, with the following Network Shell (netsh) command:
Please refer to the workaround section of this security bulletin for more information: https://learn.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-006 Note: No reboot is needed after making the change. Revision: 1.0    12-Sep-23     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-38149 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5030220 (Security Update) | Important | Denial of Service | 5029259 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.20162 | Yes | None |
Windows 10 for x64-based Systems | 5030220 (Security Update) | Important | Denial of Service | 5029259 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.20162 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5030213 (Security Update) | Important | Denial of Service | 5029242 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5030213 (Security Update) | Important | Denial of Service | 5029242 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5030214 (Security Update) | Important | Denial of Service | 5029247 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5030214 (Security Update) | Important | Denial of Service | 5029247 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5030214 (Security Update) | Important | Denial of Service | 5029247 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5030211 (Security Update) | Important | Denial of Service | 5029244 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5030211 (Security Update) | Important | Denial of Service | 5029244 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5030211 (Security Update) | Important | Denial of Service | 5029244 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5030211 (Security Update) | Important | Denial of Service | 5029244 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5030211 (Security Update) | Important | Denial of Service | 5029244 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5030211 (Security Update) | Important | Denial of Service | 5029244 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 11 version 21H2 for ARM64-based Systems | 5030217 (Security Update) | Important | Denial of Service | 5029253 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5030217 (Security Update) | Important | Denial of Service | 5029253 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5030219 (Security Update) | Important | Denial of Service | 5029263 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.2275 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5030219 (Security Update) | Important | Denial of Service | 5029263 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.2275 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5030265 (Monthly Rollup) 5030261 (Security Only) |
Important | Denial of Service | 5029296 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.26713 |
Yes | 5030265 5030261 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5030265 (Monthly Rollup) 5030261 (Security Only) |
Important | Denial of Service | 5029296 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.26713 |
Yes | 5030265 5030261 |
Windows Server 2012 | 5030278 (Monthly Rollup) 5030279 (Security Only) |
Important | Denial of Service | 5029295 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.24462 | Yes | None |
Windows Server 2012 (Server Core installation) | 5030278 (Monthly Rollup) 5030279 (Security Only) |
Important | Denial of Service | 5029295 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.24462 | Yes | None |
Windows Server 2012 R2 | 5030269 (Monthly Rollup) 5030287 (Security Only) |
Important | Denial of Service | 5029312 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.21563 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5030269 (Monthly Rollup) 5030287 (Security Only) |
Important | Denial of Service | 5029312 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.21563 | Yes | None |
Windows Server 2016 | 5030213 (Security Update) | Important | Denial of Service | 5029242 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows Server 2016 (Server Core installation) | 5030213 (Security Update) | Important | Denial of Service | 5029242 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows Server 2019 | 5030214 (Security Update) | Important | Denial of Service | 5029247 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2019 (Server Core installation) | 5030214 (Security Update) | Important | Denial of Service | 5029247 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2022 | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Denial of Service | 5029250 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
Windows Server 2022 (Server Core installation) | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Denial of Service | 5029250 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
CVE ID | Acknowledgements |
CVE-2023-38149 | Wei in Kunlun Lab with Cyber KunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-38148
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Internet Connection Sharing (ICS) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS score, the attack vector is adjacent (AV:A). What does this mean for this vulnerability? This attack is limited to systems connected to the same network segment as the attacker. The attack cannot be performed across multiple networks (for example, a WAN) and would be limited to systems on the same network switch or virtual network. How could an attacker exploit this vulnerability? An unauthorized attacker could exploit this Internet Connection Sharing (ICS) vulnerability by sending a specially crafted network packet to the Internet Connection Sharing (ICS) Service. Mitigations: The following mitigating factors might be helpful in your situation: Exploitation of this vulnerability requires that the Internet Connection Sharing (ICS) is enabled. Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-38148 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 21H2 for 32-bit Systems | 5030211 (Security Update) | Critical | Remote Code Execution | 5029244 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5030211 (Security Update) | Critical | Remote Code Execution | 5029244 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5030211 (Security Update) | Critical | Remote Code Execution | 5029244 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5030211 (Security Update) | Critical | Remote Code Execution | 5029244 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5030211 (Security Update) | Critical | Remote Code Execution | 5029244 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5030211 (Security Update) | Critical | Remote Code Execution | 5029244 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 11 version 21H2 for ARM64-based Systems | 5030217 (Security Update) | Critical | Remote Code Execution | 5029253 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5030217 (Security Update) | Critical | Remote Code Execution | 5029253 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5030219 (Security Update) | Critical | Remote Code Execution | 5029263 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2275 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5030219 (Security Update) | Critical | Remote Code Execution | 5029263 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2275 | Yes | None |
Windows Server 2022 | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Critical | Remote Code Execution | 5029250 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
Windows Server 2022 (Server Core installation) | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Critical | Remote Code Execution | 5029250 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
CVE ID | Acknowledgements |
CVE-2023-38148 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-38147
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Miracast Wireless Display Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability? Exploiting this vulnerability requires an attacker to be within proximity of the target system in order to send and receive radio transmissions. How could an attacker exploit this vulnerability? An unauthenticated attacker could project to a vulnerable system on the same wireless network that was configured to allow "Projecting to this PC" and marked as "Available Everywhere". This is not a default configuration. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-38147 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5030220 (Security Update) | Important | Remote Code Execution | 5029259 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20162 | Yes | None |
Windows 10 for x64-based Systems | 5030220 (Security Update) | Important | Remote Code Execution | 5029259 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20162 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5030213 (Security Update) | Important | Remote Code Execution | 5029242 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5030213 (Security Update) | Important | Remote Code Execution | 5029242 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5030214 (Security Update) | Important | Remote Code Execution | 5029247 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5030214 (Security Update) | Important | Remote Code Execution | 5029247 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5030214 (Security Update) | Important | Remote Code Execution | 5029247 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5030211 (Security Update) | Important | Remote Code Execution | 5029244 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5030211 (Security Update) | Important | Remote Code Execution | 5029244 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5030211 (Security Update) | Important | Remote Code Execution | 5029244 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5030211 (Security Update) | Important | Remote Code Execution | 5029244 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5030211 (Security Update) | Important | Remote Code Execution | 5029244 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5030211 (Security Update) | Important | Remote Code Execution | 5029244 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 11 version 21H2 for ARM64-based Systems | 5030217 (Security Update) | Important | Remote Code Execution | 5029253 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5030217 (Security Update) | Important | Remote Code Execution | 5029253 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5030219 (Security Update) | Important | Remote Code Execution | 5029263 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2275 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5030219 (Security Update) | Important | Remote Code Execution | 5029263 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2275 | Yes | None |
Windows Server 2016 | 5030213 (Security Update) | Important | Remote Code Execution | 5029242 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows Server 2016 (Server Core installation) | 5030213 (Security Update) | Important | Remote Code Execution | 5029242 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows Server 2019 | 5030214 (Security Update) | Important | Remote Code Execution | 5029247 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2019 (Server Core installation) | 5030214 (Security Update) | Important | Remote Code Execution | 5029247 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2022 | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Remote Code Execution | 5029250 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
Windows Server 2022 (Server Core installation) | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Remote Code Execution | 5029250 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
CVE ID | Acknowledgements |
CVE-2023-38147 | wkai with Codesafe Team of Legendsec at QI-ANXIN Group |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-38146
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Themes Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? An attacker would need to convince a targeted user to load a Windows Themes file on a vulnerable system with access to an attacker-controlled SMB share. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-38146 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 version 21H2 for ARM64-based Systems | 5030217 (Security Update) | Important | Remote Code Execution | 5029253 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5030217 (Security Update) | Important | Remote Code Execution | 5029253 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5030219 (Security Update) | Important | Remote Code Execution | 5029263 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2275 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5030219 (Security Update) | Important | Remote Code Execution | 5029263 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2275 | Yes | None |
CVE ID | Acknowledgements |
CVE-2023-38146 | Gabe Kirkpatrick Thijs Alkemade, Khaled Nassar, and Daan Keuper with Computest Sector 7 |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-38144
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-38144 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5030220 (Security Update) | Important | Elevation of Privilege | 5029259 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20162 | Yes | None |
Windows 10 for x64-based Systems | 5030220 (Security Update) | Important | Elevation of Privilege | 5029259 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20162 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5030213 (Security Update) | Important | Elevation of Privilege | 5029242 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5030213 (Security Update) | Important | Elevation of Privilege | 5029242 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 11 version 21H2 for ARM64-based Systems | 5030217 (Security Update) | Important | Elevation of Privilege | 5029253 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5030217 (Security Update) | Important | Elevation of Privilege | 5029253 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5030219 (Security Update) | Important | Elevation of Privilege | 5029263 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2275 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5030219 (Security Update) | Important | Elevation of Privilege | 5029263 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2275 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Elevation of Privilege | 5029318 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22264 |
Yes | 5030271 5030286 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Elevation of Privilege | 5029318 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22264 |
Yes | 5030271 5030286 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Elevation of Privilege | 5029318 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22264 6.0.6003.22262 |
Yes | 5030271 5030286 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Elevation of Privilege | 5029318 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22264 6.0.6003.22262 |
Yes | 5030271 5030286 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5030265 (Monthly Rollup) 5030261 (Security Only) |
Important | Elevation of Privilege | 5029296 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26713 |
Yes | 5030265 5030261 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5030265 (Monthly Rollup) 5030261 (Security Only) |
Important | Elevation of Privilege | 5029296 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26713 |
Yes | 5030265 5030261 |
Windows Server 2012 | 5030278 (Monthly Rollup) 5030279 (Security Only) |
Important | Elevation of Privilege | 5029295 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24462 | Yes | None |
Windows Server 2012 (Server Core installation) | 5030278 (Monthly Rollup) 5030279 (Security Only) |
Important | Elevation of Privilege | 5029295 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24462 | Yes | None |
Windows Server 2012 R2 | 5030269 (Monthly Rollup) 5030287 (Security Only) |
Important | Elevation of Privilege | 5029312 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21563 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5030269 (Monthly Rollup) 5030287 (Security Only) |
Important | Elevation of Privilege | 5029312 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21563 | Yes | None |
Windows Server 2016 | 5030213 (Security Update) | Important | Elevation of Privilege | 5029242 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows Server 2016 (Server Core installation) | 5030213 (Security Update) | Important | Elevation of Privilege | 5029242 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows Server 2019 | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2019 (Server Core installation) | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2022 | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Elevation of Privilege | 5029250 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
Windows Server 2022 (Server Core installation) | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Elevation of Privilege | 5029250 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
CVE ID | Acknowledgements |
CVE-2023-38144 | Anonymous working with Trend Micro Zero Day Initiative |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-38143
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-38143 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5030220 (Security Update) | Important | Elevation of Privilege | 5029259 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20162 | Yes | None |
Windows 10 for x64-based Systems | 5030220 (Security Update) | Important | Elevation of Privilege | 5029259 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20162 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5030213 (Security Update) | Important | Elevation of Privilege | 5029242 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5030213 (Security Update) | Important | Elevation of Privilege | 5029242 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 11 version 21H2 for ARM64-based Systems | 5030217 (Security Update) | Important | Elevation of Privilege | 5029253 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5030217 (Security Update) | Important | Elevation of Privilege | 5029253 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5030219 (Security Update) | Important | Elevation of Privilege | 5029263 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2275 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5030219 (Security Update) | Important | Elevation of Privilege | 5029263 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2275 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Elevation of Privilege | 5029318 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22264 |
Yes | 5030271 5030286 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Elevation of Privilege | 5029318 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22264 |
