The August 2023 Patch Tuesday report has been released, providing critical information for organizations and individuals to address security vulnerabilities and software updates. This monthly event plays a crucial role in maintaining the security and stability of the Windows operating system and various other software products people rely on. In this article, we’ll break down the key highlights of the August 2023 Patch Tuesday report, focusing on the most pressing concerns for users and administrators.
Notably, Microsoft has released fixes for 88 vulnerabilities in August 2023 Patch Tuesday report, out of which 6 were rated Critical. Microsoft also warned about the active exploitation of 1 vulnerability. Again, as with other Patch Tuesday reports, Remote Code Execution (RCE) vulnerability has topped the list with 23 occurrences in the list of vulnerabilities. Let’s break down what is there in the report that Microsoft released on 8th August.
Two of the flaws are zero-day vulnerabilities, one of which is being actively exploited in the wild. In addition to the RCE flaws, this release covers privilege escalation bugs, information disclosure issues, spoofing weaknesses, and denial of service vulnerabilities across a wide range of Microsoft products.
Key affected products include Windows, Internet Explorer, Office, Exchange Server, SQL Server, Visual Studio, and Microsoft Dynamics. Administrators and end users are advised to apply these security updates as soon as possible to ensure systems are not vulnerable to any of the fixed flaws.
Key Highlights are:
Microsoft’s August’s 2023 Patch Tuesday included updates for 88 security flaws, including two Security Advisories and 12 browser vulnerabilities.
2 of them are Zero-Days, with one publicly disclosed.
The patch covered 23 Remote Code Execution (RCE) vulnerabilities, 6 of which were rated as ‘Critical.’The 2 zero-day vulnerabilities patched are:
CVE-2023-38180 – Actively exploited ASP.NET zero-day denial of service vulnerability
CVE-2023-36884 – Previously disclosed Windows zero-day vulnerability
The complete list of 88 vulnerabilities is classified into six categories. Remote Code Execution Vulnerability has been identified as the most common vulnerability, occurring 23 times, while Security Feature Bypass is the least frequent vulnerability, occurring only 3 times. Please refer to the below chart for complete details on all categories of vulnerabilities:
Elevation of Privilege vulnerabilities | CVE-2023-38176 CVE-2023-35359 CVE-2023-36876 CVE-2023-38167 CVE-2023-36869 CVE-2023-35390 CVE-2023-36899 CVE-2023-36873 CVE-2023-36904 CVE-2023-36900 CVE-2023-38175 CVE-2023-38186 CVE-2023-35378 CVE-2023-38154 CVE-2023-35382 CVE-2023-35386 CVE-2023-35380 |
Security Feature Bypass vulnerabilities | CVE-2023-38157 CVE-2023-35384 |
Remote Code Execution vulnerabilities | CVE-2023-38185 CVE-2023-35388 CVE-2023-35368 CVE-2023-29328 CVE-2023-29330 CVE-2023-36895 CVE-2023-36896 CVE-2023-35371 CVE-2023-38169 CVE-2023-36898 CVE-2023-38170 CVE-2023-32051 CVE-2023-35303 CVE-2023-38184 CVE-2023-35315 CVE-2023-35297 CVE-2023-300 CVE-2023-36910 CVE-2023-36911 CVE-2023-35385 |
Information Disclosure vulnerabilities | CVE-2023-35391 CVE-2023-36890 CVE-2023-36894 CVE-2023-36905 CVE-2023-36907 CVE-2023-36906 CVE-2023-35383 CVE-2023-36913 |
Denial of Service vulnerabilities | CVE-2023-38180 CVE-2023-38178 CVE-2023-36909 CVE-2023-35376 CVE-2023-38172 CVE-2023-38254 CVE-2023-35377 |
Spoofing vulnerabilities | CVE-2023-38181 CVE-2023-36893 CVE-2023-36891 CVE-2023-36892 CVE-2023-35394 CVE-2023-35393 CVE-2023-36881 CVE-2023-36877 CVE-2023-38188 |
