This report contains detail for the following vulnerabilities:
CVE Issued by | Tag | CVE ID | CVE Title |
---|---|---|---|
Microsoft | .NET and Visual Studio | CVE-2023-24895 | .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability |
Microsoft | .NET and Visual Studio | CVE-2023-33126 | .NET and Visual Studio Remote Code Execution Vulnerability |
Microsoft | .NET and Visual Studio | CVE-2023-24936 | .NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability |
Microsoft | .NET and Visual Studio | CVE-2023-33135 | .NET and Visual Studio Elevation of Privilege Vulnerability |
Microsoft | .NET and Visual Studio | CVE-2023-32032 | .NET and Visual Studio Elevation of Privilege Vulnerability |
Microsoft | .NET and Visual Studio | CVE-2023-32030 | .NET and Visual Studio Denial of Service Vulnerability |
Microsoft | .NET and Visual Studio | CVE-2023-33128 | .NET and Visual Studio Remote Code Execution Vulnerability |
Microsoft | .NET and Visual Studio | CVE-2023-24897 | .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability |
Microsoft | .NET Core | CVE-2023-29331 | .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability |
Microsoft | .NET Framework | CVE-2023-29326 | .NET Framework Remote Code Execution Vulnerability |
Microsoft | ASP .NET | CVE-2023-33141 | Yet Another Reverse Proxy (YARP) Denial of Service Vulnerability |
Microsoft | Azure DevOps | CVE-2023-21569 | Azure DevOps Server Spoofing Vulnerability |
Microsoft | Azure DevOps | CVE-2023-21565 | Azure DevOps Server Spoofing Vulnerability |
Microsoft | Microsoft Dynamics | CVE-2023-24896 | Dynamics 365 Finance Spoofing Vulnerability |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-2941 | Chromium: CVE-2023-2941 Inappropriate implementation in Extensions API |
Microsoft | Microsoft Edge (Chromium-based) | CVE-2023-33145 | Microsoft Edge (Chromium-based) Information Disclosure Vulnerability |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-2937 | Chromium: CVE-2023-2937 Inappropriate implementation in Picture In Picture |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-2936 | Chromium: CVE-2023-2936 Type Confusion in V8 |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-2935 | Chromium: CVE-2023-2935 Type Confusion in V8 |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-2940 | Chromium: CVE-2023-2940 Inappropriate implementation in Downloads |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-2939 | Chromium: CVE-2023-2939 Insufficient data validation in Installer |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-2938 | Chromium: CVE-2023-2938 Inappropriate implementation in Picture In Picture |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-2931 | Chromium: CVE-2023-2931 Use after free in PDF |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-2930 | Chromium: CVE-2023-2930 Use after free in Extensions |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-2929 | Chromium: CVE-2023-2929 Out of bounds write in Swiftshader |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-2934 | Chromium: CVE-2023-2934 Out of bounds memory access in Mojo |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-2933 | Chromium: CVE-2023-2933 Use after free in PDF |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-2932 | Chromium: CVE-2023-2932 Use after free in PDF |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-3079 | Chromium: CVE-2023-3079 Type Confusion in V8 |
Microsoft | Microsoft Edge (Chromium-based) | CVE-2023-29345 | Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability |
Microsoft | Microsoft Edge (Chromium-based) | CVE-2023-33143 | Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability |
Microsoft | Microsoft Exchange Server | CVE-2023-32031 | Microsoft Exchange Server Remote Code Execution Vulnerability |
Microsoft | Microsoft Exchange Server | CVE-2023-28310 | Microsoft Exchange Server Remote Code Execution Vulnerability |
Microsoft | Microsoft Office | CVE-2023-33146 | Microsoft Office Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2023-33133 | Microsoft Excel Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2023-32029 | Microsoft Excel Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2023-33137 | Microsoft Excel Remote Code Execution Vulnerability |
Microsoft | Microsoft Office OneNote | CVE-2023-33140 | Microsoft OneNote Spoofing Vulnerability |
Microsoft | Microsoft Office Outlook | CVE-2023-33131 | Microsoft Outlook Remote Code Execution Vulnerability |
Microsoft | Microsoft Office SharePoint | CVE-2023-33142 | Microsoft SharePoint Server Elevation of Privilege Vulnerability |
Microsoft | Microsoft Office SharePoint | CVE-2023-33129 | Microsoft SharePoint Denial of Service Vulnerability |
Microsoft | Microsoft Office SharePoint | CVE-2023-33130 | Microsoft SharePoint Server Spoofing Vulnerability |
Microsoft | Microsoft Office SharePoint | CVE-2023-33132 | Microsoft SharePoint Server Spoofing Vulnerability |
Microsoft | Microsoft Office SharePoint | CVE-2023-29357 | Microsoft SharePoint Server Elevation of Privilege Vulnerability |
Microsoft | Microsoft Power Apps | CVE-2023-32024 | Microsoft Power Apps Spoofing Vulnerability |
Microsoft | Microsoft Printer Drivers | CVE-2023-32017 | Microsoft PostScript Printer Driver Remote Code Execution Vulnerability |
Microsoft | Microsoft WDAC OLE DB provider for SQL | CVE-2023-29372 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability |
Microsoft | Microsoft Windows Codecs Library | CVE-2023-29370 | Windows Media Remote Code Execution Vulnerability |
Microsoft | Microsoft Windows Codecs Library | CVE-2023-29365 | Windows Media Remote Code Execution Vulnerability |
Microsoft | NuGet Client | CVE-2023-29337 | NuGet Client Remote Code Execution Vulnerability |
Microsoft | Remote Desktop Client | CVE-2023-29362 | Remote Desktop Client Remote Code Execution Vulnerability |
Microsoft | Remote Desktop Client | CVE-2023-29352 | Windows Remote Desktop Security Feature Bypass Vulnerability |
Microsoft | Role: DNS Server | CVE-2023-32020 | Windows DNS Spoofing Vulnerability |
Microsoft | SysInternals | CVE-2023-29353 | Sysinternals Process Monitor for Windows Denial of Service Vulnerability |
GitHub | Visual Studio | CVE-2023-29007 | GitHub: CVE-2023-29007 Arbitrary configuration injection via `git submodule deinit` |
Microsoft | Visual Studio | CVE-2023-33139 | Visual Studio Information Disclosure Vulnerability |
GitHub | Visual Studio | CVE-2023-25652 | GitHub: CVE-2023-25652 "git apply --reject" partially-controlled arbitrary file write |
GitHub | Visual Studio | CVE-2023-25815 | GitHub: CVE-2023-25815 Git looks for localized messages in an unprivileged place |
AutoDesk | Visual Studio | CVE-2023-27911 | AutoDesk: CVE-2023-27911 Heap buffer overflow vulnerability in Autodesk® FBX® SDK 2020 or prior |
AutoDesk | Visual Studio | CVE-2023-27910 | AutoDesk: CVE-2023-27910 stack buffer overflow vulnerability in Autodesk® FBX® SDK 2020 or prior |
GitHub | Visual Studio | CVE-2023-29011 | GitHub: CVE-2023-29011 The config file of `connect.exe` is susceptible to malicious placing |
GitHub | Visual Studio | CVE-2023-29012 | GitHub: CVE-2023-29012 Git CMD erroneously executes `doskey.exe` in current directory, if it exists |
AutoDesk | Visual Studio | CVE-2023-27909 | AutoDesk: CVE-2023-27909 Out-Of-Bounds Write Vulnerability in Autodesk® FBX® SDK 2020 or prior |
Microsoft | Visual Studio Code | CVE-2023-33144 | Visual Studio Code Spoofing Vulnerability |
Microsoft | Windows Authentication Methods | CVE-2023-29364 | Windows Authentication Elevation of Privilege Vulnerability |
Microsoft | Windows Bus Filter Driver | CVE-2023-32010 | Windows Bus Filter Driver Elevation of Privilege Vulnerability |
Microsoft | Windows Cloud Files Mini Filter Driver | CVE-2023-29361 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability |
Microsoft | Windows Collaborative Translation Framework | CVE-2023-32009 | Windows Collaborative Translation Framework Elevation of Privilege Vulnerability |
Microsoft | Windows Container Manager Service | CVE-2023-32012 | Windows Container Manager Service Elevation of Privilege Vulnerability |
Microsoft | Windows CryptoAPI | CVE-2023-24937 | Windows CryptoAPI Denial of Service Vulnerability |
Microsoft | Windows CryptoAPI | CVE-2023-24938 | Windows CryptoAPI Denial of Service Vulnerability |
Microsoft | Windows DHCP Server | CVE-2023-29355 | DHCP Server Service Information Disclosure Vulnerability |
Microsoft | Windows Filtering | CVE-2023-29368 | Windows Filtering Platform Elevation of Privilege Vulnerability |
Microsoft | Windows GDI | CVE-2023-29358 | Windows GDI Elevation of Privilege Vulnerability |
Microsoft | Windows Geolocation Service | CVE-2023-29366 | Windows Geolocation Service Remote Code Execution Vulnerability |
Microsoft | Windows Group Policy | CVE-2023-29351 | Windows Group Policy Elevation of Privilege Vulnerability |
Microsoft | Windows Hello | CVE-2023-32018 | Windows Hello Remote Code Execution Vulnerability |
Microsoft | Windows Hyper-V | CVE-2023-32013 | Windows Hyper-V Denial of Service Vulnerability |
Microsoft | Windows Installer | CVE-2023-32016 | Windows Installer Information Disclosure Vulnerability |
Microsoft | Windows iSCSI | CVE-2023-32011 | Windows iSCSI Discovery Service Denial of Service Vulnerability |
Microsoft | Windows Kernel | CVE-2023-32019 | Windows Kernel Information Disclosure Vulnerability |
Microsoft | Windows NTFS | CVE-2023-29346 | NTFS Elevation of Privilege Vulnerability |
Microsoft | Windows ODBC Driver | CVE-2023-29373 | Microsoft ODBC Driver Remote Code Execution Vulnerability |
Microsoft | Windows OLE | CVE-2023-29367 | iSCSI Target WMI Provider Remote Code Execution Vulnerability |
Microsoft | Windows PGM | CVE-2023-29363 | Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability |
Microsoft | Windows PGM | CVE-2023-32014 | Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability |
Microsoft | Windows PGM | CVE-2023-32015 | Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability |
Microsoft | Windows Remote Procedure Call Runtime | CVE-2023-29369 | Remote Procedure Call Runtime Denial of Service Vulnerability |
Microsoft | Windows Resilient File System (ReFS) | CVE-2023-32008 | Windows Resilient File System (ReFS) Remote Code Execution Vulnerability |
Microsoft | Windows Server Service | CVE-2023-32022 | Windows Server Service Security Feature Bypass Vulnerability |
Microsoft | Windows SMB | CVE-2023-32021 | Windows SMB Witness Service Security Feature Bypass Vulnerability |
Microsoft | Windows TPM Device Driver | CVE-2023-29360 | Windows TPM Device Driver Elevation of Privilege Vulnerability |
Microsoft | Windows Win32K | CVE-2023-29371 | Windows GDI Elevation of Privilege Vulnerability |
Microsoft | Windows Win32K | CVE-2023-29359 | GDI Elevation of Privilege Vulnerability |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2023-3079
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2023-3079 Type Confusion in V8
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. Google is aware that an exploit for CVE-2023-3079 exists in the wild. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    06-Jun-23     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-3079 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
114.0.1823.41 | No | None |
CVE ID | Acknowledgements |
CVE-2023-3079 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-28310
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Exchange Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Executive Summary: None FAQ: According to the CVSS metric, privileges required is low (PR:L). Does the attacker need to be in an authenticated role on the Exchange Server? Yes, the attacker must be authenticated. How could an attacker exploit this vulnerability? An authenticated attacker who is on the same intranet as the Exchange server can achieve remote code execution via a PowerShell remoting session. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-28310 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Exchange Server 2016 Cumulative Update 23 | 5025903 (Security Update) | Important | Remote Code Execution | 5024296 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.01.2507.027 | Yes | None |
Microsoft Exchange Server 2019 Cumulative Update 12 | 5026261 (Security Update) | Important | Remote Code Execution | 5024296 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.02.1118.030 | Yes | None |
Microsoft Exchange Server 2019 Cumulative Update 13 | 5026261 (Security Update) | Important | Remote Code Execution | 5024296 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.02.1258.016 | Yes | None |
CVE ID | Acknowledgements |
CVE-2023-28310 | Anonymous, m4yfly with TianGong Team of Legendsec at Qi'anxin Group, Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-24896
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Dynamics 365 Finance Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.4/TemporalScore:4.7
Executive Summary: None FAQ: According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges. According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? A user could be tricked into entering credentials or responding to a pop up after opening a specially crafted file or clicking on a link, typically by way of an enticement in an email or URL. According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability? The user would need to access the URL of the malicious website, which could spoof the content of a legitimate website, and then click a popup displayed on that site. According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L)? What does that mean for this vulnerability? Limited information from the victim's browser associated with the vulnerable URL can be sent to the attacker by the malicious code. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-24896 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Dynamics 365 for Finance and Operations | Important | Spoofing | None | Base: 5.4 Temporal: 4.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2023-24896 | Khalid Amin with Cyshield |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-24897
MITRE NVD Issuing CNA: Microsoft |
CVE Title: .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-24897 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
.NET 6.0 | 5027797 (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.18 | Maybe | None |
.NET 7.0 | 5027798 (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
7.0.7 | Maybe | None |
Microsoft .NET Framework 3.5 and 4.6.2 on Windows 10 for 32-bit Systems | 5027230 (Security Update) | Critical | Remote Code Execution | 5026382 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Microsoft .NET Framework 3.5 and 4.6.2 on Windows 10 for x64-based Systems | 5027230 (Security Update) | Critical | Remote Code Execution | 5026382 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 on Windows 10 Version 1607 for 32-bit Systems | 5027219 (Security Update) | Critical | Remote Code Execution | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 on Windows 10 Version 1607 for x64-based Systems | 5027219 (Security Update) | Critical | Remote Code Execution | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2016 | 5027219 (Security Update) | Critical | Remote Code Execution | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for 32-bit Systems | 5027536 (Security Update) | Critical | Remote Code Execution | 5022782 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.4050.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for ARM64-based Systems | 5027536 (Security Update) | Critical | Remote Code Execution | 5022782 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.4050.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for x64-based Systems | 5027536 (Security Update) | Critical | Remote Code Execution | 5022782 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 | 5027536 (Security Update) | Critical | Remote Code Execution | 5022782 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.4050.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 (Server Core installation) | 5027536 (Security Update) | Critical | Remote Code Execution | 5022782 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.4050.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for 32-bit Systems | 5027536 (Security Update) | Critical | Remote Code Execution | 5022782 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for x64-based Systems | 5027536 (Security Update) | Critical | Remote Code Execution | 5022782 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for 32-bit Systems | 5027537 (Security Update) | Critical | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for ARM64-based Systems | 5027537 (Security Update) | Critical | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for x64-based Systems | 5027537 (Security Update) | Critical | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for 32-bit Systems | 5027538 (Security Update) | Critical | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for ARM64-based Systems | 5027538 (Security Update) | Critical | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for x64-based Systems | 5027538 (Security Update) | Critical | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for ARM64-based Systems | 5027539 (Security Update) | Critical | Remote Code Execution | 5026959, 5022730 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for x64-based Systems | 5027539 (Security Update) | Critical | Remote Code Execution | 5026959, 5022730 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 | 5027536 (Security Update) | Critical | Remote Code Execution | 5022782 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 (Server Core installation) | 5027536 (Security Update) | Critical | Remote Code Execution | 5022782 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 | 5027544 (Security Update) | Critical | Remote Code Execution | 5022735, 5022726 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 (Server Core installation) | 5027544 (Security Update) | Critical | Remote Code Execution | 5022735, 5022726 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for 32-bit Systems | 5027537 (Security Update) | Critical | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for ARM64-based Systems | 5027537 (Security Update) | Critical | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for x64-based Systems | 5027537 (Security Update) | Critical | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for 32-bit Systems | 5027538 (Security Update) | Critical | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for ARM64-based Systems | 5027538 (Security Update) | Critical | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for x64-based Systems | 5027538 (Security Update) | Critical | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for ARM64-based Systems | 5027539 (Security Update) | Critical | Remote Code Execution | 5026959, 5022730 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for x64-based Systems | 5027539 (Security Update) | Critical | Remote Code Execution | 5026959, 5022730 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for ARM64-based Systems | 5027119 (Security Update) | Critical | Remote Code Execution | 5026515, 5022497 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for x64-based Systems | 5027119 (Security Update) | Critical | Remote Code Execution | 5026515, 5022497 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 | 5027544 (Security Update) | Critical | Remote Code Execution | 5022735 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 (Server Core installation) | 5027544 (Security Update) | Critical | Remote Code Execution | 5022735 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5027543 (Monthly Rollup) 5027534 (Security Only) |
Critical | Remote Code Execution | 5022731, 5022734 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5027543 (Monthly Rollup) 5027534 (Security Only) |
Critical | Remote Code Execution | 5022731, 5022734 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5027543 (Monthly Rollup) 5027534 (Security Only) |
Critical | Remote Code Execution | 5022731, 5022734 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5027543 (Monthly Rollup) 5027534 (Security Only) |
Critical | Remote Code Execution | 5022731, 5022734 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5027540 (Monthly Rollup) 5027531 (Security Only) |
Critical | Remote Code Execution | 5022731 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5027540 (Monthly Rollup) 5027531 (Security Only) |
Critical | Remote Code Execution | 5022731 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 | 5027541 (Monthly Rollup) 5027532 (Security Only) |
Critical | Remote Code Execution | 5022732 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 (Server Core installation) | 5027541 (Monthly Rollup) 5027532 (Security Only) |
Critical | Remote Code Execution | 5022732 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 | 5027542 (Monthly Rollup) 5027533 (Security Only) |
Critical | Remote Code Execution | 5022733 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 (Server Core installation) | 5027542 (Monthly Rollup) 5027533 (Security Only) |
Critical | Remote Code Execution | 5022733 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for 32-bit Systems | 5027123 (Security Update) | Critical | Remote Code Execution | 5022503 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for x64-based Systems | 5027123 (Security Update) | Critical | Remote Code Execution | 5022503 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5027540 (Monthly Rollup) 5027531 (Security Only) |
Critical | Remote Code Execution | 5022731 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5027540 (Monthly Rollup) 5027531 (Security Only) |
Critical | Remote Code Execution | 5022731 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 | 5027541 (Monthly Rollup) 5027532 (Security Only) |
Critical | Remote Code Execution | 5022732 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 (Server Core installation) | 5027541 (Monthly Rollup) 5027532 (Security Only) |
Critical | Remote Code Execution | 5022732 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 | 5027542 (Monthly Rollup) 5027533 (Security Only) |
Critical | Remote Code Execution | 5022733 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 (Server Core installation) | 5027542 (Monthly Rollup) 5027533 (Security Only) |
Critical | Remote Code Execution | 5022733 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2016 | 5027123 (Security Update) | Critical | Remote Code Execution | 5022503 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2016 (Server Core installation) | 5027123 (Security Update) | Critical | Remote Code Execution | 5022503 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft Visual Studio 2013 Update 5 | 5026610 (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
12.0.40700.0 | Maybe | None |
Microsoft Visual Studio 2015 Update 3 | 5025792 (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
14.0.27555.0 | Maybe | None |
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) | Release Notes (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.9.55 | Maybe | None |
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | Release Notes (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.11.27 | Maybe | None |
Microsoft Visual Studio 2022 version 17.0 | Release Notes (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.0.22 | Maybe | None |
Microsoft Visual Studio 2022 version 17.2 | Release Notes (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.2.16 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.4.8 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.6.3 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-24897 | goodbyeselene HAO LI of VenusTech ADLab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-24937
