Description:
Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. The list of security updates can be found at:
https://msrc.microsoft.com/update-guide/releaseNote/2023-May
Reports indicated that the vulnerabilities (CVE-2023-24932 and CVE-2023-29336) in Microsoft Windows and Server are being exploited in the wild and the technical details of another remote code execution vulnerability (CVE-2023-29325) in Microsoft Windows and Server were publicly disclosed. In addition, multiple remote code execution vulnerabilities (CVE-2023-24941 and CVE-2023-24943) are also at a high risk of exploitation. System administrators and users are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
Reports indicated that the security feature bypass vulnerability (CVE-2023-29324) affecting Windows MSHTML platform is being exploited in the wild. System administrators are advised to take immediate action to ensure the latest patches have been applied to your affected systems to mitigate the elevated risk of cyber attacks.
Affected Systems:
- Microsoft Windows 10, 11
- Microsoft Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016, 2019, 2022
- Microsoft Office 2019, 2019 for Mac, LTSC 2021, LTSC for Mac 2021
- Microsoft Office Online Server
- Microsoft Excel 2013, 2013 RT, 2016
- Microsoft Word 2013, 2013 RT, 2016
- Microsoft 365 Apps for Enterprise
- Microsoft SharePoint Enterprise Server 2016
- Microsoft SharePoint Server 2019, Subscription Edition
- Microsoft Remote Desktop
- Microsoft Teams
- Visual Studio Code
- Windows Sysmon
- AV1 Video Extension
Impact:
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, denial of service, elevation of privilege, information disclosure, security feature bypass and spoofing.
Recommendation:
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. System administrators and users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
More Information:
- https://msrc.microsoft.com/update-guide/releaseNote/2023-May
- https://www.hkcert.org/security-bulletin/microsoft-monthly-security-update-may-2023
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24881
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24898 (to CVE-2023-24905)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24932
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24939 (to CVE-2023-24950)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24953 (to CVE-2023-24955)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28251
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28283
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28290
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29324 (to CVE-2023-29325)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29333
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29335 (to CVE-2023-29336)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29338
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29340 (to CVE-2023-29341)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29343 (to CVE-2023-29344)