Yes | 5030271 5030286 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Elevation of Privilege | 5029318 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22264 6.0.6003.22262 |
Yes | 5030271 5030286 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Elevation of Privilege | 5029318 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22264 6.0.6003.22262 |
Yes | 5030271 5030286 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5030265 (Monthly Rollup) 5030261 (Security Only) |
Important | Elevation of Privilege | 5029296 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26713 |
Yes | 5030265 5030261 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5030265 (Monthly Rollup) 5030261 (Security Only) |
Important | Elevation of Privilege | 5029296 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26713 |
Yes | 5030265 5030261 |
Windows Server 2012 | 5030278 (Monthly Rollup) 5030279 (Security Only) |
Important | Elevation of Privilege | 5029295 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24462 | Yes | None |
Windows Server 2012 (Server Core installation) | 5030278 (Monthly Rollup) 5030279 (Security Only) |
Important | Elevation of Privilege | 5029295 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24462 | Yes | None |
Windows Server 2012 R2 | 5030269 (Monthly Rollup) 5030287 (Security Only) |
Important | Elevation of Privilege | 5029312 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21563 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5030269 (Monthly Rollup) 5030287 (Security Only) |
Important | Elevation of Privilege | 5029312 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21563 | Yes | None |
Windows Server 2016 | 5030213 (Security Update) | Important | Elevation of Privilege | 5029242 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows Server 2016 (Server Core installation) | 5030213 (Security Update) | Important | Elevation of Privilege | 5029242 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows Server 2019 | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2019 (Server Core installation) | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2022 | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Elevation of Privilege | 5029250 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
Windows Server 2022 (Server Core installation) | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Elevation of Privilege | 5029250 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
CVE ID | Acknowledgements |
CVE-2023-38143 | Anonymous Trend Micro Zero Day Initiative |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-38142
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-38142 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5030220 (Security Update) | Important | Elevation of Privilege | 5029259 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20162 | Yes | None |
Windows 10 for x64-based Systems | 5030220 (Security Update) | Important | Elevation of Privilege | 5029259 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20162 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5030213 (Security Update) | Important | Elevation of Privilege | 5029242 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5030213 (Security Update) | Important | Elevation of Privilege | 5029242 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 11 version 21H2 for ARM64-based Systems | 5030217 (Security Update) | Important | Elevation of Privilege | 5029253 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5030217 (Security Update) | Important | Elevation of Privilege | 5029253 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5030219 (Security Update) | Important | Elevation of Privilege | 5029263 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2275 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5030219 (Security Update) | Important | Elevation of Privilege | 5029263 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2275 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Elevation of Privilege | 5029318 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22264 |
Yes | 5030271 5030286 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Elevation of Privilege | 5029318 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22264 |
Yes | 5030271 5030286 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Elevation of Privilege | 5029318 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22264 6.0.6003.22262 |
Yes | 5030271 5030286 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Elevation of Privilege | 5029318 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22264 6.0.6003.22262 |
Yes | 5030271 5030286 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5030265 (Monthly Rollup) 5030261 (Security Only) |
Important | Elevation of Privilege | 5029296 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26713 |
Yes | 5030265 5030261 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5030265 (Monthly Rollup) 5030261 (Security Only) |
Important | Elevation of Privilege | 5029296 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26713 |
Yes | 5030265 5030261 |
Windows Server 2012 | 5030278 (Monthly Rollup) 5030279 (Security Only) |
Important | Elevation of Privilege | 5029295 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24462 | Yes | None |
Windows Server 2012 (Server Core installation) | 5030278 (Monthly Rollup) 5030279 (Security Only) |
Important | Elevation of Privilege | 5029295 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24462 | Yes | None |
Windows Server 2012 R2 | 5030269 (Monthly Rollup) 5030287 (Security Only) |
Important | Elevation of Privilege | 5029312 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21563 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5030269 (Monthly Rollup) 5030287 (Security Only) |
Important | Elevation of Privilege | 5029312 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21563 | Yes | None |
Windows Server 2016 | 5030213 (Security Update) | Important | Elevation of Privilege | 5029242 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows Server 2016 (Server Core installation) | 5030213 (Security Update) | Important | Elevation of Privilege | 5029242 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows Server 2019 | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2019 (Server Core installation) | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2022 | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Elevation of Privilege | 5029250 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
Windows Server 2022 (Server Core installation) | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Elevation of Privilege | 5029250 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
CVE ID | Acknowledgements |
CVE-2023-38142 | Zhang WangJunJie, He YiSheng, Li WenYue with Hillstone Network Security Research Institute |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-38141
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-38141 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5030220 (Security Update) | Important | Elevation of Privilege | 5029259 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20162 | Yes | None |
Windows 10 for x64-based Systems | 5030220 (Security Update) | Important | Elevation of Privilege | 5029259 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20162 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5030213 (Security Update) | Important | Elevation of Privilege | 5029242 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5030213 (Security Update) | Important | Elevation of Privilege | 5029242 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 11 version 21H2 for ARM64-based Systems | 5030217 (Security Update) | Important | Elevation of Privilege | 5029253 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5030217 (Security Update) | Important | Elevation of Privilege | 5029253 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5030219 (Security Update) | Important | Elevation of Privilege | 5029263 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2275 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5030219 (Security Update) | Important | Elevation of Privilege | 5029263 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2275 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Elevation of Privilege | 5029318 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22264 |
Yes | 5030271 5030286 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Elevation of Privilege | 5029318 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22264 |
Yes | 5030271 5030286 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Elevation of Privilege | 5029318 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22264 6.0.6003.22262 |
Yes | 5030271 5030286 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Elevation of Privilege | 5029318 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22264 6.0.6003.22262 |
Yes | 5030271 5030286 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5030265 (Monthly Rollup) 5030261 (Security Only) |
Important | Elevation of Privilege | 5029296 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26713 |
Yes | 5030265 5030261 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5030265 (Monthly Rollup) 5030261 (Security Only) |
Important | Elevation of Privilege | 5029296 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26713 |
Yes | 5030265 5030261 |
Windows Server 2012 | 5030278 (Monthly Rollup) 5030279 (Security Only) |
Important | Elevation of Privilege | 5029295 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24462 | Yes | None |
Windows Server 2012 (Server Core installation) | 5030278 (Monthly Rollup) 5030279 (Security Only) |
Important | Elevation of Privilege | 5029295 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24462 | Yes | None |
Windows Server 2012 R2 | 5030269 (Monthly Rollup) 5030287 (Security Only) |
Important | Elevation of Privilege | 5029312 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21563 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5030269 (Monthly Rollup) 5030287 (Security Only) |
Important | Elevation of Privilege | 5029312 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21563 | Yes | None |
Windows Server 2016 | 5030213 (Security Update) | Important | Elevation of Privilege | 5029242 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows Server 2016 (Server Core installation) | 5030213 (Security Update) | Important | Elevation of Privilege | 5029242 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows Server 2019 | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2019 (Server Core installation) | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2022 | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Elevation of Privilege | 5029250 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
Windows Server 2022 (Server Core installation) | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Elevation of Privilege | 5029250 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
CVE ID | Acknowledgements |
CVE-2023-38141 | Mateusz Jurczyk of Google Project Zero |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-38140
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-38140 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1607 for 32-bit Systems | 5030213 (Security Update) | Important | Information Disclosure | 5029242 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5030213 (Security Update) | Important | Information Disclosure | 5029242 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5030214 (Security Update) | Important | Information Disclosure | 5029247 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5030214 (Security Update) | Important | Information Disclosure | 5029247 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5030214 (Security Update) | Important | Information Disclosure | 5029247 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5030211 (Security Update) | Important | Information Disclosure | 5029244 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5030211 (Security Update) | Important | Information Disclosure | 5029244 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5030211 (Security Update) | Important | Information Disclosure | 5029244 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5030211 (Security Update) | Important | Information Disclosure | 5029244 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5030211 (Security Update) | Important | Information Disclosure | 5029244 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5030211 (Security Update) | Important | Information Disclosure | 5029244 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 11 version 21H2 for ARM64-based Systems | 5030217 (Security Update) | Important | Information Disclosure | 5029253 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5030217 (Security Update) | Important | Information Disclosure | 5029253 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows Server 2016 | 5030213 (Security Update) | Important | Information Disclosure | 5029242 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows Server 2016 (Server Core installation) | 5030213 (Security Update) | Important | Information Disclosure | 5029242 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows Server 2019 | 5030214 (Security Update) | Important | Information Disclosure | 5029247 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2019 (Server Core installation) | 5030214 (Security Update) | Important | Information Disclosure | 5029247 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2022 | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Information Disclosure | 5029250 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
Windows Server 2022 (Server Core installation) | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Information Disclosure | 5029250 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
CVE ID | Acknowledgements |
CVE-2023-38140 | Mateusz Jurczyk of Google Project Zero |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-38139
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-38139 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5030220 (Security Update) | Important | Elevation of Privilege | 5029259 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20162 | Yes | None |
Windows 10 for x64-based Systems | 5030220 (Security Update) | Important | Elevation of Privilege | 5029259 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20162 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5030213 (Security Update) | Important | Elevation of Privilege | 5029242 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5030213 (Security Update) | Important | Elevation of Privilege | 5029242 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 11 version 21H2 for ARM64-based Systems | 5030217 (Security Update) | Important | Elevation of Privilege | 5029253 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5030217 (Security Update) | Important | Elevation of Privilege | 5029253 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5030219 (Security Update) | Important | Elevation of Privilege | 5029263 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2275 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5030219 (Security Update) | Important | Elevation of Privilege | 5029263 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2275 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Elevation of Privilege | 5029318 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22264 |
Yes | 5030271 5030286 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Elevation of Privilege | 5029318 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22264 |
Yes | 5030271 5030286 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Elevation of Privilege | 5029318 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22264 6.0.6003.22262 |
Yes | 5030271 5030286 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Elevation of Privilege | 5029318 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22264 6.0.6003.22262 |
Yes | 5030271 5030286 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5030265 (Monthly Rollup) 5030261 (Security Only) |
Important | Elevation of Privilege | 5029296 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26713 |
Yes | 5030265 5030261 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5030265 (Monthly Rollup) 5030261 (Security Only) |
Important | Elevation of Privilege | 5029296 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26713 |
Yes | 5030265 5030261 |
Windows Server 2012 | 5030278 (Monthly Rollup) 5030279 (Security Only) |
Important | Elevation of Privilege | 5029295 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24462 | Yes | None |
Windows Server 2012 (Server Core installation) | 5030278 (Monthly Rollup) 5030279 (Security Only) |
Important | Elevation of Privilege | 5029295 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24462 | Yes | None |
Windows Server 2012 R2 | 5030269 (Monthly Rollup) 5030287 (Security Only) |
Important | Elevation of Privilege | 5029312 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21563 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5030269 (Monthly Rollup) 5030287 (Security Only) |
Important | Elevation of Privilege | 5029312 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21563 | Yes | None |
Windows Server 2016 | 5030213 (Security Update) | Important | Elevation of Privilege | 5029242 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows Server 2016 (Server Core installation) | 5030213 (Security Update) | Important | Elevation of Privilege | 5029242 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows Server 2019 | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2019 (Server Core installation) | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2022 | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Elevation of Privilege | 5029250 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
Windows Server 2022 (Server Core installation) | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Elevation of Privilege | 5029250 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
CVE ID | Acknowledgements |
CVE-2023-38139 | Mateusz Jurczyk of Google Project Zero |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36805