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows CryptoAPI Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-24937 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5027222 (Security Update) | Important | Denial of Service | 5026362 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for ARM64-based Systems | 5027222 (Security Update) | Important | Denial of Service | 5026362 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for x64-based Systems | 5027222 (Security Update) | Important | Denial of Service | 5026362 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 21H2 for 32-bit Systems | 5027215 (Security Update) | Important | Denial of Service | 5026361 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Denial of Service | 5026361 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for x64-based Systems | 5027215 (Security Update) | Important | Denial of Service | 5026361 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for 32-bit Systems | 5027215 (Security Update) | Important | Denial of Service | 5026361 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Denial of Service | 5026361 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for x64-based Systems | 5027215 (Security Update) | Important | Denial of Service | 5026361 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 11 version 21H2 for ARM64-based Systems | 5027223 (Security Update) | Important | Denial of Service | 5026368 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 version 21H2 for x64-based Systems | 5027223 (Security Update) | Important | Denial of Service | 5026368 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 Version 22H2 for ARM64-based Systems | 5027231 (Security Update) | Important | Denial of Service | 5026372 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows 11 Version 22H2 for x64-based Systems | 5027231 (Security Update) | Important | Denial of Service | 5026372 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows Server 2019 | 5027222 (Security Update) | Important | Denial of Service | 5026362 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2019 (Server Core installation) | 5027222 (Security Update) | Important | Denial of Service | 5026362 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2022 | 5027225 (Security Update) | Important | Denial of Service | 5026370 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
Windows Server 2022 (Server Core installation) | 5027225 (Security Update) | Important | Denial of Service | 5026370 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
CVE ID | Acknowledgements |
CVE-2023-24937 | Kevin Jones with GitHub |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-24938
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows CryptoAPI Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-24938 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5027222 (Security Update) | Important | Denial of Service | 5026362 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for ARM64-based Systems | 5027222 (Security Update) | Important | Denial of Service | 5026362 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for x64-based Systems | 5027222 (Security Update) | Important | Denial of Service | 5026362 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 21H2 for 32-bit Systems | 5027215 (Security Update) | Important | Denial of Service | 5026361 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Denial of Service | 5026361 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for x64-based Systems | 5027215 (Security Update) | Important | Denial of Service | 5026361 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for 32-bit Systems | 5027215 (Security Update) | Important | Denial of Service | 5026361 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Denial of Service | 5026361 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for x64-based Systems | 5027215 (Security Update) | Important | Denial of Service | 5026361 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 11 version 21H2 for ARM64-based Systems | 5027223 (Security Update) | Important | Denial of Service | 5026368 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 version 21H2 for x64-based Systems | 5027223 (Security Update) | Important | Denial of Service | 5026368 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 Version 22H2 for ARM64-based Systems | 5027231 (Security Update) | Important | Denial of Service | 5026372 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows 11 Version 22H2 for x64-based Systems | 5027231 (Security Update) | Important | Denial of Service | 5026372 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows Server 2019 | 5027222 (Security Update) | Important | Denial of Service | 5026362 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2019 (Server Core installation) | 5027222 (Security Update) | Important | Denial of Service | 5026362 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2022 | 5027225 (Security Update) | Important | Denial of Service | 5026370 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
Windows Server 2022 (Server Core installation) | 5027225 (Security Update) | Important | Denial of Service | 5026370 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
CVE ID | Acknowledgements |
CVE-2023-24938 | Ashutosh Singh and Rishabh Rathore |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-29326
MITRE NVD Issuing CNA: Microsoft |
CVE Title: .NET Framework Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-29326 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft .NET Framework 2.0 Service Pack 2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5027543 (Monthly Rollup) 5027534 (Security Only) |
Important | Remote Code Execution | 5022734 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 2.0 Service Pack 2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5027543 (Monthly Rollup) 5027534 (Security Only) |
Important | Remote Code Execution | 5022734 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 3.0 Service Pack 2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5027543 (Monthly Rollup) 5027534 (Security Only) |
Important | Remote Code Execution | 5022734 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 3.0 Service Pack 2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5027543 (Monthly Rollup) 5027534 (Security Only) |
Important | Remote Code Execution | 5022734 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 3.5 and 4.6.2 on Windows 10 for 32-bit Systems | 5027230 (Security Update) | Important | Remote Code Execution | 5026382 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Microsoft .NET Framework 3.5 and 4.6.2 on Windows 10 for x64-based Systems | 5027230 (Security Update) | Important | Remote Code Execution | 5026382 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 on Windows 10 Version 1607 for 32-bit Systems | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 on Windows 10 Version 1607 for x64-based Systems | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2016 | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2016 (Server Core installation) | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for 32-bit Systems | 5027536 (Security Update) | Important | Remote Code Execution | 5022782 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.4050.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for ARM64-based Systems | 5027536 (Security Update) | Important | Remote Code Execution | 5022782 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.4050.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for x64-based Systems | 5027536 (Security Update) | Important | Remote Code Execution | 5022782 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 | 5027536 (Security Update) | Important | Remote Code Execution | 5022782 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.4050.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 (Server Core installation) | 5027536 (Security Update) | Important | Remote Code Execution | 5022782 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.4050.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for 32-bit Systems | 5027536 (Security Update) | Important | Remote Code Execution | 5022782 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for x64-based Systems | 5027536 (Security Update) | Important | Remote Code Execution | 5022782 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for 32-bit Systems | 5027537 (Security Update) | Important | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for ARM64-based Systems | 5027537 (Security Update) | Important | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for x64-based Systems | 5027537 (Security Update) | Important | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for 32-bit Systems | 5027538 (Security Update) | Important | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for ARM64-based Systems | 5027538 (Security Update) | Important | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for x64-based Systems | 5027538 (Security Update) | Important | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for ARM64-based Systems | 5027539 (Security Update) | Important | Remote Code Execution | 5026959, 5022730 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for x64-based Systems | 5027539 (Security Update) | Important | Remote Code Execution | 5026959, 5022730 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 | 5027536 (Security Update) | Important | Remote Code Execution | 5022782 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 (Server Core installation) | 5027536 (Security Update) | Important | Remote Code Execution | 5022782 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 | 5027544 (Security Update) | Important | Remote Code Execution | 5022735, 5022726 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 (Server Core installation) | 5027544 (Security Update) | Important | Remote Code Execution | 5022735, 5022726 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for 32-bit Systems | 5027537 (Security Update) | Important | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for ARM64-based Systems | 5027537 (Security Update) | Important | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for x64-based Systems | 5027537 (Security Update) | Important | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for 32-bit Systems | 5027538 (Security Update) | Important | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for ARM64-based Systems | 5027538 (Security Update) | Important | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for x64-based Systems | 5027538 (Security Update) | Important | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for ARM64-based Systems | 5027539 (Security Update) | Important | Remote Code Execution | 5026959, 5022730 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for x64-based Systems | 5027539 (Security Update) | Important | Remote Code Execution | 5026959, 5022730 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for ARM64-based Systems | 5027119 (Security Update) | Important | Remote Code Execution | 5026515, 5022497 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for x64-based Systems | 5027119 (Security Update) | Important | Remote Code Execution | 5026515, 5022497 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 | 5027544 (Security Update) | Important | Remote Code Execution | 5022735 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 (Server Core installation) | 5027544 (Security Update) | Important | Remote Code Execution | 5022735 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 | 5027541 (Monthly Rollup) 5027532 (Security Only) |
Important | Remote Code Execution | 5022732 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 (Server Core installation) | 5027541 (Monthly Rollup) 5027532 (Security Only) |
Important | Remote Code Execution | 5022732 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 R2 | 5027542 (Monthly Rollup) 5027533 (Security Only) |
Important | Remote Code Execution | 5022733 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 R2 (Server Core installation) | 5027542 (Monthly Rollup) 5027533 (Security Only) |
Important | Remote Code Execution | 5022733 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 3.5.1 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5027540 (Monthly Rollup) 5027531 (Security Only) |
Important | Remote Code Execution | 5022731 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 3.5.1 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5027540 (Monthly Rollup) 5027531 (Security Only) |
Important | Remote Code Execution | 5022731 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-29326 |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-29345
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.1/TemporalScore:5.3
Executive Summary: None FAQ: According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? This vulnerability could lead to a browser sandbox escape. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? The user would have to click on a specially crafted URL to be compromised by the attacker. According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability? Integrity is impacted as XSS allows an attacker to add their malicious script to fetch victim's sensitive info or to change DOM execution. According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L)? What does that mean for this vulnerability? Limited information from the victim's browser associated with the vulnerable URL can be sent to the attacker by the malicious code. What kind of security feature could be bypassed by successfully exploiting this vulnerability? The permissions dialog feature could be bypassed when prompted while attempting to download. Mitigations: None Workarounds: None Revision: 1.0    02-Jun-23     Information published. |
Low | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-29345 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Low | Security Feature Bypass | None | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C |
114.0.1823.37 | No | None |
CVE ID | Acknowledgements |
CVE-2023-29345 | lxhom |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-29353
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Sysinternals Process Monitor for Windows Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: None FAQ: How do I get the update for a Windows App? The Microsoft Store will automatically update affected customers. It is possible for customers to disable automatic updates for the Microsoft Store. The Microsoft Store will not automatically install this update for those customers. You can get the update through the store by following this guide: Get updates for apps and games in Microsoft Store. Note that Process Monitor is only available as part of an MSIX package called Sysinternals Suite. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Low | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-29353 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Sysinternals Suite | Release Notes (Security Update) | Low | Denial of Service | None | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
2023.6 | Maybe | None |
Windows Sysinternals Process Monitor | Release Notes (Security Update) | Low | Denial of Service | None | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
3.94 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-29353 | M. Akil Gündoğan |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-32024
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Power Apps Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:3.0/TemporalScore:2.6
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? The user would have to click on a specially crafted URL to be compromised by the attacker. According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? The vulnerability is in the web server, but the malicious scripts execute in the victim’s browser on their machine. According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L)? What does that mean for this vulnerability? Information in the victim's browser associated with the vulnerable URL can be read by the malicious JavaScript code and sent to the attacker. How do I know that I'm protected from this vulnerability? A new PowerApp compiler (version 3.23052.16) has been rolled out world wide. If you have an existing Canvas App you'll need to to save and republish your canvas app. Please see Save and publish canvas apps for information on this process. If you create a new Canvas App you will already be protected from this vulnerability. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-32024 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Power Apps | Information (Security Update) | Important | Spoofing | None | Base: 3.0 Temporal: 2.6 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C |
3.23052.16 | No | None |
CVE ID | Acknowledgements |
CVE-2023-32024 | Jordan Hopkins |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-32029
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince the user to open said file. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-32029 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Excel 2013 RT Service Pack 1 | 5002414 (Security Update) | Important | Remote Code Execution | 5002384 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.5563.1000 | Maybe | None |
Microsoft Excel 2013 Service Pack 1 (32-bit editions) | 5002414 (Security Update) | Important | Remote Code Execution | 5002384 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.5563.1000 | Maybe | None |
Microsoft Excel 2013 Service Pack 1 (64-bit editions) | 5002414 (Security Update) | Important | Remote Code Execution | 5002384 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.5563.1000 | Maybe | None |
Microsoft Excel 2016 (32-bit edition) | 5002405 (Security Update) | Important | Remote Code Execution | 5002386 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5400.1000 | Maybe | None |
Microsoft Excel 2016 (64-bit edition) | 5002405 (Security Update) | Important | Remote Code Execution | 5002386 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5400.1000 | Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for Mac | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.74.23061100 | Maybe | None |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.74.23061100 | Maybe | None |
Microsoft Office Online Server | 5002401 (Security Update) | Important | Remote Code Execution | 5002372 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10399.20000 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-32029 | Marcin 'Icewall' Noga with Cisco Talos |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-32031
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Exchange Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, privileges required is low (PR:L). Does the attacker need to be in an authenticated role on the Exchange Server? Yes, the attacker must be authenticated. According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is none (UI:N). What is the target used in the context of the remote code execution? The attacker for this vulnerability could target the server accounts in an arbitrary or remote code execution. As an authenticated user, the attacker could attempt to trigger malicious code in the context of the server's account through a network call. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-32031 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Exchange Server 2016 Cumulative Update 23 | 5025903 (Security Update) | Important | Remote Code Execution | 5024296 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.01.2507.027 | Yes | None |
Microsoft Exchange Server 2019 Cumulative Update 12 | 5026261 (Security Update) | Important | Remote Code Execution | 5024296 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.02.1118.030 | Yes | None |
Microsoft Exchange Server 2019 Cumulative Update 13 | 5026261 (Security Update) | Important | Remote Code Execution | 5024296 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.02.1258.016 | Yes | None |
CVE ID | Acknowledgements |
CVE-2023-32031 | Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-33137
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince the user to open said file. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-33137 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Excel 2013 RT Service Pack 1 | 5002414 (Security Update) | Important | Remote Code Execution | 5002384 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.5563.1000 | Maybe | None |
Microsoft Excel 2013 Service Pack 1 (32-bit editions) | 5002414 (Security Update) | Important | Remote Code Execution | 5002384 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.5563.1000 | Maybe | None |
Microsoft Excel 2013 Service Pack 1 (64-bit editions) | 5002414 (Security Update) | Important | Remote Code Execution | 5002384 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.5563.1000 | Maybe | None |
Microsoft Excel 2016 (32-bit edition) | 5002405 (Security Update) | Important | Remote Code Execution | 5002386 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5400.1000 | Maybe | None |
Microsoft Excel 2016 (64-bit edition) | 5002405 (Security Update) | Important | Remote Code Execution | 5002386 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5400.1000 | Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office Online Server | 5002401 (Security Update) | Important | Remote Code Execution | 5002372 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10399.20000 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-33137 | Excel Engineering team |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-33139
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Visual Studio Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.0
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is information disclosure? The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer which could leak data. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-33139 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Visual Studio 2013 Update 5 | 5026454 (Security Update) | Important | Information Disclosure | None | Base: 5.5 Temporal: 5.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
12.0.40702.0 | Maybe | None |
Microsoft Visual Studio 2015 Update 3 | 5026455 (Security Update) | Important | Information Disclosure | None | Base: 5.5 Temporal: 5.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
14.0.27554.0 | Maybe | None |
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) | Release Notes (Security Update) | Important | Information Disclosure | None | Base: 5.5 Temporal: 5.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
15.9.55 | Maybe | None |
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | Release Notes (Security Update) | Important | Information Disclosure | None | Base: 5.5 Temporal: 5.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
16.11.27 | Maybe | None |
Microsoft Visual Studio 2022 version 17.0 | Release Notes (Security Update) | Important | Information Disclosure | None | Base: 5.5 Temporal: 5.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
17.0.22 | Maybe | None |
Microsoft Visual Studio 2022 version 17.2 | Release Notes (Security Update) | Important | Information Disclosure | None | Base: 5.5 Temporal: 5.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
17.2.16 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Important | Information Disclosure | None | Base: 5.5 Temporal: 5.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
17.4.8 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Important | Information Disclosure | None | Base: 5.5 Temporal: 5.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
17.6.3 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-33139 | HAO LI of VenusTech ADLab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||
CVE-2023-33143
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Exploitation of the vulnerability requires that a user open a specially crafted file.
An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? This vulnerability could lead to a browser sandbox escape. According to the CVSS metric, successful exploitation of this vulnerability could lead to loss of availability (A:H)? What does that mean for this vulnerability? Successful exploitation of this vulnerability requires the user to click on a malicious URL or an embedded link in an email message which could lead to denial of service (DOS) or the Browser to crash. According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L)? What does that mean for this vulnerability? Information in the victim's browser associated with the vulnerable URL can be read by the malicious JavaScript code and sent to the attacker. According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability? The user would need to access the URL of the malicious website, which could spoof the content of a legitimate website, and then click a popup displayed on that site. What is the version information for this release?
