Description:
Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. The list of security updates can be found at:
https://msrc.microsoft.com/update-guide/releaseNote/2023-Jan
Reports indicated that an elevation of privilege vulnerability (CVE-2023-21674) in Microsoft Windows and Server is being exploited in the wild and the technical details of another elevation of privilege vulnerability (CVE-2023-21549) in Microsoft Windows and Server was publicly disclosed. System administrators and users are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
Affected Systems:
- Microsoft Windows 7, 8.1, RT 8.1, 10, 11
- Microsoft Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016, 2019, 2022
- Microsoft Exchange Server 2013, 2016, 2019
- Microsoft Office 2019, 2019 for Mac, LTSC 2021, LTSC for Mac 2021
- Microsoft SharePoint Foundation 2013
- Microsoft SharePoint Enterprise Server 2013, 2016
- Microsoft SharePoint Server 2019, Subscription Edition
- Microsoft Visio 2013, 2016
- Microsoft 365 Apps for Enterprise
- Visual Studio Code
- .NET 6.0
- Azure Service Fabric 8.2, 9.0, 9.1
- Windows Malicious Software Removal Tool
- 3D Builder
Impact:
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, denial of service, elevation of privilege, information disclosure, security feature bypass and spoofing.
Recommendation:
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. System administrators and users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
More Information:
- https://msrc.microsoft.com/update-guide/releaseNote/2023-Jan
- https://www.hkcert.org/security-bulletin/microsoft-monthly-security-update-january-2023
- https://www.cisa.gov/uscert/ncas/current-activity/2023/01/10/microsoft-releases-january-2023-security-updates
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21524 (to CVE-2023-21525)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21527
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21531 (to CVE-2023-21532)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21535 (to CVE-2023-21543)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21546 (to CVE-2023-21552)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21555 (to CVE-2023-21561)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21563
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21674 (to CVE-2023-21683)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21724 (to CVE-2023-21726)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21728
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21730
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21732 (to CVE-2023-21739)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21741 (to CVE-2023-21750)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21752 (to CVE-2023-21755)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21757 (to CVE-2023-21768)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21771 (to CVE-2023-21774)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21776
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21779 (to CVE-2023-21793)