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows MSHTML Platform Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component. The Security Updates table indicates that this vulnerability affects all supported versions of Microsoft Windows except Windows Server 2008, Windows Server 2008 R2, and Windows Server 2012. Why are IE Cumulative updates listed for Windows Server 2012 R2? While Microsoft has announced retirement of the Internet Explorer 11 application on certain platforms and the Microsoft Edge Legacy application is deprecated, the underlying MSHTML, EdgeHTML, and scripting platforms are still supported. The MSHTML platform is used by Internet Explorer mode in Microsoft Edge as well as other applications through WebBrowser control. The EdgeHTML platform is used by WebView and some UWP applications. The scripting platforms are used by MSHTML and EdgeHTML but can also be used by other legacy applications. Updates to address vulnerabilities in the MSHTML platform and scripting engine are included in the IE Cumulative Updates; EdgeHTML and Chakra changes are not applicable to those platforms. To stay fully protected, we recommend that customers who install Security Only updates install the IE Cumulative updates for this vulnerability. According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability? An attacker who successfully exploited this vulnerability could maintain high privileges, which include read, write, and delete functionality. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36805 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5030220 (Security Update) | Important | Security Feature Bypass | 5029259 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20162 | Yes | None |
Windows 10 for x64-based Systems | 5030220 (Security Update) | Important | Security Feature Bypass | 5029259 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20162 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5030213 (Security Update) | Important | Security Feature Bypass | 5029242 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5030213 (Security Update) | Important | Security Feature Bypass | 5029242 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5030214 (Security Update) | Important | Security Feature Bypass | 5029247 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5030214 (Security Update) | Important | Security Feature Bypass | 5029247 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5030214 (Security Update) | Important | Security Feature Bypass | 5029247 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5030211 (Security Update) | Important | Security Feature Bypass | 5029244 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5030211 (Security Update) | Important | Security Feature Bypass | 5029244 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5030211 (Security Update) | Important | Security Feature Bypass | 5029244 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5030211 (Security Update) | Important | Security Feature Bypass | 5029244 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5030211 (Security Update) | Important | Security Feature Bypass | 5029244 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5030211 (Security Update) | Important | Security Feature Bypass | 5029244 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 11 version 21H2 for ARM64-based Systems | 5030217 (Security Update) | Important | Security Feature Bypass | 5029253 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5030217 (Security Update) | Important | Security Feature Bypass | 5029253 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5030219 (Security Update) | Important | Security Feature Bypass | 5029263 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2275 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5030219 (Security Update) | Important | Security Feature Bypass | 5029263 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2275 | Yes | None |
Windows Server 2012 R2 | 5030269 (Monthly Rollup) 5030287 (Security Only) 5030209 (IE Cumulative) |
Important | Security Feature Bypass | 5029312 5029243 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21563 1.001 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5030269 (Monthly Rollup) 5030287 (Security Only) 5030209 (IE Cumulative) |
Important | Security Feature Bypass | 5029312 5029243 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21563 1.001 |
Yes | None |
Windows Server 2016 | 5030213 (Security Update) | Important | Security Feature Bypass | 5029242 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows Server 2016 (Server Core installation) | 5030213 (Security Update) | Important | Security Feature Bypass | 5029242 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows Server 2019 | 5030214 (Security Update) | Important | Security Feature Bypass | 5029247 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2019 (Server Core installation) | 5030214 (Security Update) | Important | Security Feature Bypass | 5029247 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2022 | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Security Feature Bypass | 5029250 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
Windows Server 2022 (Server Core installation) | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Security Feature Bypass | 5029250 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
CVE ID | Acknowledgements |
CVE-2023-36805 | Eduardo Braun Prado working with Trend Micro Zero Day Initiative |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36804
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows GDI Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36804 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5030220 (Security Update) | Important | Elevation of Privilege | 5029259 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20162 | Yes | None |
Windows 10 for x64-based Systems | 5030220 (Security Update) | Important | Elevation of Privilege | 5029259 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20162 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5030213 (Security Update) | Important | Elevation of Privilege | 5029242 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5030213 (Security Update) | Important | Elevation of Privilege | 5029242 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 11 version 21H2 for ARM64-based Systems | 5030217 (Security Update) | Important | Elevation of Privilege | 5029253 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5030217 (Security Update) | Important | Elevation of Privilege | 5029253 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5030219 (Security Update) | Important | Elevation of Privilege | 5029263 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2275 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5030219 (Security Update) | Important | Elevation of Privilege | 5029263 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2275 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Elevation of Privilege | 5029318 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22264 |
Yes | 5030271 5030286 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Elevation of Privilege | 5029318 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22264 |
Yes | 5030271 5030286 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Elevation of Privilege | 5029318 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22264 6.0.6003.22262 |
Yes | 5030271 5030286 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Elevation of Privilege | 5029318 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22264 6.0.6003.22262 |
Yes | 5030271 5030286 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5030265 (Monthly Rollup) 5030261 (Security Only) |
Important | Elevation of Privilege | 5029296 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26713 |
Yes | 5030265 5030261 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5030265 (Monthly Rollup) 5030261 (Security Only) |
Important | Elevation of Privilege | 5029296 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26713 |
Yes | 5030265 5030261 |
Windows Server 2012 | 5030278 (Monthly Rollup) 5030279 (Security Only) |
Important | Elevation of Privilege | 5029295 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24462 | Yes | None |
Windows Server 2012 (Server Core installation) | 5030278 (Monthly Rollup) 5030279 (Security Only) |
Important | Elevation of Privilege | 5029295 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24462 | Yes | None |
Windows Server 2012 R2 | 5030269 (Monthly Rollup) 5030287 (Security Only) |
Important | Elevation of Privilege | 5029312 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21563 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5030269 (Monthly Rollup) 5030287 (Security Only) |
Important | Elevation of Privilege | 5029312 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21563 | Yes | None |
Windows Server 2016 | 5030213 (Security Update) | Important | Elevation of Privilege | 5029242 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows Server 2016 (Server Core installation) | 5030213 (Security Update) | Important | Elevation of Privilege | 5029242 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows Server 2019 | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2019 (Server Core installation) | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2022 | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Elevation of Privilege | 5029250 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
Windows Server 2022 (Server Core installation) | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Elevation of Privilege | 5029250 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
CVE ID | Acknowledgements |
CVE-2023-36804 | Marcin Wiazowski working with Trend Micro Zero Day Initiative |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36803
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36803 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1607 for 32-bit Systems | 5030213 (Security Update) | Important | Information Disclosure | 5029242 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5030213 (Security Update) | Important | Information Disclosure | 5029242 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5030214 (Security Update) | Important | Information Disclosure | 5029247 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5030214 (Security Update) | Important | Information Disclosure | 5029247 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5030214 (Security Update) | Important | Information Disclosure | 5029247 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5030211 (Security Update) | Important | Information Disclosure | 5029244 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5030211 (Security Update) | Important | Information Disclosure | 5029244 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5030211 (Security Update) | Important | Information Disclosure | 5029244 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5030211 (Security Update) | Important | Information Disclosure | 5029244 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5030211 (Security Update) | Important | Information Disclosure | 5029244 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5030211 (Security Update) | Important | Information Disclosure | 5029244 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 11 version 21H2 for ARM64-based Systems | 5030217 (Security Update) | Important | Information Disclosure | 5029253 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5030217 (Security Update) | Important | Information Disclosure | 5029253 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5030219 (Security Update) | Important | Information Disclosure | 5029263 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.2275 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5030219 (Security Update) | Important | Information Disclosure | 5029263 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.2275 | Yes | None |
Windows Server 2016 | 5030213 (Security Update) | Important | Information Disclosure | 5029242 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows Server 2016 (Server Core installation) | 5030213 (Security Update) | Important | Information Disclosure | 5029242 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows Server 2019 | 5030214 (Security Update) | Important | Information Disclosure | 5029247 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2019 (Server Core installation) | 5030214 (Security Update) | Important | Information Disclosure | 5029247 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2022 | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Information Disclosure | 5029250 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
Windows Server 2022 (Server Core installation) | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Information Disclosure | 5029250 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
CVE ID | Acknowledgements |
CVE-2023-36803 | Mateusz Jurczyk of Google Project Zero |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36802
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Detected | No | Yes |
The following tables list the affected software details for the vulnerability.
CVE-2023-36802 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5030211 (Security Update) | Important | Elevation of Privilege | 5029244 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 11 version 21H2 for ARM64-based Systems | 5030217 (Security Update) | Important | Elevation of Privilege | 5029253 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5030217 (Security Update) | Important | Elevation of Privilege | 5029253 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5030219 (Security Update) | Important | Elevation of Privilege | 5029263 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2275 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5030219 (Security Update) | Important | Elevation of Privilege | 5029263 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.2275 | Yes | None |
Windows Server 2019 | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2019 (Server Core installation) | 5030214 (Security Update) | Important | Elevation of Privilege | 5029247 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2022 | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Elevation of Privilege | 5029250 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
Windows Server 2022 (Server Core installation) | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Elevation of Privilege | 5029250 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
CVE ID | Acknowledgements |
CVE-2023-36802 | Microsoft Security Response Center Microsoft Threat Intelligence Valentina Palmiotti with IBM X-Force Quan Jin(@jq0904) & ze0r with DBAPPSecurity WeBin Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36801
MITRE NVD Issuing CNA: Microsoft |
CVE Title: DHCP Server Service Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.3/TemporalScore:4.6
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? Exploiting this vulnerability could allow the disclosure of initialized or uninitialized memory in the process heap. According to the CVSS metrics, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L) but have no effect on integrity (I:N) or on availability (A:N). What does that mean for this vulnerability? An attacker who successfully exploited the vulnerability could view some sensitive information (Confidentiality) but not all resources within the impacted component may be divulged to the attacker. While the attacker cannot make changes to disclosed information (Integrity) or limit access to the resource (Availability). Mitigations: The following mitigating factors might be helpful in your situation: Customers who have not installed the DHCP Server Role to their server are not affected by this vulnerability. Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36801 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Information Disclosure | 5029318 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22264 |
Yes | 5030271 5030286 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Information Disclosure | 5029318 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22264 |
Yes | 5030271 5030286 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Information Disclosure | 5029318 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22264 6.0.6003.22262 |
Yes | 5030271 5030286 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Information Disclosure | 5029318 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22264 6.0.6003.22262 |
Yes | 5030271 5030286 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5030265 (Monthly Rollup) 5030261 (Security Only) |
Important | Information Disclosure | 5029296 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.26713 |
Yes | 5030265 5030261 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5030265 (Monthly Rollup) 5030261 (Security Only) |
Important | Information Disclosure | 5029296 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.26713 |
Yes | 5030265 5030261 |
Windows Server 2012 | 5030278 (Monthly Rollup) 5030279 (Security Only) |
Important | Information Disclosure | 5029295 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.24462 | Yes | None |
Windows Server 2012 (Server Core installation) | 5030278 (Monthly Rollup) 5030279 (Security Only) |
Important | Information Disclosure | 5029295 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.24462 | Yes | None |
Windows Server 2012 R2 | 5030269 (Monthly Rollup) 5030287 (Security Only) |
Important | Information Disclosure | 5029312 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21563 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5030269 (Monthly Rollup) 5030287 (Security Only) |
Important | Information Disclosure | 5029312 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21563 | Yes | None |
Windows Server 2016 | 5030213 (Security Update) | Important | Information Disclosure | 5029242 | Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows Server 2016 (Server Core installation) | 5030213 (Security Update) | Important | Information Disclosure | 5029242 | Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows Server 2019 | 5030214 (Security Update) | Important | Information Disclosure | 5029247 | Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2019 (Server Core installation) | 5030214 (Security Update) | Important | Information Disclosure | 5029247 | Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2022 | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Information Disclosure | 5029250 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
Windows Server 2022 (Server Core installation) | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Information Disclosure | 5029250 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
CVE ID | Acknowledgements |
CVE-2023-36801 | YanZiShuang@BigCJTeam of cyberkl |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36767
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Office Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:4.3/TemporalScore:3.8
