
Microsoft patched 97 CVEs in its April 2023 Patch Tuesday Release, with seven rated as critical and 90 rated as important.
This month’s update includes patches for:
- .NET Core
- Azure Machine Learning
- Azure Service Connector
- Microsoft Bluetooth Driver
- Microsoft Defender for Endpoint
- Microsoft Dynamics
- Microsoft Dynamics 365 Customer Voice
- Microsoft Edge (Chromium-based)
- Microsoft Graphics Component
- Microsoft Message Queuing
- Microsoft Office
- Microsoft Office Publisher
- Microsoft Office SharePoint
- Microsoft Office Word
- Microsoft PostScript Printer Driver
- Microsoft Printer Drivers
- Microsoft WDAC OLE DB provider for SQL
- Microsoft Windows DNS
- Visual Studio
- Visual Studio Code
- Windows Active Directory
- Windows ALPC
- Windows Ancillary Function Driver for WinSock
- Windows Boot Manager
- Windows Clip Service
- Windows CNG Key Isolation Service
- Windows Common Log File System Driver
- Windows DHCP Server
- Windows Enroll Engine
- Windows Error Reporting
- Windows Group Policy
- Windows Internet Key Exchange (IKE) Protocol
- Windows Kerberos
- Windows Kernel
- Windows Layer 2 Tunneling Protocol
- Windows Lock Screen
- Windows Netlogon
- Windows Network Address Translation (NAT)
- Windows Network File System
- Windows Network Load Balancing
- Windows NTLM
- Windows PGM
- Windows Point-to-Point Protocol over Ethernet (PPPoE)
- Windows Point-to-Point Tunneling Protocol
- Windows Raw Image Extension
- Windows RDP Client
- Windows Registry
- Windows RPC API
- Windows Secure Boot
- Windows Secure Channel
- Windows Secure Socket Tunneling Protocol (SSTP)
- Windows Transport Security Layer (TLS)
- Windows Win32K
Windows Common Log File System Driver EoP Vulnerability
CVE-2023-28252 is an EoP vulnerability in the Windows Common Log File System (CLFS) Driver, a logging service used by kernel-mode and user-mode applications. It was assigned a CVSSv3 score of 7.8. This vulnerability is a post-compromise flaw, meaning an attacker could exploit it after gaining access to a vulnerable target. Successful exploitation would elevate an attacker’s privileges SYSTEM. According to Microsoft, it was exploited in the wild as a zero day
CVE-2023-28252 is the second CLFS Driver EoP vulnerability to be exploited in the wild in 2023, as CVE-2023-23376 was disclosed in the February 2023 Patch Tuesday. It is the fourth known CLFS EoP vulnerability to be exploited in the wild in the last two years, following CVE-2022-24521 from the April 2022 Patch Tuesday and CVE-2022-37969 from the September 2022 Patch Tuesday release.
Microsoft Message Queuing RCE Vulnerability
CVE-2023-21554 is a RCE vulnerability affecting Microsoft Message Queuing (MSMQ) with a CVSSv3 score of 9.8. An attacker could exploit this flaw by sending a specially crafted MSMQ packet to an affected MSMQ server. The exploitation of this flaw requires the Windows message queuing service to be enabled. When enabled, TCP port 1801 will be listening on the host.
Two other denials of service tracked as CVE-2023-21769 and CVE-2023-28302 rated as importan” were also patched in MSMQ this month.
Windows Pragmatic General Multicast (PGM) RCE Vulnerability
CVE-2023-28250 is a RCE vulnerability affecting Windows Pragmatic General Multicast (PGM). Successful exploitation requires the MSMQ service to be enabled. An attacker could exploit this flaw by sending a crafted file over the network to execute arbitrary code. This vulnerability has a CVSSv3 score of 9.8 and impacts supported versions of Windows including Server Core installations.
