Jetzt Ausprobieren
Patch Tuesday

Microsoft Patch Tuesday – September 2023

6 min. read
12/09/2023
By Esben Dochy
Microsoft-Patch-Tuesday-May-2022

Patch Tuesday is once again upon us. As always, our team has put together the monthly Patch Tuesday Report to help you manage your update progress. The audit report gives you a quick and clear overview of your Windows machines and their patching status. The September 2023 edition of Patch Tuesday brings us 63 new fixes, with 5 rated as critical. We’ve listed the most important changes below.

⚡ TL;DR | Go Straight to the September 2023 Patch Tuesday Audit Report

Internet Connection Sharing (ICS) RCE Vulnerability

One of the most critical vulnerabilities lies in the Internet Connection Sharing (ICS). Luckily this only applies to devices where this functionality is enabled. However, if it is, attackers could end up executing code. While CVE-2023-38148 does have a CVSS base score of 8.8 and is more likely to be exploited according to Microsoft. An attack is limited to systems connected to the same network segment as the attacker. Additionally, the attack cannot be performed across multiple networks.

Four Microsoft Exchange Vulnerabilities

Exchange continues to be a hot topic this month. Coming in with three Remote Code Execution (RCE) vulnerabilities, and a spoofing vulnerability. These vulnerabilities range between a CVSS base score of 8 and 8.8.

Luckily, all of the vulnerabilities this month do require an attacker to be authenticated with LAN-access and have credentials for a valid Exchange user. While the requirements in order to utilize the vulnerabilities are quite high, if met, it does mean that attackers can execute code which can result in data theft, data manipulation, and downtime for the targeted environment.

Aside from reporting on whether the patch tuesday updates have been installed, you can also get a quick list of all exchange servers in your IT environment, their version and much more using the Exchange Server audit.

Visual Studio RCE Vulnerabilities

The majority of critically rated vulnerabilities this month are in Visual Studio. CVE-2023-36792CVE-2023-36793, and CVE-2023-36796 are all rated as critical. In the case of these three vulnerabilities, the „remote“ part only refers to the location of the attacker. The actual exploitation must be done locally. All three of the vulnerabilities require a user to open a maliciously crafted package file in Visual Studio.

CVE-2023-36794 is the last of the vulnerabilities fixed for Visual Studio this month but has the exact same description aside from being less severely rated.

If you’d like to get an overview of all the Visual Studio installations in your environment along with their version and how long they will be supported for, you can use our Visual Studio end-of-life audit.

Run the Patch Tuesday September 2023 Audit

To help manage your update progress, we’ve created the Patch Tuesday Audit that checks if the assets in your network are on the latest patch updates. The report has been color-coded to see which machines are up-to-date and which ones still need to be updated. As always, system administrators are urged to update their environment as soon as possible to ensure all endpoints are secured.

The Lansweeper Patch Tuesday report is automatically added to your Lansweeper Site. Lansweeper Sites is included in all our licenses without any additional cost and allows you to federate all your installations into one single view so all you need to do is look at one report, automatically added every patch Tuesday!

