
Microsoft patched 130 CVEs in its July Patch Tuesday release, with nine rated as critical and 121 rated as important. Microsoft also issued an advisory with guidance on the malicious use of Microsoft signed drivers as well as an advisory regarding a security feature bypass in Trend Micro EFI modules.
Summary
- Total Microsoft CVEs: 129
- Total advisories shipping in update: 3
- Publicly disclosed: 0
- Exploited: 5 (including ADV230001)
- Severity
- Critical: 9
- Important: 120
- Impact
- Elevation of Privilege: 35
- Remote Code Execution: 35
- Denial of Service: 22
- Information Disclosure: 19
- Security Feature Bypass: 12
- Spoofing: 6
This month’s update includes patches for:
- ASP.NET and.NET
- Microsoft Dynamics
- Microsoft Graphics Component
- Microsoft Media-Wiki Extensions
- Microsoft Office
- Microsoft Office Access
- Microsoft Office Excel
- Microsoft Office Outlook
- Microsoft Office SharePoint
- Microsoft Power Apps
- Microsoft Printer Drivers
- Microsoft Windows Codecs Library
- NET and Visual Studio
- Paint 3D
- Role: DNS Server
- Windows Active Template Library
- Windows Admin Center
- Windows App Store
- Windows Authentication Methods
- Windows CDP User Components
- Windows Cluster Server
- Windows Cloud Files Mini Filter Driver
- Windows Common Log File System Driver
- Windows Connected User Experiences and Telemetry
- Windows CryptoAPI
- Windows Cryptographic Services
- Windows CNG Key Isolation Service
- Windows Deployment Services
- Windows EFI Partition
- Windows Failover Cluster
- Windows Geolocation Service
- Windows HTTP.sys
- Windows Image Acquisition
- Windows Installer
- Windows Kernel
- Windows Layer-2 Bridge Network Driver
- Windows Layer 2 Tunneling Protocol
- Windows Local Security Authority (LSA)
- Windows Message Queuing
- Windows MSHTML Platform
- Windows Netlogon
- Windows ODBC Driver
- Windows OLE
- Windows Online Certificate Status Protocol (OCSP) SnapIn
- Windows Partition Management Driver
- Windows Peer Name Resolution Protocol
- Windows PGM
- Windows Power Apps
- Windows Print Spooler Components
- Windows Printer Drivers
- Windows Remote Desktop
- Windows Remote Procedure Call
- Windows Server Update Service
- Windows SmartScreen
- Windows SPNEGO Extended Negotiation
- Windows Transaction Manager
- Windows Update Orchestrator Service
- Windows VOLSNAP.SYS
- Windows Volume Shadow Copy
- Windows Win32K
Windows Routing and Remote Access Service (RRAS) RCE Vulnerability
CVE-2023-35365, CVE-2023-35366, CVE-2023-35367 are RCE vulnerabilities in the Windows Routing and Remote Access Service (RRAS) of Windows operating systems, each of which were assigned a CVSSv3 score of 9.8. RRAS is a service in Windows that can be used as a VPN gateway or router.
Exploitation requires an attacker to send crafted packets to an impacted server. RRAS is not installed or configured in Windows by default and those users who have not enabled the feature are not impacted by these vulnerabilities. Microsoft has given these vulnerabilities a rating of Exploitation less likely.
Microsoft Message Queuing RCE Vulnerability
CVE-2023-32057 is a RCE vulnerability in the Microsoft Message Queuing (MSMQ) component of Windows operating systems that was given a CVSSv3 score of 9.8 and a rating of critical. A remote unauthenticated attacker can exploit this vulnerability by sending malicious MSMQ packets to a vulnerable MSMQ server leading to arbitrary code execution.
For successful exploitation, the Message Queuing service needs to be enabled on the vulnerable server. Microsoft says if the service is enabled, that it runs under the service name “Message Queuing” and is listening on TCP port 1801. Microsoft rated this vulnerability as Exploitation less likely.
