www.isgtech.com
Open in
urlscan Pro
151.101.194.159
Public Scan
URL:
https://www.isgtech.com/microsoft-critical-actively-exploited-vulnerabilities-july-2023/
Submission: On March 05 via api from IL — Scanned from IL
Submission: On March 05 via api from IL — Scanned from IL
Form analysis
0 forms found in the DOMText Content
Skip to content * Services How We Help Leveling Up IT Operations LaunchPoint Assessment Managed Services Professional Services Infrastructure Network Management Server and Storage Management Firewall / Perimeter Workforce Productivity Managed Microsoft 365 Hosted Voice VoIP Data Protection Backup & Disaster Recovery Microsoft 365 Backup Cybersecurity Managed Security Prevention Security Endpoint Protection Threat Detection READY TO LEVEL UP YOUR IT OPERATIONS? Get Started * Industries * Healthcare * Finance * Government * Education * About * About * People * Process * Careers * Client Spotlight * News & Insights * Contact * BLOG MICROSOFT CRITICAL & ACTIVELY EXPLOITED VULNERABILITIES – JULY 2023 On July 11, 2023, Microsoft published their July 2023 Security Update with patches for 130 vulnerabilities and 2 advisories, with 6 of these being actively exploited in the wild. This article provides mitigation guidance regarding multiple critical vulnerabilities. If you are an ISG customer that utilizes our endpoint and/or server management services, we are and will be addressing these vulnerabilities as patches become available. SUMMARY WindowsImpacted ProductsWindows Server 2012 R2, Windows Server 2012, Windows Server 2008 R2 Service Pack 1, Windows Server 2008 Service Pack 2, Windows Server 2016, Windows Server 2019, Windows Server 2022Windows 10, Windows 10 Version 22H2, Windows 11 Version 22H2, Windows 10 Version 21H2, Windows 11 Version 21H2, Windows 10 Version 1809 CVE-2023-32057 (CVSS 9.8 – Critical): Microsoft Message Queuing Remote Code Execution Vulnerability – A threat actor could successfully exploit this vulnerability and achieve remote code execution on the server side by sending a specially crafted malicious Message Queuing Service (MSMQ) packet to a MSMQ server. CVE-2023-35365, CVE-2023-35366, CVE-2023-35367 (CVSS 9.8 – Critical): Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability – A threat actor could successfully exploit these vulnerabilities and achieve remote code execution by sending specially crafted packets to a server configured with the Routing and Remote Access Service running. CVE-2023-32046 (CVSS 7.8 – High): Windows MSHTML Platform Elevation of Privilege Vulnerability – To exploit this vulnerability, a threat actor needs the user to open a malicious file that has been delivered to them via email or a compromised website. Successful execution of this vulnerability results in the threat actor gaining the privileges of the user who opened the malicious file. * Note: This vulnerability is being actively exploited. CVE-2023-32049 (CVSS 8.8 – High): Windows SmartScreen Security Feature Bypass Vulnerability – Exploitation requires the user to click on a specially crafted URL and results in the threat actor being able to bypass the Open File – Security Warning prompt. * Note: This vulnerability is being actively exploited. CVE-2023-36874 (CVSS 7.8 – High): Windows Error Reporting Service Elevation of Privilege Vulnerability – A threat actor with local access to the target machine with restricted, normal user privileges can exploit this vulnerability to gain administrator privileges on the machine. * Note: This vulnerability is being actively exploited. CVE-2023-36884 (CVSS 8.3 – High): Office and Windows HTML Remote Code Execution Vulnerability – A publicly disclosed and unpatched vulnerability involves threat actors convincing a user to open a malicious Microsoft Office document to enable remote code execution. * Note: This vulnerability is being actively exploited. Microsoft has observed the threat actor tracked as Storm-0978 exploiting this vulnerability in a phishing campaign targeting defense and government entities in Europe and North America. ADV230001: Guidance on Microsoft Signed Drivers Being Used Maliciously – Threat actors who had already gained administrator privileges on compromised systems were using drivers certified with Microsoft’s Windows Hardware