What privileges could be gained by an attacker who successfully exploited the vulnerability? The attacker would gain the rights of the user that is running the affected application. Mitigations: None Workarounds: None Revision: 1.0    02-Jun-23     Information published. |
Moderate | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-33143 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Moderate | Elevation of Privilege | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:H/E:U/RL:O/RC:C |
114.0.1823.37 | No | None |
CVE ID | Acknowledgements |
CVE-2023-33143 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-33146
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? A user needs to be tricked into running malicious files. Are the updates for the Microsoft Office for Mac currently available? The security update for Microsoft Office 2019 for Mac and Microsoft Office LTSC for Mac 2021 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. Where can I find more information? Please see the Microsoft 365 Insider Blog Post relating to the temporary disablement of the ability to insert SketchUp graphics (.skp files) here: SketchUp files in Office Update. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-33146 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for Mac | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.74.23061100 | Maybe | None |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.74.23061100 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-33146 | greenbamboo Kai Lu with Zscaler's ThreatLabz |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-21565
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure DevOps Server Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.2
Executive Summary: None FAQ: According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges. According to the CVSS metric, successful exploitation of this vulnerability could lead to no loss of availability (A:N)? What does that mean for this vulnerability? An attacker cannot impact the availability of the service. According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H)? What does that mean for this vulnerability? An attacker who successfully exploited the vulnerability could access data that is available for the current user. Depending on the user's authorization the attacker could collect detailed data about ADO elements such as org/proj configuration, users, groups, teams, projects, pipelines, board, or wiki. An attacker could also craft page elements to collect user secrets. According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability? An attacker is able to manipulate DOM model of website adding/removing elements, with crafted script is able to do actions on ADO in current user context without user consent or awareness. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-21565 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure DevOps Server 2020.1.2 | Release Notes (Security Update) | Important | Spoofing | None | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
20230601.3 | Maybe | None |
Azure DevOps Server 2022 | Release Notes (Security Update) | Important | Spoofing | None | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
20230602.4 | Maybe | None |
Azure DevOps Server 2022.0.1 | Release Notes (Security Update) | Important | Spoofing | None | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
20230602.5 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-21565 | Martin Wrona (martin_jw) with Digitec Galaxus AG |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-21569
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure DevOps Server Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: None FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to minor loss of confidentiality (C:L), integrity (I:L) and availability (A:L). What does that mean for this vulnerability? While we cannot rule out the impact to Confidentiality, Integrity, and Availability, the ability to exploit this vulnerability by itself is limited. An attacker would need to combine this with other vulnerabilities to perform an attack. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker would have to send the victim a malicious file that the victim would have to execute. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-21569 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure DevOps Server 2020.1.2 | Release Notes (Security Update) | Important | Spoofing | None | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C |
20230601.3 | Maybe | None |
Azure DevOps Server 2022 | Release Notes (Security Update) | Moderate | Spoofing | None | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C |
20230602.4 | Maybe | None |
Azure DevOps Server 2022.0.1 | Release Notes (Security Update) | Moderate | Spoofing | None | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C |
20230602.5 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-21569 | Martin Wrona (martin_jw) with Digitec Galaxus AG |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-24895
MITRE NVD Issuing CNA: Microsoft |
CVE Title: .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-24895 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
.NET 6.0 | 5027797 (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.18 | Maybe | None |
.NET 7.0 | 5027798 (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
7.0.7 | Maybe | None |
Microsoft .NET Framework 2.0 Service Pack 2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5027543 (Monthly Rollup) 5027534 (Security Only) |
Important | Remote Code Execution | 5022734 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 2.0 Service Pack 2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5027534 (Security Only) 5027543 (Monthly Rollup) |
Important | Remote Code Execution | 5022734 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.4050.0 3.0.6920.8954; 2.0.50727.8970 |
Maybe | None |
Microsoft .NET Framework 3.0 Service Pack 2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5027543 (Monthly Rollup) 5027534 (Security Only) |
Important | Remote Code Execution | 5022734 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 3.0 Service Pack 2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5027534 (Security Only) 5027543 (Monthly Rollup) |
Important | Remote Code Execution | 5022734 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.4050.0 3.0.6920.8954; 2.0.50727.8970 |
Maybe | None |
Microsoft .NET Framework 3.5 and 4.6.2 on Windows 10 for 32-bit Systems | 5027230 (Security Update) | Important | Remote Code Execution | 5026382 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Microsoft .NET Framework 3.5 and 4.6.2 on Windows 10 for x64-based Systems | 5027230 (Security Update) | Important | Remote Code Execution | 5026382 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 on Windows 10 Version 1607 for 32-bit Systems | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 on Windows 10 Version 1607 for x64-based Systems | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2016 | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2016 (Server Core installation) | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for 32-bit Systems | 5027536 (Security Update) | Important | Remote Code Execution | 5022782 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.4050.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for ARM64-based Systems | 5027536 (Security Update) | Important | Remote Code Execution | 5022782 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.4050.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for x64-based Systems | 5027536 (Security Update) | Important | Remote Code Execution | 5022782 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 | 5027536 (Security Update) | Important | Remote Code Execution | 5022782 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.4050.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 (Server Core installation) | 5027536 (Security Update) | Important | Remote Code Execution | 5022782 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.4050.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for 32-bit Systems | 5027536 (Security Update) | Important | Remote Code Execution | 5022782 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for x64-based Systems | 5027536 (Security Update) | Important | Remote Code Execution | 5022782 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for 32-bit Systems | 5027537 (Security Update) | Important | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for ARM64-based Systems | 5027537 (Security Update) | Important | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for x64-based Systems | 5027537 (Security Update) | Important | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for 32-bit Systems | 5027538 (Security Update) | Important | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for ARM64-based Systems | 5027538 (Security Update) | Important | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for x64-based Systems | 5027538 (Security Update) | Important | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for ARM64-based Systems | 5027539 (Security Update) | Important | Remote Code Execution | 5026959, 5022730 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for x64-based Systems | 5027539 (Security Update) | Important | Remote Code Execution | 5026959, 5022730 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 | 5027536 (Security Update) | Important | Remote Code Execution | 5022782 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 (Server Core installation) | 5027536 (Security Update) | Important | Remote Code Execution | 5022782 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 | 5027544 (Security Update) | Important | Remote Code Execution | 5022735, 5022726 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 (Server Core installation) | 5027544 (Security Update) | Important | Remote Code Execution | 5022735, 5022726 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for 32-bit Systems | 5027537 (Security Update) | Important | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for ARM64-based Systems | 5027537 (Security Update) | Important | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for x64-based Systems | 5027537 (Security Update) | Important | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for 32-bit Systems | 5027538 (Security Update) | Important | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for ARM64-based Systems | 5027538 (Security Update) | Important | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for x64-based Systems | 5027538 (Security Update) | Important | Remote Code Execution | 5022728, 5026958, 5022729 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for ARM64-based Systems | 5027539 (Security Update) | Important | Remote Code Execution | 5026959, 5022730 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for x64-based Systems | 5027539 (Security Update) | Important | Remote Code Execution | 5026959, 5022730 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for ARM64-based Systems | 5027119 (Security Update) | Important | Remote Code Execution | 5026515, 5022497 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for x64-based Systems | 5027119 (Security Update) | Important | Remote Code Execution | 5026515, 5022497 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 | 5027544 (Security Update) | Important | Remote Code Execution | 5022735 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 (Server Core installation) | 5027544 (Security Update) | Important | Remote Code Execution | 5022735 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 | 5027541 (Monthly Rollup) 5027532 (Security Only) |
Important | Remote Code Execution | 5022732 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 (Server Core installation) | 5027541 (Monthly Rollup) 5027532 (Security Only) |
Important | Remote Code Execution | 5022732 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 R2 | 5027542 (Monthly Rollup) 5027533 (Security Only) |
Important | Remote Code Execution | 5022733 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 R2 (Server Core installation) | 5027542 (Monthly Rollup) 5027533 (Security Only) |
Important | Remote Code Execution | 5022733 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 3.5.1 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5027540 (Monthly Rollup) 5027531 (Security Only) |
Important | Remote Code Execution | 5022731 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 3.5.1 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5027540 (Monthly Rollup) 5027531 (Security Only) |
Important | Remote Code Execution | 5022731 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5027543 (Monthly Rollup) 5027534 (Security Only) |
Important | Remote Code Execution | 5022731, 5022734 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5027543 (Monthly Rollup) 5027534 (Security Only) |
Important | Remote Code Execution | 5022731, 5022734 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5027543 (Monthly Rollup) 5027534 (Security Only) |
Important | Remote Code Execution | 5022731, 5022734 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5027543 (Monthly Rollup) 5027534 (Security Only) |
Important | Remote Code Execution | 5022731, 5022734 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5027540 (Monthly Rollup) 5027531 (Security Only) |
Important | Remote Code Execution | 5022731 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5027540 (Monthly Rollup) 5027531 (Security Only) |
Important | Remote Code Execution | 5022731 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 | 5027541 (Monthly Rollup) 5027532 (Security Only) |
Important | Remote Code Execution | 5022732 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 (Server Core installation) | 5027541 (Monthly Rollup) 5027532 (Security Only) |
Important | Remote Code Execution | 5022732 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 | 5027542 (Monthly Rollup) 5027533 (Security Only) |
Important | Remote Code Execution | 5022733 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 (Server Core installation) | 5027542 (Monthly Rollup) 5027533 (Security Only) |
Important | Remote Code Execution | 5022733 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for 32-bit Systems | 5027123 (Security Update) | Important | Remote Code Execution | 5022503 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for x64-based Systems | 5027123 (Security Update) | Important | Remote Code Execution | 5022503 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5027540 (Monthly Rollup) 5027531 (Security Only) |
Important | Remote Code Execution | 5022731 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5027540 (Monthly Rollup) 5027531 (Security Only) |
Important | Remote Code Execution | 5022731 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 | 5027541 (Monthly Rollup) 5027532 (Security Only) |
Important | Remote Code Execution | 5022732 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 (Server Core installation) | 5027541 (Monthly Rollup) 5027532 (Security Only) |
Important | Remote Code Execution | 5022732 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 | 5027542 (Monthly Rollup) 5027533 (Security Only) |
Important | Remote Code Execution | 5022733 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 (Server Core installation) | 5027542 (Monthly Rollup) 5027533 (Security Only) |
Important | Remote Code Execution | 5022733 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2016 | 5027123 (Security Update) | Important | Remote Code Execution | 5022503 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2016 (Server Core installation) | 5027123 (Security Update) | Important | Remote Code Execution | 5022503 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft Visual Studio 2022 version 17.0 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.0.22 | Maybe | None |
Microsoft Visual Studio 2022 version 17.2 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.2.16 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.4.8 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.6.3 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-24895 |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-24936
MITRE NVD Issuing CNA: Microsoft |
CVE Title: .NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability. What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain administrator privileges. How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by tricking a user into opening a malicious XML file. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Moderate | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-24936 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
.NET 6.0 | 5027797 (Security Update) | Moderate | Elevation of Privilege | None | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.18 | Maybe | None |
.NET 7.0 | 5027798 (Security Update) | Moderate | Elevation of Privilege | None | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
7.0.7 | Maybe | None |
Microsoft .NET Framework 2.0 Service Pack 2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5027543 (Monthly Rollup) 5027534 (Security Only) |
Moderate | Elevation of Privilege | 5022734 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 2.0 Service Pack 2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5027534 (Security Only) 5027543 (Monthly Rollup) |
Moderate | Elevation of Privilege | 5022734 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.4050.0 3.0.6920.8954; 2.0.50727.8970 |
Maybe | None |
Microsoft .NET Framework 3.0 Service Pack 2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5027543 (Monthly Rollup) 5027534 (Security Only) |
Moderate | Elevation of Privilege | 5022734 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 3.0 Service Pack 2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5027534 (Security Only) 5027543 (Monthly Rollup) |
Moderate | Elevation of Privilege | 5022734 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.4050.0 3.0.6920.8954; 2.0.50727.8970 |
Maybe | None |
Microsoft .NET Framework 3.5 and 4.6.2 on Windows 10 for 32-bit Systems | 5027230 (Security Update) | Moderate | Elevation of Privilege | 5026382 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Microsoft .NET Framework 3.5 and 4.6.2 on Windows 10 for x64-based Systems | 5027230 (Security Update) | Moderate | Elevation of Privilege | 5026382 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 on Windows 10 Version 1607 for 32-bit Systems | 5027219 (Security Update) | Moderate | Elevation of Privilege | 5026363 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 on Windows 10 Version 1607 for x64-based Systems | 5027219 (Security Update) | Moderate | Elevation of Privilege | 5026363 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2016 | 5027219 (Security Update) | Moderate | Elevation of Privilege | 5026363 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2016 (Server Core installation) | 5027219 (Security Update) | Moderate | Elevation of Privilege | 5026363 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for 32-bit Systems | 5027536 (Security Update) | Moderate | Elevation of Privilege | 5022782 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.4050.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for ARM64-based Systems | 5027536 (Security Update) | Moderate | Elevation of Privilege | 5022782 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.4050.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for x64-based Systems | 5027536 (Security Update) | Moderate | Elevation of Privilege | 5022782 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 | 5027536 (Security Update) | Moderate | Elevation of Privilege | 5022782 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.4050.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 (Server Core installation) | 5027536 (Security Update) | Moderate | Elevation of Privilege | 5022782 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.4050.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for 32-bit Systems | 5027536 (Security Update) | Moderate | Elevation of Privilege | 5022782 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for x64-based Systems | 5027536 (Security Update) | Moderate | Elevation of Privilege | 5022782 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for 32-bit Systems | 5027537 (Security Update) | Moderate | Elevation of Privilege | 5022728, 5026958, 5022729 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for ARM64-based Systems | 5027537 (Security Update) | Moderate | Elevation of Privilege | 5022728, 5026958, 5022729 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for x64-based Systems | 5027537 (Security Update) | Moderate | Elevation of Privilege | 5022728, 5026958, 5022729 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for 32-bit Systems | 5027538 (Security Update) | Moderate | Elevation of Privilege | 5022728, 5026958, 5022729 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for ARM64-based Systems | 5027538 (Security Update) | Moderate | Elevation of Privilege | 5022728, 5026958, 5022729 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for x64-based Systems | 5027538 (Security Update) | Moderate | Elevation of Privilege | 5022728, 5026958, 5022729 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for ARM64-based Systems | 5027539 (Security Update) | Moderate | Elevation of Privilege | 5026959, 5022730 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for x64-based Systems | 5027539 (Security Update) | Moderate | Elevation of Privilege | 5026959, 5022730 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 | 5027536 (Security Update) | Moderate | Elevation of Privilege | 5022782 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 (Server Core installation) | 5027536 (Security Update) | Moderate | Elevation of Privilege | 5022782 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 | 5027544 (Security Update) | Moderate | Elevation of Privilege | 5022735, 5022726 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 (Server Core installation) | 5027544 (Security Update) | Moderate | Elevation of Privilege | 5022735, 5022726 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for 32-bit Systems | 5027537 (Security Update) | Moderate | Elevation of Privilege | 5022728, 5026958, 5022729 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for ARM64-based Systems | 5027537 (Security Update) | Moderate | Elevation of Privilege | 5022728, 5026958, 5022729 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for x64-based Systems | 5027537 (Security Update) | Moderate | Elevation of Privilege | 5022728, 5026958, 5022729 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for 32-bit Systems | 5027538 (Security Update) | Moderate | Elevation of Privilege | 5022728, 5026958, 5022729 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for ARM64-based Systems | 5027538 (Security Update) | Moderate | Elevation of Privilege | 5022728, 5026958, 5022729 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for x64-based Systems | 5027538 (Security Update) | Moderate | Elevation of Privilege | 5022728, 5026958, 5022729 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for ARM64-based Systems | 5027539 (Security Update) | Moderate | Elevation of Privilege | 5026959, 5022730 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for x64-based Systems | 5027539 (Security Update) | Moderate | Elevation of Privilege | 5026959, 5022730 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for ARM64-based Systems | 5027119 (Security Update) | Moderate | Elevation of Privilege | 5026515, 5022497 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for x64-based Systems | 5027119 (Security Update) | Moderate | Elevation of Privilege | 5026515, 5022497 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 | 5027544 (Security Update) | Moderate | Elevation of Privilege | 5022735 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 (Server Core installation) | 5027544 (Security Update) | Moderate | Elevation of Privilege | 5022735 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 | 5027541 (Monthly Rollup) 5027532 (Security Only) |
Moderate | Elevation of Privilege | 5022732 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 (Server Core installation) | 5027541 (Monthly Rollup) 5027532 (Security Only) |
Moderate | Elevation of Privilege | 5022732 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 R2 | 5027542 (Monthly Rollup) 5027533 (Security Only) |
Moderate | Elevation of Privilege | 5022733 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 R2 (Server Core installation) | 5027542 (Monthly Rollup) 5027533 (Security Only) |
Moderate | Elevation of Privilege | 5022733 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 3.5.1 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5027540 (Monthly Rollup) 5027531 (Security Only) |
Moderate | Elevation of Privilege | 5022731 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 3.5.1 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5027540 (Monthly Rollup) 5027531 (Security Only) |
Moderate | Elevation of Privilege | 5022731 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5027543 (Monthly Rollup) 5027534 (Security Only) |
Moderate | Elevation of Privilege | 5022731, 5022734 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5027543 (Monthly Rollup) 5027534 (Security Only) |
Moderate | Elevation of Privilege | 5022731, 5022734 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5027543 (Monthly Rollup) 5027534 (Security Only) |
Moderate | Elevation of Privilege | 5022731, 5022734 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5027543 (Monthly Rollup) 5027534 (Security Only) |
Moderate | Elevation of Privilege | 5022731, 5022734 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5027540 (Monthly Rollup) 5027531 (Security Only) |
Moderate | Elevation of Privilege | 5022731 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5027540 (Monthly Rollup) 5027531 (Security Only) |
Moderate | Elevation of Privilege | 5022731 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 | 5027541 (Monthly Rollup) 5027532 (Security Only) |
Moderate | Elevation of Privilege | 5022732 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 (Server Core installation) | 5027541 (Monthly Rollup) 5027532 (Security Only) |
Moderate | Elevation of Privilege | 5022732 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 | 5027542 (Monthly Rollup) 5027533 (Security Only) |
Moderate | Elevation of Privilege | 5022733 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 (Server Core installation) | 5027542 (Monthly Rollup) 5027533 (Security Only) |
Moderate | Elevation of Privilege | 5022733 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for 32-bit Systems | 5027123 (Security Update) | Moderate | Elevation of Privilege | 5022503 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for x64-based Systems | 5027123 (Security Update) | Moderate | Elevation of Privilege | 5022503 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5027540 (Monthly Rollup) 5027531 (Security Only) |
Moderate | Elevation of Privilege | 5022731 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5027540 (Monthly Rollup) 5027531 (Security Only) |
Moderate | Elevation of Privilege | 5022731 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 | 5027541 (Monthly Rollup) 5027532 (Security Only) |
Moderate | Elevation of Privilege | 5022732 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 (Server Core installation) | 5027541 (Monthly Rollup) 5027532 (Security Only) |
Moderate | Elevation of Privilege | 5022732 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 | 5027542 (Monthly Rollup) 5027533 (Security Only) |
Moderate | Elevation of Privilege | 5022733 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 (Server Core installation) | 5027542 (Monthly Rollup) 5027533 (Security Only) |
Moderate | Elevation of Privilege | 5022733 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2016 | 5027123 (Security Update) | Moderate | Elevation of Privilege | 5022503 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2016 (Server Core installation) | 5027123 (Security Update) | Moderate | Elevation of Privilege | 5022503 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft Visual Studio 2022 version 17.0 | Release Notes (Security Update) | Moderate | Elevation of Privilege | None | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.0.22 | Maybe | None |
Microsoft Visual Studio 2022 version 17.2 | Release Notes (Security Update) | Moderate | Elevation of Privilege | None | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.2.16 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Moderate | Elevation of Privilege | None | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.4.8 | Maybe | None |
Microsoft Visual Studio 2022 version 17.5 | Release Notes (Security Update) | Moderate | Elevation of Privilege | None | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.5.6 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Moderate | Elevation of Privilege | None | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.6.3 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-24936 | H01 and H02 from FPT Software Cybersecurity Assurance Service with https://www.fpt-software.com/ H01 and H02 from FPT Software Cybersecurity Assurance Service with https://www.fpt-software.com/ |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-29331
MITRE NVD Issuing CNA: Microsoft |
CVE Title: .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.7
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-29331 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
.NET 6.0 | 5027797 (Security Update) | Important | Denial of Service | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
6.0.18 | Maybe | None |
.NET 7.0 | 5027798 (Security Update) | Important | Denial of Service | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
7.0.7 | Maybe | None |
Microsoft .NET Framework 2.0 Service Pack 2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5027543 (Monthly Rollup) 5027534 (Security Only) |
Important | Denial of Service | 5022734 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 2.0 Service Pack 2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5027534 (Security Only) 5027543 (Monthly Rollup) |
Important | Denial of Service | 5022734 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.7.4050.0 3.0.6920.8954; 2.0.50727.8970 |
Maybe | None |
Microsoft .NET Framework 3.0 Service Pack 2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5027543 (Monthly Rollup) 5027534 (Security Only) |
Important | Denial of Service | 5022734 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 3.0 Service Pack 2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5027534 (Security Only) 5027543 (Monthly Rollup) |
Important | Denial of Service | 5022734 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.7.4050.0 3.0.6920.8954; 2.0.50727.8970 |
Maybe | None |
