Microsoft Patch Tuesday
This month’s Patch Tuesday fixes a total of 58 vulnerabilities, with 14 of those being for Remote Code Execution. 1 vulnerability is rated as Critical by Microsoft.
5 of the vulnerabilities this month are zero-days.
Fixes for multiple products were released as usual. The most important patches are:
CVE-2023-36028 – Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability. An unauthenticated attacker could attack a Microsoft Protected Extensible Authentication Protocol (PEAP) Server by sending specially crafted malicious PEAP packets over the network. Microsoft notes that exploitation of this vulnerability is less likely. CVSS 3.1: 9.8 (Critical)
CVE-2023-36025 – Windows SmartScreen Security Feature Bypass Vulnerability. The attacker would be able to bypass Windows Defender SmartScreen checks and their associated prompts. CVSS 3.1: 8.8 (High)
CVE-2023-36036 – Windows Cloud Files Mini Filter Driver Privilege Escalation Vulnerability. An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. CVSS 3.1: 7.8 (High)
CVE-2023-36033 – Windows DWM Core Library Privilege Escalation Vulnerability. An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. CVSS 3.1: 7.8 (High)
The main list of patches breaks down as follows:
- 15 Remote Code Execution
- 16 Privilege Escalation
- 11 Spoofing
- 5 Denial of Service
- 6 Information Disclosure
- 6 Security Feature Bypass