Developer Program (MWHDP) in post exploitation activity. Microsoft has revoked the code-signing certificates and developer accounts associated with this activity. * Note: This flaw is being actively exploited. Microsoft OfficeImpacted ProductsMicrosoft Word 2013 RT Service Pack 1, Microsoft Word 2016 , Microsoft Office LTSC 2021, Microsoft 365 Apps for Enterprise, Microsoft Office 2019 CVE-2023-33150 (CVSS 9.6 – Critical): Microsoft Outlook Security Feature Bypass Vulnerability – To exploit this vulnerability, a threat actor would require a user to open a malicious file that has been delivered to them via email or a malicious or compromised website and click through Office Security Prompt(s). As a result the threat actor can escape the Office Protected View. CVE-2023-35311 (CVSS 8.8 – High): Microsoft Outlook Security Feature Bypass Vulnerability – Exploitation requires the user to click on a specially crafted URL and results in the threat actor being able to bypass the Microsoft Outlook Security Notice prompt. * Note: This vulnerability is being actively exploited. CVE-2023-36884 (CVSS 8.3 – High): Office and Windows HTML Remote Code Execution Vulnerability – A publicly disclosed and unpatched vulnerability involves threat actors convincing a user to open a malicious Microsoft Office document to enable remote code execution. * Note: This vulnerability also impacts Microsoft Windows products. RECOMMENDATIONS RECOMMENDATION #1: APPLY SECURITY UPDATES TO IMPACTED PRODUCTS ISG Technology and our security partners strongly recommend applying the available security updates to all impacted products to prevent potential exploitation. For those vulnerable to CVE-2023-32046, Microsoft recommends customers who install Security Only updates install the IE Cumulative updates for this vulnerability. Note: As always, we recommend following change management best practices for deploying security patches, including testing changes in a dev environment before deploying to production to avoid operational impact. Windows 10 Version 1607 CVE-2023-24897, CVE-2023-32015, CVE-2023-32014, CVE-2023-29363 Security Update: 5027123, 5027219 Windows 10 Version 1809 CVE-2023-24897, CVE-2023-32013, CVE-2023-32015, CVE-2023-32014, CVE-2023-29363 Security Update: 5027536, 5027222 Windows 10 Version 21H2 CVE-2023-24897, CVE-2023-32013, CVE-2023-32015, CVE-2023-32014, CVE-2023-29363 Security Update: 5027537, 5027215 Windows 10 Version 22H2 CVE-2023-24897, CVE-2023-32013, CVE-2023-32015, CVE-2023-32014, CVE-2023-29363 Security Update: 5027538, 5027215 Windows 10 CVE-2023-24897, CVE-2023-32015, CVE-2023-32014, CVE-2023-29363 Security Update: 5027230 Windows 11 Version 22H2 CVE-2023-24897, CVE-2023-32013, CVE-2023-32015, CVE-2023-32014, CVE-2023-29363 Security Update: 5027119, 5027231 Windows 11 Version 21H2 CVE-2023-24897, CVE-2023-32013, CVE-2023-32015, CVE-2023-32014, CVE-2023-29363 Security Update: 5027539, 5027223 Windows Server 2008 R2 CVE-2023-24897, CVE-2023-32015, CVE-2023-32014, CVE-2023-29363 Monthly Rollup: 5027540, 5027275 Security Update: 5027531, 5027256 Windows Server 2008 CVE-2023-24897, CVE-2023-32015, CVE-2023-32014, CVE-2023-29363 Monthly Rollup: 5027543, 5027279 Security Update: 5027534, 5027277 Windows Server 2012 CVE-2023-24897, CVE-2023-32015, CVE-2023-32014, CVE-2023-29363 Monthly Rollup: 5027541, 5027283 Security Update: 5027532, 5027281 Windows Server 2012 R2 CVE-2023-24897, CVE-2023-32015, CVE-2023-32014, CVE-2023-29363 Monthly Rollup: 5027542, 5027271 Security Update: 5027533, 5027282 Windows Server 2016 CVE-2023-24897, CVE-2023-32015, CVE-2023-32014, CVE-2023-29363 Security Update: 5027219, 5027123 Windows Server 2019 CVE-2023-24897, CVE-2023-32013, CVE-2023-32015, CVE-2023-32014, CVE-2023-29363 Security Update: 5027536, 5027222 Windows Server 2022 CVE-2023-24897, CVE-2023-32013, CVE-2023-32015, CVE-2023-32014, CVE-2023-29363 Security Update: 5027544, 5027225 Microsoft Visual Studio 2017 Version 15.9 CVE-2023-24897 Release Notes Microsoft Visual Studio 2022 Version 17.2 CVE-2023-24897 Release Notes Microsoft Visual Studio 2019 Version 16.11 CVE-2023-24897 Release Notes Microsoft Visual Studio 2022 Version 17.0 CVE-2023-24897 Release Notes Microsoft Visual Studio 2022 Version 17.4 CVE-2023-24897 Release Notes