Office and Windows HTML RCE Vulnerability
CVE-2023-36884 is a RCE vulnerability in Microsoft Windows and Office that was assigned a CVSSv3 score of 8.3 and has been exploited in the wild as a zero-day.
Exploitation of CVE-2023-36884 has been attributed to a threat actor known as Storm-0978, also known as DEV-0978 and RomCom, a reference to the backdoor used by the group as part of its attacks. The threat actor is reportedly based out of Russia and is known for conducting ransomware attacks, including extortion-only campaigns, using a ransomware known as Underground. The group also conducts intelligence gathering operations that rely on credential theft. Exploitation of CVE-2023-36884 began in June 2023.
Microsoft Outlook Security Feature Bypass Vulnerability
CVE-2023-35311 is a security feature bypass vulnerability in Microsoft Outlook. It was assigned a CVSSv3 score of 8.8 and was exploited in the wild as a zero-day. Exploitation of this flaw requires an attacker to convince a potential victim to click on a malicious URL. Successful exploitation would result in the bypassing of the Microsoft Outlook Security Notice prompt, a feature designed to protect users. Microsoft says that while its Outlook Preview pane feature is an attack vector, user interaction is still required.
Windows MSHTML Platform EoP Vulnerability
CVE-2023-32046 is an EoP vulnerability in Microsoft’s MSHTML (Trident) engine that was exploited in the wild as a zero-day. It was assigned a CVSSv3 score of 7.8 and patches are available for all supported versions of Windows.
To exploit this vulnerability, an attacker would need to create a specially crafted file and use social engineering techniques to convince their target to open the document. Microsoft’s advisory also includes a note suggesting that users who install Security Only updates should also install the Internet Explorer Cumulative update to fully address this vulnerability.
The discovery of CVE-2023-32046 follows CVE-2021-40444, another zero-day flaw in Microsoft’s MSHTML that was exploited in the wild and patched as part of Microsoft’s September 2021’s Patch Tuesday release. It was used by a variety of threat actors, from advanced persistent threat actors and ransomware groups.
Windows Error Reporting Service EoP Vulnerability
CVE-2023-36874 is an EoP vulnerability in the Microsoft Windows Error Reporting Service. It was assigned a CVSSv3 score of 7.8 and was exploited in the wild as a zero-day. To exploit this flaw, an attacker would need to have already gained local access to a target system and have certain basic user privileges. Successful exploitation would allow an attacker to obtain administrative privileges on the target system.
Windows SmartScreen Security Feature Bypass Vulnerability
CVE-2023-32049 is a security feature bypass vulnerability impacting Windows SmartScreen, an early warning system designed to protect against malicious websites used for phishing attacks or malware distribution. To exploit this vulnerability, an attacker would need to convince a user into opening a specially crafted URL. Exploitation would allow the attacker to bypass the “Open File” warning prompt and compromise the victim’s machine.
This vulnerability was exploited in the wild as a zero-day and was assigned a CVSSv3 score of 8.8. This vulnerability is like other mark of the web (MOTW) vulnerabilities patched by Microsoft in which malicious files could evade MOTW defenses. CVE-2022-44698 is a recent example of another zero-day vulnerability that was exploited in the wild and patched in the December 2022 Patch Tuesday release.
Windows Admin Center Spoofing Vulnerability
CVE-2023-29347 is a spoofing vulnerability in Windows Admin Center (WAC) assigned a CVSSv3 score of 8.7. The vulnerability lies in the web server component of WAC, however malicious scripts would execute on a victim’s browser. There are several ways a remote, authenticated attacker can exploit the vulnerability: through a malicious script imported into the WAC HTML form, through a.csv file imported to the user interface or through the WAC API. Successful exploitation allows the attacker to perform operations on the WAC server using the privileges of the victim.
ADV230001 – Guidance on Microsoft Signed Drivers Being Used Maliciously
The discovery that drivers certified by Microsoft’s own Window Hardware Developer Program (MWHDP) were being used maliciously in post-exploitation activity will, according to the text of the advisory itself, lead to “long-term solutions to address these deceptive practices and prevent future customer impacts” at Microsoft. In the meantime, please see “Microsoft Revokes Malicious Drivers in Patch Tuesday Culling” for detailed information on what we found.