Microsoft .NET Framework 3.5 and 4.6.2 on Windows 10 for 32-bit Systems | 5027230 (Security Update) | Important | Denial of Service | 5026382 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Microsoft .NET Framework 3.5 and 4.6.2 on Windows 10 for x64-based Systems | 5027230 (Security Update) | Important | Denial of Service | 5026382 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 on Windows 10 Version 1607 for 32-bit Systems | 5027219 (Security Update) | Important | Denial of Service | 5026363 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 on Windows 10 Version 1607 for x64-based Systems | 5027219 (Security Update) | Important | Denial of Service | 5026363 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2016 | 5027219 (Security Update) | Important | Denial of Service | 5026363 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2016 (Server Core installation) | 5027219 (Security Update) | Important | Denial of Service | 5026363 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for 32-bit Systems | 5027536 (Security Update) | Important | Denial of Service | 5022782 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.7.4050.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for ARM64-based Systems | 5027536 (Security Update) | Important | Denial of Service | 5022782 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.7.4050.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for x64-based Systems | 5027536 (Security Update) | Important | Denial of Service | 5022782 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 | 5027536 (Security Update) | Important | Denial of Service | 5022782 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.7.4050.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 (Server Core installation) | 5027536 (Security Update) | Important | Denial of Service | 5022782 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.7.4050.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for 32-bit Systems | 5027536 (Security Update) | Important | Denial of Service | 5022782 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for x64-based Systems | 5027536 (Security Update) | Important | Denial of Service | 5022782 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for 32-bit Systems | 5027537 (Security Update) | Important | Denial of Service | 5022728, 5026958, 5022729 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for ARM64-based Systems | 5027537 (Security Update) | Important | Denial of Service | 5022728, 5026958, 5022729 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for x64-based Systems | 5027537 (Security Update) | Important | Denial of Service | 5022728, 5026958, 5022729 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for 32-bit Systems | 5027538 (Security Update) | Important | Denial of Service | 5022728, 5026958, 5022729 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for ARM64-based Systems | 5027538 (Security Update) | Important | Denial of Service | 5022728, 5026958, 5022729 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for x64-based Systems | 5027538 (Security Update) | Important | Denial of Service | 5022728, 5026958, 5022729 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for ARM64-based Systems | 5027539 (Security Update) | Important | Denial of Service | 5026959, 5022730 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for x64-based Systems | 5027539 (Security Update) | Important | Denial of Service | 5026959, 5022730 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 | 5027536 (Security Update) | Important | Denial of Service | 5022782 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 (Server Core installation) | 5027536 (Security Update) | Important | Denial of Service | 5022782 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 | 5027544 (Security Update) | Important | Denial of Service | 5022735, 5022726 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 (Server Core installation) | 5027544 (Security Update) | Important | Denial of Service | 5022735, 5022726 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for 32-bit Systems | 5027537 (Security Update) | Important | Denial of Service | 5022728, 5026958, 5022729 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for ARM64-based Systems | 5027537 (Security Update) | Important | Denial of Service | 5022728, 5026958, 5022729 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for x64-based Systems | 5027537 (Security Update) | Important | Denial of Service | 5022728, 5026958, 5022729 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for 32-bit Systems | 5027538 (Security Update) | Important | Denial of Service | 5022728, 5026958, 5022729 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for ARM64-based Systems | 5027538 (Security Update) | Important | Denial of Service | 5022728, 5026958, 5022729 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for x64-based Systems | 5027538 (Security Update) | Important | Denial of Service | 5022728, 5026958, 5022729 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for ARM64-based Systems | 5027539 (Security Update) | Important | Denial of Service | 5026959, 5022730 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for x64-based Systems | 5027539 (Security Update) | Important | Denial of Service | 5026959, 5022730 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for ARM64-based Systems | 5027119 (Security Update) | Important | Denial of Service | 5026515, 5022497 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for x64-based Systems | 5027119 (Security Update) | Important | Denial of Service | 5026515, 5022497 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 | 5027544 (Security Update) | Important | Denial of Service | 5022735 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 (Server Core installation) | 5027544 (Security Update) | Important | Denial of Service | 5022735 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 | 5027541 (Monthly Rollup) 5027532 (Security Only) |
Important | Denial of Service | 5022732 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 (Server Core installation) | 5027541 (Monthly Rollup) 5027532 (Security Only) |
Important | Denial of Service | 5022732 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 R2 | 5027542 (Monthly Rollup) 5027533 (Security Only) |
Important | Denial of Service | 5022733 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 R2 (Server Core installation) | 5027542 (Monthly Rollup) 5027533 (Security Only) |
Important | Denial of Service | 5022733 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 3.5.1 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5027540 (Monthly Rollup) 5027531 (Security Only) |
Important | Denial of Service | 5022731 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 3.5.1 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5027540 (Monthly Rollup) 5027531 (Security Only) |
Important | Denial of Service | 5022731 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5027543 (Monthly Rollup) 5027534 (Security Only) |
Important | Denial of Service | 5022731, 5022734 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5027543 (Monthly Rollup) 5027534 (Security Only) |
Important | Denial of Service | 5022731, 5022734 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5027543 (Monthly Rollup) 5027534 (Security Only) |
Important | Denial of Service | 5022731, 5022734 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5027543 (Monthly Rollup) 5027534 (Security Only) |
Important | Denial of Service | 5022731, 5022734 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5027540 (Monthly Rollup) 5027531 (Security Only) |
Important | Denial of Service | 5022731 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5027540 (Monthly Rollup) 5027531 (Security Only) |
Important | Denial of Service | 5022731 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 | 5027541 (Monthly Rollup) 5027532 (Security Only) |
Important | Denial of Service | 5022732 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 (Server Core installation) | 5027541 (Monthly Rollup) 5027532 (Security Only) |
Important | Denial of Service | 5022732 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 | 5027542 (Monthly Rollup) 5027533 (Security Only) |
Important | Denial of Service | 5022733 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 (Server Core installation) | 5027542 (Monthly Rollup) 5027533 (Security Only) |
Important | Denial of Service | 5022733 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for 32-bit Systems | 5027123 (Security Update) | Important | Denial of Service | 5022503 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for x64-based Systems | 5027123 (Security Update) | Important | Denial of Service | 5022503 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5027540 (Monthly Rollup) 5027531 (Security Only) |
Important | Denial of Service | 5022731 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5027540 (Monthly Rollup) 5027531 (Security Only) |
Important | Denial of Service | 5022731 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 | 5027541 (Monthly Rollup) 5027532 (Security Only) |
Important | Denial of Service | 5022732 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 (Server Core installation) | 5027541 (Monthly Rollup) 5027532 (Security Only) |
Important | Denial of Service | 5022732 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 | 5027542 (Monthly Rollup) 5027533 (Security Only) |
Important | Denial of Service | 5022733 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 (Server Core installation) | 5027542 (Monthly Rollup) 5027533 (Security Only) |
Important | Denial of Service | 5022733 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2016 | 5027123 (Security Update) | Important | Denial of Service | 5022503 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2016 (Server Core installation) | 5027123 (Security Update) | Important | Denial of Service | 5022503 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft Visual Studio 2022 version 17.0 | Release Notes (Security Update) | Important | Denial of Service | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
17.0.22 | Maybe | None |
Microsoft Visual Studio 2022 version 17.2 | Release Notes (Security Update) | Important | Denial of Service | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
17.2.16 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Important | Denial of Service | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
17.4.8 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Important | Denial of Service | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
17.6.3 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-29331 | Kevin Jones, GitHub |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-29337
MITRE NVD Issuing CNA: Microsoft |
CVE Title: NuGet Client Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.2
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. According to the CVSS metric, the attack vector is network (AV:N), and privilege required is low (PR:L). What is the target used in the context of the remote code execution? The attacker for this vulnerability could target the server accounts in an arbitrary or remote code execution. As an authenticated user, the attacker could attempt to trigger malicious code in the context of the server's account through a network call. The privilege requirement is low because the attacker needs to be authenticated as a normal user. According to the CVSS metric, user interaction is required (UI:R) and privileges required is low (PR:L). What does that mean for this vulnerability? An authorized attacker must be on the machine and monitoring for actions as a step to exploit the race condition. How could an attacker exploit this vulnerability? A local attacker in the environment could exploit a race condition that allows a symlink attack when the victim user on the same system runs the nuget command. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-29337 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
NuGet 6.0.4 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.4 | Maybe | None |
NuGet 6.2.3 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.3 | Maybe | None |
NuGet 6.3.2 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.2 | Maybe | None |
NuGet 6.4.1 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.4.1 | Maybe | None |
NuGet 6.5.0 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.5.0 | Maybe | None |
NuGet 6.6.0 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.6.0 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-29337 | Kalle Niemitalo |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2023-29012
MITRE NVD Issuing CNA: GitHub |
CVE Title: GitHub: CVE-2023-29012 Git CMD erroneously executes `doskey.exe` in current directory, if it exists
CVSS: None Executive Summary: None FAQ: Why is this GitHub CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Git for Windows software which is consumed by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds of Visual Studio are no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-29012 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
15.9.55 | Maybe | None |
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
16.11.27 | Maybe | None |
Microsoft Visual Studio 2022 version 17.0 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
17.0.22 | Maybe | None |
Microsoft Visual Studio 2022 version 17.2 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
17.2.16 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
17.4.8 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
17.6.3 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-29012 | ycdxsb with VARAS@IIE |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2023-29011
MITRE NVD Issuing CNA: GitHub |
CVE Title: GitHub: CVE-2023-29011 The config file of `connect.exe` is susceptible to malicious placing
CVSS: None Executive Summary: None FAQ: Why is this GitHub CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Git for Windows software which is consumed by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds of Visual Studio are no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-29011 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
15.9.55 | Maybe | None |
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
16.11.27 | Maybe | None |
Microsoft Visual Studio 2022 version 17.0 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
17.0.22 | Maybe | None |
Microsoft Visual Studio 2022 version 17.2 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
17.2.16 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
17.4.8 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
17.6.3 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-29011 | ycdxsb with VARAS@IIE |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2023-25815
MITRE NVD Issuing CNA: GitHub |
CVE Title: GitHub: CVE-2023-25815 Git looks for localized messages in an unprivileged place
CVSS: None Executive Summary: None FAQ: Why is this GitHub CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Git for Windows software which is consumed by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds of Visual Studio are no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-25815 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) | Release Notes (Security Update) | Important | Spoofing | None | Base: N/A Temporal: N/A Vector: N/A |
15.9.55 | Maybe | None |
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | Release Notes (Security Update) | Important | Spoofing | None | Base: N/A Temporal: N/A Vector: N/A |
16.11.27 | Maybe | None |
Microsoft Visual Studio 2022 version 17.0 | Release Notes (Security Update) | Important | Spoofing | None | Base: N/A Temporal: N/A Vector: N/A |
17.0.22 | Maybe | None |
Microsoft Visual Studio 2022 version 17.2 | Release Notes (Security Update) | Important | Spoofing | None | Base: N/A Temporal: N/A Vector: N/A |
17.2.16 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Important | Spoofing | None | Base: N/A Temporal: N/A Vector: N/A |
17.4.8 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Important | Spoofing | None | Base: N/A Temporal: N/A Vector: N/A |
17.6.3 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-25815 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2023-29007
MITRE NVD Issuing CNA: GitHub |
CVE Title: GitHub: CVE-2023-29007 Arbitrary configuration injection via `git submodule deinit`
CVSS: None Executive Summary: None FAQ: Why is this GitHub CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in mingit software which is consumed by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds of Visual Studio are no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-29007 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
15.9.55 | Maybe | None |
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
16.11.27 | Maybe | None |
Microsoft Visual Studio 2022 version 17.0 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
17.0.22 | Maybe | None |
Microsoft Visual Studio 2022 version 17.2 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
17.2.16 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
17.4.8 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
17.6.3 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-29007 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2023-25652
MITRE NVD Issuing CNA: GitHub |
CVE Title: GitHub: CVE-2023-25652 "git apply --reject" partially-controlled arbitrary file write
CVSS: None Executive Summary: None FAQ: Why is this GitHub CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in mingit software which is consumed by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds of Visual Studio are no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-25652 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
15.9.55 | Maybe | None |
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
16.11.27 | Maybe | None |
Microsoft Visual Studio 2022 version 17.0 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
17.0.22 | Maybe | None |
Microsoft Visual Studio 2022 version 17.2 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
17.2.16 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
17.4.8 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
17.6.3 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-25652 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-29346
MITRE NVD Issuing CNA: Microsoft |
CVE Title: NTFS Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain administrator privileges. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-29346 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5027230 (Security Update) | Important | Elevation of Privilege | 5026382 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 for x64-based Systems | 5027230 (Security Update) | Important | Elevation of Privilege | 5026382 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for ARM64-based Systems | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for x64-based Systems | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 21H2 for 32-bit Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for x64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for 32-bit Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for x64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 11 version 21H2 for ARM64-based Systems | 5027223 (Security Update) | Important | Elevation of Privilege | 5026368 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 version 21H2 for x64-based Systems | 5027223 (Security Update) | Important | Elevation of Privilege | 5026368 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 Version 22H2 for ARM64-based Systems | 5027231 (Security Update) | Important | Elevation of Privilege | 5026372 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows 11 Version 22H2 for x64-based Systems | 5027231 (Security Update) | Important | Elevation of Privilege | 5026372 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Elevation of Privilege | 5026408 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Elevation of Privilege | 5026408 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Elevation of Privilege | 5026408 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Elevation of Privilege | 5026408 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Important | Elevation of Privilege | 5026413 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Important | Elevation of Privilege | 5026413 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2012 | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Important | Elevation of Privilege | 5026419 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 (Server Core installation) | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Important | Elevation of Privilege | 5026419 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 R2 | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Elevation of Privilege | 5026415 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Elevation of Privilege | 5026415 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2016 | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2016 (Server Core installation) | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2019 | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2019 (Server Core installation) | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2022 | 5027225 (Security Update) | Important | Elevation of Privilege | 5026370 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
Windows Server 2022 (Server Core installation) | 5027225 (Security Update) | Important | Elevation of Privilege | 5026370 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
CVE ID | Acknowledgements |
CVE-2023-29346 | Quarkslab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-29351
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Group Policy Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain specific limited SYSTEM privileges. According to the CVSS metrics, successful exploitation of this vulnerability could lead to no loss of confidentiality (C:N) but have major impact on integrity (I:H) and on availability (A:H). What does that mean for this vulnerability? This vulnerability does not allow disclosure of any confidential information, but could allow an attacker to delete data that could include data that results in the service being unavailable. How could an attacker exploit this vulnerability? This vulnerability could allow a standard domain user to delete arbitrary files and folders with system privileges. This could be achieved when "Folder preference - delete" is configured and the user has write access, allowing them to set a reparse point. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-29351 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5027230 (Security Update) | Important | Elevation of Privilege | 5026382 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 for x64-based Systems | 5027230 (Security Update) | Important | Elevation of Privilege | 5026382 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for ARM64-based Systems | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for x64-based Systems | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 21H2 for 32-bit Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for x64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for 32-bit Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for x64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 11 version 21H2 for ARM64-based Systems | 5027223 (Security Update) | Important | Elevation of Privilege | 5026368 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 version 21H2 for x64-based Systems | 5027223 (Security Update) | Important | Elevation of Privilege | 5026368 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 Version 22H2 for ARM64-based Systems | 5027231 (Security Update) | Important | Elevation of Privilege | 5026372 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows 11 Version 22H2 for x64-based Systems | 5027231 (Security Update) | Important | Elevation of Privilege | 5026372 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Elevation of Privilege | 5026408 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Elevation of Privilege | 5026408 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Elevation of Privilege | 5026408 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Elevation of Privilege | 5026408 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Important | Elevation of Privilege | 5026413 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Important | Elevation of Privilege | 5026413 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2012 | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Important | Elevation of Privilege | 5026419 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 (Server Core installation) | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Important | Elevation of Privilege | 5026419 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 R2 | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Elevation of Privilege | 5026415 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Elevation of Privilege | 5026415 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2016 | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2016 (Server Core installation) | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2019 | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2019 (Server Core installation) | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2022 | 5027225 (Security Update) | Important | Elevation of Privilege | 5026370 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
Windows Server 2022 (Server Core installation) | 5027225 (Security Update) | Important | Elevation of Privilege | 5026370 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
CVE ID | Acknowledgements |
CVE-2023-29351 | Sukriti S. and Manish Singh with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-29352
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Remote Desktop Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince the user to open said file. How could an attacker exploit this vulnerability? An attacker who successfully exploited this vulnerability could bypass certificate validation during a remote desktop connection by creating a validly signed .RDP file that will bypass warning prompts when it is executed. This could create an opportunity for phishing. What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited the vulnerability could bypass certificate or private key authentication when establishing a remote desktop protocol session. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-29352 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Remote Desktop client for Windows Desktop | Release Notes (Security Update) | Important | Security Feature Bypass | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
1.2.4337.0 | Maybe | None |
Windows 10 Version 1809 for x64-based Systems | 5027222 (Security Update) | Important | Security Feature Bypass | 5026362 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 21H2 for x64-based Systems | 5027215 (Security Update) | Important | Security Feature Bypass | 5026361 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for x64-based Systems | 5027215 (Security Update) | Important | Security Feature Bypass | 5026361 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 11 version 21H2 for ARM64-based Systems | 5027223 (Security Update) | Important | Security Feature Bypass | 5026368 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 version 21H2 for x64-based Systems | 5027223 (Security Update) | Important | Security Feature Bypass | 5026368 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 Version 22H2 for ARM64-based Systems | 5027231 (Security Update) | Important | Security Feature Bypass | 5026372 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows 11 Version 22H2 for x64-based Systems | 5027231 (Security Update) | Important | Security Feature Bypass | 5026372 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows Server 2019 | 5027222 (Security Update) | Important | Security Feature Bypass | 5026362 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2019 (Server Core installation) | 5027222 (Security Update) | Important | Security Feature Bypass | 5026362 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2022 | 5027225 (Security Update) | Important | Security Feature Bypass | 5026370 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
Windows Server 2022 (Server Core installation) | 5027225 (Security Update) | Important | Security Feature Bypass | 5026370 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
CVE ID | Acknowledgements |
CVE-2023-29352 | Philemon Orphee Favrod and Ray Reskusich of Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-29355
MITRE NVD Issuing CNA: Microsoft |
CVE Title: DHCP Server Service Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.3/TemporalScore:4.6
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? The attacker might be able to guess the DHCP server's IP addresses pool information, which would otherwise not be disclosed. Mitigations: The following mitigating factors might be helpful in your situation: Customers who have not configured their DHCP server as a failover are not affected by this vulnerability. Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-29355 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2012 | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Important | Information Disclosure | 5026419 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 (Server Core installation) | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Important | Information Disclosure | 5026419 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 R2 | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Information Disclosure | 5026415 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Information Disclosure | 5026415 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2016 | 5027219 (Security Update) | Important | Information Disclosure | 5026363 | Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2016 (Server Core installation) | 5027219 (Security Update) | Important | Information Disclosure | 5026363 | Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2019 | 5027222 (Security Update) | Important | Information Disclosure | 5026362 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2019 (Server Core installation) | 5027222 (Security Update) | Important | Information Disclosure | 5026362 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2022 | 5027225 (Security Update) | Important | Information Disclosure | 5026370 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
Windows Server 2022 (Server Core installation) | 5027225 (Security Update) | Important | Information Disclosure | 5026370 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
CVE ID | Acknowledgements |
CVE-2023-29355 | YanZiShuang@BigCJTeam of cyberkl |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-29357
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft SharePoint Server Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain administrator privileges. According to the CVSS metric, the attack vector is network (AV:N), privilege required is none (PR:N), and user interaction is none (UI:N). What is the target used in the context of the elevation of privilege? An attacker who has gained access to spoofed JWT authentication tokens can use them to execute a network attack which bypasses authentication and allows them to gain access to the privileges of an authenticated user. The attacker needs no privileges nor does the user need to perform any action. I am running SharePoint Enterprise Server 2016 or SharePoint Server 2019 and there are multiple updates available for each of these affected versions. Do I need to install all the updates listed in the Security Updates table for these versions? Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order. Mitigations: The following mitigating factors might be helpful in your situation: Customers who have enabled the AMSI integration feature and use Microsoft Defender across their SharePoint Server farm(s) are protected from this vulnerability. For more information, see Configure AMSI integration with SharePoint Server. Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Critical | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-29357 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft SharePoint Server 2019 | 5002402 (Security Update) 5002403 (Security Update) |
Critical | Elevation of Privilege | 5002389 5002330 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10399.20005 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-29357 | Jang (Nguyễn Tiến Giang) of StarLabs SG working with Trend Micro Zero Day Initiative |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-29358
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows GDI Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-29358 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5027230 (Security Update) | Important | Elevation of Privilege | 5026382 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 for x64-based Systems | 5027230 (Security Update) | Important | Elevation of Privilege | 5026382 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for ARM64-based Systems | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for x64-based Systems | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 21H2 for 32-bit Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for x64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for 32-bit Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for x64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 11 version 21H2 for ARM64-based Systems | 5027223 (Security Update) | Important | Elevation of Privilege | 5026368 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 version 21H2 for x64-based Systems | 5027223 (Security Update) | Important | Elevation of Privilege | 5026368 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 Version 22H2 for ARM64-based Systems | 5027231 (Security Update) | Important | Elevation of Privilege | 5026372 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows 11 Version 22H2 for x64-based Systems | 5027231 (Security Update) | Important | Elevation of Privilege | 5026372 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Elevation of Privilege | 5026408 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Elevation of Privilege | 5026408 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Elevation of Privilege | 5026408 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Elevation of Privilege | 5026408 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Important | Elevation of Privilege | 5026413 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Important | Elevation of Privilege | 5026413 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2012 | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Important | Elevation of Privilege | 5026419 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 (Server Core installation) | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Important | Elevation of Privilege | 5026419 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 R2 | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Elevation of Privilege | 5026415 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Elevation of Privilege | 5026415 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2016 | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2016 (Server Core installation) | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2019 | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2019 (Server Core installation) | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2022 | 5027225 (Security Update) | Important | Elevation of Privilege | 5026370 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
