Description:
Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. The list of security updates can be found at:
https://msrc.microsoft.com/update-guide/releaseNote/2023-Mar
Microsoft has released additional information on the elevation of privilege vulnerability (CVE-2023-23397) affecting Microsoft Outlook. As multiple reports indicate that the vulnerability is being exploited in the wild, system administrators are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
Reports indicated that the vulnerabilities (CVE-2023-23397 and CVE-2023-24880) in Microsoft Outlook as well as Microsoft Windows and Server are being exploited in the wild. In addition, multiple remote code execution vulnerabilities (CVE-2023-21708, CVE-2023-23392 and CVE-2023-23415) are also at a high risk of exploitation. System administrators and users are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
Affected Systems:
- Microsoft Windows 10, 11
- Microsoft Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016, 2019, 2022
- Microsoft Office 2013, 2013 RT, 2016, 2019, LTSC 2021
- Microsoft Office 2019 for Mac, LTSC for Mac 2021
- Microsoft Office for Android, for Universal
- Microsoft Office Online Server
- Microsoft Office Web Apps Server 2013
- Microsoft Excel 2013, 2013 RT, 2016
- Microsoft Outlook
- Microsoft 365 Apps for Enterprise
- Microsoft Dynamics 365 (on-premises) version 9.0, version 9.1
- Microsoft SharePoint Foundation 2013
- Microsoft SharePoint Enterprise Server 2013, 2016
- Microsoft SharePoint Server 2019, Subscription Edition
- Microsoft Visual Studio 2017, 2019, 2022
- Azure HDInsights
- Azure Service Fabric 9.1 for Ubuntu, for Windows
- Microsoft Malware Protection Engine
- OneDrive for Android, for MacOS Installer, for iOS
Impact:
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, denial of service, elevation of privilege, information disclosure, security feature bypass and spoofing.
Recommendation:
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. System administrators and users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
More Information:
- https://msrc.microsoft.com/update-guide/releaseNote/2023-Mar
- https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-23397
- https://msrc.microsoft.com/blog/2023/03/microsoft-mitigates-outlook-elevation-of-privilege-vulnerability/
- https://www.hkcert.org/security-bulletin/microsoft-monthly-security-update-march-2023
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1017 (to CVE-2023-1018)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21708
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22490
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22743
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23383
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23385
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23388 (to CVE-2023-23389)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23391 (to CVE-2023-23423)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23618
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23946
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24856 (to CVE-2023-24859)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24861 (to CVE-2023-24872)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24876
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24879 (to CVE-2023-24880)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24882
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24890 (to CVE-2023-24892)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24906 (to CVE-2023-24911)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24913
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24919 (to CVE-2023-24923)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24930