Microsoft Visual Studio 2022 Version 17.6 CVE-2023-24897 Release Notes Microsoft Visual Studio 2013 Update 5 CVE-2023-24897 Security Update: 5026610 Microsoft Visual Studio 2015 Update 3 CVE-2023-24897 Security Update: 5025792 .NET 7.0 CVE-2023-24897 Security Update: 5027798 .NET 6.0 CVE-2023-24897 Security Update: 5027797 Microsoft SharePoint Server 2019 CVE-2023-29357 Security Update: 5002402, 5002403 RECOMMENDATION #2: DISABLE MESSAGE QUEUING SERVICE (MSMQ) IF NOT REQUIRED To be vulnerable, CVE-2023-32057 requires Message Queuing (MSMQ) service to be enabled. Consider disabling MSMQ if the service is not required in your environment to prevent exploitation. Note: You can check by looking for a service running named “Message Queuing” and for TCP port 1801 listening on the system. If disabling MSMQ is not feasible, consider blocking inbound connections to TCP port 1801 from suspicious sources. RECOMMENDATION #3: DISABLE THE ROUTING AND REMOTE ACCESS SERVICE (RRAS) ROLE IF NOT REQUIRED To be vulnerable, CVE-2023-35367 requires the Routing and Remote Access Service (RRAS) role to be enabled, which is not installed by default. Consider disabling RRAS if the service is not required in your environment to prevent exploitation. REFERENCES Microsoft Vulnerability Advisories: * CVE-2023-32057 – https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-32057 * CVE-2023-33150 – https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-33150 * CVE-2023-35365 – https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-35365 * CVE-2023-35366 – https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-35366 * CVE-2023-35367 – https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-35367 * CVE-2023-32046 – https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-32046 * CVE-2023-32049 – https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-32049 * CVE-2023-35311 – https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-35311 * CVE-2023-36874 – https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-36874 * CVE-2023-36884 – https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-36884 * ADV230001 – https://msrc.microsoft.com/update-guide/en-US/vulnerability/ADV230001 * CVE-2023-36884 Exploitation Details – https://www.microsoft.com/en-us/security/blog/2023/07/11/storm-0978-attacks-reveal-financial-and-espionage-motives/ NEED HELP? If you need help with any of these patches, please contact us or talk to your ISG Representative. ISG Technology Recognized on CRN’s 2023 Security 100 List Remote Code Execution Vulnerability Affecting FortiOS and FortiProxy (CVE-2023-33308) What We Do * Managed Services * Professional Services * Data Center Services Recent Posts * 26 Feb Strategic or Stalled? Assessing the State of Your Tech Initiatives Comments Off on Strategic or Stalled? Assessing the State of Your Tech Initiatives * 21 Feb Have You Benchmarked Your IT Maturity Level? Here’s Where to Start. Comments Off on Have You Benchmarked Your IT Maturity Level? Here’s Where to Start. * 19 Feb ISG Technology Recognized on CRN’s 2024 Security 100 List Comments Off on ISG Technology Recognized on CRN’s 2024 Security 100 List NAVIGATION Home Services Client Spotlight About People Process Careers News & Insights Contact SOLUTIONS Managed Services Professional Services Server/Storage Management INDUSTRIES Healthcare Finance Governement Education LOCATIONS Kansas City (HQ) Springfield Topeka Oklahoma City St. Louis Wichita (833) 394-6365 Powered by Lemonade Stand | Privacy Policy ISG Technology © 2024 All Rights reserved. * Services * Services * Leveling Up IT Operations * LaunchPoint Assessment * Managed Services * Professional Services * Infrastructure * Infrastructure * Network Management * Server and Storage Management * Firewall / Perimeter * Workforce Productivity * Workforce Productivity * Managed Microsoft 365 * Hosted Voice VoIP * Data Protection * Data Protection * Backup & Disaster Recovery * Microsoft 365 Backup * Cybersecurity * Cybersecurity * Managed Security * Prevention Security * Endpoint Protection * Threat Detection * Industries * Industries * Healthcare * Finance * Government * Education * About * About * About * People * Process * Careers * Client Spotlight * News & Insights * Contact * (833) 394-6365 *