It’s a new year and another edition of patch Tuesday is among us.
On Tuesday, January 10th, Microsoft released its latest round of patches for various vulnerabilities in its software. This month’s Patch Tuesday includes fixes for several critical vulnerabilities that could allow attackers to execute arbitrary code or cause a denial of service on vulnerable systems.There were total 98 vulnerabilities addressed in this month’s edition of patch Tuesday.
One of the critical vulnerabilities that made the highlight this week was CVE-2023-21674. CVE-2023-21674 is a vulnerability that affects the Microsoft Windows operating system. This vulnerability is caused by a memory corruption issue in the Windows kernel, which could allow an attacker to execute arbitrary code on a vulnerable system. This could potentially lead to a complete compromise of the affected device.
The vulnerability affects all supported versions of Windows, including Windows 10, Windows 8.1, and Windows 7. An attacker could exploit this vulnerability by crafting a malicious file or website that could trigger the memory corruption issue when opened or visited by a user.
The vulnerability has been assigned a CVSSv3 base score of 9.8, which is considered critical. It can be exploited remotely and does not require any user interaction. It’s important to note that this vulnerability does not have any known public exploit or any indication that it has been actively exploited.
Microsoft has released updates for all affected versions of Windows and it is highly recommended that users apply these updates as soon as possible. The company has also provided a mitigation for the vulnerability that can be applied to affected systems that are unable to install the update.
In addition to Microsoft’s January 2023 Patch Tuesday updates, several other major tech companies have also released updates to address vulnerabilities in their products.
As always, it is important to keep your software up to date to ensure that you are protected against the latest vulnerabilities. Microsoft has released updates for all affected products, and it is highly recommended that users apply these updates as soon as possible.
In addition to applying these updates, it is also important to practice good cybersecurity hygiene to help protect yourself against potential threats. This includes using strong, unique passwords for all of your accounts, avoiding clicking on links or opening attachments in suspicious emails, and keeping your anti-virus software up to date.
By staying vigilant and keeping your software up to date, you can help protect yourself and your organization against the latest cybersecurity threats. Happy patching!
January 2023 Security Updates:
Description | |||||||
CVE | Disclosed | Exploited | Exploitability (old versions) | current version | Severity | CVSS Base (AVG) | CVSS Temporal (AVG) |
.NET Denial of Service Vulnerability | |||||||
CVE-2023-21538 | No | No | – | – | Important | 7.5 | 6.5 |
3D Builder Remote Code Execution Vulnerability | |||||||
CVE-2023-21780 | No | No | – | – | Important | 7.8 | 6.8 |
CVE-2023-21781 | No | No | – | – | Important | 7.8 | 6.8 |
CVE-2023-21782 | No | No | – | – | Important | 7.8 | 6.8 |
CVE-2023-21784 | No | No | – | – | Important | 7.8 | 6.8 |
CVE-2023-21786 | No | No | – | – | Important | 7.8 | 6.8 |
CVE-2023-21791 | No | No | – | – | Important | 7.8 | 6.8 |
CVE-2023-21793 | No | No | – | – | Important | 7.8 | 6.8 |
CVE-2023-21783 | No | No | – | – | Important | 7.8 | 6.8 |
CVE-2023-21785 | No | No | – | – | Important | 7.8 | 6.8 |
CVE-2023-21787 | No | No | – | – | Important | 7.8 | 6.8 |
CVE-2023-21788 | No | No | – | – | Important | 7.8 | 6.8 |
CVE-2023-21789 | No | No | – | – | Important | 7.8 | 6.8 |
CVE-2023-21790 | No | No | – | – | Important | 7.8 | 6.8 |
CVE-2023-21792 | No | No | – | – | Important | 7.8 | 6.8 |
Azure Service Fabric Container Elevation of Privilege Vulnerability | |||||||
CVE-2023-21531 | No | No | – | – | Important | 7.0 | 6.1 |
BitLocker Security Feature Bypass Vulnerability | |||||||
CVE-2023-21563 | No | No | Less Likely | Less Likely | Important | 6.8 | 5.9 |
Event Tracing for Windows Information Disclosure Vulnerability | |||||||
CVE-2023-21753 | No | No | – | – | Important | 5.5 | 4.8 |
CVE-2023-21536 | No | No | Less Likely | Less Likely | Important | 4.7 | 4.1 |
Internet Key Exchange (IKE) Protocol Denial of Service Vulnerability | |||||||