DHCP Server Service RCE Vulnerability
CVE-2023-28231 is a RCE vulnerability affecting the Dynamic Host Configuration Protocol (DHCP) server service. This vulnerability is rated as “Exploitation More Likely” according to the Microsoft Exploitability Index. With a CVSSv3 score of 8.8, successful exploitation requires an attacker to be on an adjacent network prior to using a crafted RPC call to exploit the flaw.
Microsoft Raw Image Extension Vulnerability
CVE-2023-28291 is a Critical vulnerability affecting the Raw Image file extension. A raw image file is an image that has not yet been compressed or processed into a more user-friendly format such as JPEG. This vulnerability can be exploited if the victim user opens the malicious file. The affected application is most often updated through the Microsoft Store; however, Microsoft notes the update can be downloaded outside of the store.
WinVerifyTrust Signature Validation Vulnerability
Microsoft’s republishing of CVE-2013-3900, an old WinVerifyTrust Signature Validation vulnerability that has recently been exploited by attackers in the 3CX supply chain attack. The fix for it is still optional and includes setting a key in the system registry
Microsoft Exchange Server 2013 EOL
Microsoft announced that Exchange Server 2013 has reached its end of life. This version of Exchange Server will no longer receive security updates and should be upgraded as soon as possible. Microsoft released guidance to assist customers with decommissioning Exchange Server 2013.
Detailed CVE’s Patched
CVE ID | Vuln Title | Severity |
CVE-2023-21554 | Microsoft Message Queuing | Critical |
CVE-2023-28231 | Windows DHCP Server | Critical |
CVE-2023-28219 | Windows Layer 2 Tunneling Protocol | Critical |
CVE-2023-28220 | Windows Layer 2 Tunneling Protocol | Critical |
CVE-2023-28250 | Windows PGM | Critical |
CVE-2023-28232 | Windows Point-to-Point Tunneling Protocol | Critical |
CVE-2023-28291 | Windows Raw Image Extension | Critical |
CVE-2023-28260 | .NET Core | Important |
CVE-2023-28312 | Azure Machine Learning | Important |
CVE-2023-28300 | Azure Service Connector | Important |
CVE-2023-28227 | Microsoft Bluetooth Driver | Important |
CVE-2023-24860 | Microsoft Defender for Endpoint | Important |
CVE-2023-28314 | Microsoft Dynamics | Important |
CVE-2023-28309 | Microsoft Dynamics | Important |
CVE-2023-28313 | Microsoft Dynamics 365 Customer Voice | Important |
CVE-2023-24912 | Microsoft Graphics Component | Important |
CVE-2023-21769 | Microsoft Message Queuing | Important |
CVE-2023-28285 | Microsoft Office | Important |
CVE-2023-28295 | Microsoft Office Publisher | Important |
CVE-2023-28287 | Microsoft Office Publisher | Important |
CVE-2023-28288 | Microsoft Office SharePoint | Important |
CVE-2023-28311 | Microsoft Office Word | Important |
CVE-2023-28243 | Microsoft PostScript Printer Driver | Important |
CVE-2023-24883 | Microsoft Printer Drivers | Important |
CVE-2023-24927 | Microsoft Printer Drivers | Important |
CVE-2023-24925 | Microsoft Printer Drivers | Important |
CVE-2023-24924 | Microsoft Printer Drivers | Important |
CVE-2023-24885 | Microsoft Printer Drivers | Important |
CVE-2023-24928 | Microsoft Printer Drivers | Important |
CVE-2023-24884 | Microsoft Printer Drivers | Important |
CVE-2023-24926 | Microsoft Printer Drivers | Important |
CVE-2023-24929 | Microsoft Printer Drivers | Important |
CVE-2023-24887 | Microsoft Printer Drivers | Important |