Microsoft’s August 2023 Patch Tuesday includes updates for a broad range of its products, applications, and services. Here are the applications and product components that have received patches:
NET Core
.NET Framework
ASP.NET
ASP.NET and Visual Studio
Azure Arc
Azure DevOps
Azure HDInsights
Dynamics Business Central Control
Memory Integrity System Readiness Scan Tool
Microsoft Dynamics
Microsoft Exchange Server
Microsoft Office
Microsoft Office Excel
Microsoft Office Outlook
Microsoft Office SharePoint
Microsoft Office Visio
Microsoft Teams
Microsoft WDAC OLE DB provider for SQL
Microsoft Windows Codecs Library
Reliability Analysis Metrics Calculation Engine
Role: Windows Hyper-V
SQL Server
Tablet Windows User Interface
Windows Bluetooth A2DP driver
Windows Cloud Files Mini Filter Driver
Windows Common Log File System Driver
Windows Cryptographic Services
Windows Defender
Windows Fax and Scan Service
Windows Group Policy
Windows HTML Platform
Windows Kernel
Windows LDAP – Lightweight Directory Access Protocol
Windows Message Queuing
Windows Mobile Device Management
Windows Projected File System
Windows Reliability Analysis Metrics Calculation Engine
Windows Smart Card
Windows System Assessment Tool
Windows Wireless Wide Area Network Service
Microsoft patched an actively exploited zero-day denial of service (DoS) vulnerability, CVE-2023-38180, affecting ASP.NET Core. This vulnerability can lead to denial of service in Kestrel web server if exploited. Microsoft notes that reverse proxies and web application firewalls can help mitigate such attacks.
Here is a list of the actively exploited vulnerabilities patched in the August 2023 Patch Tuesday:
ADV230003 – Microsoft Office Defense in Depth Update
CVE-2023-38180 – .NET and Visual Studio Denial of Service Vulnerability
The August Patch Tuesday addressed 6 critical-rated vulnerabilities that deserve close attention:
Sl. No | CVE ID | Severity | CVSS | Description | Actively Exploited | Patch status |
1 | CVE-2023-29328 | Important | 8.8 | Remote Code Execution Vulnerability in Microsoft Teams | No | Available |
2 | CVE-2023-29330 | Important | 8.8 | Remote Code Execution Vulnerability in Microsoft Teams | No | Available |
3 | CVE-2023-36895 | Important | 7.8 | Remote Code Execution Vulnerability in Microsoft Outlook | No | Available |
4 | CVE-2023-36910 | Critical | 9.8 | Remote Code Execution Vulnerability in Microsoft Message Queuing | No | Available |
5 | CVE-2023-36911 | Critical | 9.8 | Remote Code Execution Vulnerability in Microsoft Message Queuing | No | Available |
6 | CVE-2023-35385 | Critical | 9.8 | Remote Code Execution Vulnerability in Microsoft Message Queuing | No | Available |
CVE-2023-29328 and CVE-2023-29330 – Microsoft Teams Remote Code Execution Vulnerability
These two critical RCE flaws in Microsoft Teams allow an attacker to execute arbitrary code through specially crafted Teams meeting invites. The vulnerabilities are exploitable, with no user interaction required beyond joining the malicious meeting. Microsoft has rated them as “exploitation less likely” due to the difficulty in exploiting them.
CVE-2023-36895 – Microsoft Outlook Remote Code Execution Vulnerability
This critical vulnerability in Microsoft Outlook can let a remote attacker execute arbitrary code on the target system by convincing the user to open a specially crafted file. Microsoft rates the exploitability as low.
CVE-2023-36910, CVE-2023-36911, CVE-2023-35385 – Windows Message Queuing Service Remote Code Execution
These three critical vulnerabilities in the Windows Message Queuing Service, if successfully exploited, can enable remote code execution on vulnerable systems. While concerning, the service needs to be explicitly enabled and accessible through TCP port 1801 for exploitation.
