The July 2023 Patch Tuesday report has been released, providing critical information for organizations and individuals to address security vulnerabilities and software updates. This monthly event plays a crucial role in maintaining the security and stability of the Windows operating system and various other software products people rely on. In this article, we’ll break down the key highlights of the July 2023 Patch Tuesday report, focusing on the most pressing concerns for users and administrators.
Notably, Microsoft has released fixes for 132 vulnerabilities in July 2023 Patch Tuesday report, out of which 9 were rated Critical. Microsoft also warned about the active exploitation of 6 vulnerabilities. Again, as with other Patch Tuesday reports, Remote Code Execution (RCE) vulnerability has topped the list with 37 occurrences in the list of vulnerabilities. Let’s break down what is there in the report that Microsoft released on 11th July.
Microsoft has released Cumulate updates with Moment 3 Features for Windows 11 along with this July 2023 Patch Tuesday update.
Microsoft’s July 2023 Patch Tuesday included updates for 132 security flaws.
Six of these flaws were actively exploited zero-day vulnerabilities.
The patch covered 37 Remote Code Execution (RCE) vulnerabilities, nine of which were rated as ‘Critical.’
One RCE vulnerability remains unpatched and is actively being exploited.
The six zero-day vulnerabilities patched are:
CVE-2023-32046: Windows MSHTML Platform Elevation of Privilege Vulnerability
CVE-2023-32049: Windows SmartScreen Security Feature Bypass Vulnerability
CVE-2023-36874: Windows Error Reporting Service Elevation of Privilege Vulnerability
CVE-2023-36884: Office and Windows HTML Remote Code Execution Vulnerability
ADV230001: Guidance on Microsoft Signed Drivers Being Used Maliciously
CVE-2023-35311: Microsoft Outlook Security Feature Bypass Vulnerability
The CVE-2023-36884 vulnerability is particularly critical as it allows remote code execution using specially crafted Microsoft Office documents.
The RomCom hacking group, associated with ransomware operations Industrial Spy and Cuba, is known to be exploiting the CVE-2023-36884 vulnerability.
Cumulative update for Windows 10 and Windows 11 with Moment 3 Features: KB5028166 for Windows 10, KB5028185 for Windows 11.
The complete list of 132 vulnerabilities is classified into seven categories. Remote Code Execution Vulnerability has been identified as the most common vulnerability, occurring 37 times, while Spoofing is the least frequent vulnerability, occurring only 7 times. Please refer to the below chart for complete details on all categories of vulnerabilities:
Microsoft’s July 2023 Patch Tuesday includes updates for a broad range of its products, applications, and services. Here are the applications and product components that have received patches:
ASP.NET and.NET
Microsoft Dynamics
Microsoft Graphics Component
Microsoft Media-Wiki Extensions
Microsoft Office
Microsoft Office Access
Microsoft Office Excel
Microsoft Office Outlook
Microsoft Office SharePoint
Microsoft Power Apps
Microsoft Printer Drivers
Microsoft Windows Codecs Library
.NET and Visual Studio
Paint 3D
Role: DNS Server
Windows Active Template Library
Windows Admin Center
Windows App Store
Windows Authentication Methods
Windows CDP User Components
Windows Cluster Server
Windows Cloud Files Mini Filter Driver
Windows Common Log File System Driver
Windows Connected User Experiences and Telemetry
Windows CryptoAPI
Windows Cryptographic Services
Windows CNG Key Isolation Service
Windows Deployment Services
Windows EFI Partition
Windows Failover Cluster
Windows Geolocation Service
Windows HTTP.sys
Windows Image Acquisition
Windows Installer
Windows Kernel
Windows Layer-2 Bridge Network Driver
Windows Layer 2 Tunneling Protocol
Windows Local Security Authority (LSA)
Windows Message Queuing
Windows MSHTML Platform
Windows Netlogon
Windows ODBC Driver
Windows OLE
Windows Online Certificate Status Protocol (OCSP) SnapIn
Windows Partition Management Driver
Windows Peer Name Resolution Protocol
Windows PGM
Windows Power Apps
Windows Print Spooler Components
Windows Printer Drivers
Windows Remote Desktop
Windows Remote Procedure Call
Windows Server Update Service
Windows SmartScreen
Windows SPNEGO Extended Negotiation
Windows Transaction Manager
Windows Update Orchestrator Service
Windows VOLSNAP.SYS
Windows Volume Shadow Copy
Windows Win32K
There are 6 actively exploited vulnerabilities in July 2023 Patch Tuesday.
