
Microsoft Patched 70 CVEs in its June Patch Tuesday Release, with six rated as critical, 62 rated as important, 1 rated as moderate and 1 rated as low.
This month’s update includes patches for:
- .NET Core
- 3D Builder
- Azure Service Fabric Container
- Microsoft Bluetooth Driver
- Microsoft Edge (Chromium-based)
- Microsoft Exchange Server
- Microsoft Graphics Component
- Microsoft Local Security Authority Server (lsasrv)
- Microsoft Message Queuing
- Microsoft Office
- Microsoft Office SharePoint
- Microsoft Office Visio
- Microsoft WDAC OLE DB provider for SQL
- Visual Studio Code
- Windows ALPC
- Windows Ancillary Function Driver for WinSock
- Windows Authentication Methods
- Windows Backup Engine
- Windows Bind Filter Driver
- Windows BitLocker
- Windows Boot Manager
- Windows Credential Manager
- Windows Cryptographic Services
- Windows DWM Core Library
- Windows Error Reporting
- Windows Event Tracing
- Windows IKE Extension
- Windows Installer
- Windows Internet Key Exchange (IKE) Protocol
- Windows iSCSI
- Windows Kernel
- Windows Layer 2 Tunneling Protocol
- Windows LDAP – Lightweight Directory Access Protocol
- Windows Local Security Authority (LSA)
- Windows Local Session Manager (LSM)
- Windows Malicious Software Removal Tool
- Windows Management Instrumentation
- Windows MSCryptDImportKey
- Windows NTLM
- Windows ODBC Driver
- Windows Overlay Filter
- Windows Point-to-Point Tunneling Protocol
- Windows Print Spooler Components
- Windows Remote Access Service L2TP Driver
- Windows RPC API
- Windows Secure Socket Tunneling Protocol (SSTP)
- Windows Smart Card
- Windows Task Scheduler
- Windows Virtual Registry Provider
- Windows Workstation Service
Microsoft SharePoint Server EoP Vulnerability
CVE-2023-29357 is an EoP vulnerability in Microsoft SharePoint Server 2019 with a CVSSv3 score of 9.8 and rated critical. A remote, unauthenticated attacker can exploit the vulnerability by sending a spoofed JWT authentication token to a vulnerable server giving them the privileges of an authenticated user on the target.
No user interaction is required for an attacker to exploit this flaw. Microsoft also provides mitigation guidance for the vulnerability that says users that use Microsoft Defender in their SharePoint Server farm(s) and have AMSI enabled are not affected. CVE-2023-29357 was given a rating of Exploitation More Likely.
Windows Pragmatic General Multicast (PGM) RCE Vulnerability
CVE-2023-29363, CVE-2023-32014 and CVE-2023-32015 are RCEs in Windows operating systems that were each given a CVSSv3 of 9.8 and rated critical. The vulnerability lies in the operating systems’ implementation of Pragmatic General Multicast (PGM), an experimental multicast protocol, in the Windows message queueing service component.
A remote, unauthenticated attacker could exploit these flaws by sending a malicious file to a vulnerable target. Microsoft’s mitigation guidance states that for a system to be vulnerable, it must have message queueing services enabled. As successful exploitation of these vulnerabilities requires that the Windows message queueing service is enabled,
Microsoft Exchange Server RCE Vulnerability
CVE-2023-28310 and CVE-2023-32031 are RCEs in several versions of Microsoft Exchange Server that are both rated as important and with a CVSSv3 scores of 8.0 and 8.8 respectively.
CVE-2023-28310 can be exploited by an authenticated attacker on the local network to execute commands on the target through a remote PowerShell Session. CVE-2023-32031 allows a remote, authenticated attacker to target server accounts using network calls to trigger arbitrary code execution. Both CVE-2023-32031 and CVE-2023-28310 were given a rating of “Exploitation More Likely” and affect Microsoft Exchange Server 2016 Cumulative Update 23 and 2019 Cumulative Updates 12 and 13.
Remote Desktop Client RCE Vulnerability
CVE-2023-29362 is a RCE in Windows operating systems with a CVSSv3 score of 8.8 and rated as important. The flaw lies in the Remote Desktop Client component of Windows operating systems and the Remote Desktop Client for Windows Desktop application. The vulnerability can be exploited by a remote, unauthenticated attacker with control over a Remote Desktop Server, when a user connects to an attacker-controlled Server using the vulnerable client.
Windows 10 21H2 End of Life
Microsoft announced that Windows 10 21H2 has reached its end of life for Home, Pro, Pro Education, and Pro for Workstations editions. This means that users of these versions of Windows 10 21H2 will no longer receive security updates and should upgrade as soon as possible.
