Tuesday, January 21, 2025
HomeCyber Security NewsMicrosoft Patch Tuesday, May 2023 - Fixes for 2 zero-days and 40...

Microsoft Patch Tuesday, May 2023 – Fixes for 2 zero-days and 40 vulnerabilities

Published on

SIEM as a Service

Follow Us on Google News

Microsoft released updates for two zero-day problems and 40 other newly discovered vulnerabilities in its products on Tuesday.

CVE-2023-29336, one of the zero days, is a Windows “elevation of privilege” bug with a low attack complexity, minimal privilege requirements, and no user input. The attack vector for this problem is local, as the SANS Internet Storm Centre notes.

“Once they gain initial access, they will seek administrative or SYSTEM-level permissions. This can allow the attacker to disable security tooling and deploy more attacker tools like Mimikatz that lets them move across the network and gain persistence”, said Kevin Breen, director of cyber threat research at Immersive Labs.

CVE-2023-29336, as reported by Avast, affects devices running Windows 10 and Windows Server 2008, 2012, and 2016.

The Secure Boot Security Feature Bypass issue (CVE-2023-24932), which is being actively exploited by “bootkit” malware known as “BlackLotus,” is the zero-day patch that has attracted the most attention so far. Being able to load malicious software before the operating system even launches makes a bootkit risky.

According to Microsoft, addressing CVE-2023-24932 requires removing boot managers, an irreversible action that may cause problems with specific boot settings. 

An affected boot policy could be installed on a target device by an attacker who has physical access or administrative privileges. Microsoft assigns a CVSS score of merely 6.7 to this problem, classifying it as “Important.”

Patches Remote Code Execution (RCE) Flaws

Additionally, Microsoft fixed five Windows remote code execution (RCE) problems, including two with significantly high CVSS scores.

CVE-2023-24941 affects the Windows Network File System and can be exploited via the network by sending a carefully crafted unauthenticated request. 

Microsoft’s alert also contains mitigation recommendations. This vulnerability has a CVSS of 9.8 – the highest of any bug resolved this month.

Meanwhile, CVE-2023-28283 is a critical vulnerability in the Windows Lightweight Directory Access Protocol (LDAP) that allows an unauthenticated attacker to execute malicious code on a susceptible device. 

Although the CVSS for this vulnerability is 8.1, Microsoft warns that exploiting the bug may be difficult and unreliable for attackers.

CVE-2023-29325, a flaw in Microsoft Outlook and Explorer that may be used by attackers to remotely install malware, is another vulnerability patched this month (but has yet to be exploited in the wild). 

According to Microsoft, this flaw can be exploited simply by viewing a specially-crafted email in the Outlook Preview Pane.

The tech giant also resolved CVE-2023-24955, a remote code execution flaw in SharePoint Server that was disclosed by the Star Labs team at the Pwn2Own Vancouver 2023 exploit contest.

The full list of vulnerabilities that were fixed in the May 2023 Patch Tuesday releases can be found here.

Struggling to Apply The Security Patch in Your System? – 
Try All-in-One Patch Manager Plus

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Multiple Azure DevOps Vulnerabilities Let Inject CRLF Queries & Rebind DNS

Researchers uncovered several significant vulnerabilities within Azure DevOps, specifically focusing on potential Server-Side Request...

Hackers Weaponize npm Packages To Steal Solana Private Keys Via Gmail

Socket’s threat research team has identified a series of malicious npm packages specifically designed...

Hackers Weaponize MSI Packages & PNG Files to Deliver Multi-stage Malware

Researchers have reported a series of sophisticated cyber attacks aimed at organizations in Chinese-speaking...

New IoT Botnet Launching Large-Scale DDoS attacks Hijacking IoT Devices

Large-scale DDoS attack commands sent from an IoT botnet's C&C server targeting Japan and...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Multiple Azure DevOps Vulnerabilities Let Inject CRLF Queries & Rebind DNS

Researchers uncovered several significant vulnerabilities within Azure DevOps, specifically focusing on potential Server-Side Request...

Hackers Weaponize npm Packages To Steal Solana Private Keys Via Gmail

Socket’s threat research team has identified a series of malicious npm packages specifically designed...

Hackers Weaponize MSI Packages & PNG Files to Deliver Multi-stage Malware

Researchers have reported a series of sophisticated cyber attacks aimed at organizations in Chinese-speaking...