Cyber Security News

Windows Update Addressed 2 Zero-Days and 52 Other Vulnerabilities

Microsoft has released its Patch Tuesday update, which includes 59 vulnerabilities along with two Zero-Days. The severity for these vulnerabilities ranges from 4.3 (Medium) to 8.8 (High). 

Categories of the vulnerabilities patched include Information Disclosure (9), Elevation of Privilege (18), Remote Code Execution (26), Security Feature Bypass(3), Spoofing (5) and Denial of Service (3).

In addition, there were two Chromium vulnerabilities and two Non-Microsoft flaws in AutoDesk and Electron.

Zero Days

The Two zero-days patched by Microsoft were CVE-2023-36802 – Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability and CVE-2023-36761 – Microsoft Word Information Disclosure Vulnerability.

CVE-2023-36802 local privilege escalation vulnerability can be exploited by threat actors to gain SYSTEM privileges whereas CVE-2023-36761 can be exploited for stealing NTLM (New Technology LAN Manager) hashes when opening a MS Office document.

These hashes can then be cracked to gain access to the accounts and can also be used for NTLM Relay attacks.

Among the fixed patches, some vulnerabilities had the highest severity of 8.8 (High), which were CVE-2023-38148 (Internet Connection Sharing (ICS) Remote Code Execution Vulnerability) CVE-2023-33136 (Azure DevOps Server Remote Code Execution Vulnerability), CVE-2023-36764 (Microsoft SharePoint Server Elevation of Privilege Vulnerability), CVE-2023-38146 (Windows Themes Remote Code Execution Vulnerability) and CVE-2023-38147 (Windows Miracast Wireless Display Remote Code Execution Vulnerability).

Other fixed patches and their severity can be found in the table below.

