
Microsoft has patched 61 CVEs in its September Patch Tuesday release, with five rated critical, 55 rated important and one rated moderate.
This month’s update includes patches for:
- .NET and Visual Studio
- .NET Core & Visual Studio
- .NET Framework
- 3D Builder
- 3D Viewer
- Azure DevOps
- Azure HDInsights
- Microsoft Azure Kubernetes Service
- Microsoft Dynamics
- Microsoft Dynamics Finance & Operations
- Microsoft Exchange Server
- Microsoft Identity Linux Broker
- Microsoft Office
- Microsoft Office Excel
- Microsoft Office Outlook
- Microsoft Office SharePoint
- Microsoft Office Word
- Microsoft Streaming Service
- Microsoft Windows Codecs Library
- Visual Studio
- Visual Studio Code
- Windows Cloud Files Mini Filter Driver
- Windows Common Log File System Driver
- Windows Defender
- Windows DHCP Server
- Windows GDI
- Windows Internet Connection Sharing (ICS)
- Windows Kernel
- Windows Scripting
- Windows TCP/IP
- Windows Themes
Microsoft Word Information Disclosure Vulnerability
CVE-2023-36761 is an information disclosure vulnerability in Microsoft Word with a CVSSv3 score of 6.2 and is rated important. It has been exploited in the wild as a zero-day and was publicly disclosed prior to a patch being available.
Microsoft says that the preview pane is an attack vector, meaning that simply previewing a specially crafted file can cause the exploit to trigger. Successful exploitation of this flaw would allow for the disclosure of New Technology LAN Manager (NTLM) hashes. NTLM hashes could be abused in NTLM relay or pass-the-hash attacks to further an attacker’s foothold into an organization.
This is the second zero-day vulnerability disclosed this year that could result in the disclosure of NTLM hashes. During March 2023 Patch Tuesday Release, Microsoft patched CVE-2023-23397, an elevation of privilege vulnerability in Microsoft Outlook that was also exploited in the wild as a zero-day by a Russia-based threat actor.
Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability
CVE-2023-36802 is an EoP vulnerability in the Microsoft Streaming Service Proxy with a CVSSv3 score of 7.8 and is rated important. Exploitation of this flaw would grant an attacker SYSTEM privilege. it has been exploited in the wild as a zero-day.
Microsoft Exchange Server Remote Code Execution Vulnerability
CVE-2023-36744, CVE-2023-36745 and CVE-2023-36756 are RCE vulnerabilities affecting Microsoft Exchange. Each of these vulnerabilities were given CVSSv3 scores of 8.0 and were rated as “Exploitation More Likely” using the Microsoft Exploitability Index. Successful exploitation of these vulnerabilities requires an attacker to authenticate with LAN-access and have valid credentials for an Exchange user.
Including these three vulnerabilities, Microsoft has patched 13 other Exchange RCE vulnerabilities in 2023 thus far. Microsoft Exchange continues to be a sought-after target for ransomware groups and APT actors. In the wake of vulnerabilities like ProxyLogon, ProxyShell and ProxyNotShell, it has become clear that attackers have their sights set on unpatched Microsoft Exchange Servers.
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2023-38143 and CVE-2023-38144 are EoP vulnerabilities in the Windows Common Log File System (CLFS) Driver and both has a CVSSv3 score of 7.8 and are rated as “Exploitation More Likely.” An authenticated attacker could exploit these vulnerabilities to gain SYSTEM privileges.
With the addition of these two CVEs, seven EoP vulnerabilities were discovered in the Windows CLFS Driver in 2023, two of which were exploited in the wild as zero-days (CVE-2023-23376, CVE-2023-28252).
