December 11, 2023

  • 16 Elevation of Privilege Vulnerabilities
  • 6 Security Feature Bypass Vulnerabilities
  • 15 Remote Code Execution Vulnerabilities
  • 6 Information Disclosure Vulnerabilities
  • 5 Denial of Service Vulnerabilities
  • 11 Spoofing Vulnerabilities

CVE-2023-36025 is a security feature bypass vulnerability in Windows SmartScreen. With a CVSSv3 score of 8.8 and is rated important. It was exploited in the wild as a zero-day. An attacker could exploit this flaw by crafting a malicious Internet Shortcut (.URL) file and convincing a target to click on the file or a hyperlink pointing to a.URL file. Successful exploitation would result in a bypass of the security checks in Windows Defender SmartScreen. This is the third Windows SmartScreen zero-day vulnerability exploited in the wild in 2023 and the fourth in the last two years. CVE-2022-44698, CVE-2023-24880, CVE-2023-32049

Advertisements

CVE-2023-36033 is an EoP vulnerability in the DWM Core Library in Microsoft Windows. With a CVSSv3 score of 7.8 and is rated as important. Microsoft noted that it was exploited in the wild as a zero-day and was publicly disclosed prior to a patch being available. A local attacker with a presence on a vulnerable system could exploit it to gain SYSTEM privileges.

This is the 12th EoP vulnerability patched in the DWM Core Library in the last two years, with 10 patched in 2022 and one patched earlier this year in the January 2023 Patch Tuesday release (CVE-2023-21724). However, this is the first DWM Core Library EoP vulnerability that was exploited in the wild as a zero-day in the last two years.

CVE-2023-36038 is a denial-of-service vulnerability in the open-source web application framework, ASP.NET. With a CVSSv3 score of 8.2 and rated as important. Microsoft rates it as Exploitation Less Likely. An attacker that could successfully exploit this vulnerability could trigger an OutOfMemoryException, resulting in a DoS condition. Microsoft notes that this vulnerability was publicly disclosed, however no in-the-wild exploitation has been observed.

CVE-2023-36036 is an EoP vulnerability in Microsoft Windows Cloud Files Mini Filter Driver (cldflt.sys). With a CVSSv3 score of 7.8 and is rated as important. Microsoft says it has been exploited in the wild and is credited to b​​oth the Microsoft Threat Intelligence Center (MSTIC) and Microsoft Security Response Center (MSRC). No further details were revealed and like most EoP flaws, if a local attacker exploits this flaw, they would be able to elevate privileges to SYSTEM.

Advertisements

CVE-2023-36413 is a security feature bypass vulnerability in Microsoft Office. With a CVSSv3 score of 6.5 and is rated as important. An attacker could exploit this vulnerability using social engineering tactics to convince a target to open a malicious Microsoft Office file on a vulnerable system. Successful exploitation would result in a bypass of security features of Microsoft Office designed to protect users including Protected View and the file would be opened in editing mode instead of protected mode. Microsoft says details about this flaw have been publicly disclosed prior to a patch being available.

CVE-2023-36439 is an RCE vulnerability in Microsoft Exchange Server. With a CVSSv3 score of 8.0 and rated as important. An attacker authenticated to a vulnerable Exchange Server as a valid user could exploit this vulnerability to gain RCE as NT AUTHORITY\SYSTEM on the backend of the server mailbox. Microsoft rates this vulnerability as Exploitation More Likely. It is one of four vulnerabilities in Microsoft Exchange Server patched in this month’s Patch Tuesday release. With the significant historical exploitation of Microsoft Exchange Server by attackers, we continue to monitor for and highlight flaws in Exchange Server in each Patch Tuesday release.

CVE-2023-36035, CVE-2023-36039 and CVE-2023-36050 are spoofing vulnerabilities in Microsoft Exchange Server. All three vulnerabilities were assigned a CVSSv3 score of 8.0 and are rated as important. An attacker could exploit these flaws by possessing valid credentials for an Exchange user on a vulnerable Exchange Server instance. Exploitation of CVE-2023-36035 and CVE-2023-36039 would allow an attacker to access the Net-NTLMv2 hash of the user account which could be utilized in NTLM Relay attacks against other services.

CVE-2023-38545 is a heap-based buffer overflow vulnerability in the SOCKS5 proxy handshake in libcurl and curl. This flaw was disclosed and patched on October 11. Curl is one of the most widely used open-source projects and Microsoft includes curl.exe in Windows and Windows Server. On October 19, Microsoft published an initial advisory for this vulnerability though no fixes were available at the time. However, a fixed version of curl.exe, version 8.0.4, was included in the Windows updates as part of this month’s Patch Tuesday release.

