Patch Tuesday is once again upon us. As always, our team has put together the monthly Patch Tuesday Report to help you manage your update progress. The audit report gives you a quick and clear overview of your Windows machines and their patching status. The August 2023 edition of Patch Tuesday brings us 75 new fixes, with 6 rated as critical. We’ve listed the most important changes below.
⚡ TL;DR | Go Straight to the August 2023 Patch Tuesday Audit Report
Six Microsoft Exchange Vulnerabilities
Exchange is once again a hot topic this month. Coming in with four Remote Code Execution (RCE) vulnerabilities, a spoofing vulnerability, and an elevation of privilege vulnerability, it is likely the most important group of fixes this month. These vulnerabilities range between a CVSS base score of 8 and 9.8.
The two most severe in the group are CVE-2023-38182 and CVE-2023-35388, while they both «only» have a CVSS base score of 8, Microsoft mentions that these two are more likely to be exploited. In order to exploit these vulnerabilities, an authenticated attacker who is on the same intranet as the Exchange server can achieve remote code execution via a PowerShell remoting session.
Microsoft Teams Remote Code Execution
Two of the critical severity vulnerabilities are related to Microsoft Teams. Both are RCE vulnerabilities that require a user to join a malicious Microsoft Teams meeting set up by the attacker to be exploited. If exploited, the attacker can then execute code using the security context of that user.
Microsoft has released updates for all of its Teams versions. While Teams should automatically update (since Microsoft doesn’t allow manual deployment). However, it might be interesting to verify your Teams installations are fully up to date. Microsoft lists that it has updated its Teams applications to the following versions.
Product | Build |
Microsoft Teams for iOS | 5.12.1 |
Microsoft Teams for Mac | 1.6.00.17554 |
Microsoft Teams for Android | 1.0.0.2023070204 |
Microsoft Teams for Desktop | 1.6.00.18681 |
Run the Patch Tuesday August 2023 Audit
To help manage your update progress, we’ve created the Patch Tuesday Audit that checks if the assets in your network are on the latest patch updates. The report has been color-coded to see which machines are up-to-date and which ones still need to be updated. As always, system administrators are urged to update their environment as soon as possible to ensure all endpoints are secured.
The Lansweeper Patch Tuesday report is automatically added to your Lansweeper Site. Lansweeper Sites is included in all our licenses without any additional cost and allows you to federate all your installations into one single view so all you need to do is look at one report, automatically added every patch Tuesday!
Patch Tuesday August 2023 CVE Codes & Titles
CVE Number | CVE Title |
CVE-2023-38254 | Microsoft Message Queuing Denial of Service Vulnerability |
CVE-2023-38188 | Azure Apache Hadoop Spoofing Vulnerability |
CVE-2023-38186 | Windows Mobile Device Management Elevation of Privilege Vulnerability |
CVE-2023-38185 | Microsoft Exchange Server Remote Code Execution Vulnerability |
CVE-2023-38184 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability |
CVE-2023-38182 | Microsoft Exchange Server Remote Code Execution Vulnerability |
CVE-2023-38181 | Microsoft Exchange Server Spoofing Vulnerability |
CVE-2023-38180 | .NET and Visual Studio Denial of Service Vulnerability |
CVE-2023-38178 | .NET Core and Visual Studio Denial of Service Vulnerability |
CVE-2023-38176 | Azure Arc-Enabled Servers Elevation of Privilege Vulnerability |
CVE-2023-38175 | Microsoft Windows Defender Elevation of Privilege Vulnerability |
CVE-2023-38172 | Microsoft Message Queuing Denial of Service Vulnerability |
CVE-2023-38170 | HEVC Video Extensions Remote Code Execution Vulnerability |
CVE-2023-38169 | Microsoft OLE DB Remote Code Execution Vulnerability |
CVE-2023-38167 | Microsoft Dynamics Business Central Elevation Of Privilege Vulnerability |
CVE-2023-38154 | Windows Kernel Elevation of Privilege Vulnerability |
CVE-2023-36914 | Windows Smart Card Resource Management Server Security Feature Bypass Vulnerability |
CVE-2023-36913 | Microsoft Message Queuing Information Disclosure Vulnerability |
CVE-2023-36912 | Microsoft Message Queuing Denial of Service Vulnerability |