Run the September Patch Tuesday Audit

Patch Tuesday September 2023 CVE Codes & Titles

CVE NumberCVE Title
CVE-2023-41764Microsoft Office Spoofing Vulnerability
CVE-2023-39956Electron: CVE-2023-39956 -Visual Studio Code Remote Code Execution Vulnerability
CVE-2023-38164Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
CVE-2023-38163Windows Defender Attack Surface Reduction Security Feature Bypass
CVE-2023-38162DHCP Server Service Denial of Service Vulnerability
CVE-2023-38161Windows GDI Elevation of Privilege Vulnerability
CVE-2023-38160Windows TCP/IP Information Disclosure Vulnerability
CVE-2023-38156Azure HDInsight Apache Ambari Elevation of Privilege Vulnerability
CVE-2023-38155Azure DevOps Server and Team Foundation Server Elevation of Privilege Vulnerability
CVE-2023-38152DHCP Server Service Information Disclosure Vulnerability
CVE-2023-38150Windows Kernel Elevation of Privilege Vulnerability
CVE-2023-38149Windows TCP/IP Denial of Service Vulnerability
CVE-2023-38148Internet Connection Sharing (ICS) Remote Code Execution Vulnerability
CVE-2023-38147Windows Miracast Wireless Display Remote Code Execution Vulnerability
CVE-2023-38146Windows Themes Remote Code Execution Vulnerability
CVE-2023-38144Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2023-38143Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2023-38142Windows Kernel Elevation of Privilege Vulnerability
CVE-2023-38141Windows Kernel Elevation of Privilege Vulnerability
CVE-2023-38140Windows Kernel Information Disclosure Vulnerability
CVE-2023-38139Windows Kernel Elevation of Privilege Vulnerability
CVE-2023-36886Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
CVE-2023-36805Windows MSHTML Platform Security Feature Bypass Vulnerability
CVE-2023-36804Windows GDI Elevation of Privilege Vulnerability
CVE-2023-36803Windows Kernel Information Disclosure Vulnerability
CVE-2023-36802Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability
CVE-2023-36801DHCP Server Service Information Disclosure Vulnerability
CVE-2023-36800Dynamics Finance and Operations Cross-site Scripting Vulnerability
CVE-2023-36799.NET Core and Visual Studio Denial of Service Vulnerability
CVE-2023-36796Visual Studio Remote Code Execution Vulnerability
CVE-2023-36794Visual Studio Remote Code Execution Vulnerability
CVE-2023-36793Visual Studio Remote Code Execution Vulnerability
CVE-2023-36792Visual Studio Remote Code Execution Vulnerability
CVE-2023-36788.NET Framework Remote Code Execution Vulnerability
CVE-2023-36777Microsoft Exchange Server Information Disclosure Vulnerability
CVE-2023-367733D Builder Remote Code Execution Vulnerability
CVE-2023-367723D Builder Remote Code Execution Vulnerability
CVE-2023-367713D Builder Remote Code Execution Vulnerability
CVE-2023-367703D Builder Remote Code Execution Vulnerability
CVE-2023-36767Microsoft Office Security Feature Bypass Vulnerability
CVE-2023-36766Microsoft Excel Information Disclosure Vulnerability
CVE-2023-36765Microsoft Office Elevation of Privilege Vulnerability
CVE-2023-36764Microsoft SharePoint Server Elevation of Privilege Vulnerability
CVE-2023-36763Microsoft Outlook Information Disclosure Vulnerability
CVE-2023-36762Microsoft Word Remote Code Execution Vulnerability
CVE-2023-36761Microsoft Word Information Disclosure Vulnerability
CVE-2023-367603D Viewer Remote Code Execution Vulnerability
CVE-2023-36759Visual Studio Elevation of Privilege Vulnerability
CVE-2023-36758Visual Studio Elevation of Privilege Vulnerability
CVE-2023-36757Microsoft Exchange Server Spoofing Vulnerability
CVE-2023-36756Microsoft Exchange Server Remote Code Execution Vulnerability
CVE-2023-36745Microsoft Exchange Server Remote Code Execution Vulnerability
CVE-2023-36744Microsoft Exchange Server Remote Code Execution Vulnerability
CVE-2023-36742Visual Studio Code Remote Code Execution Vulnerability
CVE-2023-367403D Viewer Remote Code Execution Vulnerability
CVE-2023-367393D Viewer Remote Code Execution Vulnerability
CVE-2023-36736Microsoft Identity Linux Broker Arbitrary Code Execution Vulnerability
CVE-2023-35355Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2023-33136Azure DevOps Server Remote Code Execution Vulnerability
CVE-2023-32051Raw Image Extension Remote Code Execution Vulnerability
CVE-2023-29332Microsoft Azure Kubernetes Service Elevation of Privilege Vulnerability
CVE-2023-24936.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability
CVE-2022-41303AutoDesk: CVE-2022-41303 use-after-free vulnerability in Autodesk® FBX® SDK 2020 or prior