CVE-2023-21547 | No | No | – | – | Important | 7.5 | 6.5 |
Microsoft Cryptographic Services Elevation of Privilege Vulnerability | |||||||
CVE-2023-21551 | No | No | – | – | Critical | 7.8 | 6.8 |
CVE-2023-21561 | No | No | Unlikely | Less Likely | Critical | 8.8 | 7.7 |
CVE-2023-21730 | No | No | Less Likely | Less Likely | Critical | 7.8 | 6.8 |
Microsoft DWM Core Library Elevation of Privilege Vulnerability | |||||||
CVE-2023-21724 | No | No | – | – | Important | 7.8 | 6.8 |
Microsoft Exchange Server Elevation of Privilege Vulnerability | |||||||
CVE-2023-21763 | No | No | – | – | Important | 7.8 | 6.8 |
CVE-2023-21764 | No | No | – | – | Important | 7.8 | 6.8 |
Microsoft Exchange Server Information Disclosure Vulnerability | |||||||
CVE-2023-21761 | No | No | – | – | Important | 7.5 | 6.5 |
Microsoft Exchange Server Spoofing Vulnerability | |||||||
CVE-2023-21762 | No | No | – | – | Important | 8.0 | 7.0 |
CVE-2023-21745 | No | No | – | – | Important | 8.0 | 7.0 |
Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability | |||||||
CVE-2023-21537 | No | No | – | – | Important | 7.8 | 6.8 |
Microsoft ODBC Driver Remote Code Execution Vulnerability | |||||||
CVE-2023-21732 | No | No | – | – | Important | 8.8 | 7.7 |
Microsoft Office Remote Code Execution Vulnerability | |||||||
CVE-2023-21734 | No | No | – | – | Important | 7.8 | 6.8 |
CVE-2023-21735 | No | No | – | – | Important | 7.8 | 6.8 |
Microsoft Office Visio Information Disclosure Vulnerability | |||||||
CVE-2023-21741 | No | No | – | – | Important | 7.1 | 6.2 |
Microsoft Office Visio Remote Code Execution Vulnerability | |||||||
CVE-2023-21736 | No | No | – | – | Important | 7.8 | 6.8 |
CVE-2023-21737 | No | No | – | – | Important | 7.8 | 6.8 |
CVE-2023-21738 | No | No | – | – | Important | 7.1 | 6.2 |
Microsoft SharePoint Server Remote Code Execution Vulnerability | |||||||
CVE-2023-21742 | No | No | – | – | Important | 8.8 | 7.7 |
CVE-2023-21744 | No | No | – | – | Important | 8.8 | 7.7 |
Microsoft SharePoint Server Security Feature Bypass Vulnerability | |||||||
CVE-2023-21743 | No | No | – | – | Critical | 5.3 | 4.6 |
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | |||||||
CVE-2023-21681 | No | No | – | – | Important | 8.8 | 7.7 |
Remote Procedure Call Runtime Denial of Service Vulnerability | |||||||
CVE-2023-21525 | No | No | Less Likely | Less Likely | Important | 5.3 | 4.6 |
Visual Studio Code Remote Code Execution | |||||||
CVE-2023-21779 | No | No | – | – | Important | 7.3 | 6.4 |
Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability | |||||||
CVE-2023-21674 | No | Yes | – | – | Important | 8.8 | 8.2 |
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | |||||||
CVE-2023-21768 | No | No | – | – | Important | 7.8 | 6.8 |
Windows Authentication Remote Code Execution Vulnerability | |||||||
CVE-2023-21539 | No | No | Less Likely | Less Likely | Important | 7.5 | 6.5 |
Windows Backup Service Elevation of Privilege Vulnerability | |||||||
CVE-2023-21752 | No | No | More Likely | Less Likely | Important | 7.1 | 6.2 |
Windows Bind Filter Driver Elevation of Privilege Vulnerability | |||||||
CVE-2023-21733 | No | No | Less Likely | Less Likely | Important | 7.0 | 6.1 |
Windows Bluetooth Driver Elevation of Privilege Vulnerability | |||||||
CVE-2023-21739 | No | No | – | – | Important | 7.0 | 6.1 |
Windows Boot Manager Security Feature Bypass Vulnerability | |||||||
CVE-2023-21560 | No | No | More Likely | Less Likely | Important | 6.6 | 5.8 |
Windows Credential Manager User Interface Elevation of Privilege Vulnerability | |||||||
CVE-2023-21726 | No | No | More Likely | More Likely | Important | 7.8 | 6.8 |
Windows Cryptographic Information Disclosure Vulnerability | |||||||
CVE-2023-21540 | No | No | Unlikely | Less Likely | Important | 5.5 | 4.8 |
CVE-2023-21550 | No | No | – | – | Important | 5.5 | 4.8 |
CVE-2023-21559 | No | No | More Likely | Less Likely | Important | 5.5 | 4.8 |
Windows Error Reporting Service Elevation of Privilege Vulnerability | |||||||
CVE-2023-21558 | No | No | Less Likely | Less Likely | Important | 7.8 | 6.8 |
Windows GDI Elevation of Privilege Vulnerability | |||||||
CVE-2023-21532 | No | No | – | – | Important | 7.0 | 6.1 |
CVE-2023-21552 | No | No | – | – | Important | 7.8 | 7.0 |
Windows Installer Elevation of Privilege Vulnerability | |||||||
CVE-2023-21542 | No | No | – | – | Important | 7.0 | 6.1 |
Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability | |||||||
CVE-2023-21677 | No | No | – | – | Important | 7.5 | 6.5 |
CVE-2023-21683 | No | No | – | – | Important | 7.5 | 6.5 |
CVE-2023-21758 | No | No | Less Likely | Less Likely | Important | 7.5 | 6.5 |
Windows Kernel Elevation of Privilege Vulnerability | |||||||
CVE-2023-21747 | No | No | – | – | Important | 7.8 | 6.8 |
CVE-2023-21748 | No | No | – | – | Important | 7.8 | 6.8 |
CVE-2023-21749 | No | No | – | – | Important | 7.8 | 6.8 |
CVE-2023-21750 | No | No | – | – | Important | 7.1 | 6.2 |
CVE-2023-21754 | No | No | Less Likely | Less Likely | Important | 7.8 | 6.8 |
CVE-2023-21755 | No | No | Less Likely | Less Likely | Important | 7.8 | 6.8 |
CVE-2023-21772 | No | No | – | – | Important | 7.8 | 6.8 |
CVE-2023-21773 | No | No | – | – | Important | 7.8 | 6.8 |
CVE-2023-21774 | No | No | – | – | Important | 7.8 | 6.8 |
CVE-2023-21675 | No | No | – | – | Important | 7.8 | 6.8 |
Windows Kernel Information Disclosure Vulnerability | |||||||
CVE-2023-21776 | No | No | – | – | Important | 5.5 | 4.8 |
Windows Layer 2 Tunneling Protocol (L2TP) Denial of Service Vulnerability | |||||||
CVE-2023-21757 | No | No | Less Likely | Less Likely | Important | 7.5 | 6.5 |
Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability | |||||||
CVE-2023-21546 | No | No | Unlikely | Less Likely | Critical | 8.1 | 7.1 |
CVE-2023-21543 | No | No | – | – | Critical | 8.1 | 7.1 |
CVE-2023-21555 | No | No | Less Likely | Less Likely | Critical | 8.1 | 7.1 |
CVE-2023-21556 | No | No | Less Likely | Less Likely | Critical | 8.1 | 7.1 |
CVE-2023-21679 | No | No | – | – | Critical | 8.1 | 7.1 |
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability | |||||||
CVE-2023-21557 | No | No | Less Likely | Less Likely | Important | 7.5 | 6.5 |
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability | |||||||
CVE-2023-21676 | No | No | Less Likely | Less Likely | Important | 8.8 | 7.7 |
Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability | |||||||
CVE-2023-21524 | No | No | Less Likely | Less Likely | Important | 7.8 | 6.8 |
Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability | |||||||
CVE-2023-21771 | No | No | – | – | Important | 7.0 | 6.1 |
Windows Malicious Software Removal Tool Elevation of Privilege Vulnerability | |||||||
CVE-2023-21725 | No | No | – | – | Important | 6.3 | 5.5 |
Windows NTLM Elevation of Privilege Vulnerability | |||||||
CVE-2023-21746 | No | No | Less Likely | Less Likely | Important | 7.8 | 6.8 |
Windows Netlogon Denial of Service Vulnerability | |||||||
CVE-2023-21728 | No | No | Less Likely | Less Likely | Important | 7.5 | 6.5 |
Windows Overlay Filter Elevation of Privilege Vulnerability | |||||||
CVE-2023-21767 | No | No | – | – | Important | 7.8 | 6.8 |
Windows Overlay Filter Information Disclosure Vulnerability | |||||||
CVE-2023-21766 | No | No | – | – | Important | 4.7 | 4.1 |
Windows Point-to-Point Protocol (PPP) Information Disclosure Vulnerability | |||||||
CVE-2023-21682 | No | No | – | – | Important | 5.3 | 4.6 |
Windows Print Spooler Elevation of Privilege Vulnerability | |||||||
CVE-2023-21678 | No | No | Less Likely | Less Likely | Important | 7.8 | 6.8 |
CVE-2023-21760 | No | No | – | – | Important | 7.1 | 6.2 |
CVE-2023-21765 | No | No | – | – | Important | 7.8 | 6.8 |
Windows SMB Witness Service Elevation of Privilege Vulnerability | |||||||
CVE-2023-21549 | Yes | No | – | – | Important | 8.8 | 7.7 |
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability | |||||||
CVE-2023-21535 | No | No | Less Likely | Less Likely | Critical | 8.1 | 7.1 |
CVE-2023-21548 | No | No | – | – | Critical | 8.1 | 7.1 |
Windows Smart Card Resource Management Server Security Feature Bypass Vulnerability | |||||||
CVE-2023-21759 | No | No | – | – | Important | 3.3 | 2.9 |
Windows Task Scheduler Elevation of Privilege Vulnerability | |||||||
CVE-2023-21541 | No | No | Less Likely | More Likely | Important | 7.8 | 6.8 |
Windows Win32k Elevation of Privilege Vulnerability | |||||||
CVE-2023-21680 | No | No | – | – | Important | 7.8 | 6.8 |
Windows iSCSI Service Denial of Service Vulnerability | |||||||
CVE-2023-21527 | No | No | Less Likely | Less Likely | Important | 7.5 | 6.5 |
Sources:
https://isc.sans.edu/diary/Microsoft+January+2023+Patch+Tuesday/29420/?is=241c03a8cd019517889491c3d0e48cf26621d141f1b9f6561b554cf774f8a743