Sl. No | CVE ID | Description |
1 | CVE-2023-32046 | Windows MSHTML Platform Elevation of Privilege Vulnerability |
2 | CVE-2023-32049 | Windows SmartScreen Security Feature Bypass Vulnerability |
3 | CVE-2023-36874 | Windows Error Reporting Service Elevation of Privilege Vulnerability |
4 | CVE-2023-36884 | Office and Windows HTML Remote Code Execution Vulnerability |
5 | ADV230001 | Guidance on Microsoft Signed Drivers Being Used Maliciously |
6 | CVE-2023-35311 | Microsoft Outlook Security Feature Bypass Vulnerability |
There are 9 vulnerabilities rated Critical including 6 activley exploited vulnerabilities listed in the previous section. Here you see the summary of the flaws followed by the list.
Sl. No | CVE ID | Severity | CVSS | Description | Actively Exploited | Patch status |
1 | CVE-2023-32046 | IMPORTANT | 7.8 | Windows MSHTML Platform Elevation of Privilege Vulnerability | YES | Not Available, but mitigation guidance provided. |
2 | CVE-2023-32049 | IMPORTANT | 8.8 | Windows SmartScreen Security Feature Bypass Vulnerability | YES | Available |
3 | CVE-2023-36874 | IMPORTANT | 7.8 | Windows Error Reporting Service Elevation of Privilege Vulnerability | YES | Available |
4 | CVE-2023-36884 | IMPORTANT | 8.3 | Office and Windows HTML Remote Code Execution Vulnerability | YES | Available |
5 | CVE-2023-29347 | IMPORTANT | 8.7 | Windows Admin Center Spoofing Vulnerability | NO | Available |
6 | CVE-2023-35311 | IMPORTANT | 8.8 | Microsoft Outlook Security Feature Bypass Vulnerability | YES | Available |
7 | CVE-2023-35365 | CRITICAL | 9.8 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | NO | Available |
8 | CVE-2023-35366 | CRITICAL | 9.8 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | NO | Available |
9 | CVE-2023-35367 | CRITICAL | 9.8 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | NO | Available |
10 | CVE-2023-32057 | CRITICAL | 9.8 | Microsoft Message Queuing Remote Code Execution Vulnerability | NO | Available |
#1. CVE-2023-36884 | Office and Windows HTML Remote Code Execution Vulnerability
CVE-2023-36884 is a Remote Code Execution (RCE) vulnerability affecting Microsoft Windows and Office. It has been given a CVSSv3 score of 8.3 and is actively being exploited as a zero-day vulnerability. Microsoft has yet to release patches for this vulnerability, but they have provided mitigation guidance to help users avoid exploitation. According to Microsoft researchers, the exploitation of CVE-2023-36884 has been linked to a threat actor known as Storm-0978, also referred to as DEV-0978 or RomCom. This threat actor, believed to be based in Russia, is known for ransomware attacks and intelligence-gathering operations. The targeted regions include Ukraine, North America, and Europe, with the telecommunications and finance industries being the primary targets.
#2. CVE-2023-35311 | Microsoft Outlook Security Feature Bypass Vulnerability
CVE-2023-35311 is a security feature bypass vulnerability found in Microsoft Outlook. With a CVSSv3 score of 8.8, this vulnerability has been exploited as a zero-day. Exploiting this flaw requires the attacker to convince a victim to click on a malicious URL. Successful exploitation allows the bypassing of the Microsoft Outlook Security Notice prompt, which is designed to protect users. Although the Outlook Preview pane feature can be an attack vector, user interaction is still necessary for exploitation.
#3. CVE-2023-32046 | Windows MSHTML Platform Elevation of Privilege Vulnerability
CVE-2023-32046 is an elevation of privilege (EoP) vulnerability in Microsoft’s MSHTML (Trident) engine. It has been exploited as a zero-day vulnerability and holds a CVSSv3 score of 7.8. Patches addressing this vulnerability are available for all supported versions of Windows. To exploit this vulnerability, an attacker needs to create a specially crafted file and employ social engineering techniques to convince the target to open the document. Microsoft advises users who install Security Only updates to also install the Internet Explorer Cumulative update to fully mitigate this vulnerability.
