Tuesday, October 15, 2024
HomeCyber Security NewsMicrosoft Patch Tuesday, May 2023 - Fixes for 2 zero-days and 40...

Microsoft Patch Tuesday, May 2023 – Fixes for 2 zero-days and 40 vulnerabilities

Published on

Malware protection

Microsoft released updates for two zero-day problems and 40 other newly discovered vulnerabilities in its products on Tuesday.

CVE-2023-29336, one of the zero days, is a Windows “elevation of privilege” bug with a low attack complexity, minimal privilege requirements, and no user input. The attack vector for this problem is local, as the SANS Internet Storm Centre notes.

“Once they gain initial access, they will seek administrative or SYSTEM-level permissions. This can allow the attacker to disable security tooling and deploy more attacker tools like Mimikatz that lets them move across the network and gain persistence”, said Kevin Breen, director of cyber threat research at Immersive Labs.

- Advertisement - SIEM as a Service

CVE-2023-29336, as reported by Avast, affects devices running Windows 10 and Windows Server 2008, 2012, and 2016.

The Secure Boot Security Feature Bypass issue (CVE-2023-24932), which is being actively exploited by “bootkit” malware known as “BlackLotus,” is the zero-day patch that has attracted the most attention so far. Being able to load malicious software before the operating system even launches makes a bootkit risky.

According to Microsoft, addressing CVE-2023-24932 requires removing boot managers, an irreversible action that may cause problems with specific boot settings. 

An affected boot policy could be installed on a target device by an attacker who has physical access or administrative privileges. Microsoft assigns a CVSS score of merely 6.7 to this problem, classifying it as “Important.”

Patches Remote Code Execution (RCE) Flaws

Additionally, Microsoft fixed five Windows remote code execution (RCE) problems, including two with significantly high CVSS scores.

CVE-2023-24941 affects the Windows Network File System and can be exploited via the network by sending a carefully crafted unauthenticated request. 

Microsoft’s alert also contains mitigation recommendations. This vulnerability has a CVSS of 9.8 – the highest of any bug resolved this month.

Meanwhile, CVE-2023-28283 is a critical vulnerability in the Windows Lightweight Directory Access Protocol (LDAP) that allows an unauthenticated attacker to execute malicious code on a susceptible device. 

Although the CVSS for this vulnerability is 8.1, Microsoft warns that exploiting the bug may be difficult and unreliable for attackers.

CVE-2023-29325, a flaw in Microsoft Outlook and Explorer that may be used by attackers to remotely install malware, is another vulnerability patched this month (but has yet to be exploited in the wild). 

According to Microsoft, this flaw can be exploited simply by viewing a specially-crafted email in the Outlook Preview Pane.

The tech giant also resolved CVE-2023-24955, a remote code execution flaw in SharePoint Server that was disclosed by the Star Labs team at the Pwn2Own Vancouver 2023 exploit contest.

The full list of vulnerabilities that were fixed in the May 2023 Patch Tuesday releases can be found here.

Struggling to Apply The Security Patch in Your System? – 
Try All-in-One Patch Manager Plus

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Allegedly Selling Data Stolen from Cisco

A group of hackers reportedly sells sensitive data stolen from Cisco Systems, Inc.The...

Fortigate SSLVPN Vulnerability Exploited in the Wild

A critical vulnerability in Fortinet's FortiGate SSLVPN appliances, CVE-2024-23113, has been actively exploited in...

Splunk Enterprise Vulnerabilities let Attackers Execute Remote Code

Splunk has disclosed multiple vulnerabilities affecting its Enterprise product, which could allow attackers to...

OilRig Hackers Exploiting Microsoft Exchange Server To Steal Login Details

Earth Simnavaz, an Iranian state-sponsored cyber espionage group, has recently intensified its attacks on...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Hackers Allegedly Selling Data Stolen from Cisco

A group of hackers reportedly sells sensitive data stolen from Cisco Systems, Inc.The...

Fortigate SSLVPN Vulnerability Exploited in the Wild

A critical vulnerability in Fortinet's FortiGate SSLVPN appliances, CVE-2024-23113, has been actively exploited in...

Splunk Enterprise Vulnerabilities let Attackers Execute Remote Code

Splunk has disclosed multiple vulnerabilities affecting its Enterprise product, which could allow attackers to...