Description:
Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. The list of security updates can be found at:
https://msrc.microsoft.com/update-guide/releaseNote/2023-Jul
Reports indicated that the vulnerabilities (CVE-2023-32046, CVE-2023-32049, CVE-2023-35311, CVE-2023-36874 and CVE-2023-36884) in Microsoft Windows and Server, as well as Microsoft Office and Outlook software are being exploited in the wild and the technical details of the remote code execution vulnerability (CVE-2023-36884) were publicly disclosed. In addition, multiple vulnerabilities (CVE-2023-21526, CVE-2023-32057, CVE-2023-33134, CVE-2023-33157, CVE-2023-33160, CVE-2023-35312, CVE-2023-35315, CVE-2023-35352, CVE-2023-35365, CVE-2023-35366, CVE-2023-35367 and CVE-2023-36871) are also at a high risk of exploitation.
Patch for CVE-2023-36884 is yet to be available but Microsoft has provided workaround to mitigate the risk. System administrators and users are advised to take immediate action to patch your affected systems and apply the recommended workaround for CVE-2023-36884 to mitigate the elevated risk of cyber attacks.
Affected Systems:
- Microsoft Windows 10, 11
- Microsoft Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016, 2019, 2022
- Microsoft Office 2013, 2013 RT, 2016, 2019, 2019 for Mac, LTSC 2021, LTSC for Mac 2021
- Microsoft Office Online Server
- Microsoft Excel 2013, 2013 RT, 2016
- Microsoft Word 2013, 2013 RT, 2016
- Microsoft Outlook 2013, 2013 RT, 2016
- Microsoft SharePoint Enterprise Server 2016
- Microsoft SharePoint Server 2019, Subscription Edition
- Microsoft 365 Apps for Enterprise
- Microsoft Dynamics 365 (on-premises) version 9.0, 9.1
- Microsoft Visual Studio 2022
- Visual Studio Code GitHub Pull Requests and Issues Extension
- .NET 6.0, 7.0
- Microsoft Malware Protection Engine
- Microsoft Power Apps (online)
- Azure Service Fabric 9.0, 9.1 for Windows
- Mono 6.12.0
- PandocUpload
- Paint 3D
- Raw Image Extension
- VP9 Video Extensions
- Windows Admin Center
Impact:
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, denial of service, elevation of privilege, information disclosure, security feature bypass and spoofing.
Recommendation:
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. System administrators and users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
While patch for CVE-2023-36884 is yet available, temporary measure is provided by Microsoft to mitigate the risk of exploitation. System administrators and users of affected systems should follow the provided recommendation in the following URL and take immediate actions to mitigate the risk. It is recommended to properly assess the impact before adopting the workaround and consult the product vendors for the assistance.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884#mitigations
More Information:
- https://msrc.microsoft.com/update-guide/releaseNote/2023-Jul
- https://www.hkcert.org/security-bulletin/microsoft-monthly-security-update-july-2023
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21526
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21756
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29347
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32033 (to CVE-2023-32035)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32037 (to CVE-2023-32047)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32049 (to CVE-2023-32057)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32083 (to CVE-2023-32085)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33127
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33134
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33148 (to CVE-2023-33174)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35296 (to CVE-2023-35300)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35302 (to CVE-2023-35306)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35308 (to CVE-2023-35326)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35328 (to CVE-2023-35333)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35335 (to CVE-2023-35347)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35350 (to CVE-2023-35353)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35356 (to CVE-2023-35358)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35360 (to CVE-2023-35367)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35373 (to CVE-2023-35374)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36867 (to CVE-2023-36868)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36871 (to CVE-2023-36872)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36874
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36884