CVE-2023-24886 | Microsoft Printer Drivers | Important |
CVE-2023-28275 | Microsoft WDAC OLE DB provider for SQL | Important |
CVE-2023-28256 | Microsoft Windows DNS | Important |
CVE-2023-28278 | Microsoft Windows DNS | Important |
CVE-2023-28307 | Microsoft Windows DNS | Important |
CVE-2023-28306 | Microsoft Windows DNS | Important |
CVE-2023-28223 | Microsoft Windows DNS | Important |
CVE-2023-28254 | Microsoft Windows DNS | Important |
CVE-2023-28305 | Microsoft Windows DNS | Important |
CVE-2023-28308 | Microsoft Windows DNS | Important |
CVE-2023-28255 | Microsoft Windows DNS | Important |
CVE-2023-28277 | Microsoft Windows DNS | Important |
CVE-2023-23384 | SQL Server | Important |
CVE-2023-23375 | SQL Server | Important |
CVE-2023-28304 | SQL Server | Important |
CVE-2023-28299 | Visual Studio | Important |
CVE-2023-28262 | Visual Studio | Important |
CVE-2023-28263 | Visual Studio | Important |
CVE-2023-28296 | Visual Studio | Important |
CVE-2023-24893 | Visual Studio Code | Important |
CVE-2023-28302 | Windows Active Directory | Important |
CVE-2023-28236 | Windows ALPC | Important |
CVE-2023-28216 | Windows ALPC | Important |
CVE-2023-28218 | Windows Ancillary Function Driver for WinSock | Important |
CVE-2023-28269 | Windows Boot Manager | Important |
CVE-2023-28249 | Windows Boot Manager | Important |
CVE-2023-28273 | Windows Clip Service | Important |
CVE-2023-28229 | Windows CNG Key Isolation Service | Important |
CVE-2023-28266 | Windows Common Log File System Driver | Important |
CVE-2023-28252 | Windows Common Log File System Driver | Important |
CVE-2023-28226 | Windows Enroll Engine | Important |
CVE-2023-28221 | Windows Error Reporting | Important |
CVE-2023-28276 | Windows Group Policy | Important |
CVE-2023-28238 | Windows Internet Key Exchange (IKE) Protocol | Important |
CVE-2023-28244 | Windows Kerberos | Important |
CVE-2023-28271 | Windows Kernel | Important |
CVE-2023-28248 | Windows Kernel | Important |
CVE-2023-28222 | Windows Kernel | Important |
CVE-2023-28272 | Windows Kernel | Important |
CVE-2023-28293 | Windows Kernel | Important |
CVE-2023-28253 | Windows Kernel | Important |
CVE-2023-28237 | Windows Kernel | Important |
CVE-2023-28298 | Windows Kernel | Important |
CVE-2023-28270 | Windows Lock Screen | Important |
CVE-2023-28235 | Windows Lock Screen | Important |
CVE-2023-28268 | Windows Netlogon | Important |
CVE-2023-28217 | Windows Network Address Translation (NAT) | Important |
CVE-2023-28247 | Windows Network File System | Important |
CVE-2023-28240 | Windows Network Load Balancing | Important |
CVE-2023-28225 | Windows NTLM | Important |
CVE-2023-28224 | Windows Point-to-Point Protocol over Ethernet (PPPoE) | Important |
CVE-2023-28292 | Windows Raw Image Extension | Important |
CVE-2023-28228 | Windows RDP Client | Important |
CVE-2023-28267 | Windows RDP Client | Important |
CVE-2023-28246 | Windows Registry | Important |
CVE-2023-21729 | Windows RPC API | Important |
CVE-2023-21727 | Windows RPC API | Important |
CVE-2023-28297 | Windows RPC API | Important |
CVE-2023-24931 | Windows Secure Channel | Important |
CVE-2023-28233 | Windows Secure Channel | Important |
CVE-2023-28241 | Windows Secure Socket Tunneling Protocol (SSTP) | Important |
CVE-2023-28234 | Windows Transport Security Layer (TLS) | Important |
CVE-2023-28274 | Windows Win32K | Important |
CVE-2023-24914 | Windows Win32K | Important |