Executive Summary: None FAQ: Is the Attachment Preview Pane an attack vector for this vulnerability? Yes. The attachment Preview Pane that is accessed when a user clicks to preview an attached file is an attack vector; however, the email Preview Pane itself is not. What kind of security feature could be bypassed by successfully exploiting this vulnerability? The attacker would be able to bypass the protection in Outlook that prevents a potentially dangerous extension from being uploaded and downloaded. According to the CVSS metrics, successful exploitation of this vulnerability could lead to no loss of confidentiality (C:N), with minor loss of integrity (I:N) and availability (A:L). What does that mean for this vulnerability? While we cannot rule out the impact to Confidentiality, Integrity, and Availability, the ability to exploit this vulnerability by itself is limited. An attacker would need to combine this with other vulnerabilities to perform an attack. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36767 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Security Feature Bypass | None | Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Security Feature Bypass | None | Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2013 RT Service Pack 1 | 5002477 (Security Update) | Important | Security Feature Bypass | 5002439 | Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C |
15.0.5589.1000 | Maybe | None |
Microsoft Office 2013 Service Pack 1 (32-bit editions) | 5002477 (Security Update) | Important | Security Feature Bypass | 5002439 | Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C |
15.0.5589.1000 | Maybe | None |
Microsoft Office 2013 Service Pack 1 (64-bit editions) | 5002477 (Security Update) | Important | Security Feature Bypass | 5002439 | Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C |
15.0.5589.1000 | Maybe | None |
Microsoft Office 2016 (32-bit edition) | 5002457 (Security Update) | Important | Security Feature Bypass | 5002419 | Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C |
16.0.5413.1000 | Maybe | None |
Microsoft Office 2016 (64-bit edition) | 5002457 (Security Update) | Important | Security Feature Bypass | 5002419 | Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C |
16.0.5413.1000 | Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Security Feature Bypass | None | Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Security Feature Bypass | None | Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for Mac | Release Notes (Security Update) | Important | Security Feature Bypass | None | Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C |
16.77.23091003 | Maybe | None |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Security Feature Bypass | None | Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Security Feature Bypass | None | Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Important | Security Feature Bypass | None | Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C |
16.77.23091003 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-36767 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36766
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is sensitive information. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is information disclosure? The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer which could leak data. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36766 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Information Disclosure | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Information Disclosure | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Excel 2013 RT Service Pack 1 | 5002488 (Security Update) | Important | Information Disclosure | 5002451 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.5589.1000 | Maybe | None |
Microsoft Excel 2013 Service Pack 1 (32-bit editions) | 5002488 (Security Update) | Important | Information Disclosure | 5002451 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.5589.1000 | Maybe | None |
Microsoft Excel 2013 Service Pack 1 (64-bit editions) | 5002488 (Security Update) | Important | Information Disclosure | 5002451 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.5589.1000 | Maybe | None |
Microsoft Excel 2016 (32-bit edition) | 5002496 (Security Update) | Important | Information Disclosure | 5002463 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5413.1000 | Maybe | None |
Microsoft Excel 2016 (64-bit edition) | 5002496 (Security Update) | Important | Information Disclosure | 5002463 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5413.1000 | Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Information Disclosure | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Information Disclosure | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for Mac | Release Notes (Security Update) | Important | Information Disclosure | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.77.23091003 | Maybe | None |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Information Disclosure | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Information Disclosure | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Important | Information Disclosure | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.77.23091003 | Maybe | None |
Microsoft Office Online Server | 5002470 (Security Update) | Important | Information Disclosure | 5002435 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10402.20000 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-36766 | Rocco Calvi (@TecR0c) with TecSecurity |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36765
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Office Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36765 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
CVE ID | Acknowledgements |
CVE-2023-36765 | Luke Papandrea, Microsoft Corporation |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36759
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Visual Studio Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component. What privileges could be gained by an attacker who successfully exploited the vulnerability? A domain user could use this vulnerability to elevate privileges to SYSTEM assigned integrity level. According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability? An authorized attacker must send a victim a malicious file and convince them to open it. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36759 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.11.30 | Maybe | None |
Microsoft Visual Studio 2022 version 17.2 | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.2.19 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.4.11 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.6.7 | Maybe | None |
Microsoft Visual Studio 2022 version 17.7 | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.7.4 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-36759 | Zeze with TeamT5 |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36758
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Visual Studio Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? A domain user could use this vulnerability to elevate privileges to SYSTEM assigned integrity level. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36758 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Visual Studio 2022 version 17.7 | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.7.4 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-36758 | Siemens AG Anonymous Angel Palomo of ING |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36757
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Exchange Server Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Executive Summary: None FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H), integrity (I:H) and availability (A:H). What does that mean for this vulnerability? An attacker who successfully exploited this vulnerability could access a user's Net-NTLMv2 hash which could be used as a basis of an NTLM Relay attack against another service to authenticate as the user. According to the CVSS metric, privileges required is low (PR:L). Does the attacker need to be in an authenticated role on the Exchange Server? Yes, the attacker must be authenticated with LAN-access and have credentials for a valid Exchange user. What updates do I need to install to be protected from this vulnerability? Customers need to install the August 2023 Exchange security updates which are listed in the Security Updates table. Customers who have already August 2023 security updates are already protected from this vulnerability. Is there more information available? Yes, please see September 2023 release of new Exchange Server CVEs for more information. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. This CVE was addressed by updates that were released in August 2023, but the CVE was inadvertently omitted from the August 2023 Security Updates. Microsoft strongly recommends that customers running affected versions of Microsoft Exchange Server install the August 2023 updates to be protected from this vulnerability. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36757 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Exchange Server 2016 Cumulative Update 23 | 5030524 (Security Update) | Important | Spoofing | 5030524 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.01.2507.032 | Yes | None |
Microsoft Exchange Server 2019 Cumulative Update 12 | 5030524 (Security Update) | Important | Spoofing | 5026261 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.02.1118.037 | Yes | None |
Microsoft Exchange Server 2019 Cumulative Update 13 | 5030524 (Security Update) | Important | Spoofing | 5026261 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.02.1258.025 | Yes | None |
CVE ID | Acknowledgements |
CVE-2023-36757 | Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36756
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Exchange Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? In a network-based attack, an attacker could trigger malicious code in the context of the server's account through a network call. According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability? An attacker who successfully exploits this vulnerability could perform a remote attack that could enable access to the victim's information and the ability to alter information. Successful exploitation could also potentially cause downtime for the targeted environment. According to the CVSS metric, privileges required is low (PR:L). Does the attacker need to be in an authenticated role on the Exchange Server? Yes, the attacker must be authenticated with LAN-access and have credentials for a valid Exchange user. What updates do I need to install to be protected from this vulnerability? Customers need to install the August 2023 Exchange security updates which are listed in the Security Updates table. Customers who have already August 2023 security updates are already protected from this vulnerability. Is there more information available? Yes, please see September 2023 release of new Exchange Server CVEs for more information. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. This CVE was addressed by updates that were released in August 2023, but the CVE was inadvertently omitted from the August 2023 Security Updates. Microsoft strongly recommends that customers running affected versions of Microsoft Exchange Server install the August 2023 updates to be protected from this vulnerability. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36756 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Exchange Server 2016 Cumulative Update 23 | 5030524 (Security Update) | Important | Remote Code Execution | 5030524 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.01.2507.032 | Yes | None |
Microsoft Exchange Server 2019 Cumulative Update 12 | 5030524 (Security Update) | Important | Remote Code Execution | 5026261 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.02.1118.037 | Yes | None |
Microsoft Exchange Server 2019 Cumulative Update 13 | 5030524 (Security Update) | Important | Remote Code Execution | 5026261 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.02.1258.025 | Yes | None |
CVE ID | Acknowledgements |
CVE-2023-36756 | Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36745
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Exchange Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Executive Summary: None FAQ: According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability? An attacker who successfully exploits this vulnerability could perform a remote attack that could enable access to the victim's information and the ability to alter information. Successful exploitation could also potentially cause downtime for the targeted environment. According to the CVSS metric, privileges required is low (PR:L). Does the attacker need to be in an authenticated role on the Exchange Server? Yes, the attacker must be authenticated with LAN-access and have credentials for a valid Exchange user. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by leveraging the known (Type 4) UnitySerializationHolder gadget through a deserialization of untrusted data. Exploitation of this vulnerability requires that a user gain LAN-access as well as obtain credentials for a valid Exchange user. What updates do I need to install to be protected from this vulnerability? Customers need to install the August 2023 Exchange security updates which are listed in the Security Updates table. Customers who have already August 2023 security updates are already protected from this vulnerability. Is there more information available? Yes, please see September 2023 release of new Exchange Server CVEs for more information. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. This CVE was addressed by updates that were released in August 2023, but the CVE was inadvertently omitted from the August 2023 Security Updates. Microsoft strongly recommends that customers running affected versions of Microsoft Exchange Server install the August 2023 updates to be protected from this vulnerability. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36745 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Exchange Server 2016 Cumulative Update 23 | 5030524 (Security Update) | Important | Remote Code Execution | 5030524 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.01.2507.032 | Yes | None |
Microsoft Exchange Server 2019 Cumulative Update 12 | 5030524 (Security Update) | Important | Remote Code Execution | 5026261 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.02.1118.037 | Yes | None |
Microsoft Exchange Server 2019 Cumulative Update 13 | 5030524 (Security Update) | Important | Remote Code Execution | 5026261 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.02.1258.025 | Yes | None |
CVE ID | Acknowledgements |
CVE-2023-36745 | Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36744
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Exchange Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? In a network-based attack, an attacker could trigger malicious code in the context of the server's account through a network call. According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability? An attacker who successfully exploits this vulnerability could perform a remote attack that could enable access to the victim's information and the ability to alter information. Successful exploitation could also potentially cause downtime for the targeted environment. According to the CVSS metric, privileges required is low (PR:L). Does the attacker need to be in an authenticated role on the Exchange Server? Yes, the attacker must be authenticated with LAN-access and have credentials for a valid Exchange user. What updates do I need to install to be protected from this vulnerability? Customers need to install the August 2023 Exchange security updates which are listed in the Security Updates table. Customers who have already August 2023 security updates are already protected from this vulnerability. Is there more information available? Yes, please see September 2023 release of new Exchange Server CVEs for more information. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. This CVE was addressed by updates that were released in August 2023, but the CVE was inadvertently omitted from the August 2023 Security Updates. Microsoft strongly recommends that customers running affected versions of Microsoft Exchange Server install the August 2023 updates to be protected from this vulnerability. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36744 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Exchange Server 2016 Cumulative Update 23 | 5030524 (Security Update) | Important | Remote Code Execution | 5030524 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.01.2507.032 | Yes | None |
Microsoft Exchange Server 2019 Cumulative Update 12 | 5030524 (Security Update) | Important | Remote Code Execution | 5026261 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.02.1118.037 | Yes | None |
Microsoft Exchange Server 2019 Cumulative Update 13 | 5030524 (Security Update) | Important | Remote Code Execution | 5026261 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.02.1258.025 | Yes | None |
CVE ID | Acknowledgements |
CVE-2023-36744 | Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative
|
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36742
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Visual Studio Code Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? The user would have to open in VS Code a malicious folder that was shared with them. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36742 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Visual Studio Code | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.82.1 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-36742 | Thomas Chauchefoin with Sonar Paul Gerste with Sonar |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36736
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Identity Linux Broker Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:4.4/TemporalScore:3.9
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. How is the protection from this vulnerability applied? Microsoft Identity Linux Broker allows users with a Linux device support for bring your own device (BYOD) in an Azure AD environment. To be protected from this vulnerability you need to run the following command on the ubuntu machines:
This will pull and update the released packages. You can find the packages here:
According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. **According to the CVSS metric, Confidentiality, and Integrity is Low (CI:L). What does that mean for this vulnerability? ** An attacker is only able to compromise files that they were allowed access to as part of their initial privilege. Any encrypted data will still be protected since the attacker doesn't have access to the Device Broker encryption key as part of this vulnerability. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36736 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Identity Linux Broker | Information (Security Update) | Important | Remote Code Execution | None | Base: 4.4 Temporal: 3.9 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C |
1.6.1 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-36736 | Jamie McClymont with CyberCX Rhys Davies with CyberCX |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-41764
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Office Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Exploitation of the vulnerability requires that a user open a specially crafted file.