The discovery of CVE-2023-32046 follows the previous zero-day vulnerability, CVE-2021-40444, which was exploited and patched in September 2021. Although CVE-2021-40444 didn’t make it into our top 5 list of noteworthy vulnerabilities in the 2021 Threat Landscape Retrospective, it was among the vulnerabilities that almost made the list.
#4. CVE-2023-36874 | Windows Error Reporting Service Elevation of Privilege Vulnerability
CVE-2023-36874 is an elevation of privilege vulnerability affecting the Microsoft Windows Error Reporting Service. With a CVSSv3 score of 7.8, this vulnerability has been actively exploited as a zero-day. Exploiting this flaw requires the attacker to have local access to the target system and certain basic user privileges. Successful exploitation leads to the attacker obtaining administrative privileges on the compromised system. The credit for discovering this vulnerability goes to Vlad Stolyarov and Maddie Stone, researchers at Google’s Threat Analysis Group (TAG). Unfortunately, specific details about its exploitation are not available at the time of writing.
#5. CVE-2023-32049 | Windows SmartScreen Security Feature Bypass Vulnerability
CVE-2023-32049 is a security feature bypass vulnerability that affects Windows SmartScreen, an early warning system designed to protect against phishing attacks and malware distribution through malicious websites. To exploit this vulnerability, an attacker needs to convince a user to open a specially crafted URL. Successful exploitation allows the attacker to bypass the “Open File” warning prompt and compromise the victim’s machine. This vulnerability has been actively exploited as a zero-day and holds a CVSSv3 score of 8.8.
This vulnerability is similar to other Mark of the Web (MOTW) vulnerabilities previously patched by Microsoft. One example is CVE-2022-44698, which was exploited and patched in the December 2022 Patch Tuesday release.
#6. CVE-2023-29347 | Windows Admin Center Spoofing Vulnerability
CVE-2023-29347 is a spoofing vulnerability discovered in Windows Admin Center (WAC). It has been assigned a CVSSv3 score of 8.7 and a max severity rating of “important.” This vulnerability resides in the web server component of WAC, but malicious scripts execute within the victim’s browser. Microsoft’s CVSS scoring reflects this as a scope change. Remote authenticated attackers can exploit this vulnerability through a malicious script imported into the WAC HTML form, a .csv file imported to the user interface, or the WAC API. Successful exploitation enables the attacker to perform operations on the WAC server using the victim’s privileges.
#7. CVE-2023-35365, CVE-2023-35366, and CVE-2023-35367 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2023-35365, CVE-2023-35366, and CVE-2023-35367 are remote code execution (RCE) vulnerabilities affecting the Windows Routing and Remote Access Service (RRAS) in Windows operating systems. Each vulnerability has been assigned a CVSSv3 score of 9.8. It’s important to note that RRAS is not installed or configured in Windows by default, and users who haven’t enabled the feature are not affected by these vulnerabilities. Exploiting these vulnerabilities requires the attacker to send crafted packets to an impacted server. According to Microsoft, the exploitability of these vulnerabilities is less likely, as indicated by the Microsoft Exploitability Index.
#8. CVE-2023-32057 | Microsoft Message Queuing Remote Code Execution Vulnerability
CVE-2023-32057 is an RCE vulnerability discovered in the Microsoft Message Queuing (MSMQ) component of Windows operating systems. With a CVSSv3 score of 9.8 and a critical rating, this vulnerability allows remote unauthenticated attackers to execute arbitrary code by sending malicious MSMQ packets to a vulnerable MSMQ server. For successful exploitation, the Message Queuing service must be enabled on the targeted server. Microsoft has categorized this vulnerability as “Exploitation less likely” using the Microsoft Exploitability Index.
#9. ADV230001 | Guidance on Microsoft Signed Drivers Being Used Maliciously
To provide guidance regarding the malicious use of Microsoft Signed Drivers, Microsoft released ADV230001. The advisory highlights cases where drivers certified by Microsoft’s Windows Hardware Developer Program (MWHDP) were abused by malicious actors as part of post-compromise activities. In such instances, the malicious actors gained administrative access to affected systems to utilize these drivers. Microsoft has taken several steps to address this issue, including disabling compromised developer program accounts, and releasing updates to untrust the malicious.
If you wish to download the complete list of vulnerabilities patched in July 2023 Patch Tuesday, you can do it from here.