If you wish to download the complete list of vulnerabilities patched in August 2023 Patch Tuesday, you can do it from here.
CVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score |
---|---|---|---|---|
CVE-2023-38176 | Azure Arc-Enabled Servers Elevation of Privilege Vulnerability | No | No | 7 |
CVE-2023-35394 | Azure HDInsight Jupyter Notebook Spoofing Vulnerability | No | No | 4.6 |
CVE-2023-36877 | Azure Apache Oozie Spoofing Vulnerability | No | No | 4.5 |
CVE-2023-35393 | Azure Apache Hive Spoofing Vulnerability | No | No | 4.5 |
CVE-2023-38188 | Azure Apache Hadoop Spoofing Vulnerability | No | No | 4.5 |
CVE-2023-36881 | Azure Apache Ambari Spoofing Vulnerability | No | No | 4.5 |
CVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score |
---|---|---|---|---|
CVE-2023-36869 | Azure DevOps Server Spoofing Vulnerability | No | No | 6.3 |
CVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score |
---|---|---|---|---|
CVE-2023-38157 | Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | No | No | 6.5 |
CVE-2023-4078 | Chromium: CVE-2023-4078 Inappropriate implementation in Extensions | No | No | N/A |
CVE-2023-4077 | Chromium: CVE-2023-4077 Insufficient data validation in Extensions | No | No | N/A |
CVE-2023-4076 | Chromium: CVE-2023-4076 Use after free in WebRTC | No | No | N/A |
CVE-2023-4075 | Chromium: CVE-2023-4075 Use after free in Cast | No | No | N/A |
CVE-2023-4074 | Chromium: CVE-2023-4074 Use after free in Blink Task Scheduling | No | No | N/A |
CVE-2023-4073 | Chromium: CVE-2023-4073 Out of bounds memory access in ANGLE | No | No | N/A |
CVE-2023-4072 | Chromium: CVE-2023-4072 Out of bounds read and write in WebGL | No | No | N/A |
CVE-2023-4071 | Chromium: CVE-2023-4071 Heap buffer overflow in Visuals | No | No | N/A |
CVE-2023-4070 | Chromium: CVE-2023-4070 Type Confusion in V8 | No | No | N/A |
CVE-2023-4069 | Chromium: CVE-2023-4069 Type Confusion in V8 | No | No | N/A |
CVE-2023-4068 | Chromium: CVE-2023-4068 Type Confusion in V8 | No | No | N/A |
CVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score |
---|---|---|---|---|
CVE-2023-35390 | .NET and Visual Studio Remote Code Execution Vulnerability | No | No | 7.8 |
CVE-2023-36899 | ASP.NET Elevation of Privilege Vulnerability | No | No | 7.5 |
CVE-2023-38180 | .NET and Visual Studio Denial of Service Vulnerability | Yes | No | 7.5 |
CVE-2023-38178 | .NET Core and Visual Studio Denial of Service Vulnerability | No | No | 7.5 |
CVE-2023-36873 | .NET Framework Spoofing Vulnerability | No | No | 7.4 |
CVE-2023-35391 | ASP.NET Core SignalR and Visual Studio Information Disclosure Vulnerability | No | No | 7.1 |
CVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score |
---|---|---|---|---|
CVE-2023-36897 | Visual Studio Tools for Office Runtime Spoofing Vulnerability | No | No | 8.1 |
CVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score |
---|---|---|---|---|
CVE-2023-35379 | Reliability Analysis Metrics Calculation Engine (RACEng) Elevation of Privilege Vulnerability | No | No | 7.8 |
CVE-2023-36876 | Reliability Analysis Metrics Calculation (RacTask) Elevation of Privilege Vulnerability | No | No | 7.1 |
CVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score |
---|---|---|---|---|
CVE-2023-21709 | Microsoft Exchange Server Elevation of Privilege Vulnerability | No | No | 9.8 |
CVE-2023-38181 | Microsoft Exchange Server Spoofing Vulnerability | No | No | 8.8 |
CVE-2023-38185 | Microsoft Exchange Server Remote Code Execution Vulnerability | No | No | 8.8 |
