To ensure the security of computer systems and networks, Microsoft regularly releases security updates to address its software products’ vulnerabilities. It recently issued the May 2023 Patch Tuesday updates for Windows 10 and 11. This month’s updates address 38 security flaws present in Windows and other related components. The update includes six critical vulnerabilities, which must be immediately addressed to prevent potential security breaches.
This blog will highlight the latest updates to gain a comprehensive understanding of the report, emphasizing the severity levels of the vulnerabilities addressed.
Microsoft released the May 2023 Patch Tuesday. Let’s see the summary of the report.
The security update addressed 38 vulnerabilities, of which six are critical, and 32 are important.
All 6 critical vulnerabilities are Remote Code Execution vulnerabilities.
The May 2023 update has fixes for three zero-day vulnerabilities, two of which are exploited in the wild.
The two actively exploited zero-day vulnerabilities include Win32k elevation of privilege vulnerability and secure boot security feature Bypass Vulnerability.
The update from Microsoft has resolved an interoperability problem that existed between the latest Windows Local Administrator Password Solution (LAPS) and previous LAPS policies. Additionally, Windows 11 version 22H2 enables users to receive the latest non-security updates promptly by tweaking a new setting.
The May security update includes these products: Microsoft Bluetooth Driver, Microsoft Graphics Component, Microsoft Edge (Chromium-based), Microsoft Office, Microsoft Teams, Microsoft Windows, and other components.
The May 2023 vulnerabilities are distributed as follows by Microsoft:
Vulnerability | Quantity | Severities |
Elevation of Privilege Vulnerabilities | 8 | Important: 8 |
Spoofing Vulnerability | 1 | Important: 1 |
Denial of Service Vulnerabilities | 5 | Important: 5 |
Information Disclosure Vulnerabilities | 8 | Important: 8 |
Remote Code Execution Vulnerabilities | 12 | Important: 6Critical: 6 |
Security Feature Bypass Vulnerabilities | 4 | Important: 4 |
Microsoft Edge (Chromium-based) | 15 | Unknown |
The table provides information about the number of bugs in different categories of vulnerabilities. It shows that there are 8 Elevation of Privilege vulnerabilities, 1 Spoofing vulnerability, 5 Denial of Service vulnerabilities, 8 Information Disclosure vulnerabilities, 12 Remote Code Execution vulnerabilities, 4 Security Feature Bypass vulnerabilities, and 15 Edge-Chromium vulnerabilities.
When developers can not address an issue before attackers can exploit it, it is called a “zero-day” vulnerability. These types of vulnerabilities are particularly perilous because they are prone to exploitation before patches or fixes can be released. Recently, Microsoft disclosed that it had remedied three zero-day vulnerabilities, out of which 2 have been exploited by attackers in the wild while 1 was publicly disclosed.
The two vulnerabilities include the following:
CVE ID | Vulnerable Product/Application | Vulnerability Type |
CVE-2023-29336 | Windows 32k | Elevation of Privilege |
CVE-2023-24932 | Windows Secure Boot | Security Feature Bypass |
The publicly disclosed vulnerability is given below.
CVE ID | Vulnerable Product/Application | Vulnerability Type |
CVE-2023-29325 | Windows OLE | Remote Code Execution |
Microsoft has recently addressed a privilege elevation vulnerability in the Win32k Kernel driver, which can allow unauthorized access to SYSTEM, the highest user privilege level in Windows. An attacker who successfully exploits this vulnerability could gain complete control over the system.
Although Microsoft has confirmed that this bug has been actively exploited, no further details are available on the specific techniques attackers use.
Microsoft has recently addressed a vulnerability that a threat actor exploited to install the BlackLotus UEFI bootkit. This Secure Boot bypass flaw allowed an attacker with administrative rights or physical access to install an impacted boot policy, thereby installing malware in the system. UEFI bootkits are malicious programs that can remain undetected since they load early in the booting sequence and operate outside the operating system.
Last month, Microsoft issued guidelines on how to detect BlackLotus UEFI bootkit attacks. With the latest Patch Tuesday update, Microsoft has fixed the vulnerability but has not enabled it by default.