CVE ID | CVE Title | Severity | Tag |
CVE-2023-33127 | .NET and Visual Studio Elevation of Privilege Vulnerability | Important | .NET and Visual Studio |
CVE-2023-33170 | ASP.NET and Visual Studio Security Feature Bypass Vulnerability | Important | ASP.NET and Visual Studio |
CVE-2023-36871 | Azure Active Directory Security Feature Bypass Vulnerability | Important | Azure Active Directory |
CVE-2023-35348 | Active Directory Federation Service Security Feature Bypass Vulnerability | Important | Azure Active Directory |
CVE-2023-33171 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | Important | Microsoft Dynamics |
CVE-2023-35335 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | Important | Microsoft Dynamics |
CVE-2023-33149 | Microsoft Office Graphics Remote Code Execution Vulnerability | Important | Microsoft Graphics Component |
CVE-2023-21756 | Windows Win32k Elevation of Privilege Vulnerability | Important | Microsoft Graphics Component |
CVE-2023-35333 | MediaWiki PandocUpload Extension Remote Code Execution Vulnerability | Important | Microsoft Media-Wiki Extensions |
CVE-2023-33148 | Microsoft Office Elevation of Privilege Vulnerability | Important | Microsoft Office |
CVE-2023-36884 | Office and Windows HTML Remote Code Execution Vulnerability | Important | Microsoft Office |
CVE-2023-33150 | Microsoft Office Security Feature Bypass Vulnerability | Important | Microsoft Office |
CVE-2023-33152 | Microsoft ActiveX Remote Code Execution Vulnerability | Important | Microsoft Office Access |
CVE-2023-33158 | Microsoft Excel Remote Code Execution Vulnerability | Important | Microsoft Office Excel |
CVE-2023-33161 | Microsoft Excel Remote Code Execution Vulnerability | Important | Microsoft Office Excel |
CVE-2023-33162 | Microsoft Excel Information Disclosure Vulnerability | Important | Microsoft Office Excel |
CVE-2023-33151 | Microsoft Outlook Spoofing Vulnerability | Important | Microsoft Office Outlook |
CVE-2023-33153 | Microsoft Outlook Remote Code Execution Vulnerability | Important | Microsoft Office Outlook |
CVE-2023-35311 | Microsoft Outlook Security Feature Bypass Vulnerability | Important | Microsoft Office Outlook |
CVE-2023-33134 | Microsoft SharePoint Server Remote Code Execution Vulnerability | Important | Microsoft Office SharePoint |
CVE-2023-33160 | Microsoft SharePoint Server Remote Code Execution Vulnerability | Critical | Microsoft Office SharePoint |
CVE-2023-33165 | Microsoft SharePoint Server Security Feature Bypass Vulnerability | Important | Microsoft Office SharePoint |
CVE-2023-33157 | Microsoft SharePoint Remote Code Execution Vulnerability | Critical | Microsoft Office SharePoint |
CVE-2023-33159 | Microsoft SharePoint Server Spoofing Vulnerability | Important | Microsoft Office SharePoint |
CVE-2023-32052 | Microsoft Power Apps Spoofing Vulnerability | Important | Microsoft Power Apps |
CVE-2023-32085 | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | Important | Microsoft Printer Drivers |
CVE-2023-35302 | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | Important | Microsoft Printer Drivers |
CVE-2023-35296 | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | Important | Microsoft Printer Drivers |
CVE-2023-35324 | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | Important | Microsoft Printer Drivers |
CVE-2023-32040 | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | Important | Microsoft Printer Drivers |
CVE-2023-35306 | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | Important | Microsoft Printer Drivers |
CVE-2023-32039 | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | Important | Microsoft Printer Drivers |
CVE-2023-35303 | USB Audio Class System Driver Remote Code Execution Vulnerability | Important | Microsoft Windows Codecs Library |
CVE-2023-36872 | VP9 Video Extensions Information Disclosure Vulnerability | Important | Microsoft Windows Codecs Library |
CVE-2023-32051 | Raw Image Extension Remote Code Execution Vulnerability | Important | Microsoft Windows Codecs Library |
CVE-2023-35373 | Mono Authenticode Validation Spoofing Vulnerability | Important | Mono Authenticode |
CVE-2023-35374 | Paint 3D Remote Code Execution Vulnerability | Important | Paint 3D |
CVE-2023-32047 | Paint 3D Remote Code Execution Vulnerability | Important | Paint 3D |
