Friday, April 11, 2025
HomeCyber Security NewsMicrosoft Patch Tuesday, May 2023 - Fixes for 2 zero-days and 40...

Microsoft Patch Tuesday, May 2023 – Fixes for 2 zero-days and 40 vulnerabilities

Published on

SIEM as a Service

Follow Us on Google News

Microsoft released updates for two zero-day problems and 40 other newly discovered vulnerabilities in its products on Tuesday.

CVE-2023-29336, one of the zero days, is a Windows “elevation of privilege” bug with a low attack complexity, minimal privilege requirements, and no user input. The attack vector for this problem is local, as the SANS Internet Storm Centre notes.

“Once they gain initial access, they will seek administrative or SYSTEM-level permissions. This can allow the attacker to disable security tooling and deploy more attacker tools like Mimikatz that lets them move across the network and gain persistence”, said Kevin Breen, director of cyber threat research at Immersive Labs.

- Advertisement - Google News

CVE-2023-29336, as reported by Avast, affects devices running Windows 10 and Windows Server 2008, 2012, and 2016.

The Secure Boot Security Feature Bypass issue (CVE-2023-24932), which is being actively exploited by “bootkit” malware known as “BlackLotus,” is the zero-day patch that has attracted the most attention so far. Being able to load malicious software before the operating system even launches makes a bootkit risky.

According to Microsoft, addressing CVE-2023-24932 requires removing boot managers, an irreversible action that may cause problems with specific boot settings. 

An affected boot policy could be installed on a target device by an attacker who has physical access or administrative privileges. Microsoft assigns a CVSS score of merely 6.7 to this problem, classifying it as “Important.”

Patches Remote Code Execution (RCE) Flaws

Additionally, Microsoft fixed five Windows remote code execution (RCE) problems, including two with significantly high CVSS scores.

CVE-2023-24941 affects the Windows Network File System and can be exploited via the network by sending a carefully crafted unauthenticated request. 

Microsoft’s alert also contains mitigation recommendations. This vulnerability has a CVSS of 9.8 – the highest of any bug resolved this month.

Meanwhile, CVE-2023-28283 is a critical vulnerability in the Windows Lightweight Directory Access Protocol (LDAP) that allows an unauthenticated attacker to execute malicious code on a susceptible device. 

Although the CVSS for this vulnerability is 8.1, Microsoft warns that exploiting the bug may be difficult and unreliable for attackers.

CVE-2023-29325, a flaw in Microsoft Outlook and Explorer that may be used by attackers to remotely install malware, is another vulnerability patched this month (but has yet to be exploited in the wild). 

According to Microsoft, this flaw can be exploited simply by viewing a specially-crafted email in the Outlook Preview Pane.

The tech giant also resolved CVE-2023-24955, a remote code execution flaw in SharePoint Server that was disclosed by the Star Labs team at the Pwn2Own Vancouver 2023 exploit contest.

The full list of vulnerabilities that were fixed in the May 2023 Patch Tuesday releases can be found here.

Struggling to Apply The Security Patch in Your System? – 
Try All-in-One Patch Manager Plus

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

TROX Stealer Harvests Sensitive Data Including Stored Credit Cards and Browser Credentials

Cybersecurity experts at Sublime have uncovered a complex malware campaign revolving around TROX Stealer,...

Chinese eCrime Group Targets Users in 120+ Countries to Steal Banking Credentials

Smishing Triad, a Chinese eCrime group, has launched an extensive operation targeting users across...

Calix Devices Vulnerable to Pre-Auth RCE on Port 6998, Root Access Possible

A severe security flaw enabling unauthenticated remote code execution (RCE) with root privileges has...

Microsoft Boosts Exchange and SharePoint Security with Updated Antimalware Scan

Microsoft has fortified its Exchange Server and SharePoint Server security by integrating advanced Antimalware...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

TROX Stealer Harvests Sensitive Data Including Stored Credit Cards and Browser Credentials

Cybersecurity experts at Sublime have uncovered a complex malware campaign revolving around TROX Stealer,...

Chinese eCrime Group Targets Users in 120+ Countries to Steal Banking Credentials

Smishing Triad, a Chinese eCrime group, has launched an extensive operation targeting users across...

Calix Devices Vulnerable to Pre-Auth RCE on Port 6998, Root Access Possible

A severe security flaw enabling unauthenticated remote code execution (RCE) with root privileges has...