Windows Server 2022 (Server Core installation) | 5027225 (Security Update) | Important | Elevation of Privilege | 5026370 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
CVE ID | Acknowledgements |
CVE-2023-29358 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-29359
MITRE NVD Issuing CNA: Microsoft |
CVE Title: GDI Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-29359 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5027230 (Security Update) | Important | Elevation of Privilege | 5026382 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 for x64-based Systems | 5027230 (Security Update) | Important | Elevation of Privilege | 5026382 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for ARM64-based Systems | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for x64-based Systems | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 21H2 for 32-bit Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for x64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for 32-bit Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for x64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 11 version 21H2 for ARM64-based Systems | 5027223 (Security Update) | Important | Elevation of Privilege | 5026368 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 version 21H2 for x64-based Systems | 5027223 (Security Update) | Important | Elevation of Privilege | 5026368 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 Version 22H2 for ARM64-based Systems | 5027231 (Security Update) | Important | Elevation of Privilege | 5026372 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows 11 Version 22H2 for x64-based Systems | 5027231 (Security Update) | Important | Elevation of Privilege | 5026372 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Elevation of Privilege | 5026408 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Elevation of Privilege | 5026408 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Elevation of Privilege | 5026408 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Elevation of Privilege | 5026408 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Important | Elevation of Privilege | 5026413 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Important | Elevation of Privilege | 5026413 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2012 | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Important | Elevation of Privilege | 5026419 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 (Server Core installation) | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Important | Elevation of Privilege | 5026419 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 R2 | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Elevation of Privilege | 5026415 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Elevation of Privilege | 5026415 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2016 | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2016 (Server Core installation) | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2019 | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2019 (Server Core installation) | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2022 | 5027225 (Security Update) | Important | Elevation of Privilege | 5026370 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
Windows Server 2022 (Server Core installation) | 5027225 (Security Update) | Important | Elevation of Privilege | 5026370 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
CVE ID | Acknowledgements |
CVE-2023-29359 | Marcin Wiazowski working with Trend Micro Zero Day Initiative |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-29360
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows TPM Device Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-29360 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1607 for 32-bit Systems | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for ARM64-based Systems | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for x64-based Systems | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 21H2 for 32-bit Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for x64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for 32-bit Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for x64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 11 version 21H2 for ARM64-based Systems | 5027223 (Security Update) | Important | Elevation of Privilege | 5026368 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 version 21H2 for x64-based Systems | 5027223 (Security Update) | Important | Elevation of Privilege | 5026368 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 Version 22H2 for ARM64-based Systems | 5027231 (Security Update) | Important | Elevation of Privilege | 5026372 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows 11 Version 22H2 for x64-based Systems | 5027231 (Security Update) | Important | Elevation of Privilege | 5026372 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows Server 2016 | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2016 (Server Core installation) | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2019 | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2019 (Server Core installation) | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2022 | 5027225 (Security Update) | Important | Elevation of Privilege | 5026370 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
Windows Server 2022 (Server Core installation) | 5027225 (Security Update) | Important | Elevation of Privilege | 5026370 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
CVE ID | Acknowledgements |
CVE-2023-29360 | Thomas Imbert (@masthoon) from Synacktiv (@Synacktiv) Working with Trend Micro Zero Day Initiative
|
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-29361
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-29361 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 21H2 for 32-bit Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for x64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for 32-bit Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for x64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 11 version 21H2 for ARM64-based Systems | 5027223 (Security Update) | Important | Elevation of Privilege | 5026368 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 version 21H2 for x64-based Systems | 5027223 (Security Update) | Important | Elevation of Privilege | 5026368 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 Version 22H2 for ARM64-based Systems | 5027231 (Security Update) | Important | Elevation of Privilege | 5026372 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows 11 Version 22H2 for x64-based Systems | 5027231 (Security Update) | Important | Elevation of Privilege | 5026372 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows Server 2022 | 5027225 (Security Update) | Important | Elevation of Privilege | 5026370 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
Windows Server 2022 (Server Core installation) | 5027225 (Security Update) | Important | Elevation of Privilege | 5026370 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
CVE ID | Acknowledgements |
CVE-2023-29361 | Anonymous Trend Micro Zero Day Initiative |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-29362
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Remote Desktop Client Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? In the case of a Remote Desktop connection, an attacker with control of a Remote Desktop Server could trigger a remote code execution (RCE) on the RDP client machine when a victim connects to the attacking server with the vulnerable Remote Desktop Client. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-29362 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Remote Desktop client for Windows Desktop | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.2.4337.0 | Maybe | None |
Windows 10 for x64-based Systems | 5027230 (Security Update) | Important | Remote Code Execution | 5026382 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5027222 (Security Update) | Important | Remote Code Execution | 5026362 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 21H2 for x64-based Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for x64-based Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 11 version 21H2 for ARM64-based Systems | 5027223 (Security Update) | Important | Remote Code Execution | 5026368 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 version 21H2 for x64-based Systems | 5027223 (Security Update) | Important | Remote Code Execution | 5026368 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 Version 22H2 for ARM64-based Systems | 5027231 (Security Update) | Important | Remote Code Execution | 5026372 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows 11 Version 22H2 for x64-based Systems | 5027231 (Security Update) | Important | Remote Code Execution | 5026372 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Important | Remote Code Execution | 5026413 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Important | Remote Code Execution | 5026413 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2012 | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Important | Remote Code Execution | 5026419 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 (Server Core installation) | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Important | Remote Code Execution | 5026419 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 R2 | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Remote Code Execution | 5026415 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Remote Code Execution | 5026415 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2016 | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2016 (Server Core installation) | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2019 | 5027222 (Security Update) | Important | Remote Code Execution | 5026362 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2019 (Server Core installation) | 5027222 (Security Update) | Important | Remote Code Execution | 5026362 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2022 | 5027225 (Security Update) | Important | Remote Code Execution | 5026370 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
Windows Server 2022 (Server Core installation) | 5027225 (Security Update) | Important | Remote Code Execution | 5026370 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
CVE ID | Acknowledgements |
CVE-2023-29362 | Dor Dali with Cyolo |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-29363
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? When Windows message queuing service is running in a PGM Server environment, an attacker could send a specially crafted file over the network to achieve remote code execution and attempt to trigger malicious code. Mitigations: Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors might be helpful in your situation: The Windows message queuing service, which is a Windows component, needs to be enabled for a system to be exploitable by this vulnerability. This feature can be added via the Control Panel. You can check to see if there is a service running named Message Queuing and TCP port 1801 is listening on the machine. Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-29363 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5027230 (Security Update) | Critical | Remote Code Execution | 5026382 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 for x64-based Systems | 5027230 (Security Update) | Critical | Remote Code Execution | 5026382 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5027219 (Security Update) | Critical | Remote Code Execution | 5026363 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5027219 (Security Update) | Critical | Remote Code Execution | 5026363 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5027222 (Security Update) | Critical | Remote Code Execution | 5026362 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for ARM64-based Systems | 5027222 (Security Update) | Critical | Remote Code Execution | 5026362 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for x64-based Systems | 5027222 (Security Update) | Critical | Remote Code Execution | 5026362 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 21H2 for 32-bit Systems | 5027215 (Security Update) | Critical | Remote Code Execution | 5026361 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for ARM64-based Systems | 5027215 (Security Update) | Critical | Remote Code Execution | 5026361 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for x64-based Systems | 5027215 (Security Update) | Critical | Remote Code Execution | 5026361 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for 32-bit Systems | 5027215 (Security Update) | Critical | Remote Code Execution | 5026361 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for ARM64-based Systems | 5027215 (Security Update) | Critical | Remote Code Execution | 5026361 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for x64-based Systems | 5027215 (Security Update) | Critical | Remote Code Execution | 5026361 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 11 version 21H2 for ARM64-based Systems | 5027223 (Security Update) | Critical | Remote Code Execution | 5026368 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 version 21H2 for x64-based Systems | 5027223 (Security Update) | Critical | Remote Code Execution | 5026368 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 Version 22H2 for ARM64-based Systems | 5027231 (Security Update) | Critical | Remote Code Execution | 5026372 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows 11 Version 22H2 for x64-based Systems | 5027231 (Security Update) | Critical | Remote Code Execution | 5026372 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Critical | Remote Code Execution | 5026408 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Critical | Remote Code Execution | 5026408 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Critical | Remote Code Execution | 5026408 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Critical | Remote Code Execution | 5026408 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Critical | Remote Code Execution | 5026413 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Critical | Remote Code Execution | 5026413 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2012 | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Critical | Remote Code Execution | 5026419 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 (Server Core installation) | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Critical | Remote Code Execution | 5026419 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 R2 | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Critical | Remote Code Execution | 5026415 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Critical | Remote Code Execution | 5026415 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2016 | 5027219 (Security Update) | Critical | Remote Code Execution | 5026363 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2016 (Server Core installation) | 5027219 (Security Update) | Critical | Remote Code Execution | 5026363 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2019 | 5027222 (Security Update) | Critical | Remote Code Execution | 5026362 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2019 (Server Core installation) | 5027222 (Security Update) | Critical | Remote Code Execution | 5026362 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2022 | 5027225 (Security Update) | Critical | Remote Code Execution | 5026370 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
Windows Server 2022 (Server Core installation) | 5027225 (Security Update) | Critical | Remote Code Execution | 5026370 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
CVE ID | Acknowledgements |
CVE-2023-29363 | Jarvis_1oop of vulnerability research institute |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-29364
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Authentication Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.3
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-29364 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5027230 (Security Update) | Important | Elevation of Privilege | 5026382 | Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 for x64-based Systems | 5027230 (Security Update) | Important | Elevation of Privilege | 5026382 | Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for ARM64-based Systems | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for x64-based Systems | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 21H2 for 32-bit Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for x64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for 32-bit Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for x64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 11 version 21H2 for ARM64-based Systems | 5027223 (Security Update) | Important | Elevation of Privilege | 5026368 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 version 21H2 for x64-based Systems | 5027223 (Security Update) | Important | Elevation of Privilege | 5026368 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 Version 22H2 for ARM64-based Systems | 5027231 (Security Update) | Important | Elevation of Privilege | 5026372 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows 11 Version 22H2 for x64-based Systems | 5027231 (Security Update) | Important | Elevation of Privilege | 5026372 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Important | Elevation of Privilege | 5026413 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Important | Elevation of Privilege | 5026413 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2012 | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Important | Elevation of Privilege | 5026419 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 (Server Core installation) | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Important | Elevation of Privilege | 5026419 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 R2 | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Elevation of Privilege | 5026415 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Elevation of Privilege | 5026415 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2016 | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2016 (Server Core installation) | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2019 | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2019 (Server Core installation) | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2022 | 5027225 (Security Update) | Important | Elevation of Privilege | 5026370 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
Windows Server 2022 (Server Core installation) | 5027225 (Security Update) | Important | Elevation of Privilege | 5026370 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
CVE ID | Acknowledgements |
CVE-2023-29364 | k0shl with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-29365
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Media Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-29365 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5027230 (Security Update) | Important | Remote Code Execution | 5026382 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 for x64-based Systems | 5027230 (Security Update) | Important | Remote Code Execution | 5026382 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5027222 (Security Update) | Important | Remote Code Execution | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for ARM64-based Systems | 5027222 (Security Update) | Important | Remote Code Execution | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for x64-based Systems | 5027222 (Security Update) | Important | Remote Code Execution | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 21H2 for 32-bit Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for x64-based Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for 32-bit Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for x64-based Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 11 version 21H2 for ARM64-based Systems | 5027223 (Security Update) | Important | Remote Code Execution | 5026368 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 version 21H2 for x64-based Systems | 5027223 (Security Update) | Important | Remote Code Execution | 5026368 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 Version 22H2 for ARM64-based Systems | 5027231 (Security Update) | Important | Remote Code Execution | 5026372 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows 11 Version 22H2 for x64-based Systems | 5027231 (Security Update) | Important | Remote Code Execution | 5026372 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Important | Remote Code Execution | 5026413 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Important | Remote Code Execution | 5026413 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2012 | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Important | Remote Code Execution | 5026419 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 (Server Core installation) | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Important | Remote Code Execution | 5026419 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 R2 | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Remote Code Execution | 5026415 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Remote Code Execution | 5026415 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2016 | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2016 (Server Core installation) | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2019 | 5027222 (Security Update) | Important | Remote Code Execution | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2019 (Server Core installation) | 5027222 (Security Update) | Important | Remote Code Execution | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2022 | 5027225 (Security Update) | Important | Remote Code Execution | 5026370 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
Windows Server 2022 (Server Core installation) | 5027225 (Security Update) | Important | Remote Code Execution | 5026370 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
CVE ID | Acknowledgements |
CVE-2023-29365 | mainc |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-29366
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Geolocation Service Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince the user to open said file. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-29366 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 21H2 for 32-bit Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for x64-based Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for 32-bit Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for x64-based Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 11 version 21H2 for ARM64-based Systems | 5027223 (Security Update) | Important | Remote Code Execution | 5026368 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 version 21H2 for x64-based Systems | 5027223 (Security Update) | Important | Remote Code Execution | 5026368 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 Version 22H2 for ARM64-based Systems | 5027231 (Security Update) | Important | Remote Code Execution | 5026372 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows 11 Version 22H2 for x64-based Systems | 5027231 (Security Update) | Important | Remote Code Execution | 5026372 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows Server 2022 | 5027225 (Security Update) | Important | Remote Code Execution | 5026370 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
Windows Server 2022 (Server Core installation) | 5027225 (Security Update) | Important | Remote Code Execution | 5026370 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
CVE ID | Acknowledgements |
CVE-2023-29366 | kap0k |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-29367
MITRE NVD Issuing CNA: Microsoft |
CVE Title: iSCSI Target WMI Provider Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-29367 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2012 R2 | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Remote Code Execution | 5026415 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Remote Code Execution | 5026415 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2016 | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2016 (Server Core installation) | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2019 | 5027222 (Security Update) | Important | Remote Code Execution | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2019 (Server Core installation) | 5027222 (Security Update) | Important | Remote Code Execution | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2022 | 5027225 (Security Update) | Important | Remote Code Execution | 5026370 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
Windows Server 2022 (Server Core installation) | 5027225 (Security Update) | Important | Remote Code Execution | 5026370 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
CVE ID | Acknowledgements |
CVE-2023-29367 | kap0k |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-29368
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Filtering Platform Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain administrator privileges. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-29368 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5027230 (Security Update) | Important | Elevation of Privilege | 5026382 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 for x64-based Systems | 5027230 (Security Update) | Important | Elevation of Privilege | 5026382 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for ARM64-based Systems | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for x64-based Systems | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 21H2 for 32-bit Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for x64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for 32-bit Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for x64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 11 version 21H2 for ARM64-based Systems | 5027223 (Security Update) | Important | Elevation of Privilege | 5026368 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 version 21H2 for x64-based Systems | 5027223 (Security Update) | Important | Elevation of Privilege | 5026368 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 Version 22H2 for ARM64-based Systems | 5027231 (Security Update) | Important | Elevation of Privilege | 5026372 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows 11 Version 22H2 for x64-based Systems | 5027231 (Security Update) | Important | Elevation of Privilege | 5026372 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Elevation of Privilege | 5026408 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Elevation of Privilege | 5026408 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Elevation of Privilege | 5026408 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Elevation of Privilege | 5026408 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Important | Elevation of Privilege | 5026413 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Important | Elevation of Privilege | 5026413 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2012 | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Important | Elevation of Privilege | 5026419 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 (Server Core installation) | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Important | Elevation of Privilege | 5026419 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 R2 | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Elevation of Privilege | 5026415 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Elevation of Privilege | 5026415 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2016 | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2016 (Server Core installation) | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2019 | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2019 (Server Core installation) | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2022 | 5027225 (Security Update) | Important | Elevation of Privilege | 5026370 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
Windows Server 2022 (Server Core installation) | 5027225 (Security Update) | Important | Elevation of Privilege | 5026370 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
CVE ID | Acknowledgements |
CVE-2023-29368 | ziming zhang with Ant Security Light-Year Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-29369
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Remote Procedure Call Runtime Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-29369 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2012 | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Important | Denial of Service | 5026419 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 (Server Core installation) | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Important | Denial of Service | 5026419 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 R2 | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Denial of Service | 5026415 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Denial of Service | 5026415 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2016 | 5027219 (Security Update) | Important | Denial of Service | 5026363 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2016 (Server Core installation) | 5027219 (Security Update) | Important | Denial of Service | 5026363 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2019 | 5027222 (Security Update) | Important | Denial of Service | 5026362 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2019 (Server Core installation) | 5027222 (Security Update) | Important | Denial of Service | 5026362 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2022 | 5027225 (Security Update) | Important | Denial of Service | 5026370 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
Windows Server 2022 (Server Core installation) | 5027225 (Security Update) | Important | Denial of Service | 5026370 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
CVE ID | Acknowledgements |
CVE-2023-29369 | Wei in Kunlun Lab with Cyber KunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-29370
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Media Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince the user to open said file. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-29370 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5027230 (Security Update) | Important | Remote Code Execution | 5026382 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 for x64-based Systems | 5027230 (Security Update) | Important | Remote Code Execution | 5026382 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5027222 (Security Update) | Important | Remote Code Execution | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for ARM64-based Systems | 5027222 (Security Update) | Important | Remote Code Execution | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for x64-based Systems | 5027222 (Security Update) | Important | Remote Code Execution | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 21H2 for 32-bit Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for x64-based Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for 32-bit Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for x64-based Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 11 version 21H2 for ARM64-based Systems | 5027223 (Security Update) | Important | Remote Code Execution | 5026368 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 version 21H2 for x64-based Systems | 5027223 (Security Update) | Important | Remote Code Execution | 5026368 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 Version 22H2 for ARM64-based Systems | 5027231 (Security Update) | Important | Remote Code Execution | 5026372 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows 11 Version 22H2 for x64-based Systems | 5027231 (Security Update) | Important | Remote Code Execution | 5026372 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows Server 2016 | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2016 (Server Core installation) | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2019 | 5027222 (Security Update) | Important | Remote Code Execution | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2019 (Server Core installation) | 5027222 (Security Update) | Important | Remote Code Execution | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2022 | 5027225 (Security Update) | Important | Remote Code Execution | 5026370 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