Patched CVE Details
CVE ID | CVE Title |
CVE-2023-36884 | Office and Windows HTML Remote Code Execution Vulnerability |
CVE-2023-36874 | Windows Error Reporting Service Elevation of Privilege Vulnerability |
CVE-2023-36872 | VP9 Video Extensions Information Disclosure Vulnerability |
CVE-2023-36871 | Azure Active Directory Security Feature Bypass Vulnerability |
CVE-2023-36868 | Azure Service Fabric on Windows Information Disclosure Vulnerability |
CVE-2023-36867 | Visual Studio Code GitHub Pull Requests and Issues Extension Remote Code Execution Vulnerability |
CVE-2023-35374 | Paint 3D Remote Code Execution Vulnerability |
CVE-2023-35373 | Mono Authenticode Validation Spoofing Vulnerability |
CVE-2023-35367 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
CVE-2023-35366 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
CVE-2023-35365 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
CVE-2023-35364 | Windows Kernel Elevation of Privilege Vulnerability |
CVE-2023-35363 | Windows Kernel Elevation of Privilege Vulnerability |
CVE-2023-35362 | Windows Clip Service Elevation of Privilege Vulnerability |
CVE-2023-35361 | Windows Kernel Elevation of Privilege Vulnerability |
CVE-2023-35360 | Windows Kernel Elevation of Privilege Vulnerability |
CVE-2023-35358 | Windows Kernel Elevation of Privilege Vulnerability |
CVE-2023-35357 | Windows Kernel Elevation of Privilege Vulnerability |
CVE-2023-35356 | Windows Kernel Elevation of Privilege Vulnerability |
CVE-2023-35353 | Connected User Experiences and Telemetry Elevation of Privilege Vulnerability |
CVE-2023-35352 | Windows Remote Desktop Security Feature Bypass Vulnerability |
CVE-2023-35351 | Windows Active Directory Certificate Services (AD CS) Remote Code Execution Vulnerability |
CVE-2023-35350 | Windows Active Directory Certificate Services (AD CS) Remote Code Execution Vulnerability |
CVE-2023-35348 | Active Directory Federation Service Security Feature Bypass Vulnerability |
CVE-2023-35347 | Microsoft Install Service Elevation of Privilege Vulnerability |
CVE-2023-35346 | Windows DNS Server Remote Code Execution Vulnerability |
CVE-2023-35345 | Windows DNS Server Remote Code Execution Vulnerability |
CVE-2023-35344 | Windows DNS Server Remote Code Execution Vulnerability |
CVE-2023-35343 | Windows Geolocation Service Remote Code Execution Vulnerability |
CVE-2023-35342 | Windows Image Acquisition Elevation of Privilege Vulnerability |
CVE-2023-35341 | Microsoft DirectMusic Information Disclosure Vulnerability |
CVE-2023-35340 | Windows CNG Key Isolation Service Elevation of Privilege Vulnerability |
CVE-2023-35339 | Windows CryptoAPI Denial of Service Vulnerability |
CVE-2023-35338 | Windows Peer Name Resolution Protocol Denial of Service Vulnerability |
CVE-2023-35337 | Win32k Elevation of Privilege Vulnerability |
CVE-2023-35336 | Windows MSHTML Platform Security Feature Bypass Vulnerability |
CVE-2023-35335 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability |
CVE-2023-35333 | MediaWiki PandocUpload Extension Remote Code Execution Vulnerability |
CVE-2023-35332 | Windows Remote Desktop Protocol Security Feature Bypass |
CVE-2023-35331 | Windows Local Security Authority (LSA) Denial of Service Vulnerability |
CVE-2023-35330 | Windows Extended Negotiation Denial of Service Vulnerability |
CVE-2023-35329 | Windows Authentication Denial of Service Vulnerability |
CVE-2023-35328 | Windows Transaction Manager Elevation of Privilege Vulnerability |
CVE-2023-35326 | Windows CDP User Components Information Disclosure Vulnerability |
CVE-2023-35325 | Windows Print Spooler Information Disclosure Vulnerability |