Detailed report
CVE ID | Title | Criticality |
CVE-2023-24897 | .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability | Critical |
CVE-2023-29357 | Microsoft SharePoint Server Elevation of Privilege Vulnerability | Critical |
CVE-2023-32013 | Windows Hyper-V Denial of Service Vulnerability | Critical |
CVE-2023-29363 | Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability | Critical |
CVE-2023-32014 | Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability | Critical |
CVE-2023-32015 | Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability | Critical |
CVE-2023-24895 | .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability | Important |
CVE-2023-33126 | .NET and Visual Studio Remote Code Execution Vulnerability | Important |
CVE-2023-33135 | .NET and Visual Studio Elevation of Privilege Vulnerability | Important |
CVE-2023-32032 | .NET and Visual Studio Elevation of Privilege Vulnerability | Important |
CVE-2023-32030 | .NET and Visual Studio Denial of Service Vulnerability | Important |
CVE-2023-33128 | .NET and Visual Studio Remote Code Execution Vulnerability | Important |
CVE-2023-29331 | .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability | Important |
CVE-2023-29326 | .NET Framework Remote Code Execution Vulnerability | Important |
CVE-2023-33141 | Yet Another Reverse Proxy (YARP) Denial of Service Vulnerability | Important |
CVE-2023-21569 | Azure DevOps Server Spoofing Vulnerability | Important |
CVE-2023-21565 | Azure DevOps Server Spoofing Vulnerability | Important |
CVE-2023-24896 | Dynamics 365 Finance Spoofing Vulnerability | Important |
CVE-2023-33145 | Microsoft Edge (Chromium-based) Information Disclosure Vulnerability | Important |
CVE-2023-32031 | Microsoft Exchange Server Remote Code Execution Vulnerability | Important |
CVE-2023-28310 | Microsoft Exchange Server Remote Code Execution Vulnerability | Important |
CVE-2023-33146 | Microsoft Office Remote Code Execution Vulnerability | Important |
CVE-2023-33133 | Microsoft Excel Remote Code Execution Vulnerability | Important |
CVE-2023-32029 | Microsoft Excel Remote Code Execution Vulnerability | Important |
CVE-2023-33137 | Microsoft Excel Remote Code Execution Vulnerability | Important |
CVE-2023-33140 | Microsoft OneNote Spoofing Vulnerability | Important |
CVE-2023-33131 | Microsoft Outlook Remote Code Execution Vulnerability | Important |
CVE-2023-33142 | Microsoft SharePoint Server Elevation of Privilege Vulnerability | Important |
CVE-2023-33129 | Microsoft SharePoint Denial of Service Vulnerability | Important |
CVE-2023-33130 | Microsoft SharePoint Server Spoofing Vulnerability | Important |
CVE-2023-33132 | Microsoft SharePoint Server Spoofing Vulnerability | Important |
CVE-2023-32024 | Microsoft Power Apps Spoofing Vulnerability | Important |
CVE-2023-32017 | Microsoft PostScript Printer Driver Remote Code Execution Vulnerability | Important |
CVE-2023-29372 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | Important |
CVE-2023-29370 | Windows Media Remote Code Execution Vulnerability | Important |
CVE-2023-29365 | Windows Media Remote Code Execution Vulnerability | Important |
CVE-2023-29337 | NuGet Client Remote Code Execution Vulnerability | Important |
CVE-2023-29362 | Remote Desktop Client Remote Code Execution Vulnerability | Important |
CVE-2023-29352 | Windows Remote Desktop Security Feature Bypass Vulnerability | Important |
CVE-2023-32020 | Windows DNS Spoofing Vulnerability | Important |
CVE-2023-29007 | GitHub: CVE-2023-29007 Arbitrary configuration injection via `git submodule deinit` | Important |
CVE-2023-33139 | Visual Studio Information Disclosure Vulnerability | Important |
CVE-2023-25652 | GitHub: CVE-2023-25652 “git apply –reject” partially-controlled arbitrary file write | Important |
CVE-2023-25815 | GitHub: CVE-2023-25815 Git looks for localized messages in an unprivileged place | Important |
CVE-2023-27911 | AutoDesk: CVE-2023-27911 Heap buffer overflow vulnerability in Autodesk® FBX® SDK 2020 or prior | Important |
CVE-2023-27910 | AutoDesk: CVE-2023-27910 stack buffer overflow vulnerability in Autodesk® FBX® SDK 2020 or prior | Important |
CVE-2023-29011 | GitHub: CVE-2023-29011 The config file of `connect.exe` is susceptible to malicious placing | Important |
