Patch Tuesday Update - September 2023

 

Today’s Microsoft Security Update includes Microsoft Patch Tuesday checks in the NIRV 4.28.0 and Frontline Agent 1.64.0 releases.

  • Microsoft addressed 59 vulnerabilities in this release, including five rated as Critical.
  • This release also includes three republished non-Microsoft CVEs to address issues in Microsoft Edge (Chromium-based), Visual Studio Code, and 3D Viewer.
  • Two of the CVEs fixed in this month’s release are also being exploited in the wild.
    • CVE-2023-36802
      • A privilege escalation vulnerability in the Microsoft Streaming Service Proxy could allow an attacker to gain SYSTEM privileges on the affected system.
    • CVE-2023-36761
      • This information disclosure vulnerability in Microsoft Word could result in the disclosure of NTLM hashes.
CVE/AdvisoryTitleTagMicrosoft Severity RatingBase ScoreMicrosoft ImpactExploitedPublicly Disclosed
CVE-2023-35355Windows Cloud Files Mini Filter Driver Elevation of Privilege VulnerabilityWindows Cloud Files Mini Filter DriverImportant7.8Elevation of PrivilegeNoNo
CVE-2023-38162DHCP Server Service Denial of Service VulnerabilityWindows DHCP ServerImportant7.5Denial of ServiceNoNo
CVE-2023-38161Windows GDI Elevation of Privilege VulnerabilityWindows GDIImportant7.8Elevation of PrivilegeNoNo
CVE-2023-38156Azure HDInsight Apache Ambari Elevation of Privilege VulnerabilityAzure HDInsightsImportant7.2Elevation of PrivilegeNoNo
CVE-2023-38152DHCP Server Service Information Disclosure VulnerabilityWindows DHCP ServerImportant5.3Information DisclosureNoNo
CVE-2023-38150Windows Kernel Elevation of Privilege VulnerabilityWindows KernelImportant7.8Elevation of PrivilegeNoNo
CVE-2023-38149Windows TCP/IP Denial of Service VulnerabilityWindows TCP/IPImportant7.5Denial of ServiceNoNo
CVE-2023-38148Internet Connection Sharing (ICS) Remote Code Execution VulnerabilityWindows Internet Connection Sharing (ICS)Critical8.8Remote Code ExecutionNoNo
CVE-2023-38147Windows Miracast Wireless Display Remote Code Execution VulnerabilityMicrosoft Windows Codecs LibraryImportant8.8Remote Code ExecutionNoNo
CVE-2023-38146Windows Themes Remote Code Execution VulnerabilityWindows ThemesImportant8.8Remote Code ExecutionNoNo
CVE-2023-38144Windows Common Log File System Driver Elevation of Privilege VulnerabilityWindows Common Log File System DriverImportant7.8Elevation of PrivilegeNoNo
CVE-2023-38143Windows Common Log File System Driver Elevation of Privilege VulnerabilityWindows Common Log File System DriverImportant7.8Elevation of PrivilegeNoNo
CVE-2023-38142Windows Kernel Elevation of Privilege VulnerabilityWindows KernelImportant7.8Elevation of PrivilegeNoNo
CVE-2023-38141Windows Kernel Elevation of Privilege VulnerabilityWindows KernelImportant7.8Elevation of PrivilegeNoNo
CVE-2023-38140Windows Kernel Information Disclosure VulnerabilityWindows KernelImportant5.5Information DisclosureNoNo