Advertisements
CVE IDCVE TitleSeverity
CVE-2023-36052Azure CLI REST Command Information Disclosure VulnerabilityCritical
CVE-2023-36400Windows HMAC Key Derivation Elevation of Privilege VulnerabilityCritical
CVE-2023-36397Windows Pragmatic General Multicast (PGM) Remote Code Execution VulnerabilityCritical
CVE-2023-36399Windows Storage Elevation of Privilege VulnerabilityImportan
CVE-2023-36049.NET, .NET Framework, and Visual Studio Elevation of Privilege VulnerabilityImportant
CVE-2023-36560ASP.NET Security Feature Bypass VulnerabilityImportant
CVE-2023-36038ASP.NET Core Denial of Service VulnerabilityImportant
CVE-2023-36558ASP.NET Core – Security Feature Bypass VulnerabilityImportant
CVE-2023-38151Microsoft Host Integration Server 2020 Remote Code Execution VulnerabilityImportant
CVE-2023-36021Microsoft On-Prem Data Gateway Security Feature Bypass VulnerabilityImportant
CVE-2023-36437Azure DevOps Server Remote Code Execution VulnerabilityImportant
CVE-2023-24023Mitre: CVE-2023-24023 Bluetooth VulnerabilityImportant
CVE-2023-36016Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityImportant
CVE-2023-36007Microsoft Send Customer Voice survey from Dynamics 365 Spoofing VulnerabilityImportant
CVE-2023-36031Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityImportant
CVE-2023-36410Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityImportant
CVE-2023-36030Microsoft Dynamics 365 Sales Spoofing VulnerabilityImportant
CVE-2023-36439Microsoft Exchange Server Remote Code Execution VulnerabilityImportant
CVE-2023-36050Microsoft Exchange Server Spoofing VulnerabilityImportant
CVE-2023-36039Microsoft Exchange Server Spoofing VulnerabilityImportant
CVE-2023-36035Microsoft Exchange Server Spoofing VulnerabilityImportant
CVE-2023-36413Microsoft Office Security Feature Bypass VulnerabilityImportant
CVE-2023-36045Microsoft Office Graphics Remote Code Execution VulnerabilityImportant
CVE-2023-36041Microsoft Excel Remote Code Execution VulnerabilityImportant
CVE-2023-36037Microsoft Excel Security Feature Bypass VulnerabilityImportant
CVE-2023-38177Microsoft SharePoint Server Remote Code Execution VulnerabilityImportant
CVE-2023-36423Microsoft Remote Registry Service Remote Code Execution VulnerabilityImportant
CVE-2023-36401Microsoft Remote Registry Service Remote Code Execution VulnerabilityImportant
CVE-2023-36402Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityImportant
CVE-2023-36394Windows Search Service Elevation of Privilege VulnerabilityImportant
CVE-2023-36719Microsoft Speech Application Programming Interface (SAPI) Elevation of Privilege VulnerabilityImportant
CVE-2023-36043Open Management Infrastructure Information Disclosure VulnerabilityImportant
CVE-2023-36393Windows User Interface Application Core Remote Code Execution VulnerabilityImportant
CVE-2023-36042Visual Studio Denial of Service VulnerabilityImportant
CVE-2023-36018Visual Studio Code Jupyter Extension Spoofing VulnerabilityImportant
CVE-2023-36047Windows Authentication Elevation of Privilege VulnerabilityImportant
CVE-2023-36428Microsoft Local Security Authority Subsystem Service Information Disclosure VulnerabilityImportant
CVE-2023-36046Windows Authentication Denial of Service VulnerabilityImportant
CVE-2023-36036Windows Cloud Files Mini Filter Driver Elevation of Privilege VulnerabilityImportant
CVE-2023-36424Windows Common Log File System Driver Elevation of Privilege VulnerabilityImportant
CVE-2023-36396Windows Compressed Folder Remote Code Execution VulnerabilityImportant
CVE-2023-36422Microsoft Windows Defender Elevation of Privilege VulnerabilityImportant
CVE-2023-36395Windows Deployment Services Denial of Service VulnerabilityImportant
CVE-2023-36392DHCP Server Service Denial of Service VulnerabilityImportant
CVE-2023-36425Windows Distributed File System (DFS) Remote Code Execution VulnerabilityImportant
CVE-2023-36033Windows DWM Core Library Elevation of Privilege VulnerabilityImportant
CVE-2023-36427Windows Hyper-V Elevation of Privilege VulnerabilityImportant
CVE-2023-36407Windows Hyper-V Elevation of Privilege VulnerabilityImportant
CVE-2023-36406Windows Hyper-V Information Disclosure VulnerabilityImportant
CVE-2023-36408Windows Hyper-V Elevation of Privilege VulnerabilityImportant
CVE-2023-36705Windows Installer Elevation of Privilege VulnerabilityImportant
CVE-2023-36405Windows Kernel Elevation of Privilege VulnerabilityImportant
CVE-2023-36404Windows Kernel Information Disclosure VulnerabilityImportant
CVE-2023-36403Windows Kernel Elevation of Privilege VulnerabilityImportant
CVE-2023-36398Windows NTFS Information Disclosure VulnerabilityImportant
CVE-2023-36028Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution VulnerabilityImportant
CVE-2023-36017Windows Scripting Engine Memory Corruption VulnerabilityImportant
CVE-2023-36025Windows SmartScreen Security Feature Bypass VulnerabilityImportant

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d