CVE-2023-35368 | Microsoft Exchange Remote Code Execution Vulnerability | No | No | 8.8 |
CVE-2023-35388 | Microsoft Exchange Server Remote Code Execution Vulnerability | No | No | 8 |
CVE-2023-38182 | Microsoft Exchange Server Remote Code Execution Vulnerability | No | No | 8 |
CVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score |
---|---|---|---|---|
CVE-2023-38167 | Microsoft Dynamics Business Central Elevation Of Privilege Vulnerability | No | No | 7.2 |
CVE-2023-35389 | Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability | No | No | 6.5 |
CVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score |
---|---|---|---|---|
CVE-2023-29328 | Microsoft Teams Remote Code Execution Vulnerability | No | No | 8.8 |
CVE-2023-29330 | Microsoft Teams Remote Code Execution Vulnerability | No | No | 8.8 |
CVE-2023-36891 | Microsoft SharePoint Server Spoofing Vulnerability | No | No | 8 |
CVE-2023-36892 | Microsoft SharePoint Server Spoofing Vulnerability | No | No | 8 |
CVE-2023-36895 | Microsoft Outlook Remote Code Execution Vulnerability | No | No | 7.8 |
CVE-2023-36865 | Microsoft Office Visio Remote Code Execution Vulnerability | No | No | 7.8 |
CVE-2023-36866 | Microsoft Office Visio Remote Code Execution Vulnerability | No | No | 7.8 |
CVE-2023-35372 | Microsoft Office Visio Remote Code Execution Vulnerability | No | No | 7.8 |
CVE-2023-35371 | Microsoft Office Remote Code Execution Vulnerability | No | No | 7.8 |
CVE-2023-36896 | Microsoft Excel Remote Code Execution Vulnerability | No | No | 7.8 |
CVE-2023-36890 | Microsoft SharePoint Server Information Disclosure Vulnerability | No | No | 6.5 |
CVE-2023-36894 | Microsoft SharePoint Server Information Disclosure Vulnerability | No | No | 6.5 |
CVE-2023-36893 | Microsoft Outlook Spoofing Vulnerability | No | No | 6.5 |
CVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score |
---|---|---|---|---|
CVE-2023-38169 | Microsoft OLE DB Remote Code Execution Vulnerability | No | No | 8.8 |
CVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score |
---|---|---|---|---|
CVE-2023-38175 | Microsoft Windows Defender Elevation of Privilege Vulnerability | No | No | 7.8 |
CVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score |
---|---|---|---|---|
CVE-2023-35387 | Windows Bluetooth A2DP driver Elevation of Privilege Vulnerability | No | No | 8.8 |
CVE-2023-38186 | Windows Mobile Device Management Elevation of Privilege Vulnerability | No | No | 7.8 |
CVE-2023-35382 | Windows Kernel Elevation of Privilege Vulnerability | No | No | 7.8 |
CVE-2023-35386 | Windows Kernel Elevation of Privilege Vulnerability | No | No | 7.8 |
CVE-2023-38154 | Windows Kernel Elevation of Privilege Vulnerability | No | No | 7.8 |
CVE-2023-36904 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | No | No | 7.8 |
CVE-2023-36898 | Tablet Windows User Interface Application Core Remote Code Execution Vulnerability | No | No | 7.8 |
CVE-2023-38170 | HEVC Video Extensions Remote Code Execution Vulnerability | No | No | 7.8 |
CVE-2023-35378 | Windows Projected File System Elevation of Privilege Vulnerability | No | No | 7 |
CVE-2023-36905 | Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability | No | No | 5.5 |
CVE-2023-36914 | Windows Smart Card Resource Management Server Security Feature Bypass Vulnerability | No | No | 5.5 |
CVE-2023-35384 | Windows HTML Platforms Security Feature Bypass Vulnerability | No | No | 5.4 |
CVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score |
---|---|---|---|---|