CVE-2023-38139Windows Kernel Elevation of Privilege VulnerabilityWindows KernelImportant7.8Elevation of PrivilegeNoNo
CVE-2023-36805Windows MSHTML Platform Security Feature Bypass VulnerabilityWindows ScriptingImportant7Security Feature BypassNoNo
CVE-2023-36804Windows GDI Elevation of Privilege VulnerabilityWindows GDIImportant7.8Elevation of PrivilegeNoNo
CVE-2023-36803Windows Kernel Information Disclosure VulnerabilityWindows KernelImportant5.5Information DisclosureNoNo
CVE-2023-36802Microsoft Streaming Service Proxy Elevation of Privilege VulnerabilityMicrosoft Streaming ServiceImportant7.8Elevation of PrivilegeYesNo
CVE-2023-36801DHCP Server Service Information Disclosure VulnerabilityWindows DHCP ServerImportant5.3Information DisclosureNoNo
CVE-2023-36767Microsoft Office Security Feature Bypass VulnerabilityMicrosoft OfficeImportant4.3Security Feature BypassNoNo
CVE-2023-36766Microsoft Excel Information Disclosure VulnerabilityMicrosoft Office ExcelImportant7.8Information DisclosureNoNo
CVE-2023-36765Microsoft Office Elevation of Privilege VulnerabilityMicrosoft OfficeImportant7.8Elevation of PrivilegeNoNo
CVE-2023-36759Visual Studio Elevation of Privilege VulnerabilityVisual StudioImportant6.7Elevation of PrivilegeNoNo
CVE-2023-36758Visual Studio Elevation of Privilege VulnerabilityVisual StudioImportant7.8Elevation of PrivilegeNoNo
CVE-2023-36757Microsoft Exchange Server Spoofing VulnerabilityMicrosoft Exchange ServerImportant8SpoofingNoNo
CVE-2023-36756Microsoft Exchange Server Remote Code Execution VulnerabilityMicrosoft Exchange ServerImportant8Remote Code ExecutionNoNo
CVE-2023-36745Microsoft Exchange Server Remote Code Execution VulnerabilityMicrosoft Exchange ServerImportant8Remote Code ExecutionNoNo
CVE-2023-36744Microsoft Exchange Server Remote Code Execution VulnerabilityMicrosoft Exchange ServerImportant8Remote Code ExecutionNoNo
CVE-2023-36742Visual Studio Code Remote Code Execution VulnerabilityVisual Studio CodeImportant7.8Remote Code ExecutionNoNo
CVE-2023-36736Microsoft Identity Linux Broker Remote Code Execution VulnerabilityMicrosoft Identity Linux BrokerImportant4.4Remote Code ExecutionNoNo
CVE-2023-41764Microsoft Office Spoofing VulnerabilityMicrosoft OfficeModerate5.5SpoofingNoNo
CVE-2022-41303AutoDesk: CVE-2022-41303 use-after-free vulnerability in Autodesk® FBX® SDK 2020 or prior3D ViewerImportantN/ARemote Code ExecutionNoNo
CVE-2023-29332Microsoft Azure Kubernetes Service Elevation of Privilege VulnerabilityMicrosoft Azure Kubernetes ServiceCritical7.5Elevation of PrivilegeNoNo
CVE-2023-33136Azure DevOps Server Remote Code Execution VulnerabilityAzure DevOpsImportant8.8Remote Code ExecutionNoNo
CVE-2023-36886Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityMicrosoft DynamicsImportant7.6SpoofingNoNo
CVE-2023-38164Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityMicrosoft DynamicsImportant7.6SpoofingNoNo