An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. According to the CVSS metric, the attack vector is local (AV:L) but no privileges are required (PR:N) and user interaction is required (UI:R). How could an attacker exploit this spoofing vulnerability? The attack itself is carried out locally by a user with authentication to the targeted system. An attacker could exploit the vulnerability by convincing a victim, through social engineering, to download and open a specially crafted file from a website which could lead to a local attack on the victim computer. According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of integrity (I:H)? What does that mean for this vulnerability? The vulnerability could allow an unauthenticated attacker to insert malicious content into a document which then passes the authentication check when a partial signature is present. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Moderate | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-41764 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Moderate | Spoofing | None | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Moderate | Spoofing | None | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2013 RT Service Pack 1 | 5002477 (Security Update) | Moderate | Spoofing | 5002439 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
15.0.5589.1000 | Maybe | None |
Microsoft Office 2013 Service Pack 1 (32-bit editions) | 5002477 (Security Update) | Moderate | Spoofing | 5002439 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
15.0.5589.1000 | Maybe | None |
Microsoft Office 2013 Service Pack 1 (64-bit editions) | 5002477 (Security Update) | Moderate | Spoofing | 5002439 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
15.0.5589.1000 | Maybe | None |
Microsoft Office 2016 (32-bit edition) | 5002457 (Security Update) 5002498 (Security Update) 5002100 (Security Update) |
Moderate | Spoofing | 5002419 5002465 4486670 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
16.0.5413.1000 | Maybe | None |
Microsoft Office 2016 (64-bit edition) | 5002457 (Security Update) 5002498 (Security Update) 5002100 (Security Update) |
Moderate | Spoofing | 5002419 5002465 4486670 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
16.0.5413.1000 | Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Moderate | Spoofing | None | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Moderate | Spoofing | None | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Moderate | Spoofing | None | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Moderate | Spoofing | None | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
CVE ID | Acknowledgements |
CVE-2023-41764 | Simon Rohlmann, Vladislav Mladenov, Christian Mainka and Jörg Schwenk with Ruhr University Bochum |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2022-41303
MITRE NVD Issuing CNA: Autodesk |
CVE Title: AutoDesk: CVE-2022-41303 use-after-free vulnerability in Autodesk® FBX® SDK 2020 or prior
CVSS: None Executive Summary: None FAQ: Why is this AutoDesk CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in AutoDesk software which is consumed by the Microsoft products listed in the Security Updates table. It is being documented in the Security Update Guide to announce that the latest builds of these products are no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. How do I get the updated app? The Microsoft Store will automatically update affected customers. Alternatively, customers can get the update immediately; see here for details. It is possible for customers to disable automatic updates for the Microsoft Store. The Microsoft Store will not automatically install this update for those customers. Customers using the Microsoft Store for Business and Microsoft Store for Education can get this update through their organizations. How can I check if the update is installed? App package versions 7.2307.27042.0 and later contain this update. You can check the package version in PowerShell:
Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2022-41303 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
3D Viewer | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
7.2306.12012.0 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2022-41303 | keqi hu |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-29332
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Azure Kubernetes Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain Cluster Administrator privileges. According to the CVSS metric, the attack vector is network (AV:N) and the attack complexity is low (AC:L). What does that mean for this vulnerability? The attack vector is set to Network because this vulnerability is remotely exploitable and can be exploited from the internet. The attack complexity is set to Low because an attacker does not require significant prior knowledge of the cluster/system and can achieve repeatable success when attempting to exploit this vulnerability. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Critical | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-29332 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Kubernetes Service | Release Notes (Security Update) | Critical | Elevation of Privilege | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
1.24 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-29332 | Stav Nir |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-33136
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure DevOps Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is network (AV:N), attack complexity is low (AC:L), and privilege required is low (PR:L). What is the target used in the context of the remote code execution? Successful exploitation of this vulnerability requires an attacker to have Queue Build permissions on an Azure DevOps pipeline that has an overridable variable. An attacker with these permissions could perform remote code execution (RCE) by performing a malicious input injection via a runtime parameter that could be used in place of the overridable variable. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-33136 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure DevOps Server 2019.0.1 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C |
20230601.3 | Maybe | None |
Azure DevOps Server 2019.1.2 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C |
20230825.1 | Maybe | None |
Azure DevOps Server 2020.0.2 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C |
20230820.2 | Maybe | None |
Azure DevOps Server 2020.1.2 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C |
20230823.1 | Maybe | None |
Azure DevOps Server 2022.0.1 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C |
20230825.4 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-33136 | Estevam Arantes, Microsoft Yogeesh Seralathan, Microsoft Michael Van Leeuwen, Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36886
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.6/TemporalScore:6.6
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? The user would have to click on a specially crafted URL to be compromised by the attacker. According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? The vulnerability is in the web server, but the malicious scripts execute in the victim’s browser on their machine. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges. According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability? The attacker is only able to modify the content of the vulnerable link to redirect the victim to a malicious site. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36886 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Dynamics 365 (on-premises) version 9.0 | 5029396 (Security Update) | Important | Spoofing | None | Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C |
9.0.47.xx | Maybe | None |
Microsoft Dynamics 365 (on-premises) version 9.1 | 5030608 (Security Update) | Important | Spoofing | None | Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C |
9.1.18.xx | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-36886 | batram |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-38164
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.6/TemporalScore:6.6
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? The user would have to click on a specially crafted URL to be compromised by the attacker. According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? The vulnerability is in the web server, but the malicious scripts execute in the victim’s browser on their machine. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges. According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability? The attacker is only able to modify the content of the vulnerable link to redirect the victim to a malicious site. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-38164 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Dynamics 365 (on-premises) version 9.0 | 5029396 (Security Update) | Important | Spoofing | None | Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C |
9.0.47.xx | Maybe | None |
Microsoft Dynamics 365 (on-premises) version 9.1 | 5030608 (Security Update) | Important | Spoofing | None | Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C |
9.1.18.xx | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-38164 | Norwin Boniao with https://twitter.com/norwin_boniao |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-38163
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Defender Attack Surface Reduction Security Feature Bypass
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass the Windows Defender Attack Surface Reduction blocking feature. How can I check if I'm protected from this vulnerability? This vulnerability existed in the Defender Security Intelligence Updates and not the Malware protection engine. The version of the signatures that addressed the vulnerability is 1.391.1332.0 and was updated automatically. Check the current version in Windows Update history Definition Updates to see the most recently installed definitions. According to the CVSS metric, the attack vector is local (AV:L) and user interaction is required (UI:R), what does that mean for this vulnerability? The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to click on a local file path link or download and run a malicious application or file. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-38163 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Defender Security Intelligence Updates | Release Notes (Security Update) | Important | Security Feature Bypass | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.391.1332.0 | No | None |
CVE ID | Acknowledgements |
CVE-2023-38163 | Johannes Diebold Benjamin Schiele with Paul Hartmann AG |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-38160
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows TCP/IP Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory. According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H) but have no effect on integrity (I:N) or on availability (A:N). What does that mean for this vulnerability? An attacker who successfully exploited the vulnerability could view sensitive information (Confidentiality). While the attacker can not make changes to disclosed information (Integrity) and limit access to the resource (Availability). Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-38160 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5030220 (Security Update) | Important | Information Disclosure | 5029259 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20162 | Yes | None |
Windows 10 for x64-based Systems | 5030220 (Security Update) | Important | Information Disclosure | 5029259 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20162 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5030213 (Security Update) | Important | Information Disclosure | 5029242 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5030213 (Security Update) | Important | Information Disclosure | 5029242 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5030214 (Security Update) | Important | Information Disclosure | 5029247 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5030214 (Security Update) | Important | Information Disclosure | 5029247 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5030214 (Security Update) | Important | Information Disclosure | 5029247 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5030211 (Security Update) | Important | Information Disclosure | 5029244 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5030211 (Security Update) | Important | Information Disclosure | 5029244 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5030211 (Security Update) | Important | Information Disclosure | 5029244 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3448 | Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5030211 (Security Update) | Important | Information Disclosure | 5029244 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5030211 (Security Update) | Important | Information Disclosure | 5029244 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5030211 (Security Update) | Important | Information Disclosure | 5029244 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3448 | Yes | None |
Windows 11 version 21H2 for ARM64-based Systems | 5030217 (Security Update) | Important | Information Disclosure | 5029253 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5030217 (Security Update) | Important | Information Disclosure | 5029253 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2416 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5030219 (Security Update) | Important | Information Disclosure | 5029263 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.2275 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5030219 (Security Update) | Important | Information Disclosure | 5029263 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.2275 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Information Disclosure | 5029318 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22264 |
Yes | 5030271 5030286 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Information Disclosure | 5029318 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22264 |
Yes | 5030271 5030286 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Information Disclosure | 5029318 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22264 6.0.6003.22262 |
Yes | 5030271 5030286 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5030271 (Monthly Rollup) 5030286 (Security Only) |
Important | Information Disclosure | 5029318 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22264 6.0.6003.22262 |
Yes | 5030271 5030286 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5030265 (Monthly Rollup) 5030261 (Security Only) |
Important | Information Disclosure | 5029296 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.26713 |
Yes | 5030265 5030261 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5030265 (Monthly Rollup) 5030261 (Security Only) |
Important | Information Disclosure | 5029296 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.26713 |
Yes | 5030265 5030261 |
Windows Server 2012 | 5030278 (Monthly Rollup) 5030279 (Security Only) |
Important | Information Disclosure | 5029295 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.24462 | Yes | None |
Windows Server 2012 (Server Core installation) | 5030278 (Monthly Rollup) 5030279 (Security Only) |
Important | Information Disclosure | 5029295 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.24462 | Yes | None |
Windows Server 2012 R2 | 5030269 (Monthly Rollup) 5030287 (Security Only) |
Important | Information Disclosure | 5029312 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21563 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5030269 (Monthly Rollup) 5030287 (Security Only) |
Important | Information Disclosure | 5029312 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21563 | Yes | None |
Windows Server 2016 | 5030213 (Security Update) | Important | Information Disclosure | 5029242 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows Server 2016 (Server Core installation) | 5030213 (Security Update) | Important | Information Disclosure | 5029242 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6252 | Yes | None |
Windows Server 2019 | 5030214 (Security Update) | Important | Information Disclosure | 5029247 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2019 (Server Core installation) | 5030214 (Security Update) | Important | Information Disclosure | 5029247 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4851 | Yes | None |
Windows Server 2022 | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Information Disclosure | 5029250 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
Windows Server 2022 (Server Core installation) | 5030216 (Security Update) 5030325 (AzureHotpatch) |
Important | Information Disclosure | 5029250 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.1960 |
Yes | 5030216 |
CVE ID | Acknowledgements |
CVE-2023-38160 | Wei in Kunlun Lab with Cyber KunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-38155
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure DevOps Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.3
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain administrator privileges. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment and take additional actions prior to exploitation to prepare the target environment. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-38155 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure DevOps Server 2019.0.1 | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
20230601.3 | Maybe | None |
Azure DevOps Server 2019.1.2 | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
20230825.1 | Maybe | None |
Azure DevOps Server 2020.0.2 | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
20230820.2 | Maybe | None |
Azure DevOps Server 2020.1.2 | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
20230823.1 | Maybe | None |
Azure DevOps Server 2022.0.1 | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
20230825.4 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-38155 | Mikhail Shcherbakov (@yu5k3) working with Trend Micro Zero Day Initiative |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36800
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Dynamics Finance and Operations Cross-site Scripting Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.6/TemporalScore:6.6
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? The user would have to click on a specially crafted URL to be compromised by the attacker. According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? The vulnerability is in the web server, but the malicious scripts execute in the victim’s browser on their machine. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges. According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability? The attacker is only able to modify the content of the vulnerable link to redirect the victim to a malicious site. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36800 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Dynamics 365 for Finance and Operations | Release Notes (Security Update) | Important | Spoofing | None | Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C |
10.0.xx | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-36800 | Jordi Sastre with Prodware |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36799
MITRE NVD Issuing CNA: Microsoft |
CVE Title: .NET Core and Visual Studio Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious request and convince them to open it. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36799 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
.NET 6.0 | 5030559 (Security Update) | Important | Denial of Service | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.22 | Maybe | None |
.NET 7.0 | 5030560 (Security Update) | Important | Denial of Service | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
7.0.11 | Maybe | None |
Microsoft Visual Studio 2022 version 17.2 | Release Notes (Security Update) | Important | Denial of Service | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
17.2.19 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Important | Denial of Service | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
17.4.11 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Important | Denial of Service | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
17.6.7 | Maybe | None |
Microsoft Visual Studio 2022 version 17.7 | Release Notes (Security Update) | Important | Denial of Service | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
17.7.4 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-36799 | Kevin Jones, GitHub |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36796