CVE-2023-35310 | Windows DNS Server Remote Code Execution Vulnerability | Important | Role: DNS Server |
CVE-2023-35346 | Windows DNS Server Remote Code Execution Vulnerability | Important | Role: DNS Server |
CVE-2023-35345 | Windows DNS Server Remote Code Execution Vulnerability | Important | Role: DNS Server |
CVE-2023-35344 | Windows DNS Server Remote Code Execution Vulnerability | Important | Role: DNS Server |
CVE-2023-36868 | Azure Service Fabric on Windows Information Disclosure Vulnerability | Important | Service Fabric |
CVE-2023-36867 | Visual Studio Code GitHub Pull Requests and Issues Extension Remote Code Execution Vulnerability | Important | Visual Studio Code |
CVE-2023-35351 | Windows Active Directory Certificate Services (AD CS) Remote Code Execution Vulnerability | Important | Windows Active Directory Certificate Services |
CVE-2023-35350 | Windows Active Directory Certificate Services (AD CS) Remote Code Execution Vulnerability | Important | Windows Active Directory Certificate Services |
CVE-2023-32055 | Active Template Library Elevation of Privilege Vulnerability | Important | Windows Active Template Library |
CVE-2023-29347 | Windows Admin Center Spoofing Vulnerability | Important | Windows Admin Center |
CVE-2023-35347 | Microsoft Install Service Elevation of Privilege Vulnerability | Important | Windows App Store |
CVE-2023-35329 | Windows Authentication Denial of Service Vulnerability | Important | Windows Authentication Methods |
CVE-2023-35326 | Windows CDP User Components Information Disclosure Vulnerability | Important | Windows CDP User Components |
ADV230001 | Guidance on Microsoft Signed Drivers Being Used Maliciously | None | Windows Certificates |
CVE-2023-35362 | Windows Clip Service Elevation of Privilege Vulnerability | Important | Windows Clip Service |
CVE-2023-33155 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | Important | Windows Cloud Files Mini Filter Driver |
CVE-2023-32033 | Microsoft Failover Cluster Remote Code Execution Vulnerability | Important | Windows Cluster Server |
CVE-2023-35340 | Windows CNG Key Isolation Service Elevation of Privilege Vulnerability | Important | Windows CNG Key Isolation Service |
CVE-2023-35299 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | Important | Windows Common Log File System Driver |
CVE-2023-35320 | Connected User Experiences and Telemetry Elevation of Privilege Vulnerability | Important | Windows Connected User Experiences and Telemetry |
CVE-2023-35353 | Connected User Experiences and Telemetry Elevation of Privilege Vulnerability | Important | Windows Connected User Experiences and Telemetry |
CVE-2023-35339 | Windows CryptoAPI Denial of Service Vulnerability | Important | Windows CryptoAPI |
CVE-2023-33174 | Windows Cryptographic Information Disclosure Vulnerability | Important | Windows Cryptographic Services |
CVE-2023-33156 | Microsoft Defender Elevation of Privilege Vulnerability | Important | Windows Defender |
CVE-2023-35322 | Windows Deployment Services Remote Code Execution Vulnerability | Important | Windows Deployment Services |
CVE-2023-35321 | Windows Deployment Services Denial of Service Vulnerability | Important | Windows Deployment Services |
ADV230002 | Microsoft Guidance for Addressing Security Feature Bypass in Trend Micro EFI Modules | Important | Windows EFI Partition |
CVE-2023-36874 | Windows Error Reporting Service Elevation of Privilege Vulnerability | Important | Windows Error Reporting |
CVE-2023-32083 | Microsoft Failover Cluster Information Disclosure Vulnerability | Important | Windows Failover Cluster |
CVE-2023-35343 | Windows Geolocation Service Remote Code Execution Vulnerability | Important | Windows Geolocation Service |
CVE-2023-32084 | HTTP.sys Denial of Service Vulnerability | Important | Windows HTTP.sys |
CVE-2023-35298 | HTTP.sys Denial of Service Vulnerability | Important | Windows HTTP.sys |
CVE-2023-35342 | Windows Image Acquisition Elevation of Privilege Vulnerability | Important | Windows Image Acquisition |
CVE-2023-32053 | Windows Installer Elevation of Privilege Vulnerability | Important | Windows Installer |
CVE-2023-32050 | Windows Installer Elevation of Privilege Vulnerability | Important | Windows Installer |