To address the vulnerability, further measures are necessary at present. To assess the impact on your environment, have a look at the following steps outlined in KB5025885 by Microsoft.
Microsoft has remedied a Windows OLE flaw. Attackers can exploit this vulnerability through specially crafted emails. Microsoft’s advisory warns that if the victim uses an affected version of Microsoft Outlook software and either opens the email or previews it, the attacker could execute remote code on the victim’s machine.
Microsoft advises users to read all messages in plain text format to mitigate this vulnerability.
Here are the 6 critical vulnerabilities patched by Microsoft in May 2023 Patch Tuesday.
CVE ID | Vulnerable Product/Application | Vulnerability Type |
CVE-2023-24955 | Microsoft Office SharePoint Server | Remote Code Execution Vulnerability |
CVE-2023-28283 | Windows Lightweight Directory Access Protocol (LDAP) | Remote Code Execution Vulnerability |
CVE-2023-24941 | Windows Network File System | Remote Code Execution Vulnerability |
CVE-2023-29325 | Windows OLE | Remote Code Execution Vulnerability |
CVE-2023-24943 | Windows Pragmatic General Multicast (PGM) | Remote Code Execution Vulnerability |
CVE-2023-24903 | Windows Secure Socket Tunneling Protocol (SSTP) | Remote Code Execution Vulnerability |
You can download the complete list of patched vulnerabilities from here.
CVE ID | Severity | CVE Title | Tag |
CVE-2023-24947 | Important | Windows Bluetooth Driver Remote Code Execution Vulnerability | Microsoft Bluetooth Driver |
CVE-2023-24948 | Important | Windows Bluetooth Driver Elevation of Privilege Vulnerability | Microsoft Bluetooth Driver |
CVE-2023-24944 | Important | Windows Bluetooth Driver Information Disclosure Vulnerability | Microsoft Bluetooth Driver |
CVE-2023-29354 | Moderate | Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | Microsoft Edge (Chromium-based) |
CVE-2023-2468 | Unknown | Chromium: CVE-2023-2468 Inappropriate implementation in PictureInPicture | Microsoft Edge (Chromium-based) |
CVE-2023-2459 | Unknown | Chromium: CVE-2023-2459 Inappropriate implementation in Prompts | Microsoft Edge (Chromium-based) |
CVE-2023-29350 | Important | Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | Microsoft Edge (Chromium-based) |
CVE-2023-2467 | Unknown | Chromium: CVE-2023-2467 Inappropriate implementation in Prompts | Microsoft Edge (Chromium-based) |
CVE-2023-2463 | Unknown | Chromium: CVE-2023-2463 Inappropriate implementation in Full Screen Mode | Microsoft Edge (Chromium-based) |
CVE-2023-2462 | Unknown | Chromium: CVE-2023-2462 Inappropriate implementation in Prompts | Microsoft Edge (Chromium-based) |
CVE-2023-2460 | Unknown | Chromium: CVE-2023-2460 Insufficient validation of untrusted input in Extensions | Microsoft Edge (Chromium-based) |
CVE-2023-2465 | Unknown | Chromium: CVE-2023-2465 Inappropriate implementation in CORS | Microsoft Edge (Chromium-based) |
CVE-2023-2466 | Unknown | Chromium: CVE-2023-2466 Inappropriate implementation in Prompts | Microsoft Edge (Chromium-based) |
CVE-2023-2464 | Unknown | Chromium: CVE-2023-2464 Inappropriate implementation in PictureInPicture | Microsoft Edge (Chromium-based) |
CVE-2023-24899 | Important | Windows Graphics Component Elevation of Privilege Vulnerability | Microsoft Graphics Component |
CVE-2023-29344 | Important | Microsoft Office Remote Code Execution Vulnerability | Microsoft Office |
CVE-2023-29333 | Important | Microsoft Access Denial of Service Vulnerability | Microsoft Office Access |
CVE-2023-24953 | Important | Microsoft Excel Remote Code Execution Vulnerability | Microsoft Office Excel |
CVE-2023-24955 | Critical | Microsoft SharePoint Server Remote Code Execution Vulnerability | Microsoft Office SharePoint |
