Home > Security Bulletins > Microsoft Patch Tuesday – November 2023

Microsoft Patch Tuesday – November 2023

Microsoft

Microsoft Patch Tuesday

This month’s Patch Tuesday fixes a total of 58 vulnerabilities, with 14 of those being for Remote Code Execution. 1 vulnerability is rated as Critical by Microsoft.

5 of the vulnerabilities this month are zero-days.

Fixes for multiple products were released as usual. The most important patches are:

CVE-2023-36028 – Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability. An unauthenticated attacker could attack a Microsoft Protected Extensible Authentication Protocol (PEAP) Server by sending specially crafted malicious PEAP packets over the network. Microsoft notes that exploitation of this vulnerability is less likely. CVSS 3.1: 9.8 (Critical)

CVE-2023-36025 – Windows SmartScreen Security Feature Bypass Vulnerability. The attacker would be able to bypass Windows Defender SmartScreen checks and their associated prompts. CVSS 3.1: 8.8 (High)

CVE-2023-36036 – Windows Cloud Files Mini Filter Driver Privilege Escalation Vulnerability. An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. CVSS 3.1: 7.8 (High)

CVE-2023-36033 – Windows DWM Core Library Privilege Escalation Vulnerability. An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. CVSS 3.1: 7.8 (High)

The main list of patches breaks down as follows:

  • 15 Remote Code Execution
  • 16 Privilege Escalation
  • 11 Spoofing
  • 5 Denial of Service
  • 6 Information Disclosure
  • 6 Security Feature Bypass