CVE NumberCVE TitleImpactMax SeverityTag
CVE-2023-4863Chromium: CVE-2023-4863 Heap buffer overflow in WebPMicrosoft Edge (Chromium-based)
CVE-2023-41764Microsoft Office Spoofing VulnerabilitySpoofingModerateMicrosoft Office
CVE-2023-39956Electron: CVE-2023-39956 -Visual Studio Code Remote Code Execution VulnerabilityRemote Code ExecutionImportantVisual Studio Code
CVE-2023-38164Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilitySpoofingImportantMicrosoft Dynamics
CVE-2023-38163Windows Defender Attack Surface Reduction Security Feature BypassSecurity Feature BypassImportantWindows Defender
CVE-2023-38162DHCP Server Service Denial of Service VulnerabilityDenial of ServiceImportantWindows DHCP Server
CVE-2023-38161Windows GDI Elevation of Privilege VulnerabilityElevation of PrivilegeImportantWindows GDI
CVE-2023-38160Windows TCP/IP Information Disclosure VulnerabilityInformation DisclosureImportantWindows TCP/IP
CVE-2023-38156Azure HDInsight Apache Ambari Elevation of Privilege VulnerabilityElevation of PrivilegeImportantAzure HDInsights
CVE-2023-38155Azure DevOps Server Remote Code Execution VulnerabilityElevation of PrivilegeImportantAzure DevOps
CVE-2023-38152DHCP Server Service Information Disclosure VulnerabilityInformation DisclosureImportantWindows DHCP Server
CVE-2023-38150Windows Kernel Elevation of Privilege VulnerabilityElevation of PrivilegeImportantWindows Kernel
CVE-2023-38149Windows TCP/IP Denial of Service VulnerabilityDenial of ServiceImportantWindows TCP/IP
CVE-2023-38148Internet Connection Sharing (ICS) Remote Code Execution VulnerabilityRemote Code ExecutionCriticalWindows Internet Connection Sharing (ICS)
CVE-2023-38147Windows Miracast Wireless Display Remote Code Execution VulnerabilityRemote Code ExecutionImportantMicrosoft Windows Codecs Library
CVE-2023-38146Windows Themes Remote Code Execution VulnerabilityRemote Code ExecutionImportantWindows Themes
CVE-2023-38144Windows Common Log File System Driver Elevation of Privilege VulnerabilityElevation of PrivilegeImportantWindows Common Log File System Driver
CVE-2023-38143Windows Common Log File System Driver Elevation of Privilege VulnerabilityElevation of PrivilegeImportantWindows Common Log File System Driver
CVE-2023-38142Windows Kernel Elevation of Privilege VulnerabilityElevation of PrivilegeImportantWindows Kernel
CVE-2023-38141Windows Kernel Elevation of Privilege VulnerabilityElevation of PrivilegeImportantWindows Kernel
CVE-2023-38140Windows Kernel Information Disclosure VulnerabilityInformation DisclosureImportantWindows Kernel
CVE-2023-38139Windows Kernel Elevation of Privilege VulnerabilityElevation of PrivilegeImportantWindows Kernel
CVE-2023-36886Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilitySpoofingImportantMicrosoft Dynamics
CVE-2023-36805Windows MSHTML Platform Security Feature Bypass VulnerabilityRemote Code ExecutionImportantWindows Scripting
CVE-2023-36804Windows GDI Elevation of Privilege VulnerabilityElevation of PrivilegeImportantWindows GDI
CVE-2023-36803Windows Kernel Information Disclosure VulnerabilityInformation DisclosureImportantWindows Kernel
CVE-2023-36802Microsoft Streaming Service Proxy Elevation of Privilege VulnerabilityElevation of PrivilegeImportantMicrosoft Streaming Service
CVE-2023-36801DHCP Server Service Information Disclosure VulnerabilityInformation DisclosureImportantWindows DHCP Server
CVE-2023-36800Dynamics Finance and Operations Cross-site Scripting VulnerabilitySpoofingImportantMicrosoft Dynamics Finance & Operations
CVE-2023-36799.NET Core and Visual Studio Denial of Service VulnerabilityDenial of ServiceImportant.NET Core & Visual Studio
CVE-2023-36796Visual Studio Remote Code Execution VulnerabilityRemote Code ExecutionCritical.NET and Visual Studio
CVE-2023-36794Visual Studio Remote Code Execution VulnerabilityRemote Code ExecutionImportant.NET and Visual Studio
CVE-2023-36793Visual Studio Remote Code Execution VulnerabilityRemote Code ExecutionCritical.NET and Visual Studio
CVE-2023-36792Visual Studio Remote Code Execution VulnerabilityRemote Code ExecutionCritical.NET and Visual Studio
CVE-2023-36788.NET Framework Remote Code Execution VulnerabilityRemote Code ExecutionImportant.NET Framework
CVE-2023-36777Microsoft Exchange Server Information Disclosure VulnerabilityInformation DisclosureImportantMicrosoft Exchange Server
CVE-2023-367733D Builder Remote Code Execution VulnerabilityRemote Code ExecutionImportant3D Builder
CVE-2023-367723D Builder Remote Code Execution VulnerabilityRemote Code ExecutionImportant3D Builder
CVE-2023-367713D Builder Remote Code Execution VulnerabilityRemote Code ExecutionImportant3D Builder
CVE-2023-367703D Builder Remote Code Execution VulnerabilityRemote Code ExecutionImportant3D Builder
CVE-2023-36767Microsoft Office Security Feature Bypass VulnerabilitySecurity Feature BypassImportantMicrosoft Office
CVE-2023-36766Microsoft Excel Information Disclosure VulnerabilityInformation DisclosureImportantMicrosoft Office Excel
CVE-2023-36765Microsoft Office Elevation of Privilege VulnerabilityElevation of PrivilegeImportantMicrosoft Office
CVE-2023-36764Microsoft SharePoint Server Elevation of Privilege VulnerabilityElevation of PrivilegeImportantMicrosoft Office SharePoint
CVE-2023-36763Microsoft Outlook Information Disclosure VulnerabilityInformation DisclosureImportantMicrosoft Office Outlook
CVE-2023-36762Microsoft Word Remote Code Execution VulnerabilityRemote Code ExecutionImportantMicrosoft Office Word
CVE-2023-36761Microsoft Word Information Disclosure VulnerabilityInformation DisclosureImportantMicrosoft Office Word
CVE-2023-367603D Viewer Remote Code Execution VulnerabilityRemote Code ExecutionImportant3D Viewer
CVE-2023-36759Visual Studio Elevation of Privilege VulnerabilityElevation of PrivilegeImportantVisual Studio
CVE-2023-36758Visual Studio Elevation of Privilege VulnerabilityElevation of PrivilegeImportantVisual Studio
CVE-2023-36757Microsoft Exchange Server Spoofing VulnerabilitySpoofingImportantMicrosoft Exchange Server
CVE-2023-36756Microsoft Exchange Server Remote Code Execution VulnerabilityRemote Code ExecutionImportantMicrosoft Exchange Server
CVE-2023-36745Microsoft Exchange Server Remote Code Execution VulnerabilityRemote Code ExecutionImportantMicrosoft Exchange Server
CVE-2023-36744Microsoft Exchange Server Remote Code Execution VulnerabilityRemote Code ExecutionImportantMicrosoft Exchange Server
CVE-2023-36742Visual Studio Code Remote Code Execution VulnerabilityRemote Code ExecutionImportantVisual Studio Code
CVE-2023-367403D Viewer Remote Code Execution VulnerabilityRemote Code ExecutionImportant3D Viewer
CVE-2023-367393D Viewer Remote Code Execution VulnerabilityRemote Code ExecutionImportant3D Viewer
CVE-2023-36736Microsoft Identity Linux Broker Remote Code Execution VulnerabilityRemote Code ExecutionImportantMicrosoft Identity Linux Broker
CVE-2023-35355Windows Cloud Files Mini Filter Driver Elevation of Privilege VulnerabilityElevation of PrivilegeImportantWindows Cloud Files Mini Filter Driver
CVE-2023-33136Azure DevOps Server Remote Code Execution VulnerabilityRemote Code ExecutionImportantAzure DevOps
CVE-2023-32051Raw Image Extension Remote Code Execution VulnerabilityRemote Code ExecutionImportantMicrosoft Windows Codecs Library
CVE-2023-29332Microsoft Azure Kubernetes Service Elevation of Privilege VulnerabilityElevation of PrivilegeCriticalMicrosoft Azure Kubernetes Service
CVE-2023-24936.NET, .NET Framework, and Visual Studio Elevation of Privilege VulnerabilityElevation of PrivilegeModerate.NET and Visual Studio
CVE-2022-41303AutoDesk: CVE-2022-41303 use-after-free vulnerability in Autodesk® FBX® SDK 2020 or priorRemote Code ExecutionImportant3D Viewer
Source: Microsoft