CVE-2023-35304 | Windows Kernel Elevation of Privilege Vulnerability | Important | Windows Kernel |
CVE-2023-35363 | Windows Kernel Elevation of Privilege Vulnerability | Important | Windows Kernel |
CVE-2023-35305 | Windows Kernel Elevation of Privilege Vulnerability | Important | Windows Kernel |
CVE-2023-35356 | Windows Kernel Elevation of Privilege Vulnerability | Important | Windows Kernel |
CVE-2023-35357 | Windows Kernel Elevation of Privilege Vulnerability | Important | Windows Kernel |
CVE-2023-35358 | Windows Kernel Elevation of Privilege Vulnerability | Important | Windows Kernel |
CVE-2023-32037 | Windows Layer-2 Bridge Network Driver Information Disclosure Vulnerability | Important | Windows Layer 2 Tunneling Protocol |
CVE-2023-35315 | Windows Layer-2 Bridge Network Driver Remote Code Execution Vulnerability | Critical | Windows Layer-2 Bridge Network Driver |
CVE-2023-35331 | Windows Local Security Authority (LSA) Denial of Service Vulnerability | Important | Windows Local Security Authority (LSA) |
CVE-2023-35341 | Microsoft DirectMusic Information Disclosure Vulnerability | Important | Windows Media |
CVE-2023-32057 | Microsoft Message Queuing Remote Code Execution Vulnerability | Critical | Windows Message Queuing |
CVE-2023-35309 | Microsoft Message Queuing Remote Code Execution Vulnerability | Important | Windows Message Queuing |
CVE-2023-32045 | Microsoft Message Queuing Denial of Service Vulnerability | Important | Windows Message Queuing |
CVE-2023-32044 | Microsoft Message Queuing Denial of Service Vulnerability | Important | Windows Message Queuing |
CVE-2023-32046 | Windows MSHTML Platform Elevation of Privilege Vulnerability | Important | Windows MSHTML Platform |
CVE-2023-35336 | Windows MSHTML Platform Security Feature Bypass Vulnerability | Important | Windows MSHTML Platform |
CVE-2023-35308 | Windows MSHTML Platform Security Feature Bypass Vulnerability | Important | Windows MSHTML Platform |
CVE-2023-21526 | Windows Netlogon Information Disclosure Vulnerability | Important | Windows Netlogon |
CVE-2023-33163 | Windows Network Load Balancing Remote Code Execution Vulnerability | Important | Windows Network Load Balancing |
CVE-2023-35361 | Windows Kernel Elevation of Privilege Vulnerability | Important | Windows NT OS Kernel |
CVE-2023-35364 | Windows Kernel Elevation of Privilege Vulnerability | Important | Windows NT OS Kernel |
CVE-2023-35360 | Windows Kernel Elevation of Privilege Vulnerability | Important | Windows NT OS Kernel |
CVE-2023-32038 | Microsoft ODBC Driver Remote Code Execution Vulnerability | Important | Windows ODBC Driver |
CVE-2023-32042 | OLE Automation Information Disclosure Vulnerability | Important | Windows OLE |
CVE-2023-35323 | Windows OLE Remote Code Execution Vulnerability | Important | Windows Online Certificate Status Protocol (OCSP) SnapIn |
CVE-2023-35313 | Windows Online Certificate Status Protocol (OCSP) SnapIn Remote Code Execution Vulnerability | Important | Windows Online Certificate Status Protocol (OCSP) SnapIn |
CVE-2023-33154 | Windows Partition Management Driver Elevation of Privilege Vulnerability | Important | Windows Partition Management Driver |
CVE-2023-35338 | Windows Peer Name Resolution Protocol Denial of Service Vulnerability | Important | Windows Peer Name Resolution Protocol |
CVE-2023-35297 | Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability | Critical | Windows PGM |
CVE-2023-35325 | Windows Print Spooler Information Disclosure Vulnerability | Important | Windows Print Spooler Components |
CVE-2023-35352 | Windows Remote Desktop Security Feature Bypass Vulnerability | Critical | Windows Remote Desktop |
CVE-2023-32043 | Windows Remote Desktop Security Feature Bypass Vulnerability | Important | Windows Remote Desktop |
CVE-2023-35332 | Windows Remote Desktop Protocol Security Feature Bypass | Important | Windows Remote Desktop |
CVE-2023-35300 | Remote Procedure Call Runtime Remote Code Execution Vulnerability | Important | Windows Remote Procedure Call |
CVE-2023-33168 | Remote Procedure Call Runtime Denial of Service Vulnerability | Important | Windows Remote Procedure Call |
CVE-2023-33173 | Remote Procedure Call Runtime Denial of Service Vulnerability | Important | Windows Remote Procedure Call |