Patch Summary
CVE ID | CVE Title | Severity |
CVE-2023-36796 | Visual Studio Remote Code Execution Vulnerability | Critical |
CVE-2023-36792 | Visual Studio Remote Code Execution Vulnerability | Critical |
CVE-2023-36793 | Visual Studio Remote Code Execution Vulnerability | Critical |
CVE-2023-29332 | Microsoft Azure Kubernetes Service Elevation of Privilege Vulnerability | Critical |
CVE-2023-38148 | Internet Connection Sharing (ICS) Remote Code Execution Vulnerability | Critical |
CVE-2023-36794 | Visual Studio Remote Code Execution Vulnerability | Important |
CVE-2023-36799 | .NET Core and Visual Studio Denial of Service Vulnerability | Important |
CVE-2023-36788 | .NET Framework Remote Code Execution Vulnerability | Important |
CVE-2023-36772 | 3D Builder Remote Code Execution Vulnerability | Important |
CVE-2023-36771 | 3D Builder Remote Code Execution Vulnerability | Important |
CVE-2023-36770 | 3D Builder Remote Code Execution Vulnerability | Important |
CVE-2023-36773 | 3D Builder Remote Code Execution Vulnerability | Important |
CVE-2023-36760 | 3D Viewer Remote Code Execution Vulnerability | Important |
CVE-2023-36740 | 3D Viewer Remote Code Execution Vulnerability | Important |
CVE-2023-36739 | 3D Viewer Remote Code Execution Vulnerability | Important |
CVE-2023-33136 | Azure DevOps Server Remote Code Execution Vulnerability | Important |
CVE-2023-38155 | Azure DevOps Server Remote Code Execution Vulnerability | Important |
CVE-2023-38156 | Azure HDInsight Apache Ambari Elevation of Privilege Vulnerability | Important |
CVE-2023-38164 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | Important |
CVE-2023-36886 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | Important |
CVE-2023-36800 | Dynamics Finance and Operations Cross-site Scripting Vulnerability | Important |
CVE-2023-36744 | Microsoft Exchange Server Remote Code Execution Vulnerability | Important |
CVE-2023-36756 | Microsoft Exchange Server Remote Code Execution Vulnerability | Important |
CVE-2023-36745 | Microsoft Exchange Server Remote Code Execution Vulnerability | Important |
CVE-2023-36777 | Microsoft Exchange Server Information Disclosure Vulnerability | Important |
CVE-2023-36757 | Microsoft Exchange Server Spoofing Vulnerability | Important |
CVE-2023-36736 | Microsoft Identity Linux Broker Remote Code Execution Vulnerability | Important |
CVE-2023-36767 | Microsoft Office Security Feature Bypass Vulnerability | Important |
CVE-2023-36765 | Microsoft Office Elevation of Privilege Vulnerability | Important |
CVE-2023-36766 | Microsoft Excel Information Disclosure Vulnerability | Important |
CVE-2023-36763 | Microsoft Outlook Information Disclosure Vulnerability | Important |
CVE-2023-36764 | Microsoft SharePoint Server Elevation of Privilege Vulnerability | Important |
CVE-2023-36761 | Microsoft Word Information Disclosure Vulnerability | Important |
CVE-2023-36762 | Microsoft Word Remote Code Execution Vulnerability | Important |
CVE-2023-36802 | Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability | Important |
CVE-2023-38147 | Windows Miracast Wireless Display Remote Code Execution Vulnerability | Important |
CVE-2023-36758 | Visual Studio Elevation of Privilege Vulnerability | Important |
CVE-2023-36759 | Visual Studio Elevation of Privilege Vulnerability | Important |
CVE-2023-36742 | Visual Studio Code Remote Code Execution Vulnerability | Important |
CVE-2023-39956 | Electron: CVE-2023-39956 -Visual Studio Code Remote Code Execution Vulnerability | Important |
CVE-2023-35355 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | Important |
CVE-2023-38143 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | Important |
CVE-2023-38144 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | Important |
CVE-2023-38163 | Windows Defender Attack Surface Reduction Security Feature Bypass | Important |
CVE-2023-38152 | DHCP Server Service Information Disclosure Vulnerability | Important |
CVE-2023-38162 | DHCP Server Service Denial of Service Vulnerability | Important |
CVE-2023-36801 | DHCP Server Service Information Disclosure Vulnerability | Important |
CVE-2023-36804 | Windows GDI Elevation of Privilege Vulnerability | Important |
CVE-2023-38161 | Windows GDI Elevation of Privilege Vulnerability | Important |
CVE-2023-38141 | Windows Kernel Elevation of Privilege Vulnerability | Important |
CVE-2023-38142 | Windows Kernel Elevation of Privilege Vulnerability | Important |
CVE-2023-38139 | Windows Kernel Elevation of Privilege Vulnerability | Important |
CVE-2023-38140 | Windows Kernel Information Disclosure Vulnerability | Important |
CVE-2023-38150 | Windows Kernel Elevation of Privilege Vulnerability | Important |
CVE-2023-36803 | Windows Kernel Information Disclosure Vulnerability | Important |
CVE-2023-36805 | Windows MSHTML Platform Security Feature Bypass Vulnerability | Important |
CVE-2023-38160 | Windows TCP/IP Information Disclosure Vulnerability | Important |
CVE-2023-38149 | Windows TCP/IP Denial of Service Vulnerability | Important |
CVE-2023-38146 | Windows Themes Remote Code Execution Vulnerability | Important |
CVE-2023-41764 | Microsoft Office Spoofing Vulnerability | Moderate |