It is recommended that organizations upgrade to the latest version of patches released by Microsoft to fix these vulnerabilities and prevent them from getting exploited.

Keep informed about the latest Cyber Security News by following us on Google NewsLinkedinTwitter, and Facebook.

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Cyber Guardians: INE Security Champions Cybersecurity Training During National Physicians Week 2025

Cary, NC, March 24th, 2025, CyberNewsWire INE Security, a global provider of cybersecurity training and…

2 hours ago

Hackers Using Fake Semrush Ads to Steal Google Accounts Login Credentials

A sophisticated phishing campaign targeting Google account credentials through fake Semrush advertisements has emerged, posing…

4 hours ago

Pocket Card Users Under Attack Via Sophisticated Phishing Campaign

A highly targeted phishing campaign is currently exploiting Pocket Card users through elaborately crafted emails…

4 hours ago

Operation Red Card – 300+ Cyber Criminals Arrested Linking to Multiple Hacking Activities

INTERPOL led a multi-national law enforcement operation dubbed "Operation Red Card," which has resulted in…

4 hours ago

Hackers Could Drop Teams Malware via Browser’s Cache Smuggling

A novel attack vector combining browser cache exploitation and DLL proxying has emerged as a…

4 hours ago

New Linux Kernel Rust Module Unveiled to Detect Rootkits

A groundbreaking security tool has emerged in the ongoing battle against sophisticated Linux malware. A…

5 hours ago