CVE-2023-33172 | Remote Procedure Call Runtime Denial of Service Vulnerability | Important | Windows Remote Procedure Call |
CVE-2023-32035 | Remote Procedure Call Runtime Denial of Service Vulnerability | Important | Windows Remote Procedure Call |
CVE-2023-33166 | Remote Procedure Call Runtime Denial of Service Vulnerability | Important | Windows Remote Procedure Call |
CVE-2023-32034 | Remote Procedure Call Runtime Denial of Service Vulnerability | Important | Windows Remote Procedure Call |
CVE-2023-33167 | Remote Procedure Call Runtime Denial of Service Vulnerability | Important | Windows Remote Procedure Call |
CVE-2023-33169 | Remote Procedure Call Runtime Denial of Service Vulnerability | Important | Windows Remote Procedure Call |
CVE-2023-35318 | Remote Procedure Call Runtime Denial of Service Vulnerability | Important | Windows Remote Procedure Call |
CVE-2023-33164 | Remote Procedure Call Runtime Denial of Service Vulnerability | Important | Windows Remote Procedure Call |
CVE-2023-35319 | Remote Procedure Call Runtime Denial of Service Vulnerability | Important | Windows Remote Procedure Call |
CVE-2023-35316 | Remote Procedure Call Runtime Information Disclosure Vulnerability | Important | Windows Remote Procedure Call |
CVE-2023-35314 | Remote Procedure Call Runtime Denial of Service Vulnerability | Important | Windows Remote Procedure Call |
CVE-2023-35367 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Critical | Windows Routing and Remote Access Service (RRAS) |
CVE-2023-35366 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Critical | Windows Routing and Remote Access Service (RRAS) |
CVE-2023-35365 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Critical | Windows Routing and Remote Access Service (RRAS) |
CVE-2023-35317 | Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability | Important | Windows Server Update Service |
CVE-2023-32056 | Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability | Important | Windows Server Update Service |
CVE-2023-32049 | Windows SmartScreen Security Feature Bypass Vulnerability | Important | Windows SmartScreen |
CVE-2023-35330 | Windows Extended Negotiation Denial of Service Vulnerability | Important | Windows SPNEGO Extended Negotiation |
CVE-2023-35328 | Windows Transaction Manager Elevation of Privilege Vulnerability | Important | Windows Transaction Manager |
CVE-2023-32041 | Windows Update Orchestrator Service Information Disclosure Vulnerability | Important | Windows Update Orchestrator Service |
CVE-2023-35312 | Microsoft VOLSNAP.SYS Elevation of Privilege Vulnerability | Important | Windows VOLSNAP.SYS |
CVE-2023-32054 | Volume Shadow Copy Elevation of Privilege Vulnerability | Important | Windows Volume Shadow Copy |
CVE-2023-35337 | Win32k Elevation of Privilege Vulnerability | Important | Windows Win32K |
The July 2023 Patch Tuesday release was quite significant, addressing a wide range of vulnerabilities across various Microsoft products. Security professionals and system administrators should be paying close attention to the fixes released during this month’s update cycle, as they may greatly impact the overall security posture of their organizations.
With a total of 132 vulnerabilities addressed, the patch covers 9 critical security issues, which could lead to remote code execution, privilege escalation, and denial of service attacks if left unpatched. System administrators are encouraged to prioritize and deploy these updates to minimize the potential risk to their systems.
In closing, the July 2023 Patch Tuesday release serves as a reminder of the importance of ongoing cybersecurity and patch management efforts. By staying up-to-date with the latest vulnerabilities, addressing them in a timely manner, and carefully monitoring the impact of these updates, organizations can greatly improve their security posture and mitigate potential threats.
Our aim is to inform you about the July 2023 Patch Tuesday report released by Microsoft on July 11th, 2023. We encourage you to share this post to help enhance digital security. You can also visit our website thesecmaster.com or subscribe to our social media pages on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium & Instagram to receive similar updates.
You may also like these articles:
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.