CVE-2023-35324 | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability |
CVE-2023-35323 | Windows OLE Remote Code Execution Vulnerability |
CVE-2023-35322 | Windows Deployment Services Remote Code Execution Vulnerability |
CVE-2023-35321 | Windows Deployment Services Denial of Service Vulnerability |
CVE-2023-35320 | Connected User Experiences and Telemetry Elevation of Privilege Vulnerability |
CVE-2023-35319 | Remote Procedure Call Runtime Denial of Service Vulnerability |
CVE-2023-35318 | Remote Procedure Call Runtime Denial of Service Vulnerability |
CVE-2023-35317 | Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability |
CVE-2023-35316 | Remote Procedure Call Runtime Information Disclosure Vulnerability |
CVE-2023-35315 | Windows Layer-2 Bridge Network Driver Remote Code Execution Vulnerability |
CVE-2023-35314 | Remote Procedure Call Runtime Denial of Service Vulnerability |
CVE-2023-35313 | Windows Online Certificate Status Protocol (OCSP) SnapIn Remote Code Execution Vulnerability |
CVE-2023-35312 | Microsoft VOLSNAP.SYS Elevation of Privilege Vulnerability |
CVE-2023-35311 | Microsoft Outlook Security Feature Bypass Vulnerability |
CVE-2023-35310 | Windows DNS Server Remote Code Execution Vulnerability |
CVE-2023-35309 | Microsoft Message Queuing Remote Code Execution Vulnerability |
CVE-2023-35308 | Windows MSHTML Platform Security Feature Bypass Vulnerability |
CVE-2023-35306 | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability |
CVE-2023-35305 | Windows Kernel Elevation of Privilege Vulnerability |
CVE-2023-35304 | Windows Kernel Elevation of Privilege Vulnerability |
CVE-2023-35303 | USB Audio Class System Driver Remote Code Execution Vulnerability |
CVE-2023-35302 | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability |
CVE-2023-35300 | Remote Procedure Call Runtime Remote Code Execution Vulnerability |
CVE-2023-35299 | Windows Common Log File System Driver Elevation of Privilege Vulnerability |
CVE-2023-35298 | HTTP.sys Denial of Service Vulnerability |
CVE-2023-35297 | Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability |
CVE-2023-35296 | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability |
CVE-2023-33174 | Windows Cryptographic Information Disclosure Vulnerability |
CVE-2023-33173 | Remote Procedure Call Runtime Denial of Service Vulnerability |
CVE-2023-33172 | Remote Procedure Call Runtime Denial of Service Vulnerability |
CVE-2023-33171 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability |
CVE-2023-33170 | ASP.NET and Visual Studio Security Feature Bypass Vulnerability |
CVE-2023-33169 | Remote Procedure Call Runtime Denial of Service Vulnerability |
CVE-2023-33168 | Remote Procedure Call Runtime Denial of Service Vulnerability |
CVE-2023-33167 | Remote Procedure Call Runtime Denial of Service Vulnerability |
CVE-2023-33166 | Remote Procedure Call Runtime Denial of Service Vulnerability |
CVE-2023-33165 | Microsoft SharePoint Server Security Feature Bypass Vulnerability |
CVE-2023-33164 | Remote Procedure Call Runtime Denial of Service Vulnerability |
CVE-2023-33163 | Windows Network Load Balancing Remote Code Execution Vulnerability |
CVE-2023-33162 | Microsoft Excel Information Disclosure Vulnerability |
CVE-2023-33161 | Microsoft Excel Remote Code Execution Vulnerability |
CVE-2023-33160 | Microsoft SharePoint Server Remote Code Execution Vulnerability |
CVE-2023-33159 | Microsoft SharePoint Server Spoofing Vulnerability |
CVE-2023-33158 | Microsoft Excel Remote Code Execution Vulnerability |
CVE-2023-33157 | Microsoft SharePoint Remote Code Execution Vulnerability |