CVE-2023-38163Windows Defender Attack Surface Reduction Security Feature BypassWindows DefenderImportant7.8Security Feature BypassNoNo
CVE-2023-38160Windows TCP/IP Information Disclosure VulnerabilityWindows TCP/IPImportant5.5Information DisclosureNoNo
CVE-2023-38155Azure DevOps Server Remote Code Execution VulnerabilityAzure DevOpsImportant7Elevation of PrivilegeNoNo
CVE-2023-36800Dynamics Finance and Operations Cross-site Scripting VulnerabilityMicrosoft Dynamics Finance & OperationsImportant7.6SpoofingNoNo
CVE-2023-36799.NET Core and Visual Studio Denial of Service Vulnerability.NET Core & Visual StudioImportant6.5Denial of ServiceNoNo
CVE-2023-36796Visual Studio Remote Code Execution Vulnerability.NET and Visual StudioImportant/Critical7.8Remote Code ExecutionNoNo
CVE-2023-36794Visual Studio Remote Code Execution Vulnerability.NET and Visual StudioImportant7.8Remote Code ExecutionNoNo
CVE-2023-36793Visual Studio Remote Code Execution Vulnerability.NET and Visual StudioImportant/Critical7.8Remote Code ExecutionNoNo
CVE-2023-36792Visual Studio Remote Code Execution Vulnerability.NET and Visual StudioImportant/Critical7.8Remote Code ExecutionNoNo
CVE-2023-36788.NET Framework Remote Code Execution Vulnerability.NET FrameworkImportant7.8Remote Code ExecutionNoNo
CVE-2023-36777Microsoft Exchange Server Information Disclosure VulnerabilityMicrosoft Exchange ServerImportant5.7Information DisclosureNoNo
CVE-2023-367733D Builder Remote Code Execution Vulnerability3D BuilderImportant7.8Remote Code ExecutionNoNo
CVE-2023-367723D Builder Remote Code Execution Vulnerability3D BuilderImportant7.8Remote Code ExecutionNoNo
CVE-2023-367713D Builder Remote Code Execution Vulnerability3D BuilderImportant7.8Remote Code ExecutionNoNo
CVE-2023-367703D Builder Remote Code Execution Vulnerability3D BuilderImportant7.8Remote Code ExecutionNoNo
CVE-2023-36764Microsoft SharePoint Server Elevation of Privilege VulnerabilityMicrosoft Office SharePointImportant8.8Elevation of PrivilegeNoNo
CVE-2023-36763Microsoft Outlook Information Disclosure VulnerabilityMicrosoft Office OutlookImportant7.5Information DisclosureNoNo
CVE-2023-36762Microsoft Word Remote Code Execution VulnerabilityMicrosoft Office WordImportant7.3Remote Code ExecutionNoNo
CVE-2023-36761Microsoft Word Information Disclosure VulnerabilityMicrosoft Office WordImportant6.2Information DisclosureYesYes
CVE-2023-367603D Viewer Remote Code Execution Vulnerability3D ViewerImportant7.8Remote Code ExecutionNoNo
CVE-2023-39956Electron: CVE-2023-39956 -Visual Studio Code Remote Code Execution VulnerabilityVisual Studio CodeImportantN/ARemote Code ExecutionNoNo
CVE-2023-367403D Viewer Remote Code Execution Vulnerability3D ViewerImportant7.8Remote Code ExecutionNoNo
CVE-2023-367393D Viewer Remote Code Execution Vulnerability3D ViewerImportant7.8Remote Code ExecutionNoNo
CVE-2023-4863Chromium: CVE-2023-4863 Heap buffer overflow in WebPMicrosoft Edge (Chromium-based) N/A   