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Visual Studio Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Exploitation of this vulnerability requires that an attacker convinces a user to open a maliciously crafted package file in Visual Studio. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36796 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
.NET 6.0 | 5030559 (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.22 | Maybe | None |
.NET 7.0 | 5030560 (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
7.0.11 | Maybe | None |
Microsoft .NET Framework 2.0 Service Pack 2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 2.0 Service Pack 2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.0 Service Pack 2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.0 Service Pack 2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for 32-bit Systems | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.05 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for ARM64-based Systems | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.05 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for x64-based Systems | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.05 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.05 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 (Server Core installation) | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.05 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for 32-bit Systems | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.03 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for x64-based Systems | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.03 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for 32-bit Systems | 5030179 (Security Update) | Important | Remote Code Execution | 5029648 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for ARM64-based Systems | 5030179 (Security Update) | Important | Remote Code Execution | 5029648 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for x64-based Systems | 5030179 (Security Update) | Important | Remote Code Execution | 5029648 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for 32-bit Systems | 5030180 (Security Update) | Important | Remote Code Execution | 5029649 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for ARM64-based Systems | 5030180 (Security Update) | Important | Remote Code Execution | 5029649 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for x64-based Systems | 5030180 (Security Update) | Important | Remote Code Execution | 5029649 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for ARM64-based Systems | 5030181 (Security Update) | Important | Remote Code Execution | 5029650 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for x64-based Systems | 5030181 (Security Update) | Important | Remote Code Execution | 5029650 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.03 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 (Server Core installation) | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.03 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 | 5030186 (Security Update) | Important | Remote Code Execution | 5029655 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.03 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 (Server Core installation) | 5030186 (Security Update) | Important | Remote Code Execution | 5029655 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.03 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for 32-bit Systems | 5030179 (Security Update) | Important | Remote Code Execution | 5029648 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for ARM64-based Systems | 5030179 (Security Update) | Important | Remote Code Execution | 5029648 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for x64-based Systems | 5030179 (Security Update) | Important | Remote Code Execution | 5029648 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for 32-bit Systems | 5030180 (Security Update) | Important | Remote Code Execution | 5029649 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for ARM64-based Systems | 5030180 (Security Update) | Important | Remote Code Execution | 5029649 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for x64-based Systems | 5030180 (Security Update) | Important | Remote Code Execution | 5029649 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for ARM64-based Systems | 5030181 (Security Update) | Important | Remote Code Execution | 5029650 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for x64-based Systems | 5030181 (Security Update) | Important | Remote Code Execution | 5029650 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for ARM64-based Systems | 5029921 (Security Update) | Important | Remote Code Execution | 5028948 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for x64-based Systems | 5029921 (Security Update) | Important | Remote Code Execution | 5028948 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 | 5030186 (Security Update) | Important | Remote Code Execution | 5029655 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 (Server Core installation) | 5030186 (Security Update) | Important | Remote Code Execution | 5029655 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 | 5030183 (Monthly Rollup) | Important | Remote Code Execution | 5029652 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 (Server Core installation) | 5030183 (Monthly Rollup) | Important | Remote Code Execution | 5029652 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 R2 | 5030184 (Monthly Rollup) | Important | Remote Code Execution | 5029653 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 R2 (Server Core installation) | 5030184 (Monthly Rollup) | Important | Remote Code Execution | 5029653 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.5.1 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5030182 (Monthly Rollup) | Important | Remote Code Execution | 5029651 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.5.1 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5030182 (Monthly Rollup) | Important | Remote Code Execution | 5029651 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.01 | Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.01 | Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.01 | Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.01 | Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5030182 (Monthly Rollup) | Important | Remote Code Execution | 5029651 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.01 | Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5030182 (Monthly Rollup) | Important | Remote Code Execution | 5029651 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.01 | Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 | 5030183 (Monthly Rollup) | Important | Remote Code Execution | 5029652 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.02 | Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 (Server Core installation) | 5030183 (Monthly Rollup) | Important | Remote Code Execution | 5029652 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.02 | Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 | 5030184 (Monthly Rollup) | Important | Remote Code Execution | 5029653 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.02 | Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 (Server Core installation) | 5030184 (Monthly Rollup) | Important | Remote Code Execution | 5029653 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for 32-bit Systems | 5029924 (Security Update) | Important | Remote Code Execution | 5028952 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for x64-based Systems | 5029924 (Security Update) | Important | Remote Code Execution | 5028952 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5030182 (Monthly Rollup) | Important | Remote Code Execution | 5029651 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5030182 (Monthly Rollup) | Important | Remote Code Execution | 5029651 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 | 5030183 (Monthly Rollup) | Important | Remote Code Execution | 5029652 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 (Server Core installation) | 5030183 (Monthly Rollup) | Important | Remote Code Execution | 5029652 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 | 5030184 (Monthly Rollup) | Important | Remote Code Execution | 5029653 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 (Server Core installation) | 5030184 (Monthly Rollup) | Important | Remote Code Execution | 5029653 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2016 | 5029924 (Security Update) | Important | Remote Code Execution | 5028952 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2016 (Server Core installation) | 5029924 (Security Update) | Important | Remote Code Execution | 5028952 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) | Release Notes (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.9.57 | Maybe | None |
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | Release Notes (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.11.30 | Maybe | None |
Microsoft Visual Studio 2022 version 17.2 | Release Notes (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.2.19 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.4.11 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.6.7 | Maybe | None |
Microsoft Visual Studio 2022 version 17.7 | Release Notes (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.7.4 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-36796 | goodbyeselene |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36794
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Visual Studio Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Exploitation of this vulnerability requires that an attacker convinces a user to open a maliciously crafted package file in Visual Studio. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36794 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
.NET 6.0 | 5030559 (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.22 | Maybe | None |
.NET 7.0 | 5030560 (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
7.0.11 | Maybe | None |
Microsoft .NET Framework 2.0 Service Pack 2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 2.0 Service Pack 2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.0 Service Pack 2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.0 Service Pack 2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for 32-bit Systems | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.05 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for ARM64-based Systems | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.05 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for x64-based Systems | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.05 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.05 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 (Server Core installation) | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.05 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for 32-bit Systems | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.03 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for x64-based Systems | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.03 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for 32-bit Systems | 5030179 (Security Update) | Important | Remote Code Execution | 5029648 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for ARM64-based Systems | 5030179 (Security Update) | Important | Remote Code Execution | 5029648 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for x64-based Systems | 5030179 (Security Update) | Important | Remote Code Execution | 5029648 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for 32-bit Systems | 5030180 (Security Update) | Important | Remote Code Execution | 5029649 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for ARM64-based Systems | 5030180 (Security Update) | Important | Remote Code Execution | 5029649 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for x64-based Systems | 5030180 (Security Update) | Important | Remote Code Execution | 5029649 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for ARM64-based Systems | 5030181 (Security Update) | Important | Remote Code Execution | 5029650 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for x64-based Systems | 5030181 (Security Update) | Important | Remote Code Execution | 5029650 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.03 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 (Server Core installation) | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.03 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 | 5030186 (Security Update) | Important | Remote Code Execution | 5029655 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.03 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 (Server Core installation) | 5030186 (Security Update) | Important | Remote Code Execution | 5029655 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.03 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for 32-bit Systems | 5030179 (Security Update) | Important | Remote Code Execution | 5029648 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for ARM64-based Systems | 5030179 (Security Update) | Important | Remote Code Execution | 5029648 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for x64-based Systems | 5030179 (Security Update) | Important | Remote Code Execution | 5029648 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for 32-bit Systems | 5030180 (Security Update) | Important | Remote Code Execution | 5029649 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for ARM64-based Systems | 5030180 (Security Update) | Important | Remote Code Execution | 5029649 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for x64-based Systems | 5030180 (Security Update) | Important | Remote Code Execution | 5029649 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for ARM64-based Systems | 5030181 (Security Update) | Important | Remote Code Execution | 5029650 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for x64-based Systems | 5030181 (Security Update) | Important | Remote Code Execution | 5029650 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for ARM64-based Systems | 5029921 (Security Update) | Important | Remote Code Execution | 5028948 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for x64-based Systems | 5029921 (Security Update) | Important | Remote Code Execution | 5028948 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 | 5030186 (Security Update) | Important | Remote Code Execution | 5029655 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 (Server Core installation) | 5030186 (Security Update) | Important | Remote Code Execution | 5029655 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 | 5030183 (Monthly Rollup) | Important | Remote Code Execution | 5029652 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 (Server Core installation) | 5030183 (Monthly Rollup) | Important | Remote Code Execution | 5029652 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 R2 | 5030184 (Monthly Rollup) | Important | Remote Code Execution | 5029653 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 R2 (Server Core installation) | 5030184 (Monthly Rollup) | Important | Remote Code Execution | 5029653 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.5.1 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5030182 (Monthly Rollup) | Important | Remote Code Execution | 5029651 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.5.1 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5030182 (Monthly Rollup) | Important | Remote Code Execution | 5029651 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.01 | Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.01 | Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.01 | Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.01 | Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5030182 (Monthly Rollup) | Important | Remote Code Execution | 5029651 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.01 | Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5030182 (Monthly Rollup) | Important | Remote Code Execution | 5029651 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.01 | Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 | 5030183 (Monthly Rollup) | Important | Remote Code Execution | 5029652 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.02 | Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 (Server Core installation) | 5030183 (Monthly Rollup) | Important | Remote Code Execution | 5029652 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.02 | Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 | 5030184 (Monthly Rollup) | Important | Remote Code Execution | 5029653 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.02 | Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 (Server Core installation) | 5030184 (Monthly Rollup) | Important | Remote Code Execution | 5029653 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for 32-bit Systems | 5029924 (Security Update) | Important | Remote Code Execution | 5028952 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for x64-based Systems | 5029924 (Security Update) | Important | Remote Code Execution | 5028952 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5030182 (Monthly Rollup) | Important | Remote Code Execution | 5029651 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5030182 (Monthly Rollup) | Important | Remote Code Execution | 5029651 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 | 5030183 (Monthly Rollup) | Important | Remote Code Execution | 5029652 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 (Server Core installation) | 5030183 (Monthly Rollup) | Important | Remote Code Execution | 5029652 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 | 5030184 (Monthly Rollup) | Important | Remote Code Execution | 5029653 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 (Server Core installation) | 5030184 (Monthly Rollup) | Important | Remote Code Execution | 5029653 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2016 | 5029924 (Security Update) | Important | Remote Code Execution | 5028952 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2016 (Server Core installation) | 5029924 (Security Update) | Important | Remote Code Execution | 5028952 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.9.57 | Maybe | None |
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.11.30 | Maybe | None |
Microsoft Visual Studio 2022 version 17.2 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.2.19 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.4.11 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.6.7 | Maybe | None |
Microsoft Visual Studio 2022 version 17.7 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.7.4 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-36794 | goodbyeselene |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36793
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Visual Studio Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Exploitation of this vulnerability requires that an attacker convinces a user to open a maliciously crafted package file in Visual Studio. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36793 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
.NET 6.0 | 5030559 (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.22 | Maybe | None |
.NET 7.0 | 5030560 (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
7.0.11 | Maybe | None |