Windows Server 2022 (Server Core installation) | 5027225 (Security Update) | Important | Remote Code Execution | 5026370 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
CVE ID | Acknowledgements |
CVE-2023-29370 | Kim Dong-uk(@justlikebono) with PKSecurity |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-29371
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows GDI Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-29371 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5027230 (Security Update) | Important | Elevation of Privilege | 5026382 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 for x64-based Systems | 5027230 (Security Update) | Important | Elevation of Privilege | 5026382 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for ARM64-based Systems | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for x64-based Systems | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 21H2 for 32-bit Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for x64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for 32-bit Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for x64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 11 version 21H2 for ARM64-based Systems | 5027223 (Security Update) | Important | Elevation of Privilege | 5026368 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 version 21H2 for x64-based Systems | 5027223 (Security Update) | Important | Elevation of Privilege | 5026368 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 Version 22H2 for ARM64-based Systems | 5027231 (Security Update) | Important | Elevation of Privilege | 5026372 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows 11 Version 22H2 for x64-based Systems | 5027231 (Security Update) | Important | Elevation of Privilege | 5026372 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Elevation of Privilege | 5026408 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Elevation of Privilege | 5026408 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Elevation of Privilege | 5026408 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Elevation of Privilege | 5026408 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Important | Elevation of Privilege | 5026413 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Important | Elevation of Privilege | 5026413 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2012 | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Important | Elevation of Privilege | 5026419 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 (Server Core installation) | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Important | Elevation of Privilege | 5026419 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 R2 | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Elevation of Privilege | 5026415 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Elevation of Privilege | 5026415 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2016 | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2016 (Server Core installation) | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2019 | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2019 (Server Core installation) | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2022 | 5027225 (Security Update) | Important | Elevation of Privilege | 5026370 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
Windows Server 2022 (Server Core installation) | 5027225 (Security Update) | Important | Elevation of Privilege | 5026370 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
CVE ID | Acknowledgements |
CVE-2023-29371 | Keqi Hu |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-29372
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-29372 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5027230 (Security Update) | Important | Remote Code Execution | 5026382 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 for x64-based Systems | 5027230 (Security Update) | Important | Remote Code Execution | 5026382 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5027222 (Security Update) | Important | Remote Code Execution | 5026362 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for ARM64-based Systems | 5027222 (Security Update) | Important | Remote Code Execution | 5026362 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for x64-based Systems | 5027222 (Security Update) | Important | Remote Code Execution | 5026362 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 21H2 for 32-bit Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for x64-based Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for 32-bit Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for x64-based Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 11 version 21H2 for ARM64-based Systems | 5027223 (Security Update) | Important | Remote Code Execution | 5026368 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 version 21H2 for x64-based Systems | 5027223 (Security Update) | Important | Remote Code Execution | 5026368 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 Version 22H2 for ARM64-based Systems | 5027231 (Security Update) | Important | Remote Code Execution | 5026372 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows 11 Version 22H2 for x64-based Systems | 5027231 (Security Update) | Important | Remote Code Execution | 5026372 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Remote Code Execution | 5026408 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Remote Code Execution | 5026408 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Remote Code Execution | 5026408 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Remote Code Execution | 5026408 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Important | Remote Code Execution | 5026413 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Important | Remote Code Execution | 5026413 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2012 | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Important | Remote Code Execution | 5026419 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 (Server Core installation) | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Important | Remote Code Execution | 5026419 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 R2 | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Remote Code Execution | 5026415 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Remote Code Execution | 5026415 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2016 | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2016 (Server Core installation) | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2019 | 5027222 (Security Update) | Important | Remote Code Execution | 5026362 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2019 (Server Core installation) | 5027222 (Security Update) | Important | Remote Code Execution | 5026362 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2022 | 5027225 (Security Update) | Important | Remote Code Execution | 5026370 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
Windows Server 2022 (Server Core installation) | 5027225 (Security Update) | Important | Remote Code Execution | 5026370 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
CVE ID | Acknowledgements |
CVE-2023-29372 | Kyou Fujibayashi |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-29373
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft ODBC Driver Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-29373 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5027230 (Security Update) | Important | Remote Code Execution | 5026382 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 for x64-based Systems | 5027230 (Security Update) | Important | Remote Code Execution | 5026382 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5027222 (Security Update) | Important | Remote Code Execution | 5026362 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for ARM64-based Systems | 5027222 (Security Update) | Important | Remote Code Execution | 5026362 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for x64-based Systems | 5027222 (Security Update) | Important | Remote Code Execution | 5026362 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 21H2 for 32-bit Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for x64-based Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for 32-bit Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for x64-based Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 11 version 21H2 for ARM64-based Systems | 5027223 (Security Update) | Important | Remote Code Execution | 5026368 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 version 21H2 for x64-based Systems | 5027223 (Security Update) | Important | Remote Code Execution | 5026368 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 Version 22H2 for ARM64-based Systems | 5027231 (Security Update) | Important | Remote Code Execution | 5026372 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows 11 Version 22H2 for x64-based Systems | 5027231 (Security Update) | Important | Remote Code Execution | 5026372 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Remote Code Execution | 5026408 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Remote Code Execution | 5026408 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Remote Code Execution | 5026408 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Remote Code Execution | 5026408 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Important | Remote Code Execution | 5026413 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Important | Remote Code Execution | 5026413 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2012 | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Important | Remote Code Execution | 5026419 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 (Server Core installation) | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Important | Remote Code Execution | 5026419 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 R2 | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Remote Code Execution | 5026415 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Remote Code Execution | 5026415 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2016 | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2016 (Server Core installation) | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2019 | 5027222 (Security Update) | Important | Remote Code Execution | 5026362 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2019 (Server Core installation) | 5027222 (Security Update) | Important | Remote Code Execution | 5026362 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2022 | 5027225 (Security Update) | Important | Remote Code Execution | 5026370 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
Windows Server 2022 (Server Core installation) | 5027225 (Security Update) | Important | Remote Code Execution | 5026370 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
CVE ID | Acknowledgements |
CVE-2023-29373 | Yousuke Shibazaki |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-32008
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is local (AV:L) while user interaction is required (UI:R). What does that mean for this vulnerability? An attacker can trick a local user on a vulnerable system into mounting a specially crafted VHD that would then trigger the vulnerability. Although the CVSS metric is local (AV:L), are there additional attack vectors? This vulnerability could also be exploited through a physical attack vector. An attacker with physical access to a vulnerable system could insert a specially crafted USB device into the machine. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-32008 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5027230 (Security Update) | Important | Remote Code Execution | 5026382 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 for x64-based Systems | 5027230 (Security Update) | Important | Remote Code Execution | 5026382 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5027222 (Security Update) | Important | Remote Code Execution | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for ARM64-based Systems | 5027222 (Security Update) | Important | Remote Code Execution | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for x64-based Systems | 5027222 (Security Update) | Important | Remote Code Execution | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 21H2 for 32-bit Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for x64-based Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for 32-bit Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for x64-based Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 11 version 21H2 for ARM64-based Systems | 5027223 (Security Update) | Important | Remote Code Execution | 5026368 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 version 21H2 for x64-based Systems | 5027223 (Security Update) | Important | Remote Code Execution | 5026368 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 Version 22H2 for ARM64-based Systems | 5027231 (Security Update) | Important | Remote Code Execution | 5026372 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows 11 Version 22H2 for x64-based Systems | 5027231 (Security Update) | Important | Remote Code Execution | 5026372 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows Server 2016 | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2016 (Server Core installation) | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2019 | 5027222 (Security Update) | Important | Remote Code Execution | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2019 (Server Core installation) | 5027222 (Security Update) | Important | Remote Code Execution | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2022 | 5027225 (Security Update) | Important | Remote Code Execution | 5026370 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
Windows Server 2022 (Server Core installation) | 5027225 (Security Update) | Important | Remote Code Execution | 5026370 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
CVE ID | Acknowledgements |
CVE-2023-32008 | Andrew Ruddick with Microsoft Security Response Center |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-32009
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Collaborative Translation Framework Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? In this case, a successful attack could be performed from a low privilege AppContainer. The attacker could elevate their privileges and execute code or access resources at a higher integrity level than that of the AppContainer execution environment. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-32009 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1607 for 32-bit Systems | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for ARM64-based Systems | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for x64-based Systems | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 21H2 for 32-bit Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for x64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for 32-bit Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for x64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 11 version 21H2 for ARM64-based Systems | 5027223 (Security Update) | Important | Elevation of Privilege | 5026368 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 version 21H2 for x64-based Systems | 5027223 (Security Update) | Important | Elevation of Privilege | 5026368 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 Version 22H2 for ARM64-based Systems | 5027231 (Security Update) | Important | Elevation of Privilege | 5026372 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows 11 Version 22H2 for x64-based Systems | 5027231 (Security Update) | Important | Elevation of Privilege | 5026372 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows Server 2016 | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2016 (Server Core installation) | 5027219 (Security Update) | Important | Elevation of Privilege | 5026363 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2019 | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2019 (Server Core installation) | 5027222 (Security Update) | Important | Elevation of Privilege | 5026362 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2022 | 5027225 (Security Update) | Important | Elevation of Privilege | 5026370 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
Windows Server 2022 (Server Core installation) | 5027225 (Security Update) | Important | Elevation of Privilege | 5026370 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
CVE ID | Acknowledgements |
CVE-2023-32009 |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-32010
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Bus Filter Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited the vulnerability? A domain user could use this vulnerability to elevate privileges to SYSTEM assigned integrity level. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-32010 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 22H2 for ARM64-based Systems | 5027231 (Security Update) | Important | Elevation of Privilege | 5026372 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows 11 Version 22H2 for x64-based Systems | 5027231 (Security Update) | Important | Elevation of Privilege | 5026372 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
CVE ID | Acknowledgements |
CVE-2023-32010 | k0shl with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-32011
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows iSCSI Discovery Service Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-32011 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5027230 (Security Update) | Important | Denial of Service | 5026382 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 for x64-based Systems | 5027230 (Security Update) | Important | Denial of Service | 5026382 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5027219 (Security Update) | Important | Denial of Service | 5026363 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5027219 (Security Update) | Important | Denial of Service | 5026363 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5027222 (Security Update) | Important | Denial of Service | 5026362 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for ARM64-based Systems | 5027222 (Security Update) | Important | Denial of Service | 5026362 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for x64-based Systems | 5027222 (Security Update) | Important | Denial of Service | 5026362 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 21H2 for 32-bit Systems | 5027215 (Security Update) | Important | Denial of Service | 5026361 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Denial of Service | 5026361 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for x64-based Systems | 5027215 (Security Update) | Important | Denial of Service | 5026361 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for 32-bit Systems | 5027215 (Security Update) | Important | Denial of Service | 5026361 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Denial of Service | 5026361 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for x64-based Systems | 5027215 (Security Update) | Important | Denial of Service | 5026361 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 11 version 21H2 for ARM64-based Systems | 5027223 (Security Update) | Important | Denial of Service | 5026368 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 version 21H2 for x64-based Systems | 5027223 (Security Update) | Important | Denial of Service | 5026368 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 Version 22H2 for ARM64-based Systems | 5027231 (Security Update) | Important | Denial of Service | 5026372 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows 11 Version 22H2 for x64-based Systems | 5027231 (Security Update) | Important | Denial of Service | 5026372 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Denial of Service | 5026408 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Denial of Service | 5026408 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Denial of Service | 5026408 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Denial of Service | 5026408 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Important | Denial of Service | 5026413 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Important | Denial of Service | 5026413 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2012 | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Important | Denial of Service | 5026419 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 (Server Core installation) | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Important | Denial of Service | 5026419 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 R2 | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Denial of Service | 5026415 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Denial of Service | 5026415 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2016 | 5027219 (Security Update) | Important | Denial of Service | 5026363 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2016 (Server Core installation) | 5027219 (Security Update) | Important | Denial of Service | 5026363 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2019 | 5027222 (Security Update) | Important | Denial of Service | 5026362 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2019 (Server Core installation) | 5027222 (Security Update) | Important | Denial of Service | 5026362 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2022 | 5027225 (Security Update) | Important | Denial of Service | 5026370 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
Windows Server 2022 (Server Core installation) | 5027225 (Security Update) | Important | Denial of Service | 5026370 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
CVE ID | Acknowledgements |
CVE-2023-32011 | Azure Yang with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-32012
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Container Manager Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.3/TemporalScore:5.5
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-32012 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 21H2 for 32-bit Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for x64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for 32-bit Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for x64-based Systems | 5027215 (Security Update) | Important | Elevation of Privilege | 5026361 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 11 version 21H2 for ARM64-based Systems | 5027223 (Security Update) | Important | Elevation of Privilege | 5026368 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 version 21H2 for x64-based Systems | 5027223 (Security Update) | Important | Elevation of Privilege | 5026368 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 Version 22H2 for ARM64-based Systems | 5027231 (Security Update) | Important | Elevation of Privilege | 5026372 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows 11 Version 22H2 for x64-based Systems | 5027231 (Security Update) | Important | Elevation of Privilege | 5026372 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
CVE ID | Acknowledgements |
CVE-2023-32012 | Naceri with MSRC Vulnerabilities and Mitigations |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-32013
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Hyper-V Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Critical | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-32013 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for x64-based Systems | 5027222 (Security Update) | Critical | Denial of Service | 5026362 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 21H2 for x64-based Systems | 5027215 (Security Update) | Critical | Denial of Service | 5026361 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for x64-based Systems | 5027215 (Security Update) | Critical | Denial of Service | 5026361 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 11 version 21H2 for ARM64-based Systems | 5027223 (Security Update) | Critical | Denial of Service | 5026368 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 version 21H2 for x64-based Systems | 5027223 (Security Update) | Critical | Denial of Service | 5026368 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 Version 22H2 for ARM64-based Systems | 5027231 (Security Update) | Critical | Denial of Service | 5026372 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows 11 Version 22H2 for x64-based Systems | 5027231 (Security Update) | Critical | Denial of Service | 5026372 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows Server 2019 | 5027222 (Security Update) | Critical | Denial of Service | 5026362 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2019 (Server Core installation) | 5027222 (Security Update) | Critical | Denial of Service | 5026362 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2022 | 5027225 (Security Update) | Critical | Denial of Service | 5026370 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
Windows Server 2022 (Server Core installation) | 5027225 (Security Update) | Critical | Denial of Service | 5026370 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
CVE ID | Acknowledgements |
CVE-2023-32013 | Microsoft Offensive Research & Security Engineering (MORSE) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-32014
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? When Windows message queuing service is running in a PGM Server environment, an attacker could send a specially crafted file over the network to achieve remote code execution and attempt to trigger malicious code. Mitigations: Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors might be helpful in your situation: The Windows message queuing service, which is a Windows component, needs to be enabled for a system to be exploitable by this vulnerability. This feature can be added via the Control Panel. You can check to see if there is a service running named Message Queuing and TCP port 1801 is listening on the machine. Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-32014 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5027230 (Security Update) | Critical | Remote Code Execution | 5026382 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 for x64-based Systems | 5027230 (Security Update) | Critical | Remote Code Execution | 5026382 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5027219 (Security Update) | Critical | Remote Code Execution | 5026363 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5027219 (Security Update) | Critical | Remote Code Execution | 5026363 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5027222 (Security Update) | Critical | Remote Code Execution | 5026362 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for ARM64-based Systems | 5027222 (Security Update) | Critical | Remote Code Execution | 5026362 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for x64-based Systems | 5027222 (Security Update) | Critical | Remote Code Execution | 5026362 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 21H2 for 32-bit Systems | 5027215 (Security Update) | Critical | Remote Code Execution | 5026361 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for ARM64-based Systems | 5027215 (Security Update) | Critical | Remote Code Execution | 5026361 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for x64-based Systems | 5027215 (Security Update) | Critical | Remote Code Execution | 5026361 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for 32-bit Systems | 5027215 (Security Update) | Critical | Remote Code Execution | 5026361 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for ARM64-based Systems | 5027215 (Security Update) | Critical | Remote Code Execution | 5026361 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for x64-based Systems | 5027215 (Security Update) | Critical | Remote Code Execution | 5026361 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 11 version 21H2 for ARM64-based Systems | 5027223 (Security Update) | Critical | Remote Code Execution | 5026368 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 version 21H2 for x64-based Systems | 5027223 (Security Update) | Critical | Remote Code Execution | 5026368 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 Version 22H2 for ARM64-based Systems | 5027231 (Security Update) | Critical | Remote Code Execution | 5026372 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows 11 Version 22H2 for x64-based Systems | 5027231 (Security Update) | Critical | Remote Code Execution | 5026372 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Critical | Remote Code Execution | 5026408 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Critical | Remote Code Execution | 5026408 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Critical | Remote Code Execution | 5026408 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Critical | Remote Code Execution | 5026408 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Critical | Remote Code Execution | 5026413 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Critical | Remote Code Execution | 5026413 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2012 | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Critical | Remote Code Execution | 5026419 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 (Server Core installation) | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Critical | Remote Code Execution | 5026419 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 R2 | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Critical | Remote Code Execution | 5026415 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Critical | Remote Code Execution | 5026415 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2016 | 5027219 (Security Update) | Critical | Remote Code Execution | 5026363 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2016 (Server Core installation) | 5027219 (Security Update) | Critical | Remote Code Execution | 5026363 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2019 | 5027222 (Security Update) | Critical | Remote Code Execution | 5026362 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2019 (Server Core installation) | 5027222 (Security Update) | Critical | Remote Code Execution | 5026362 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2022 | 5027225 (Security Update) | Critical | Remote Code Execution | 5026370 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
Windows Server 2022 (Server Core installation) | 5027225 (Security Update) | Critical | Remote Code Execution | 5026370 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
CVE ID | Acknowledgements |
CVE-2023-32014 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-32015
