Description:
Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. The list of security updates can be found at:
https://msrc.microsoft.com/update-guide/releaseNote/2023-Aug
Further to our High Threat Security Alert (A23-07-07), Microsoft has released security updates to stop the attack chain that leads to the remote code execution vulnerability (CVE-2023-36884) in Windows Search. In addition, reports indicated that the denial of service vulnerability (CVE-2023-38180) in Microsoft .NET and Visual Studio is being exploited in the wild, and multiple remote code execution vulnerabilities (CVE-2023-29328, CVE-2023-29330, CVE-2023-35385, CVE-2023-36895, CVE-2023-36910 and CVE-2023-36911) are also at a high risk of exploitation. System administrators and users are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
Affected Systems:
- Microsoft Windows 10, 11
- Microsoft Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016, 2019, 2022
- Microsoft Exchange Server 2016, 2019
- Microsoft Office 2013, 2013 RT, 2016, 2019, 2019 for Mac, LTSC 2021, LTSC for Mac 2021
- Microsoft Office Online Server
- Microsoft Excel 2013, 2013 RT, 2016
- Microsoft Word 2013, 2013 RT, 2016
- Microsoft PowerPoint 2013, 2013 RT, 2016
- Microsoft Project 2013, 2016
- Microsoft Publisher 2013, 2016
- Microsoft Outlook 2013, 2013 RT, 2016
- Microsoft SharePoint Enterprise Server 2016
- Microsoft SharePoint Server 2019, Subscription Edition
- Microsoft Teams for Android, for Desktop, for Mac, for iOS
- Microsoft Visio 2013, 2016
- Microsoft 365 Apps for Enterprise
- Microsoft Dynamics 365 (on-premises) version 9.0, version 9.1
- Microsoft Dynamics 365 Business Central 2023
- Microsoft SQL Server 2019, 2022
- Microsoft ODBC Driver 17, 18 for SQL Server
- Microsoft OLE DB Driver 18, 19 for SQL Server
- Microsoft Visual Studio 2017, 2019, 2022
- Visual Studio 2010 Tools for Office Runtime
- Microsoft .NET Framework 2.0, 3.5, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8, 4.8.1
- .NET 6.0, 7.0
- ASP.NET Core 2.1
- Azure Arc-Enabled Servers, HDInsights
- Azure DevOps Server 2019, 2020, 2022
- HEVC Video Extensions
- Memory Integrity System Readiness Scan Tool
- Windows Defender Antimalware Platform
Impact:
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, denial of service, elevation of privilege, information disclosure, security feature bypass and spoofing.
Recommendation:
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. System administrators and users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
More Information:
- https://msrc.microsoft.com/update-guide/releaseNote/2023-Aug
- https://msrc.microsoft.com/update-guide/vulnerability/ADV230003
- https://www.hkcert.org/security-bulletin/microsoft-monthly-security-update-august-2023
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20569
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21709
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29328
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29330
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35359
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35368
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35371 (to CVE-2023-35372)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35376 (to CVE-2023-35391)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35393 (to CVE-2023-35394)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36865 (to CVE-2023-36866)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36869
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36873
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36876 (to CVE-2023-36877)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36881 (to CVE-2023-36882)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36884
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36889 (to CVE-2023-36900)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36903 (to CVE-2023-36914)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38154
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38167
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38169 (to CVE-2023-38170)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38172
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38175 (to CVE-2023-38176)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38178
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38180 (to CVE-2023-38182)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38184 (to CVE-2023-38186)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38188
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38254