CVE-2023-36910 | Microsoft Message Queuing Remote Code Execution Vulnerability | No | No | 9.8 |
CVE-2023-36911 | Microsoft Message Queuing Remote Code Execution Vulnerability | No | No | 9.8 |
CVE-2023-35385 | Microsoft Message Queuing Remote Code Execution Vulnerability | No | No | 9.8 |
CVE-2023-35381 | Windows Fax Service Remote Code Execution Vulnerability | No | No | 8.8 |
CVE-2023-36882 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | No | No | 8.8 |
CVE-2023-36903 | Windows System Assessment Tool Elevation of Privilege Vulnerability | No | No | 7.8 |
CVE-2023-35359 | Windows Kernel Elevation of Privilege Vulnerability | No | No | 7.8 |
CVE-2023-35380 | Windows Kernel Elevation of Privilege Vulnerability | No | No | 7.8 |
CVE-2023-36900 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | No | No | 7.8 |
CVE-2023-38184 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability | No | No | 7.5 |
CVE-2023-35383 | Microsoft Message Queuing Information Disclosure Vulnerability | No | No | 7.5 |
CVE-2023-36912 | Microsoft Message Queuing Denial of Service Vulnerability | No | No | 7.5 |
CVE-2023-38172 | Microsoft Message Queuing Denial of Service Vulnerability | No | No | 7.5 |
CVE-2023-36913 | Microsoft Message Queuing Information Disclosure Vulnerability | No | No | 6.5 |
CVE-2023-36909 | Microsoft Message Queuing Denial of Service Vulnerability | No | No | 6.5 |
CVE-2023-35376 | Microsoft Message Queuing Denial of Service Vulnerability | No | No | 6.5 |
CVE-2023-38254 | Microsoft Message Queuing Denial of Service Vulnerability | No | No | 6.5 |
CVE-2023-35377 | Microsoft Message Queuing Denial of Service Vulnerability | No | No | 6.5 |
CVE-2023-36908 | Windows Hyper-V Information Disclosure Vulnerability | No | No | 5.7 |
CVE-2023-36889 | Windows Group Policy Security Feature Bypass Vulnerability | No | No | 5.5 |
CVE-2023-36906 | Windows Cryptographic Services Information Disclosure Vulnerability | No | No | 5.5 |
CVE-2023-36907 | Windows Cryptographic Services Information Disclosure Vulnerability | No | No | 5.5 |
CVE-2023-20569 | AMD: CVE-2023-20569 Return Address Predictor | No | No | N/A |
Ref: https://www.rapid7.com/blog/post/2023/08/08/patch-tuesday-august-2023/
The August 2023 Patch Tuesday release contains important security updates for a wide range of Microsoft products. With 88 vulnerabilities addressed, including 23 critical remote code executions, system administrators should prioritize testing and deployment of these fixes.
The 6 critical-rated vulnerabilities, covering Outlook, Teams, and the Windows Message Queuing Service, deserve immediate attention given their potential impact. The actively exploited ASP.NET zero-day vulnerability also needs urgent patching.
Overall, this Patch Tuesday continues the trend of large, complex updates that must be carefully reviewed and applied to avoid security risks. Ongoing diligence with patch management remains crucial, as Microsoft delivers fixes for critical flaws each month.
By applying these updates promptly and monitoring for any potential impacts, organizations can enhance their security posture against evolving threats. We aim to keep readers informed through monthly Patch Tuesday reports. Please share this post and follow our website thesecmaster.com or subscribe to our social media pages on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium & Instagram to receive similar updates.
You may also like these articles:
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.