CVE-2023-36911 | Microsoft Message Queuing Remote Code Execution Vulnerability |
CVE-2023-36910 | Microsoft Message Queuing Remote Code Execution Vulnerability |
CVE-2023-36909 | Microsoft Message Queuing Denial of Service Vulnerability |
CVE-2023-36908 | Windows Hyper-V Information Disclosure Vulnerability |
CVE-2023-36907 | Windows Cryptographic Services Information Disclosure Vulnerability |
CVE-2023-36906 | Windows Cryptographic Services Information Disclosure Vulnerability |
CVE-2023-36905 | Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability |
CVE-2023-36904 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability |
CVE-2023-36903 | Windows System Assessment Tool Elevation of Privilege Vulnerability |
CVE-2023-36900 | Windows Common Log File System Driver Elevation of Privilege Vulnerability |
CVE-2023-36899 | ASP.NET Elevation of Privilege Vulnerability |
CVE-2023-36898 | Tablet Windows User Interface Application Core Remote Code Execution Vulnerability |
CVE-2023-36897 | Visual Studio Tools for Office Runtime Spoofing Vulnerability |
CVE-2023-36896 | Microsoft Excel Remote Code Execution Vulnerability |
CVE-2023-36895 | Microsoft Outlook Remote Code Execution Vulnerability |
CVE-2023-36894 | Microsoft SharePoint Server Information Disclosure Vulnerability |
CVE-2023-36893 | Microsoft Outlook Spoofing Vulnerability |
CVE-2023-36892 | Microsoft SharePoint Server Spoofing Vulnerability |
CVE-2023-36891 | Microsoft SharePoint Server Spoofing Vulnerability |
CVE-2023-36890 | Microsoft SharePoint Server Information Disclosure Vulnerability |
CVE-2023-36889 | Windows Group Policy Security Feature Bypass Vulnerability |
CVE-2023-36884 | Windows Search Security Feature Bypass Vulnerability |
CVE-2023-36882 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability |
CVE-2023-36881 | Azure Apache Ambari Spoofing Vulnerability |
CVE-2023-36877 | Azure Apache Oozie Spoofing Vulnerability |
CVE-2023-36876 | Reliability Analysis Metrics Calculation (RacTask) Elevation of Privilege Vulnerability |
CVE-2023-36873 | .NET Framework Spoofing Vulnerability |
CVE-2023-36869 | Azure DevOps Server Spoofing Vulnerability |
CVE-2023-36866 | Microsoft Office Visio Remote Code Execution Vulnerability |
CVE-2023-36865 | Microsoft Office Visio Remote Code Execution Vulnerability |
CVE-2023-35394 | Azure HDInsight Jupyter Notebook Spoofing Vulnerability |
CVE-2023-35393 | Azure Apache Hive Spoofing Vulnerability |
CVE-2023-35391 | ASP.NET Core SignalR and Visual Studio Information Disclosure Vulnerability |
CVE-2023-35390 | .NET and Visual Studio Remote Code Execution Vulnerability |
CVE-2023-35389 | Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability |
CVE-2023-35388 | Microsoft Exchange Server Remote Code Execution Vulnerability |
CVE-2023-35387 | Windows Bluetooth A2DP driver Elevation of Privilege Vulnerability |
CVE-2023-35386 | Windows Kernel Elevation of Privilege Vulnerability |
CVE-2023-35385 | Microsoft Message Queuing Remote Code Execution Vulnerability |
CVE-2023-35384 | Windows HTML Platforms Security Feature Bypass Vulnerability |
CVE-2023-35383 | Microsoft Message Queuing Information Disclosure Vulnerability |
CVE-2023-35382 | Windows Kernel Elevation of Privilege Vulnerability |
CVE-2023-35381 | Windows Fax Service Remote Code Execution Vulnerability |
CVE-2023-35380 | Windows Kernel Elevation of Privilege Vulnerability |
CVE-2023-35379 | Reliability Analysis Metrics Calculation Engine (RACEng) Elevation of Privilege Vulnerability |
CVE-2023-35378 | Windows Projected File System Elevation of Privilege Vulnerability |
CVE-2023-35377 | Microsoft Message Queuing Denial of Service Vulnerability |
CVE-2023-35376 | Microsoft Message Queuing Denial of Service Vulnerability |
CVE-2023-35372 | Microsoft Office Visio Remote Code Execution Vulnerability |
CVE-2023-35371 | Microsoft Office Remote Code Execution Vulnerability |
CVE-2023-35368 | Microsoft Exchange Remote Code Execution Vulnerability |
CVE-2023-35359 | Windows Kernel Elevation of Privilege Vulnerability |
CVE-2023-29330 | Microsoft Teams Remote Code Execution Vulnerability |
CVE-2023-29328 | Microsoft Teams Remote Code Execution Vulnerability |
CVE-2023-21709 | Microsoft Exchange Server Elevation of Privilege Vulnerability |
CVE-2023-20569 | AMD: CVE-2023-20569 Return Address Predictor |