Prioritize the right vulnerabilities and accelerate your time-to-remediation

Watch this 3-minute video to see what Frontline VM can do for you.

Cybersecurity Heats Up in the Summer

 

When school is out for summer, it seems like everyone is on vacation – everyone except your (un)friendly neighborhood cybercriminals.

Something about the summer months puts us off our guard and threat actors on high alert. The only way to stay safe is to know what’s causing the trouble in the first place. We’ve packed our sunscreen – now read on to find out how to make sure your security also doesn’t get burned.

Summer Cybersecurity Weaknesses to Look Out For

  1. Holidays mean lower staff counts | Summer is the time for family vacations, trips abroad, and lower rates of qualified cybersecurity personnel on duty. Additionally, temporary staff may also not have had the same security awareness training and therefore be more susceptible to phishing emails, insecure file transfers, and other unsafe practices. Threat actors can take advantage of this natural deficiency, leading to potentially increased risks of phishing and lower response times on urgent alerts. Together, this make for a bad combination.
  2. Servers can’t beat the heat | Everyone knows that a hot server is a slow server. An overheated server can severely malfunction or even crash, leaving companies not only potentially incapacitated, but also vulnerable. As heat waves are increasingly taking down data centers, the potential cybersecurity risks such incidents pose is becoming clear. Hastily bringing a server back online could actually compound the problem, accidentally opening more avenues of attack by failing to take the proper precautions and set it up right. And, if companies reduce operations to prevent servers from getting too hot, such measures may have unintended consequences of increasing risk to the enterprise.   
  3. Vacation means poolside public WiFi | Just because remote work allows you to work from anywhere doesn’t mean it’s safe to connect everywhere. Public WiFi is not the place to log in and check a quick work email – even for a minute. It only takes a moment for the right threat actor to infect your device with malware, snoop for confidential data, or hijack your session. It’s annoying when it happens to your Gmail account. It’s detrimental when it happens to your Microsoft Outlook work account. An attacker may scan sensitive information, download your contacts, and pivot to others within your organization. On top of that, vacation is a time when those who do find time to work are often distracted and may be more careless about what they’re opening. And the threats are out there: Business Email Compromise (BEC) resulted in $2.7 billion dollars in losses in 2022.

Protecting Your Organization All Year Long

No one wants to come back from a week off to find an IT disaster waiting for them. Here are some tips to stay safe:

  1. Vulnerability Scanning | Never fly blind when it comes to your network, especially when you’re out of the office. These scans can be scheduled and automated, making it easy to keep an eye on things, even with staff outages. These scans provide the foundation for any subsequent security efforts – you can’t fix what you can’t see.
  2. Pen Testing | Pen testing is great for making sure your systems are as good-to-go as you think they are. They can not only exploit and prioritize vulnerabilities but can also make you aware of misconfigurations – like if that server got back online too quickly and left the enterprise exposed. You don’t want to go on vacations with systems unpatched, and pen testing on a regular basis can help your team take on a proactive – not reactive – approach to security.
  3. Red Team Exercises | Make sure your security team is prepared by putting them to the test. Red teaming doesn’t just assess defenses, it also helps train the blue team. Facing down real-world threat tactics goes beyond even the preparation of knowing what to patch. It tests their security nervous system, anticipates how well they will do under pressure, and seasons them so if the worst happens while the team is short-staffed everyone will still know what to do.
  4. Use a VPN | You never know where your adventures might lead, or how tempted you might be to fall for public WiFi when your data runs out in a strange city. For instance, the FBI has explicitly warned against cell-charging kiosks, stating that “Cybersecurity experts warn that bad actors can load malware onto public USB charging stations to maliciously access electronic devices while they are being charged.” It’s safer to make a habit of using a VPN – either for personal or work use – every time you log in. Cybercriminals are working when you’re not, and every in is a potential liability.
  5. Make social engineering tests a must | All a threat actor needs is one weak link. You can prepare team members with a phishing campaign that tests how they react to malicious emails they might encounter. This can help identify who is susceptible and in need of additional training on how to stay safe and spot suspicious activity. You never know who might be up late, checking emails in a hotel room while on vacation – off their guard and susceptible to click bait, ransomware-infested text links and other phishing emails.

The Best Defense is a Good Offense

Cybercriminals don’t sleep, and neither do we. The best defense is a good offense and Fortra’s Core Security has solutions to prepare your organization to stay sharp during the summer months and beyond.

Core ImpactCore Security’s flagship penetration testing tool, can integrate with top vulnerability scanners like beSECURE to maximize the impact of both. Adversary simulations and red team operations can be run with the help of Cobalt Strike and Outflank Security Tooling (OST), two powerful red teaming solutions ideal for deploying sophisticated adversary simulations. Best of all, these solutions can be bundled together so you can cost effectively accelerate your offensive security strategy.

If we’re not careful, we can get burned by more than just the sun this summer. Secure your enterprise with Core Security’s lineup of offensive security solutions and enjoy your time off.

Learn how offensive security can strengthen your security no matter the season

Find out more about different offensive security solutions and which ones are the best fit for your environment in our webinar, Bundling Up: The Importance of Layering Offensive Security Solutions.