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? When Windows message queuing service is running in a PGM Server environment, an attacker could send a specially crafted file over the network to achieve remote code execution and attempt to trigger malicious code. Mitigations: Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors might be helpful in your situation: The Windows message queuing service, which is a Windows component, needs to be enabled for a system to be exploitable by this vulnerability. This feature can be added via the Control Panel. You can check to see if there is a service running named Message Queuing and TCP port 1801 is listening on the machine. Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-32015 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5027230 (Security Update) | Critical | Remote Code Execution | 5026382 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 for x64-based Systems | 5027230 (Security Update) | Critical | Remote Code Execution | 5026382 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5027219 (Security Update) | Critical | Remote Code Execution | 5026363 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5027219 (Security Update) | Critical | Remote Code Execution | 5026363 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5027222 (Security Update) | Critical | Remote Code Execution | 5026362 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for ARM64-based Systems | 5027222 (Security Update) | Critical | Remote Code Execution | 5026362 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for x64-based Systems | 5027222 (Security Update) | Critical | Remote Code Execution | 5026362 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 21H2 for 32-bit Systems | 5027215 (Security Update) | Critical | Remote Code Execution | 5026361 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for ARM64-based Systems | 5027215 (Security Update) | Critical | Remote Code Execution | 5026361 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for x64-based Systems | 5027215 (Security Update) | Critical | Remote Code Execution | 5026361 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for 32-bit Systems | 5027215 (Security Update) | Critical | Remote Code Execution | 5026361 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for ARM64-based Systems | 5027215 (Security Update) | Critical | Remote Code Execution | 5026361 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for x64-based Systems | 5027215 (Security Update) | Critical | Remote Code Execution | 5026361 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 11 version 21H2 for ARM64-based Systems | 5027223 (Security Update) | Critical | Remote Code Execution | 5026368 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 version 21H2 for x64-based Systems | 5027223 (Security Update) | Critical | Remote Code Execution | 5026368 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 Version 22H2 for ARM64-based Systems | 5027231 (Security Update) | Critical | Remote Code Execution | 5026372 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows 11 Version 22H2 for x64-based Systems | 5027231 (Security Update) | Critical | Remote Code Execution | 5026372 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Critical | Remote Code Execution | 5026408 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Critical | Remote Code Execution | 5026408 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Critical | Remote Code Execution | 5026408 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Critical | Remote Code Execution | 5026408 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Critical | Remote Code Execution | 5026413 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Critical | Remote Code Execution | 5026413 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2012 | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Critical | Remote Code Execution | 5026419 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 (Server Core installation) | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Critical | Remote Code Execution | 5026419 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 R2 | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Critical | Remote Code Execution | 5026415 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Critical | Remote Code Execution | 5026415 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2016 | 5027219 (Security Update) | Critical | Remote Code Execution | 5026363 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2016 (Server Core installation) | 5027219 (Security Update) | Critical | Remote Code Execution | 5026363 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2019 | 5027222 (Security Update) | Critical | Remote Code Execution | 5026362 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2019 (Server Core installation) | 5027222 (Security Update) | Critical | Remote Code Execution | 5026362 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2022 | 5027225 (Security Update) | Critical | Remote Code Execution | 5026370 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
Windows Server 2022 (Server Core installation) | 5027225 (Security Update) | Critical | Remote Code Execution | 5026370 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
CVE ID | Acknowledgements |
CVE-2023-32015 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-32016
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Installer Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? Exploiting this vulnerability could allow the disclosure of initialized or uninitialized memory in the process heap. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-32016 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5027230 (Security Update) | Important | Information Disclosure | 5026382 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 for x64-based Systems | 5027230 (Security Update) | Important | Information Disclosure | 5026382 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5027219 (Security Update) | Important | Information Disclosure | 5026363 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5027219 (Security Update) | Important | Information Disclosure | 5026363 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5027222 (Security Update) | Important | Information Disclosure | 5026362 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for ARM64-based Systems | 5027222 (Security Update) | Important | Information Disclosure | 5026362 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for x64-based Systems | 5027222 (Security Update) | Important | Information Disclosure | 5026362 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 21H2 for 32-bit Systems | 5027215 (Security Update) | Important | Information Disclosure | 5026361 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Information Disclosure | 5026361 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for x64-based Systems | 5027215 (Security Update) | Important | Information Disclosure | 5026361 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for 32-bit Systems | 5027215 (Security Update) | Important | Information Disclosure | 5026361 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Information Disclosure | 5026361 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for x64-based Systems | 5027215 (Security Update) | Important | Information Disclosure | 5026361 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 11 version 21H2 for ARM64-based Systems | 5027223 (Security Update) | Important | Information Disclosure | 5026368 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 version 21H2 for x64-based Systems | 5027223 (Security Update) | Important | Information Disclosure | 5026368 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 Version 22H2 for ARM64-based Systems | 5027231 (Security Update) | Important | Information Disclosure | 5026372 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows 11 Version 22H2 for x64-based Systems | 5027231 (Security Update) | Important | Information Disclosure | 5026372 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Information Disclosure | 5026408 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Information Disclosure | 5026408 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Information Disclosure | 5026408 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Information Disclosure | 5026408 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Important | Information Disclosure | 5026413 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Important | Information Disclosure | 5026413 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2012 | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Important | Information Disclosure | 5026419 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 (Server Core installation) | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Important | Information Disclosure | 5026419 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 R2 | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Information Disclosure | 5026415 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Information Disclosure | 5026415 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2016 | 5027219 (Security Update) | Important | Information Disclosure | 5026363 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2016 (Server Core installation) | 5027219 (Security Update) | Important | Information Disclosure | 5026363 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2019 | 5027222 (Security Update) | Important | Information Disclosure | 5026362 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2019 (Server Core installation) | 5027222 (Security Update) | Important | Information Disclosure | 5026362 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2022 | 5027225 (Security Update) | Important | Information Disclosure | 5026370 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
Windows Server 2022 (Server Core installation) | 5027225 (Security Update) | Important | Information Disclosure | 5026370 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
CVE ID | Acknowledgements |
CVE-2023-32016 | Adrian Denkiewicz with Doyensec |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-32017
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft PostScript Printer Driver Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-32017 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5027230 (Security Update) | Important | Remote Code Execution | 5026382 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 for x64-based Systems | 5027230 (Security Update) | Important | Remote Code Execution | 5026382 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5027222 (Security Update) | Important | Remote Code Execution | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for ARM64-based Systems | 5027222 (Security Update) | Important | Remote Code Execution | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for x64-based Systems | 5027222 (Security Update) | Important | Remote Code Execution | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 21H2 for 32-bit Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for x64-based Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for 32-bit Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for x64-based Systems | 5027215 (Security Update) | Important | Remote Code Execution | 5026361 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 11 version 21H2 for ARM64-based Systems | 5027223 (Security Update) | Important | Remote Code Execution | 5026368 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 version 21H2 for x64-based Systems | 5027223 (Security Update) | Important | Remote Code Execution | 5026368 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 Version 22H2 for ARM64-based Systems | 5027231 (Security Update) | Important | Remote Code Execution | 5026372 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows 11 Version 22H2 for x64-based Systems | 5027231 (Security Update) | Important | Remote Code Execution | 5026372 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Remote Code Execution | 5026408 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Remote Code Execution | 5026408 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Remote Code Execution | 5026408 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Remote Code Execution | 5026408 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Important | Remote Code Execution | 5026413 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Important | Remote Code Execution | 5026413 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2012 | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Important | Remote Code Execution | 5026419 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 (Server Core installation) | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Important | Remote Code Execution | 5026419 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 R2 | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Remote Code Execution | 5026415 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Remote Code Execution | 5026415 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2016 | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2016 (Server Core installation) | 5027219 (Security Update) | Important | Remote Code Execution | 5026363 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2019 | 5027222 (Security Update) | Important | Remote Code Execution | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2019 (Server Core installation) | 5027222 (Security Update) | Important | Remote Code Execution | 5026362 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2022 | 5027225 (Security Update) | Important | Remote Code Execution | 5026370 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
Windows Server 2022 (Server Core installation) | 5027225 (Security Update) | Important | Remote Code Execution | 5026370 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
CVE ID | Acknowledgements |
CVE-2023-32017 | kap0k |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-32018
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Hello Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince the user to open said file. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-32018 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 22H2 for ARM64-based Systems | 5027231 (Security Update) | Important | Remote Code Execution | 5026372 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows 11 Version 22H2 for x64-based Systems | 5027231 (Security Update) | Important | Remote Code Execution | 5026372 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
CVE ID | Acknowledgements |
CVE-2023-32018 | CHEN QINGYANG with Topsec Alpha Team |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-32019
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:4.7/TemporalScore:4.1
Executive Summary: None FAQ: According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges. What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could view heap memory from a privileged process running on the server. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to coordinate an attack with another privileged process executed by another user in the system. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-32019 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1607 for 32-bit Systems | 5027219 (Security Update) | Important | Information Disclosure | 5026363 | Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5027219 (Security Update) | Important | Information Disclosure | 5026363 | Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5027222 (Security Update) | Important | Information Disclosure | 5026362 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for ARM64-based Systems | 5027222 (Security Update) | Important | Information Disclosure | 5026362 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 1809 for x64-based Systems | 5027222 (Security Update) | Important | Information Disclosure | 5026362 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows 10 Version 21H2 for 32-bit Systems | 5027215 (Security Update) | Important | Information Disclosure | 5026361 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Information Disclosure | 5026361 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 21H2 for x64-based Systems | 5027215 (Security Update) | Important | Information Disclosure | 5026361 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for 32-bit Systems | 5027215 (Security Update) | Important | Information Disclosure | 5026361 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for ARM64-based Systems | 5027215 (Security Update) | Important | Information Disclosure | 5026361 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 10 Version 22H2 for x64-based Systems | 5027215 (Security Update) | Important | Information Disclosure | 5026361 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.3087 |
Yes | 5027215 |
Windows 11 version 21H2 for ARM64-based Systems | 5027223 (Security Update) | Important | Information Disclosure | 5026368 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 version 21H2 for x64-based Systems | 5027223 (Security Update) | Important | Information Disclosure | 5026368 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2057 |
Yes | 5027223 |
Windows 11 Version 22H2 for ARM64-based Systems | 5027231 (Security Update) | Important | Information Disclosure | 5026372 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows 11 Version 22H2 for x64-based Systems | 5027231 (Security Update) | Important | Information Disclosure | 5026372 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.1848 |
Yes | 5027231 |
Windows Server 2016 | 5027219 (Security Update) | Important | Information Disclosure | 5026363 | Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2016 (Server Core installation) | 5027219 (Security Update) | Important | Information Disclosure | 5026363 | Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2019 | 5027222 (Security Update) | Important | Information Disclosure | 5026362 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2019 (Server Core installation) | 5027222 (Security Update) | Important | Information Disclosure | 5026362 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2022 | 5027225 (Security Update) | Important | Information Disclosure | 5026370 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
Windows Server 2022 (Server Core installation) | 5027225 (Security Update) | Important | Information Disclosure | 5026370 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
CVE ID | Acknowledgements |
CVE-2023-32019 | Mateusz Jurczyk of Google Project Zero |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-32020
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows DNS Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:3.7/TemporalScore:3.2
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment. According to the CVSS metrics, successful exploitation of this vulnerability could lead to minor loss of confidentiality (C:L), integrity (I:L) and availability (A:L). What does that mean for this vulnerability? While we cannot rule out the impact to Confidentiality, Integrity, and Availability, the ability to exploit this vulnerability by itself is limited. An attacker would need to combine this with other vulnerabilities to perform an attack. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-32020 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Spoofing | 5026408 |
Base: 3.7 Temporal: 3.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Spoofing | 5026408 |
Base: 3.7 Temporal: 3.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Spoofing | 5026408 |
Base: 3.7 Temporal: 3.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5027279 (Monthly Rollup) 5027277 (Security Only) |
Important | Spoofing | 5026408 |
Base: 3.7 Temporal: 3.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
6.0.6003.22113 |
Yes | 5027279 5027277 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Important | Spoofing | 5026413 |
Base: 3.7 Temporal: 3.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5027275 (Monthly Rollup) 5027256 (Security Only) |
Important | Spoofing | 5026413 |
Base: 3.7 Temporal: 3.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
6.1.7601.26564 |
Yes | 5027275 5027256 |
Windows Server 2012 | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Important | Spoofing | 5026419 |
Base: 3.7 Temporal: 3.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 (Server Core installation) | 5027283 (Monthly Rollup) 5027281 (Security Only) |
Important | Spoofing | 5026419 |
Base: 3.7 Temporal: 3.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
6.2.9200.24314 | Yes | None |
Windows Server 2012 R2 | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Spoofing | 5026415 |
Base: 3.7 Temporal: 3.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Spoofing | 5026415 |
Base: 3.7 Temporal: 3.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2016 | 5027219 (Security Update) | Important | Spoofing | 5026363 | Base: 3.7 Temporal: 3.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2016 (Server Core installation) | 5027219 (Security Update) | Important | Spoofing | 5026363 | Base: 3.7 Temporal: 3.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2019 | 5027222 (Security Update) | Important | Spoofing | 5026362 |
Base: 3.7 Temporal: 3.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2019 (Server Core installation) | 5027222 (Security Update) | Important | Spoofing | 5026362 |
Base: 3.7 Temporal: 3.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2022 | 5027225 (Security Update) | Important | Spoofing | 5026370 |
Base: 3.7 Temporal: 3.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
Windows Server 2022 (Server Core installation) | 5027225 (Security Update) | Important | Spoofing | 5026370 |
Base: 3.7 Temporal: 3.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
CVE ID | Acknowledgements |
CVE-2023-32020 | Xiang Li with NISL Lab @Tsinghua University |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-32021
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows SMB Witness Service Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.2
Executive Summary: None FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could execute RPC procedures that are restricted to privileged accounts, bypassing the access check for the RPC procedures. How could an attacker exploit the vulnerability? To exploit this vulnerability, an attacker could execute a specially crafted malicious script which executes an RPC call to a Windows SMB Witness Service. Mitigations: The following mitigating factors might be helpful in your situation:
Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-32021 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2012 R2 | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Security Feature Bypass | 5026415 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Security Feature Bypass | 5026415 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2016 | 5027219 (Security Update) | Important | Security Feature Bypass | 5026363 | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2016 (Server Core installation) | 5027219 (Security Update) | Important | Security Feature Bypass | 5026363 | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2019 | 5027222 (Security Update) | Important | Security Feature Bypass | 5026362 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2019 (Server Core installation) | 5027222 (Security Update) | Important | Security Feature Bypass | 5026362 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2022 | 5027225 (Security Update) | Important | Security Feature Bypass | 5026370 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
Windows Server 2022 (Server Core installation) | 5027225 (Security Update) | Important | Security Feature Bypass | 5026370 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
CVE ID | Acknowledgements |
CVE-2023-32021 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-32022
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Server Service Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.6/TemporalScore:6.6
Executive Summary: Windows Server Service Security Feature Bypass Vulnerability
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could execute RPC procedures that are restricted to privileged accounts, bypassing the access check for the RPC procedures. How could an attacker exploit this vulnerability? To exploit this vulnerability, an attacker could execute a specially crafted malicious script which executes an RPC call to a Windows SMB Server Service. According to the CVSS metrics, successful exploitation of this vulnerability could lead to minor loss of confidentiality (C:L), integrity (I:L), and have a high impact on availability (A:H). What does that mean for this vulnerability? Abuse of the affected RPC procedures can lead directly to a loss of the availability (A:H) of this service. At the same time we cannot rule out the potential impact that successful exploitation could have on Confidentiality and Integrity, Mitigations: The following mitigating factors might be helpful in your situation:
Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-32022 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2012 R2 | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Security Feature Bypass | 5026415 |
Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5027271 (Monthly Rollup) 5027282 (Security Only) |
Important | Security Feature Bypass | 5026415 |
Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C |
6.3.9600.21013 | Yes | None |
Windows Server 2016 | 5027219 (Security Update) | Important | Security Feature Bypass | 5026363 | Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2016 (Server Core installation) | 5027219 (Security Update) | Important | Security Feature Bypass | 5026363 | Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Windows Server 2019 | 5027222 (Security Update) | Important | Security Feature Bypass | 5026362 |
Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2019 (Server Core installation) | 5027222 (Security Update) | Important | Security Feature Bypass | 5026362 |
Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C |
10.0.17763.4499 |
Yes | 5027222 |
Windows Server 2022 | 5027225 (Security Update) | Important | Security Feature Bypass | 5026370 |
Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
Windows Server 2022 (Server Core installation) | 5027225 (Security Update) | Important | Security Feature Bypass | 5026370 |
Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C |
10.0.20348.1787 |
Yes | 5027225 |
CVE ID | Acknowledgements |
CVE-2023-32022 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-32030
MITRE NVD Issuing CNA: Microsoft |
CVE Title: .NET and Visual Studio Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.7
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-32030 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft .NET Framework 2.0 Service Pack 2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5027219 (Security Update) 5027534 (Security Only) |
Important | Denial of Service | 5026363 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
10.0.14393.5989 3.0.6920.8954; 2.0.50727.8970 |
Yes Maybe |
None |
Microsoft .NET Framework 2.0 Service Pack 2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5027534 (Security Only) 5027543 (Monthly Rollup) |
Important | Denial of Service | 5022734 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.7.4050.0 3.0.6920.8954; 2.0.50727.8970 |
Maybe | None |
Microsoft .NET Framework 3.0 Service Pack 2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5027534 (Security Only) 5027543 (Monthly Rollup) |
Important | Denial of Service | 5022734 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 3.0 Service Pack 2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5027534 (Security Only) 5027543 (Monthly Rollup) |
Important | Denial of Service | 5022734 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.7.4050.0 3.0.6920.8954; 2.0.50727.8970 |
Maybe | None |
Microsoft .NET Framework 3.5 and 4.6.2 on Windows 10 for 32-bit Systems | 5027230 (Security Update) | Important | Denial of Service | 5026382 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Microsoft .NET Framework 3.5 and 4.6.2 on Windows 10 for x64-based Systems | 5027230 (Security Update) | Important | Denial of Service | 5026382 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
10.0.10240.19983 | Yes | None |
Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 on Windows 10 Version 1607 for 32-bit Systems | 5027219 (Security Update) | Important | Denial of Service | 5026363 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 on Windows 10 Version 1607 for x64-based Systems | 5027219 (Security Update) | Important | Denial of Service | 5026363 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2016 | 5027219 (Security Update) | Important | Denial of Service | 5026363 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2016 (Server Core installation) | 5027219 (Security Update) | Important | Denial of Service | 5026363 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for 32-bit Systems | 5027536 (Security Update) | Important | Denial of Service | 5022782 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.7.4050.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for ARM64-based Systems | 5027536 (Security Update) | Important | Denial of Service | 5022782 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.7.4050.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for x64-based Systems | 5027536 (Security Update) | Important | Denial of Service | 5022782 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 | 5027536 (Security Update) | Important | Denial of Service | 5022782 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.7.4050.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 (Server Core installation) | 5027536 (Security Update) | Important | Denial of Service | 5022782 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.7.4050.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for 32-bit Systems | 5027536 (Security Update) | Important | Denial of Service | 5022782 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for x64-based Systems | 5027536 (Security Update) | Important | Denial of Service | 5022782 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for 32-bit Systems | 5027537 (Security Update) | Important | Denial of Service | 5022728, 5026958, 5022729 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for ARM64-based Systems | 5027537 (Security Update) | Important | Denial of Service | 5022728, 5026958, 5022729 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for x64-based Systems | 5027537 (Security Update) | Important | Denial of Service | 5022728, 5026958, 5022729 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for 32-bit Systems | 5027538 (Security Update) | Important | Denial of Service | 5022728, 5026958, 5022729 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for ARM64-based Systems | 5027538 (Security Update) | Important | Denial of Service | 5022728, 5026958, 5022729 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for x64-based Systems | 5027538 (Security Update) | Important | Denial of Service | 5022728, 5026958, 5022729 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for ARM64-based Systems | 5027539 (Security Update) | Important | Denial of Service | 5026959, 5022730 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for x64-based Systems | 5027539 (Security Update) | Important | Denial of Service | 5026959, 5022730 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 | 5027536 (Security Update) | Important | Denial of Service | 5022782 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 (Server Core installation) | 5027536 (Security Update) | Important | Denial of Service | 5022782 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 | 5027219 (Security Update) | Important | Denial of Service | 5026363 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 (Server Core installation) | 5027219 (Security Update) | Important | Denial of Service | 5026363 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
10.0.14393.5989 | Yes | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for 32-bit Systems | 5027537 (Security Update) | Important | Denial of Service | 5022728, 5026958, 5022729 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for ARM64-based Systems | 5027537 (Security Update) | Important | Denial of Service | 5022728, 5026958, 5022729 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for x64-based Systems | 5027537 (Security Update) | Important | Denial of Service | 5022728, 5026958, 5022729 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for 32-bit Systems | 5027538 (Security Update) | Important | Denial of Service | 5022728, 5026958, 5022729 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for ARM64-based Systems | 5027538 (Security Update) | Important | Denial of Service | 5022728, 5026958, 5022729 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for x64-based Systems | 5027538 (Security Update) | Important | Denial of Service | 5022728, 5026958, 5022729 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for ARM64-based Systems | 5027539 (Security Update) | Important | Denial of Service | 5026959, 5022730 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for x64-based Systems | 5027539 (Security Update) | Important | Denial of Service | 5026959, 5022730 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for ARM64-based Systems | 5027119 (Security Update) | Important | Denial of Service | 5026515, 5022497 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for x64-based Systems | 5027119 (Security Update) | Important | Denial of Service | 5026515, 5022497 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 | 5027544 (Security Update) | Important | Denial of Service | 5022735 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 (Server Core installation) | 5027544 (Security Update) | Important | Denial of Service | 5022735 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.9166.0 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 | 5027541 (Monthly Rollup) 5027532 (Security Only) |
Important | Denial of Service | 5022732 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 (Server Core installation) | 5027541 (Monthly Rollup) 5027532 (Security Only) |
Important | Denial of Service | 5022732 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 R2 | 5027542 (Monthly Rollup) 5027533 (Security Only) |
Important | Denial of Service | 5022733 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 3.5 on Windows Server 2012 R2 (Server Core installation) | 5027542 (Monthly Rollup) 5027533 (Security Only) |
Important | Denial of Service | 5022733 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 3.5.1 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5027540 (Monthly Rollup) 5027531 (Security Only) |
Important | Denial of Service | 5022731 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 3.5.1 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5027540 (Monthly Rollup) 5027531 (Security Only) |
Important | Denial of Service | 5022731 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