CVE-2023-33156 | Microsoft Defender Elevation of Privilege Vulnerability |
CVE-2023-33155 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability |
CVE-2023-33154 | Windows Partition Management Driver Elevation of Privilege Vulnerability |
CVE-2023-33153 | Microsoft Outlook Remote Code Execution Vulnerability |
CVE-2023-33152 | Microsoft ActiveX Remote Code Execution Vulnerability |
CVE-2023-33151 | Microsoft Outlook Spoofing Vulnerability |
CVE-2023-33150 | Microsoft Office Security Feature Bypass Vulnerability |
CVE-2023-33149 | Microsoft Office Graphics Remote Code Execution Vulnerability |
CVE-2023-33148 | Microsoft Office Elevation of Privilege Vulnerability |
CVE-2023-33134 | Microsoft SharePoint Server Remote Code Execution Vulnerability |
CVE-2023-33127 | .NET and Visual Studio Elevation of Privilege Vulnerability |
CVE-2023-32085 | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability |
CVE-2023-32084 | HTTP.sys Denial of Service Vulnerability |
CVE-2023-32083 | Microsoft Failover Cluster Information Disclosure Vulnerability |
CVE-2023-32057 | Microsoft Message Queuing Remote Code Execution Vulnerability |
CVE-2023-32056 | Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability |
CVE-2023-32055 | Active Template Library Elevation of Privilege Vulnerability |
CVE-2023-32054 | Volume Shadow Copy Elevation of Privilege Vulnerability |
CVE-2023-32053 | Windows Installer Elevation of Privilege Vulnerability |
CVE-2023-32052 | Microsoft Power Apps Spoofing Vulnerability |
CVE-2023-32051 | Raw Image Extension Remote Code Execution Vulnerability |
CVE-2023-32050 | Windows Installer Elevation of Privilege Vulnerability |
CVE-2023-32049 | Windows SmartScreen Security Feature Bypass Vulnerability |
CVE-2023-32047 | Paint 3D Remote Code Execution Vulnerability |
CVE-2023-32046 | Windows MSHTML Platform Elevation of Privilege Vulnerability |
CVE-2023-32045 | Microsoft Message Queuing Denial of Service Vulnerability |
CVE-2023-32044 | Microsoft Message Queuing Denial of Service Vulnerability |
CVE-2023-32043 | Windows Remote Desktop Security Feature Bypass Vulnerability |
CVE-2023-32042 | OLE Automation Information Disclosure Vulnerability |
CVE-2023-32041 | Windows Update Orchestrator Service Information Disclosure Vulnerability |
CVE-2023-32040 | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability |
CVE-2023-32039 | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability |
CVE-2023-32038 | Microsoft ODBC Driver Remote Code Execution Vulnerability |
CVE-2023-32037 | Windows Layer-2 Bridge Network Driver Information Disclosure Vulnerability |
CVE-2023-32035 | Remote Procedure Call Runtime Denial of Service Vulnerability |
CVE-2023-32034 | Remote Procedure Call Runtime Denial of Service Vulnerability |
CVE-2023-32033 | Microsoft Failover Cluster Remote Code Execution Vulnerability |
CVE-2023-32028 | Microsoft OLE DB Remote Code Execution Vulnerability |
CVE-2023-32027 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2023-32026 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2023-32025 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2023-29356 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2023-29349 | Microsoft ODBC and OLE DB Remote Code Execution Vulnerability |
CVE-2023-29347 | Windows Admin Center Spoofing Vulnerability |
CVE-2023-24932 | Secure Boot Security Feature Bypass Vulnerability |
CVE-2023-21756 | Windows Win32k Elevation of Privilege Vulnerability |
CVE-2023-21526 | Windows Netlogon Information Disclosure Vulnerability |
CVE-2022-38023 | Netlogon RPC Elevation of Privilege Vulnerability |
CVE-2022-37967 | Windows Kerberos Elevation of Privilege Vulnerability |