CVE-2023-24954 | Important | Microsoft SharePoint Server Information Disclosure Vulnerability | Microsoft Office SharePoint |
CVE-2023-24950 | Important | Microsoft SharePoint Server Spoofing Vulnerability | Microsoft Office SharePoint |
CVE-2023-29335 | Important | Microsoft Word Security Feature Bypass Vulnerability | Microsoft Office Word |
CVE-2023-24881 | Important | Microsoft Teams Information Disclosure Vulnerability | Microsoft Teams |
CVE-2023-29340 | Important | AV1 Video Extension Remote Code Execution Vulnerability | Microsoft Windows Codecs Library |
CVE-2023-29341 | Important | AV1 Video Extension Remote Code Execution Vulnerability | Microsoft Windows Codecs Library |
CVE-2023-24905 | Important | Remote Desktop Client Remote Code Execution Vulnerability | Remote Desktop Client |
CVE-2023-29343 | Important | SysInternals Sysmon for Windows Elevation of Privilege Vulnerability | SysInternals |
CVE-2023-29338 | Important | Visual Studio Code Information Disclosure Vulnerability | Visual Studio Code |
CVE-2023-24946 | Important | Windows Backup Service Elevation of Privilege Vulnerability | Windows Backup Engine |
CVE-2023-24904 | Important | Windows Installer Elevation of Privilege Vulnerability | Windows Installer |
CVE-2023-24945 | Important | Windows iSCSI Target Service Information Disclosure Vulnerability | Windows iSCSI Target Service |
CVE-2023-24949 | Important | Windows Kernel Elevation of Privilege Vulnerability | Windows Kernel |
CVE-2023-28283 | Critical | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability | Windows LDAP – Lightweight Directory Access Protocol |
CVE-2023-29324 | Important | Windows MSHTML Platform Security Feature Bypass Vulnerability | Windows MSHTML Platform |
CVE-2023-24941 | Critical | Windows Network File System Remote Code Execution Vulnerability | Windows Network File System |
CVE-2023-24901 | Important | Windows NFS Portmapper Information Disclosure Vulnerability | Windows NFS Portmapper |
CVE-2023-24939 | Important | Server for NFS Denial of Service Vulnerability | Windows NFS Portmapper |
CVE-2023-24900 | Important | Windows NTLM Security Support Provider Information Disclosure Vulnerability | Windows NTLM |
CVE-2023-29325 | Critical | Windows OLE Remote Code Execution Vulnerability | Windows OLE |
CVE-2023-24940 | Important | Windows Pragmatic General Multicast (PGM) Denial of Service Vulnerability | Windows PGM |
CVE-2023-24943 | Critical | Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability | Windows PGM |
CVE-2023-28290 | Important | Microsoft Remote Desktop app for Windows Information Disclosure Vulnerability | Windows RDP Client |
CVE-2023-24942 | Important | Remote Procedure Call Runtime Denial of Service Vulnerability | Windows Remote Procedure Call Runtime |
CVE-2023-28251 | Important | Windows Driver Revocation List Security Feature Bypass Vulnerability | Windows Secure Boot |
CVE-2023-24932 | Important | Secure Boot Security Feature Bypass Vulnerability | Windows Secure Boot |
CVE-2023-24903 | Critical | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability | Windows Secure Socket Tunneling Protocol (SSTP) |
CVE-2023-24898 | Important | Windows SMB Denial of Service Vulnerability | Windows SMB |
CVE-2023-29336 | Important | Win32k Elevation of Privilege Vulnerability | Windows Win32K |
CVE-2023-24902 | Important | Win32k Elevation of Privilege Vulnerability | Windows Win32K |
Our aim is to inform you about the February 2023 Patch Tuesday report released by Microsoft on May 9th, 2023. We encourage you to share this post to help enhance digital security. You can also subscribe to our social media pages on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium & Instagram to receive similar updates.
You may also like these articles:
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.