3.0.6920.8954; 2.0.50727.8970 | Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5027543 (Monthly Rollup) 5027534 (Security Only) |
Important | Denial of Service | 5022731, 5022734 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5027543 (Monthly Rollup) 5027534 (Security Only) |
Important | Denial of Service | 5022731, 5022734 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5027543 (Monthly Rollup) 5027534 (Security Only) |
Important | Denial of Service | 5022731, 5022734 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5027543 (Monthly Rollup) 5027534 (Security Only) |
Important | Denial of Service | 5022731, 5022734 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5027540 (Monthly Rollup) 5027531 (Security Only) |
Important | Denial of Service | 5022731 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5027540 (Monthly Rollup) 5027531 (Security Only) |
Important | Denial of Service | 5022731 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 | 5027541 (Monthly Rollup) 5027532 (Security Only) |
Important | Denial of Service | 5022732 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 (Server Core installation) | 5027541 (Monthly Rollup) 5027532 (Security Only) |
Important | Denial of Service | 5022732 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 | 5027542 (Monthly Rollup) 5027533 (Security Only) |
Important | Denial of Service | 5022733 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 (Server Core installation) | 5027542 (Monthly Rollup) 5027533 (Security Only) |
Important | Denial of Service | 5022733 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.7.04043.0 4.7.4050.0 |
Maybe | None |
Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for 32-bit Systems | 5027123 (Security Update) | Important | Denial of Service | 5022503 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for x64-based Systems | 5027123 (Security Update) | Important | Denial of Service | 5022503 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5027540 (Monthly Rollup) 5027531 (Security Only) |
Important | Denial of Service | 5022731 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5027540 (Monthly Rollup) 5027531 (Security Only) |
Important | Denial of Service | 5022731 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 | 5027541 (Monthly Rollup) 5027532 (Security Only) |
Important | Denial of Service | 5022732 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 (Server Core installation) | 5027541 (Monthly Rollup) 5027532 (Security Only) |
Important | Denial of Service | 5022732 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 | 5027542 (Monthly Rollup) 5027533 (Security Only) |
Important | Denial of Service | 5022733 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 (Server Core installation) | 5027542 (Monthly Rollup) 5027533 (Security Only) |
Important | Denial of Service | 5022733 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2016 | 5027123 (Security Update) | Important | Denial of Service | 5022503 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2016 (Server Core installation) | 5027123 (Security Update) | Important | Denial of Service | 5022503 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
4.8.4644.0 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-32030 |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-32032
MITRE NVD Issuing CNA: Microsoft |
CVE Title: .NET and Visual Studio Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.9
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could overwrite arbitrary file content in the security context of the local system. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to invest time in repeated exploitation attempts through sending constant or intermittent data. According to the CVSS metrics, the attack vector is local (AV:L) and privilege required is low (PR:L). What does that mean for this vulnerability? An attacker must have access to the targeted worker role and the ability to deploy a malicious application within the worker. The attack itself is carried out locally on the worker role where a malicious application has been deployed. According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L)? What does that mean for this vulnerability? An attacker who successfully exploited this vulnerability might be able to gain some understanding of the filesystem layout, but nothing confidential. The attacker would be able to write files, and thus impact Integrity of files if they were overwritten, and similarly cause a Denial of Service if required files, configurations, or both were overwritten. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-32032 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
.NET 7.0 | 5027798 (Security Update) | Important | Elevation of Privilege | None | Base: 6.5 Temporal: 5.9 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H/E:P/RL:O/RC:C |
7.0.7 | Maybe | None |
Microsoft Visual Studio 2022 version 17.0 | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 6.5 Temporal: 5.9 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H/E:P/RL:O/RC:C |
17.0.22 | Maybe | None |
Microsoft Visual Studio 2022 version 17.2 | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 6.5 Temporal: 5.9 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H/E:P/RL:O/RC:C |
17.2.16 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 6.5 Temporal: 5.9 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H/E:P/RL:O/RC:C |
17.4.8 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 6.5 Temporal: 5.9 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H/E:P/RL:O/RC:C |
17.6.3 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-32032 | Tom Deseyn of Red Hat |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-33126
MITRE NVD Issuing CNA: Microsoft |
CVE Title: .NET and Visual Studio Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.6
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Exploitation of this vulnerability requires that a user trigger the payload in the application. According to the CVSS metric, user interaction is required (UI:R) and privileges required is low (PR:L). What does that mean for this vulnerability? An authorized attacker must send the user a malicious file and convince the user to open it. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-33126 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
.NET 6.0 | 5027797 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.6 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
6.0.18 | Maybe | None |
.NET 7.0 | 5027798 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.6 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
7.0.7 | Maybe | None |
Microsoft Visual Studio 2022 version 17.0 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.6 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
17.0.22 | Maybe | None |
Microsoft Visual Studio 2022 version 17.2 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.6 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
17.2.16 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.6 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
17.4.8 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.6 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
17.6.3 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-33126 | ycdxsb with VARAS@IIE |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-33128
MITRE NVD Issuing CNA: Microsoft |
CVE Title: .NET and Visual Studio Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.6
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Exploitation of this vulnerability requires that a user trigger the payload in the application. According to the CVSS metric, the attack vector is local (AV:L). What does this mean for this vulnerability? The attacker would have to be an authenticated user logged on to the vulnerable system to be able to exploit this vulnerability. According to the CVSS metric, user interaction is required (UI:R) and privileges required is low (PR:L). What does that mean for this vulnerability? An authorized attacker must send the user a malicious file and convince the user to open it. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-33128 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
.NET 6.0 | 5027797 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.6 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
6.0.18 | Maybe | None |
.NET 7.0 | 5027798 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.6 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
7.0.7 | Maybe | None |
Microsoft Visual Studio 2022 version 17.0 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.6 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
17.0.22 | Maybe | None |
Microsoft Visual Studio 2022 version 17.2 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.6 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
17.2.16 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.6 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
17.4.8 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.6 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
17.6.3 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-33128 |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-33129
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft SharePoint Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: None FAQ: According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? The attacker must be authenticated to the target site, with the permission to use Manage Lists within SharePoint. According to the CVSS metric, the attack vector is network (AV:N). How could an attacker exploit this vulnerability? As an authenticated user, the attacker could send a specially crafted string of data over the network, causing the application to crash. I am running SharePoint Enterprise Server 2016 or SharePoint Server 2019 and there are multiple updates available for each of these affected versions. Do I need to install all the updates listed in the Security Updates table for these versions? Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-33129 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft SharePoint Enterprise Server 2016 | 5002404 (Security Update) | Important | Denial of Service | 5002397 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
16.0.5400.1001 | Maybe | None |
Microsoft SharePoint Server 2019 | 5002402 (Security Update) 5002403 (Security Update) |
Important | Denial of Service | 5002389 5002330 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
16.0.10399.20005 | Maybe | None |
Microsoft SharePoint Server Subscription Edition | 5002416 (Security Update) | Important | Denial of Service | 5002390 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
16.0.16130.20548 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-33129 | Ivan Vagunin |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-33130
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft SharePoint Server Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or Instant Messenger message, and then convince the user to open the specially crafted file. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-33130 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft SharePoint Server 2019 | 5002402 (Security Update) 5002403 (Security Update) |
Important | Spoofing | 5002389 5002330 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
16.0.10399.20005 | Maybe | None |
Microsoft SharePoint Server Subscription Edition | 5002416 (Security Update) | Important | Spoofing | 5002390 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
16.0.16130.20548 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-33130 | Chris81 |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-33131
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Outlook Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Exploitation of the vulnerability requires that a user open a specially crafted file.
An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. According to the CVSS metric, the attack vector is network (AV:N) and privilege required is none (PR:N). What is the target used in the context of the remote code execution? An attacker who successfully exploits this vulnerability could perform remote code execution in the context of the victim user. The attacker does not need privileges to attempt to exploit this vulnerability. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-33131 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Outlook 2013 (32-bit editions) | 5002382 (Security Update) | Important | Remote Code Execution | 5002265 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.5563.1000 | Maybe | None |
Microsoft Outlook 2013 (64-bit editions) | 5002387 (Security Update) | Important | Remote Code Execution | 5002254 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5400.1000 | Maybe | None |
Microsoft Outlook 2013 RT Service Pack 1 | 5002382 (Security Update) | Important | Remote Code Execution | 5002265 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.5563.1000 | Maybe | None |
Microsoft Outlook 2016 (32-bit edition) | 5002387 (Security Update) | Important | Remote Code Execution | 5002254 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5400.1000 | Maybe | None |
Microsoft Outlook 2016 (64-bit edition) | 5002387 (Security Update) | Important | Remote Code Execution | 5002254 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5400.1000 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-33131 | Eduardo Braun Prado |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-33132
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft SharePoint Server Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.3/TemporalScore:5.5
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or Instant Messenger message, and then convince the user to open the specially crafted file. According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability? Integrity is impacted as XSS allows an attacker to add their malicious script to fetch victim's sensitive info or to change DOM execution. I am running SharePoint Enterprise Server 2016 or SharePoint Server 2019 and there are multiple updates available for each of these affected versions. Do I need to install all the updates listed in the Security Updates table for these versions? Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? The attacker must be authenticated to the target site as at least a Site Member. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-33132 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft SharePoint Server 2019 | 5002402 (Security Update) 5002403 (Security Update) |
Important | Spoofing | 5002389 5002330 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
16.0.10399.20005 | Maybe | None |
Microsoft SharePoint Server Subscription Edition | 5002416 (Security Update) | Important | Spoofing | 5002390 | Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
16.0.16130.20548 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-33132 | Chris81 |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-33133
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince the user to open said file. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-33133 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Excel 2013 RT Service Pack 1 | 5002414 (Security Update) | Important | Remote Code Execution | 5002384 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.5563.1000 | Maybe | None |
Microsoft Excel 2013 Service Pack 1 (32-bit editions) | 5002414 (Security Update) | Important | Remote Code Execution | 5002384 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.5563.1000 | Maybe | None |
Microsoft Excel 2013 Service Pack 1 (64-bit editions) | 5002414 (Security Update) | Important | Remote Code Execution | 5002384 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.5563.1000 | Maybe | None |
Microsoft Excel 2016 (32-bit edition) | 5002405 (Security Update) | Important | Remote Code Execution | 5002386 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5400.1000 | Maybe | None |
Microsoft Excel 2016 (64-bit edition) | 5002405 (Security Update) | Important | Remote Code Execution | 5002386 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5400.1000 | Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for Mac | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.74.23061100 | Maybe | None |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.74.23061100 | Maybe | None |
Microsoft Office Online Server | 5002401 (Security Update) | Important | Remote Code Execution | 5002372 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10399.20000 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-33133 | Marcin 'icewall' Noga with Cisco Talos |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-33135
MITRE NVD Issuing CNA: Microsoft |
CVE Title: .NET and Visual Studio Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.6
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince the user to open said file. According to the CVSS metric, user interaction is required (UI:R) and privileges required is low (PR:L). What does that mean for this vulnerability? An authorized attacker must send the user a malicious file and convince the user to open it. What privileges could be gained by an attacker who successfully exploited the vulnerability? Low-privilege attackers who successfully exploited the vulnerability could potentially write malicious configurations and download malicious files. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-33135 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
.NET 6.0 | 5027797 (Security Update) | Important | Elevation of Privilege | None | Base: 7.3 Temporal: 6.6 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
6.0.18 | Maybe | None |
.NET 7.0 | 5027798 (Security Update) | Important | Elevation of Privilege | None | Base: 7.3 Temporal: 6.6 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
7.0.7 | Maybe | None |
Microsoft Visual Studio 2022 version 17.0 | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 7.3 Temporal: 6.6 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
17.0.22 | Maybe | None |
Microsoft Visual Studio 2022 version 17.2 | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 7.3 Temporal: 6.6 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
17.2.16 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 7.3 Temporal: 6.6 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
17.4.8 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 7.3 Temporal: 6.6 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
17.6.3 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-33135 | ycdxsb with VARAS@IIE |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2023-27909
MITRE NVD Issuing CNA: AutoDesk |
CVE Title: AutoDesk: CVE-2023-27909 Out-Of-Bounds Write Vulnerability in Autodesk® FBX® SDK 2020 or prior
CVSS: None Executive Summary: None FAQ: Why is this AutoDesk CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in AutoDesk software which is consumed by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds of Visual Studio are no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-27909 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Visual Studio 2013 Update 5 | 5026454 (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
12.0.40702.0 | Maybe | None |
Microsoft Visual Studio 2015 Update 3 | 5026455 (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
14.0.27554.0 | Maybe | None |
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
15.9.55 | Maybe | None |
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
16.11.27 | Maybe | None |
Microsoft Visual Studio 2022 version 17.0 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
17.0.22 | Maybe | None |
Microsoft Visual Studio 2022 version 17.2 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
17.2.16 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
17.4.8 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
17.6.3 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-27909 | HAO LI of VenusTech ADLab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2023-27910
MITRE NVD Issuing CNA: AutoDesk |
CVE Title: AutoDesk: CVE-2023-27910 stack buffer overflow vulnerability in Autodesk® FBX® SDK 2020 or prior
CVSS: None Executive Summary: None FAQ: Why is this AutoDesk CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in AutoDesk software which is consumed by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds of Visual Studio are no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-27910 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Visual Studio 2013 Update 5 | 5026454 (Security Update) | Important | Information Disclosure | None | Base: N/A Temporal: N/A Vector: N/A |
12.0.40702.0 | Maybe | None |
Microsoft Visual Studio 2015 Update 3 | 5026455 (Security Update) | Important | Information Disclosure | None | Base: N/A Temporal: N/A Vector: N/A |
14.0.27554.0 | Maybe | None |
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) | Release Notes (Security Update) | Important | Information Disclosure | None | Base: N/A Temporal: N/A Vector: N/A |
15.9.55 | Maybe | None |
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | Release Notes (Security Update) | Important | Information Disclosure | None | Base: N/A Temporal: N/A Vector: N/A |
16.11.27 | Maybe | None |
Microsoft Visual Studio 2022 version 17.0 | Release Notes (Security Update) | Important | Information Disclosure | None | Base: N/A Temporal: N/A Vector: N/A |
17.0.22 | Maybe | None |
Microsoft Visual Studio 2022 version 17.2 | Release Notes (Security Update) | Important | Information Disclosure | None | Base: N/A Temporal: N/A Vector: N/A |
17.2.16 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Important | Information Disclosure | None | Base: N/A Temporal: N/A Vector: N/A |
17.4.8 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Important | Information Disclosure | None | Base: N/A Temporal: N/A Vector: N/A |
17.6.3 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-27910 | HAO LI of VenusTech ADLab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2023-27911
MITRE NVD Issuing CNA: AutoDesk |
CVE Title: AutoDesk: CVE-2023-27911 Heap buffer overflow vulnerability in Autodesk® FBX® SDK 2020 or prior
CVSS: None Executive Summary: None FAQ: Why is this AutoDesk CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in AutoDesk software which is consumed by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds of Visual Studio are no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-27911 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Visual Studio 2013 Update 5 | 5026454 (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
12.0.40702.0 | Maybe | None |
Microsoft Visual Studio 2015 Update 3 | 5026455 (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
14.0.27554.0 | Maybe | None |
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
15.9.55 | Maybe | None |
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
16.11.27 | Maybe | None |
Microsoft Visual Studio 2022 version 17.0 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
17.0.22 | Maybe | None |
Microsoft Visual Studio 2022 version 17.2 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
17.2.16 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
17.4.8 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
17.6.3 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-27911 | HAO LI of VenusTech ADLab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-33140
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft OneNote Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft OneNote and then click on a specially crafted URL to be compromised by the attacker. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-33140 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft OneNote for Universal | Release Notes (Security Update) | Important | Spoofing | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
16.0.14326.21450 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-33140 | Jordan Hopkins |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-33141
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Yet Another Reverse Proxy (YARP) Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.7
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-33141 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
YARP 2.0 | Release Notes (Security Update) | Important | Denial of Service | None | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
2.0.0 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-33141 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-33142
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft SharePoint Server Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: None FAQ: I am running SharePoint Enterprise Server 2016 or SharePoint Server 2019 and there are multiple updates available for each of these affected versions. Do I need to install all the updates listed in the Security Updates table for these versions? Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order. What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited the vulnerability would be able to create a list or document library in the targeted SharePoint site. **According to the CVSS metrics, successful exploitation of this vulnerability could lead to a major loss of integrity (I:H) but no loss of confidentiality (C:N), or have any effect on availability (A:N). How could an attacker affect the SharePoint site? ** An attacker who successfully exploited this vulnerability could create a list or document library in the targeted SharePoint site thus affecting the integrity. However, an attacker could not edit or delete a list or document library from the Sharepoint site. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-33142 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft SharePoint Server 2019 | 5002402 (Security Update) 5002403 (Security Update) |
Important | Elevation of Privilege | 5002389 5002330 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
16.0.10399.20005 | Maybe | None |
Microsoft SharePoint Server Subscription Edition | 5002416 (Security Update) | Important | Elevation of Privilege | 5002390 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
16.0.16130.20548 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-33142 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-33144
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Visual Studio Code Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.0/TemporalScore:4.5
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R) and privileges required is low (PR:L). What does that mean for this vulnerability? An authenticated attacker would have to send the victim a malicious file that the victim would have to open with Visual Studio Code. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-33144 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Visual Studio Code | Release Notes (Security Update) | Important | Spoofing | None | Base: 5.0 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
1.79 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2023-33144 | Justin Steven |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2023-33145
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Edge (Chromium-based) Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is data inside the targeted website like IDs, tokens, nonces, and other sensitive information. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? The user would have to click on a specially crafted URL to be compromised by the attacker. Mitigations: None Workarounds: None Revision: 1.0    13-Jun-23     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-33145 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Important | Information Disclosure | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
114.0.1823.41 | No | None |
CVE ID | Acknowledgements |
CVE-2023-33145 | Jun Kokatsu |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2023-2929
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2023-2929 Out of bounds write in Swiftshader
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    02-Jun-23     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-2929 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
114.0.1823.37 | No | None |
CVE ID | Acknowledgements |
CVE-2023-2929 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2023-2930
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2023-2930 Use after free in Extensions
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    02-Jun-23     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-2930 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
114.0.1823.37 | No | None |
CVE ID | Acknowledgements |
CVE-2023-2930 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2023-2931
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2023-2931 Use after free in PDF
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    02-Jun-23     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-2931 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
114.0.1823.37 | No | None |
CVE ID | Acknowledgements |
CVE-2023-2931 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2023-2932
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2023-2932 Use after free in PDF
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    02-Jun-23     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-2932 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
114.0.1823.37 | No | None |
CVE ID | Acknowledgements |
CVE-2023-2932 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2023-2933
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2023-2933 Use after free in PDF
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    02-Jun-23     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-2933 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
114.0.1823.37 | No | None |
CVE ID | Acknowledgements |
CVE-2023-2933 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2023-2934
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2023-2934 Out of bounds memory access in Mojo
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    02-Jun-23     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-2934 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
114.0.1823.37 | No | None |
CVE ID | Acknowledgements |
CVE-2023-2934 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2023-2935
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2023-2935 Type Confusion in V8
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    02-Jun-23     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-2935 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
114.0.1823.37 | No | None |
CVE ID | Acknowledgements |
CVE-2023-2935 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2023-2936
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2023-2936 Type Confusion in V8
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    02-Jun-23     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-2936 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
114.0.1823.37 | No | None |
CVE ID | Acknowledgements |
CVE-2023-2936 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2023-2937
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2023-2937 Inappropriate implementation in Picture In Picture
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    02-Jun-23     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-2937 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
114.0.1823.37 | No | None |
CVE ID | Acknowledgements |
CVE-2023-2937 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2023-2938
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2023-2938 Inappropriate implementation in Picture In Picture
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    02-Jun-23     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-2938 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
114.0.1823.37 | No | None |
CVE ID | Acknowledgements |
CVE-2023-2938 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2023-2939
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2023-2939 Insufficient data validation in Installer
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    02-Jun-23     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-2939 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
114.0.1823.37 | No | None |
CVE ID | Acknowledgements |
CVE-2023-2939 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2023-2940
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2023-2940 Inappropriate implementation in Downloads
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    02-Jun-23     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-2940 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
114.0.1823.37 | No | None |
CVE ID | Acknowledgements |
CVE-2023-2940 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2023-2941
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2023-2941 Inappropriate implementation in Extensions API
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    02-Jun-23     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-2941 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
114.0.1823.37 | No | None |
CVE ID | Acknowledgements |
CVE-2023-2941 | None |