CVE-2023-29012 | GitHub: CVE-2023-29012 Git CMD erroneously executes `doskey.exe` in current directory, if it exists | Important |
CVE-2023-27909 | AutoDesk: CVE-2023-27909 Out-Of-Bounds Write Vulnerability in Autodesk® FBX® SDK 2020 or prior | Important |
CVE-2023-33144 | Visual Studio Code Spoofing Vulnerability | Important |
CVE-2023-29364 | Windows Authentication Elevation of Privilege Vulnerability | Important |
CVE-2023-32010 | Windows Bus Filter Driver Elevation of Privilege Vulnerability | Important |
CVE-2023-29361 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | Important |
CVE-2023-32009 | Windows Collaborative Translation Framework Elevation of Privilege Vulnerability | Important |
CVE-2023-32012 | Windows Container Manager Service Elevation of Privilege Vulnerability | Important |
CVE-2023-24937 | Windows CryptoAPI Denial of Service Vulnerability | Important |
CVE-2023-24938 | Windows CryptoAPI Denial of Service Vulnerability | Important |
CVE-2023-29355 | DHCP Server Service Information Disclosure Vulnerability | Important |
CVE-2023-29368 | Windows Filtering Platform Elevation of Privilege Vulnerability | Important |
CVE-2023-29358 | Windows GDI Elevation of Privilege Vulnerability | Important |
CVE-2023-29366 | Windows Geolocation Service Remote Code Execution Vulnerability | Important |
CVE-2023-29351 | Windows Group Policy Elevation of Privilege Vulnerability | Important |
CVE-2023-32018 | Windows Hello Remote Code Execution Vulnerability | Important |
CVE-2023-32016 | Windows Installer Information Disclosure Vulnerability | Important |
CVE-2023-32011 | Windows iSCSI Discovery Service Denial of Service Vulnerability | Important |
CVE-2023-32019 | Windows Kernel Information Disclosure Vulnerability | Important |
CVE-2023-29346 | NTFS Elevation of Privilege Vulnerability | Important |
CVE-2023-29373 | Microsoft ODBC Driver Remote Code Execution Vulnerability | Important |
CVE-2023-29367 | iSCSI Target WMI Provider Remote Code Execution Vulnerability | Important |
CVE-2023-29369 | Remote Procedure Call Runtime Denial of Service Vulnerability | Important |
CVE-2023-32008 | Windows Resilient File System (ReFS) Remote Code Execution Vulnerability | Important |
CVE-2023-32022 | Windows Server Service Security Feature Bypass Vulnerability | Important |
CVE-2023-32021 | Windows SMB Witness Service Security Feature Bypass Vulnerability | Important |
CVE-2023-29360 | Windows TPM Device Driver Elevation of Privilege Vulnerability | Important |
CVE-2023-29371 | Windows GDI Elevation of Privilege Vulnerability | Important |
CVE-2023-29359 | GDI Elevation of Privilege Vulnerability | Important |
CVE-2023-29345 | Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | Low |
CVE-2023-29353 | Sysinternals Process Monitor for Windows Denial of Service Vulnerability | Low |
CVE-2023-24936 | .NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability | Moderate |
CVE-2023-33143 | Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | Moderate |
CVE-2023-2941 | Chromium: CVE-2023-2941 Inappropriate implementation in Extensions API | Unknown |
CVE-2023-2937 | Chromium: CVE-2023-2937 Inappropriate implementation in Picture In Picture | Unknown |
CVE-2023-2936 | Chromium: CVE-2023-2936 Type Confusion in V8 | Unknown |
CVE-2023-2935 | Chromium: CVE-2023-2935 Type Confusion in V8 | Unknown |
CVE-2023-2940 | Chromium: CVE-2023-2940 Inappropriate implementation in Downloads | Unknown |
CVE-2023-2939 | Chromium: CVE-2023-2939 Insufficient data validation in Installer | Unknown |
CVE-2023-2938 | Chromium: CVE-2023-2938 Inappropriate implementation in Picture In Picture | Unknown |
CVE-2023-2931 | Chromium: CVE-2023-2931 Use after free in PDF | Unknown |
CVE-2023-2930 | Chromium: CVE-2023-2930 Use after free in Extensions | Unknown |
CVE-2023-2929 | Chromium: CVE-2023-2929 Out of bounds write in Swiftshader | Unknown |
CVE-2023-2934 | Chromium: CVE-2023-2934 Out of bounds memory access in Mojo | Unknown |
CVE-2023-2933 | Chromium: CVE-2023-2933 Use after free in PDF | Unknown |
CVE-2023-2932 | Chromium: CVE-2023-2932 Use after free in PDF | Unknown |
CVE-2023-3079 | Chromium: CVE-2023-3079 Type Confusion in V8 | Unknown |