Microsoft .NET Framework 2.0 Service Pack 2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 2.0 Service Pack 2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.0 Service Pack 2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.0 Service Pack 2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for 32-bit Systems | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.05 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for ARM64-based Systems | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.05 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for x64-based Systems | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.05 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.05 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 (Server Core installation) | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.05 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for 32-bit Systems | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.03 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for x64-based Systems | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.03 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for 32-bit Systems | 5030179 (Security Update) | Important | Remote Code Execution | 5029648 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for ARM64-based Systems | 5030179 (Security Update) | Important | Remote Code Execution | 5029648 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for x64-based Systems | 5030179 (Security Update) | Important | Remote Code Execution | 5029648 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for 32-bit Systems | 5030180 (Security Update) | Important | Remote Code Execution | 5029649 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for ARM64-based Systems | 5030180 (Security Update) | Important | Remote Code Execution | 5029649 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for x64-based Systems | 5030180 (Security Update) | Important | Remote Code Execution | 5029649 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for ARM64-based Systems | 5030181 (Security Update) | Important | Remote Code Execution | 5029650 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for x64-based Systems | 5030181 (Security Update) | Important | Remote Code Execution | 5029650 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.03 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 (Server Core installation) | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.03 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 | 5030186 (Security Update) | Important | Remote Code Execution | 5029655 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.03 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 (Server Core installation) | 5030186 (Security Update) | Important | Remote Code Execution | 5029655 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.03 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for 32-bit Systems | 5030179 (Security Update) | Important | Remote Code Execution | 5029648 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for ARM64-based Systems | 5030179 (Security Update) | Important | Remote Code Execution | 5029648 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for x64-based Systems | 5030179 (Security Update) | Important | Remote Code Execution | 5029648 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for 32-bit Systems | 5030180 (Security Update) | Important | Remote Code Execution | 5029649 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for ARM64-based Systems | 5030180 (Security Update) | Important | Remote Code Execution | 5029649 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for x64-based Systems | 5030180 (Security Update) | Important | Remote Code Execution | 5029649 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for ARM64-based Systems | 5030181 (Security Update) | Important | Remote Code Execution | 5029650 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for x64-based Systems | 5030181 (Security Update) | Important | Remote Code Execution | 5029650 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for ARM64-based Systems | 5029921 (Security Update) | Important | Remote Code Execution | 5028948 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for x64-based Systems | 5029921 (Security Update) | Important | Remote Code Execution | 5028948 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 | 5030186 (Security Update) | Important | Remote Code Execution | 5029655 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 (Server Core installation) | 5030186 (Security Update) | Important | Remote Code Execution | 5029655 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 | 5030183 (Monthly Rollup) | Important | Remote Code Execution | 5029652 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 (Server Core installation) | 5030183 (Monthly Rollup) | Important | Remote Code Execution | 5029652 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 R2 | 5030184 (Monthly Rollup) | Important | Remote Code Execution | 5029653 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 R2 (Server Core installation) | 5030184 (Monthly Rollup) | Important | Remote Code Execution | 5029653 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.5.1 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5030182 (Monthly Rollup) | Important | Remote Code Execution | 5029651 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.5.1 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5030182 (Monthly Rollup) | Important | Remote Code Execution | 5029651 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.01 | Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.01 | Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.01 | Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.01 | Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5030182 (Monthly Rollup) | Important | Remote Code Execution | 5029651 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.01 | Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5030182 (Monthly Rollup) | Important | Remote Code Execution | 5029651 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.01 | Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 | 5030183 (Monthly Rollup) | Important | Remote Code Execution | 5029652 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.02 | Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 (Server Core installation) | 5030183 (Monthly Rollup) | Important | Remote Code Execution | 5029652 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.02 | Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 | 5030184 (Monthly Rollup) | Important | Remote Code Execution | 5029653 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.02 | Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 (Server Core installation) | 5030184 (Monthly Rollup) | Important | Remote Code Execution | 5029653 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for 32-bit Systems | 5029924 (Security Update) | Important | Remote Code Execution | 5028952 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for x64-based Systems | 5029924 (Security Update) | Important | Remote Code Execution | 5028952 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5030182 (Monthly Rollup) | Important | Remote Code Execution | 5029651 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5030182 (Monthly Rollup) | Important | Remote Code Execution | 5029651 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 | 5030184 (Monthly Rollup) | Important | Remote Code Execution | 5029653 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 (Server Core installation) | 5030184 (Monthly Rollup) | Important | Remote Code Execution | 5029653 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2016 | 5029924 (Security Update) | Important | Remote Code Execution | 5028952 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2016 (Server Core installation) | 5029924 (Security Update) | Important | Remote Code Execution | 5028952 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) | Release Notes (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.9.57 | Maybe | None |
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | Release Notes (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.11.30 | Maybe | None |
Microsoft Visual Studio 2022 version 17.2 | Release Notes (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.2.19 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.4.11 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.6.7 | Maybe | None |
Microsoft Visual Studio 2022 version 17.7 | Release Notes (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.7.4 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-36793 | goodbyeselene |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36792
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Visual Studio Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Exploitation of this vulnerability requires that an attacker convinces a user to open a maliciously crafted package file in Visual Studio. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36792 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
.NET 6.0 | 5030559 (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.22 | Maybe | None |
.NET 7.0 | 5030560 (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
7.0.11 | Maybe | None |
Microsoft .NET Framework 2.0 Service Pack 2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 2.0 Service Pack 2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.0 Service Pack 2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.0 Service Pack 2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for 32-bit Systems | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.05 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for ARM64-based Systems | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.05 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for x64-based Systems | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.05 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.05 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 (Server Core installation) | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.05 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for 32-bit Systems | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.03 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for x64-based Systems | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.03 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for 32-bit Systems | 5030179 (Security Update) | Important | Remote Code Execution | 5029648 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for ARM64-based Systems | 5030179 (Security Update) | Important | Remote Code Execution | 5029648 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for x64-based Systems | 5030179 (Security Update) | Important | Remote Code Execution | 5029648 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for 32-bit Systems | 5030180 (Security Update) | Important | Remote Code Execution | 5029649 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for ARM64-based Systems | 5030180 (Security Update) | Important | Remote Code Execution | 5029649 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for x64-based Systems | 5030180 (Security Update) | Important | Remote Code Execution | 5029649 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for ARM64-based Systems | 5030181 (Security Update) | Important | Remote Code Execution | 5029650 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for x64-based Systems | 5030181 (Security Update) | Important | Remote Code Execution | 5029650 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.03 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 (Server Core installation) | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.03 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 | 5030186 (Security Update) | Important | Remote Code Execution | 5029655 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.03 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 (Server Core installation) | 5030186 (Security Update) | Important | Remote Code Execution | 5029655 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.03 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for 32-bit Systems | 5030179 (Security Update) | Important | Remote Code Execution | 5029648 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for ARM64-based Systems | 5030179 (Security Update) | Important | Remote Code Execution | 5029648 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for x64-based Systems | 5030179 (Security Update) | Important | Remote Code Execution | 5029648 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for 32-bit Systems | 5030180 (Security Update) | Important | Remote Code Execution | 5029649 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for ARM64-based Systems | 5030180 (Security Update) | Important | Remote Code Execution | 5029649 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for x64-based Systems | 5030180 (Security Update) | Important | Remote Code Execution | 5029649 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for ARM64-based Systems | 5030181 (Security Update) | Important | Remote Code Execution | 5029650 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for x64-based Systems | 5030181 (Security Update) | Important | Remote Code Execution | 5029650 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for ARM64-based Systems | 5029921 (Security Update) | Important | Remote Code Execution | 5028948 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for x64-based Systems | 5029921 (Security Update) | Important | Remote Code Execution | 5028948 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 | 5030186 (Security Update) | Important | Remote Code Execution | 5029655 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 (Server Core installation) | 5030186 (Security Update) | Important | Remote Code Execution | 5029655 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 | 5030183 (Monthly Rollup) | Important | Remote Code Execution | 5029652 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 (Server Core installation) | 5030183 (Monthly Rollup) | Important | Remote Code Execution | 5029652 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 R2 | 5030184 (Monthly Rollup) | Important | Remote Code Execution | 5029653 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 R2 (Server Core installation) | 5030184 (Monthly Rollup) | Important | Remote Code Execution | 5029653 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.5.1 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5030182 (Monthly Rollup) | Important | Remote Code Execution | 5029651 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.5.1 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5030182 (Monthly Rollup) | Important | Remote Code Execution | 5029651 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.01 | Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.01 | Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.01 | Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.01 | Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5030182 (Monthly Rollup) | Important | Remote Code Execution | 5029651 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.01 | Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5030182 (Monthly Rollup) | Important | Remote Code Execution | 5029651 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.01 | Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 | 5030183 (Monthly Rollup) | Important | Remote Code Execution | 5029652 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.02 | Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 (Server Core installation) | 5030183 (Monthly Rollup) | Important | Remote Code Execution | 5029652 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.02 | Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 | 5030184 (Monthly Rollup) | Important | Remote Code Execution | 5029653 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.02 | Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 (Server Core installation) | 5030184 (Monthly Rollup) | Important | Remote Code Execution | 5029653 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for 32-bit Systems | 5029924 (Security Update) | Important | Remote Code Execution | 5028952 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for x64-based Systems | 5029924 (Security Update) | Important | Remote Code Execution | 5028952 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5030182 (Monthly Rollup) | Important | Remote Code Execution | 5029651 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5030182 (Monthly Rollup) | Important | Remote Code Execution | 5029651 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 | 5030183 (Monthly Rollup) | Important | Remote Code Execution | 5029652 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 (Server Core installation) | 5030183 (Monthly Rollup) | Important | Remote Code Execution | 5029652 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 | 5030184 (Monthly Rollup) | Important | Remote Code Execution | 5029653 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 (Server Core installation) | 5030184 (Monthly Rollup) | Important | Remote Code Execution | 5029653 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2016 | 5029924 (Security Update) | Important | Remote Code Execution | 5028952 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2016 (Server Core installation) | 5029924 (Security Update) | Important | Remote Code Execution | 5028952 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) | Release Notes (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.9.57 | Maybe | None |
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | Release Notes (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.11.30 | Maybe | None |
Microsoft Visual Studio 2022 version 17.2 | Release Notes (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.2.19 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.4.11 | Maybe | None |
Microsoft Visual Studio 2022 version 17.7 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.7.4 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-36792 | goodbyeselene kap0k |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36788
MITRE NVD Issuing CNA: Microsoft |
CVE Title: .NET Framework Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Exploitation of this vulnerability requires that a user trigger the payload in the application. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36788 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft .NET Framework 2.0 Service Pack 2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 2.0 Service Pack 2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.0 Service Pack 2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.0 Service Pack 2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5030185 (Monthly Rollup) | Important | Remote Code Execution | 5029654 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for 32-bit Systems | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.05 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for ARM64-based Systems | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.05 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for x64-based Systems | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.05 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.05 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 (Server Core installation) | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04063.05 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for 32-bit Systems | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.03 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for x64-based Systems | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.03 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for 32-bit Systems | 5030179 (Security Update) | Important | Remote Code Execution | 5029648 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for ARM64-based Systems | 5030179 (Security Update) | Important | Remote Code Execution | 5029648 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for x64-based Systems | 5030179 (Security Update) | Important | Remote Code Execution | 5029648 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for 32-bit Systems | 5030180 (Security Update) | Important | Remote Code Execution | 5029649 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for ARM64-based Systems | 5030180 (Security Update) | Important | Remote Code Execution | 5029649 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for x64-based Systems | 5030180 (Security Update) | Important | Remote Code Execution | 5029649 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for ARM64-based Systems | 5030181 (Security Update) | Important | Remote Code Execution | 5029650 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for x64-based Systems | 5030181 (Security Update) | Important | Remote Code Execution | 5029650 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.02 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.03 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 (Server Core installation) | 5030178 (Security Update) | Important | Remote Code Execution | 5029647 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.03 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 | 5030186 (Security Update) | Important | Remote Code Execution | 5029655 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.03 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 (Server Core installation) | 5030186 (Security Update) | Important | Remote Code Execution | 5029655 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.04667.03 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for 32-bit Systems | 5030179 (Security Update) | Important | Remote Code Execution | 5029648 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for ARM64-based Systems | 5030179 (Security Update) | Important | Remote Code Execution | 5029648 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for x64-based Systems | 5030179 (Security Update) | Important | Remote Code Execution | 5029648 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for 32-bit Systems | 5030180 (Security Update) | Important | Remote Code Execution | 5029649 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for ARM64-based Systems | 5030180 (Security Update) | Important | Remote Code Execution | 5029649 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for x64-based Systems | 5030180 (Security Update) | Important | Remote Code Execution | 5029649 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for ARM64-based Systems | 5030181 (Security Update) | Important | Remote Code Execution | 5029650 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for x64-based Systems | 5030181 (Security Update) | Important | Remote Code Execution | 5029650 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for ARM64-based Systems | 5029921 (Security Update) | Important | Remote Code Execution | 5028948 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for x64-based Systems | 5029921 (Security Update) | Important | Remote Code Execution | 5028948 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 | 5030186 (Security Update) | Important | Remote Code Execution | 5029655 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 (Server Core installation) | 5030186 (Security Update) | Important | Remote Code Execution | 5029655 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.09186.01 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 | 5030183 (Monthly Rollup) | Important | Remote Code Execution | 5029652 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 (Server Core installation) | 5030183 (Monthly Rollup) | Important | Remote Code Execution | 5029652 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 R2 | 5030184 (Monthly Rollup) | Important | Remote Code Execution | 5029653 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 R2 (Server Core installation) | 5030184 (Monthly Rollup) | Important | Remote Code Execution | 5029653 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.5.1 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5030182 (Monthly Rollup) | Important | Remote Code Execution | 5029651 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
Microsoft .NET Framework 3.5.1 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5030182 (Monthly Rollup) | Important | Remote Code Execution | 5029651 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.30729.8957 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-36788 |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36777
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Exchange Server Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.7/TemporalScore:5.0
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is file content. According to the CVSS metric, privileges required is low (PR:L). Does the attacker need to be in an authenticated role on the Exchange Server? Yes, the attacker must be authenticated with LAN-access and have credentials for a valid Exchange user. According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability? An authenticated attacker could exploit this vulnerability with LAN access. What updates do I need to install to be protected from this vulnerability? Customers need to install the August 2023 Exchange security updates which are listed in the Security Updates table. Customers who have already August 2023 security updates are already protected from this vulnerability. Is there more information available? Yes, please see September 2023 release of new Exchange Server CVEs for more information. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. This CVE was addressed by updates that were released in August 2023, but the CVE was inadvertently omitted from the August 2023 Security Updates. Microsoft strongly recommends that customers running affected versions of Microsoft Exchange Server install the August 2023 updates to be protected from this vulnerability. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36777 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Exchange Server 2016 Cumulative Update 23 | 5030524 (Security Update) | Important | Information Disclosure | 5030524 | Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
15.01.2507.032 | Yes | None |
Microsoft Exchange Server 2019 Cumulative Update 12 | 5030524 (Security Update) | Important | Information Disclosure | 5026261 | Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
15.02.1118.037 | Yes | None |
Microsoft Exchange Server 2019 Cumulative Update 13 | 5030524 (Security Update) | Important | Information Disclosure | 5026261 | Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
15.02.1258.025 | Yes | None |
CVE ID | Acknowledgements |
CVE-2023-36777 | Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36773
MITRE NVD Issuing CNA: Microsoft |
CVE Title: 3D Builder Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. How do I get the update for a Windows App? The Microsoft Store will automatically update affected customers. It is possible for customers to disable automatic updates for the Microsoft Store. The Microsoft Store will not automatically install this update for those customers. You can get the update through the store by following this guide: Get updates for apps and games in Microsoft Store. Be sure to select the tab for the operating system installed on your device to search for updates. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36773 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
3D Builder | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
20.0.4.0 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-36773 | Mat Powell of Trend Micro Zero Day Initiative |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36772
MITRE NVD Issuing CNA: Microsoft |
CVE Title: 3D Builder Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. How do I get the update for a Windows App? The Microsoft Store will automatically update affected customers. It is possible for customers to disable automatic updates for the Microsoft Store. The Microsoft Store will not automatically install this update for those customers. You can get the update through the store by following this guide: Get updates for apps and games in Microsoft Store. Be sure to select the tab for the operating system installed on your device to search for updates. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36772 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
3D Builder | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
20.0.4.0 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-36772 | Mat Powell of Trend Micro Zero Day Initiative |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36771
MITRE NVD Issuing CNA: Microsoft |
CVE Title: 3D Builder Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. How do I get the update for a Windows App? The Microsoft Store will automatically update affected customers. It is possible for customers to disable automatic updates for the Microsoft Store. The Microsoft Store will not automatically install this update for those customers. You can get the update through the store by following this guide: Get updates for apps and games in Microsoft Store. Be sure to select the tab for the operating system installed on your device to search for updates. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36771 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
3D Builder | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
20.0.4.0 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-36771 | Mat Powell of Trend Micro Zero Day Initiative |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36770
MITRE NVD Issuing CNA: Microsoft |
CVE Title: 3D Builder Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. How do I get the update for a Windows App? The Microsoft Store will automatically update affected customers. It is possible for customers to disable automatic updates for the Microsoft Store. The Microsoft Store will not automatically install this update for those customers. You can get the update through the store by following this guide: Get updates for apps and games in Microsoft Store. Be sure to select the tab for the operating system installed on your device to search for updates. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36770 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
3D Builder | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
20.0.4.0 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-36770 | Mat Powell of Trend Micro Zero Day Initiative |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36764
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft SharePoint Server Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain administrator privileges. According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability? An attacker who successfully exploits this vulnerability could perform a remote attack that could enable access to the victim's information and the ability to alter information. Successful exploitation could also potentially cause downtime for the targeted environment. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? The attacker must be authenticated to the target site as at least a Site Member. How could an attacker exploit the vulnerability? An attacker could exploit the vulnerability by creating an ASP.NET page with specially-crafted declarative markup. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36764 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft SharePoint Enterprise Server 2016 | 5002494 (Security Update) | Important | Elevation of Privilege | 5002453 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5413.1001 |
Maybe | 5002494 |
Microsoft SharePoint Server 2019 | 5002472 (Security Update) | Important | Elevation of Privilege | 5002436 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10402.20016 |
Maybe | 5002472 |
Microsoft SharePoint Server Subscription Edition | 5002474 (Security Update) | Important | Elevation of Privilege | 5002437 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.16731.20180 |
Maybe | 5002474 |
CVE ID | Acknowledgements |
CVE-2023-36764 | Markus Wulftange |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36763
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Outlook Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: None FAQ: Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. What type of information could be disclosed by this vulnerability? Exploiting this vulnerability could allow the disclosure of credentials. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36763 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Information Disclosure | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Information Disclosure | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Information Disclosure | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Information Disclosure | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Information Disclosure | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Information Disclosure | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Outlook 2016 (32-bit edition) | 5002499 (Security Update) | Important | Information Disclosure | 5002459 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
16.0.5413.1000 | Maybe | None |
Microsoft Outlook 2016 (64-bit edition) | 5002499 (Security Update) | Important | Information Disclosure | 5002459 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
16.0.5413.1000 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-36763 | Carl Pearson |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36762
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Word Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of availability (A:L)? What does that mean for this vulnerability? The performance can be interrupted and/or reduced, but the attacker cannot fully deny service. Is the Attachment Preview Pane an attack vector for this vulnerability? Yes. The attachment Preview Pane that is accessed when a user clicks to preview an attached file is an attack vector; however, the email Preview Pane itself is not. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36762 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for Mac | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L/E:U/RL:O/RC:C |
16.77.23091003 | Maybe | None |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L/E:U/RL:O/RC:C |
16.77.23091003 | Maybe | None |
Microsoft SharePoint Enterprise Server 2016 | 5002494 (Security Update) 5002501 (Security Update) |
Important | Remote Code Execution | 5002453 5002398 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L/E:U/RL:O/RC:C |
16.0.5413.1001 16.0.5413.1000 |
Maybe | 5002494 5002501 |
Microsoft Word 2016 (32-bit edition) | 5002497 (Security Update) | Important | Remote Code Execution | 5002464 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L/E:U/RL:O/RC:C |
16.0.5413.1000 | Maybe | None |
Microsoft Word 2016 (64-bit edition) | 5002497 (Security Update) | Important | Remote Code Execution | 5002464 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L/E:U/RL:O/RC:C |
16.0.5413.1000 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-36762 | Dhanesh Kizhakkinan with Mandiant |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36761
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Word Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.2/TemporalScore:5.6
Executive Summary: None FAQ: Is the Preview Pane an attack vector for this vulnerability? Yes, the Preview Pane is an attack vector. What type of information could be disclosed by this vulnerability? Exploiting this vulnerability could allow the disclosure of NTLM hashes. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Detected | Yes | Yes |
The following tables list the affected software details for the vulnerability.
CVE-2023-36761 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Information Disclosure | None | Base: 6.2 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Information Disclosure | None | Base: 6.2 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Information Disclosure | None | Base: 6.2 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Information Disclosure | None | Base: 6.2 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Information Disclosure | None | Base: 6.2 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Information Disclosure | None | Base: 6.2 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Word 2013 RT Service Pack 1 | 5002483 (Security Update) | Important | Information Disclosure | 5002445 | Base: 6.2 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
15.0.5589.1001 | Maybe | None |
Microsoft Word 2013 Service Pack 1 (32-bit editions) | 5002483 (Security Update) | Important | Information Disclosure | 5002445 | Base: 6.2 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
15.0.5589.1001 | Maybe | None |
Microsoft Word 2013 Service Pack 1 (64-bit editions) | 5002483 (Security Update) | Important | Information Disclosure | 5002445 | Base: 6.2 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
15.0.5589.1001 | Maybe | None |
Microsoft Word 2016 (32-bit edition) | 5002497 (Security Update) | Important | Information Disclosure | 5002464 | Base: 6.2 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
16.0.5413.1000 | Maybe | None |
Microsoft Word 2016 (64-bit edition) | 5002497 (Security Update) | Important | Information Disclosure | 5002464 | Base: 6.2 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
16.0.5413.1000 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-36761 | Microsoft Threat Intelligence
|
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36760
MITRE NVD Issuing CNA: Microsoft |
CVE Title: 3D Viewer Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability? An attacker who successfully exploits this vulnerability could perform a remote attack that could enable access to the victim's information and the ability to alter information. Successful exploitation could also potentially cause downtime for the targeted environment. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. How do I get the updated app? The Microsoft Store will automatically update affected customers. Alternatively, customers can get the update immediately; see here for details. It is possible for customers to disable automatic updates for the Microsoft Store. The Microsoft Store will not automatically install this update for those customers. Customers using the Microsoft Store for Business and Microsoft Store for Education can get this update through their organizations. How can I check if the update is installed? App package versions 7.2307.27042.0 and later contain this update. You can check the package version in PowerShell:
What component is affected by this vulnerability? This vulnerability affects 3MF component used within the 3D Viewer product. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36760 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
3D Viewer | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
7.2306.12012.0 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-36760 | HAO LI of VenusTech ADLab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2023-39956
MITRE NVD Issuing CNA: Electron |
CVE Title: Electron: CVE-2023-39956 -Visual Studio Code Remote Code Execution Vulnerability
CVSS: None Executive Summary: None FAQ: Why is this Electron CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Electron software which is consumed by Visual Studio Code. It is being documented in the Security Update Guide to announce that the latest build of Visual Studio Code is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-39956 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Visual Studio Code | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
1.81.2 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-39956 | Simon Siefke |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36740
MITRE NVD Issuing CNA: Microsoft |
CVE Title: 3D Viewer Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability? An attacker who successfully exploits this vulnerability could perform a remote attack that could enable access to the victim's information and the ability to alter information. Successful exploitation could also potentially cause downtime for the targeted environment. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. How do I get the updated app? The Microsoft Store will automatically update affected customers. Alternatively, customers can get the update immediately; see here for details. It is possible for customers to disable automatic updates for the Microsoft Store. The Microsoft Store will not automatically install this update for those customers. Customers using the Microsoft Store for Business and Microsoft Store for Education can get this update through their organizations. How can I check if the update is installed? App package versions 7.2307.27042.0 and later contain this update. You can check the package version in PowerShell:
What component is affected by this vulnerability? This vulnerability affects FBX component used within the 3D Viewer product. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36740 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
3D Viewer | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
7.2306.12012.0 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-36740 | HAO LI of VenusTech ADLab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-36739
MITRE NVD Issuing CNA: Microsoft |
CVE Title: 3D Viewer Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability? An attacker who successfully exploits this vulnerability could perform a remote attack that could enable access to the victim's information and the ability to alter information. Successful exploitation could also potentially cause downtime for the targeted environment. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. How do I get the updated app? The Microsoft Store will automatically update affected customers. Alternatively, customers can get the update immediately; see here for details. It is possible for customers to disable automatic updates for the Microsoft Store. The Microsoft Store will not automatically install this update for those customers. Customers using the Microsoft Store for Business and Microsoft Store for Education can get this update through their organizations. How can I check if the update is installed? App package versions 7.2307.27042.0 and later contain this update. You can check the package version in PowerShell:
What component is affected by this vulnerability? This vulnerability affects FBX component used within the 3D Viewer product. Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-36739 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
3D Viewer | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
7.2306.12012.0 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-36739 | HAO LI of VenusTech ADLab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||
CVE-2023-4863
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2023-4863 Heap buffer overflow in WebP
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    12-Sep-23     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-4863 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
116.0.5845.xxx | No | None |
CVE ID | Acknowledgements |
CVE-2023-4863 | None |