PRUEBA AHORA
Patch Tuesday

Microsoft Patch Tuesday – July 2023

9 min. read
11/07/2023
By Esben Dochy
Microsoft-Patch-Tuesday-May-2022

Patch Tuesday is once again upon us. As always, our team has put together the monthly Patch Tuesday Report to help you manage your update progress. The audit report gives you a quick and clear overview of your Windows machines and their patching status. The July 2023 edition of Patch Tuesday brings us 130 new fixes, with 9 rated as critical. We’ve listed the most important changes below.

⚡ TL;DR | Go Straight to the July 2023 Patch Tuesday Audit Report

Five Microsoft SharePoint Vulnerabilities

Just like last month, the most noteworthy fixes are for SharePoint. Sharepoint got a total of 5 vulnerabilities fixed, two of which are critical.

CVE-2023-33157 is the most severe of the five. A Remote Code Execution (RCE) vulnerability in Sharepoint Server that is «more likely» to be exploited according to Microsoft. To exploit this vulnerability, an attacker will need to be authenticated and also a site member (and have the Manage List permissions), so there are some prerequisites. If these two conditions are both achieved, it is possible for the attacker to execute code remotely.

CVE-2023-33160 is the second most severe vulnerability. While it also have the same CVSS base score of 8.8, it is not as likely to be exploited. The prerequisites of this vulnerability are similar to the one above and if exploited it can lead to «a remote attack that could enable access to the victim’s information and the ability to alter information. Successful exploitation could also potentially cause downtime for the targeted environment.«

The other vulnerabilities, CVE-2023-33165, CVE-2023-33159, and CVE-2023-33134 are less severe according to Microsoft and range from a CVSS base score of 4.4 to 8.8. These vulnerabilities are a security feature bypass, spoofing and a second RCE vulnerability.

Three Windows Remote Desktop Vulnerabilities

The second set of vulnerabilities that pose a high risk are in the Windows Remote Desktop. CVE-2023-35352 is the most critical vulnerability simply listed as a security feature bypass vulnerability. Information is rather scarce for this vulnerability, Microsoft lists that exploitation is «more likely», which indicates there is a significant risk. Aside from that all we get regarding the vulnerability is what happens if it is exploited.

An attacker who successfully exploited the vulnerability could bypass certificate or private key authentication when establishing a remote desktop protocol session.

The remaining two vulnerabilities, CVE-2023-32043 and CVE-2023-35332 both have a CVSS base score of 6.8. With these vulnerabilities we at least get some idea of which security features are being bypassed. Specifically, the certificate validation performed when a targeted user connects to a trusted server and the usage of the Datagram Transport Layer Security (DTLS) version 1.0 protocol.

Run the Patch Tuesday July 2023 Audit

To help manage your update progress, we’ve created the Patch Tuesday Audit that checks if the assets in your network are on the latest patch updates. The report has been color-coded to see which machines are up-to-date and which ones still need to be updated. As always, system administrators are urged to update their environment as soon as possible to ensure all endpoints are secured.

The Lansweeper Patch Tuesday report is automatically added to your Lansweeper Site. Lansweeper Sites is included in all our licenses without any additional cost and allows you to federate all your installations into one single view so all you need to do is look at one report, automatically added every patch Tuesday!

Patch Tuesday July 2023 CVE Codes & Titles

CVE NumberCVE Title
CVE-2023-36884Office and Windows HTML Remote Code Execution Vulnerability
CVE-2023-36874Windows Error Reporting Service Elevation of Privilege Vulnerability
CVE-2023-36872VP9 Video Extensions Information Disclosure Vulnerability
CVE-2023-36871Azure Active Directory Security Feature Bypass Vulnerability
CVE-2023-36868Azure Service Fabric on Windows Information Disclosure Vulnerability
CVE-2023-36867Visual Studio Code GitHub Pull Requests and Issues Extension Remote Code Execution Vulnerability
CVE-2023-35374Paint 3D Remote Code Execution Vulnerability
CVE-2023-35373Mono Authenticode Validation Spoofing Vulnerability
CVE-2023-35367Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2023-35366Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2023-35365Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2023-35364Windows Kernel Elevation of Privilege Vulnerability
CVE-2023-35363Windows Kernel Elevation of Privilege Vulnerability
CVE-2023-35362Windows Clip Service Elevation of Privilege Vulnerability
CVE-2023-35361Windows Kernel Elevation of Privilege Vulnerability
CVE-2023-35360Windows Kernel Elevation of Privilege Vulnerability
CVE-2023-35358Windows Kernel Elevation of Privilege Vulnerability
CVE-2023-35357Windows Kernel Elevation of Privilege Vulnerability
CVE-2023-35356Windows Kernel Elevation of Privilege Vulnerability
CVE-2023-35353Connected User Experiences and Telemetry Elevation of Privilege Vulnerability
CVE-2023-35352Windows Remote Desktop Security Feature Bypass Vulnerability
CVE-2023-35351Windows Active Directory Certificate Services (AD CS) Remote Code Execution Vulnerability
CVE-2023-35350Windows Active Directory Certificate Services (AD CS) Remote Code Execution Vulnerability
CVE-2023-35348Active Directory Federation Service Security Feature Bypass Vulnerability
CVE-2023-35347Microsoft Install Service Elevation of Privilege Vulnerability
CVE-2023-35346Windows DNS Server Remote Code Execution Vulnerability
CVE-2023-35345Windows DNS Server Remote Code Execution Vulnerability
CVE-2023-35344Windows DNS Server Remote Code Execution Vulnerability
CVE-2023-35343Windows Geolocation Service Remote Code Execution Vulnerability
CVE-2023-35342Windows Image Acquisition Elevation of Privilege Vulnerability
CVE-2023-35341Microsoft DirectMusic Information Disclosure Vulnerability
CVE-2023-35340Windows CNG Key Isolation Service Elevation of Privilege Vulnerability
CVE-2023-35339Windows CryptoAPI Denial of Service Vulnerability
CVE-2023-35338Windows Peer Name Resolution Protocol Denial of Service Vulnerability
CVE-2023-35337Win32k Elevation of Privilege Vulnerability
CVE-2023-35336Windows MSHTML Platform Security Feature Bypass Vulnerability
CVE-2023-35335Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
CVE-2023-35333MediaWiki PandocUpload Extension Remote Code Execution Vulnerability
CVE-2023-35332Windows Remote Desktop Protocol Security Feature Bypass
CVE-2023-35331Windows Local Security Authority (LSA) Denial of Service Vulnerability
CVE-2023-35330Windows Extended Negotiation Denial of Service Vulnerability
CVE-2023-35329Windows Authentication Denial of Service Vulnerability
CVE-2023-35328Windows Transaction Manager Elevation of Privilege Vulnerability
CVE-2023-35326Windows CDP User Components Information Disclosure Vulnerability
CVE-2023-35325Windows Print Spooler Information Disclosure Vulnerability
CVE-2023-35324Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
CVE-2023-35323Windows OLE Remote Code Execution Vulnerability
CVE-2023-35322Windows Deployment Services Remote Code Execution Vulnerability
CVE-2023-35321Windows Deployment Services Denial of Service Vulnerability
CVE-2023-35320Connected User Experiences and Telemetry Elevation of Privilege Vulnerability
CVE-2023-35319Remote Procedure Call Runtime Denial of Service Vulnerability
CVE-2023-35318Remote Procedure Call Runtime Denial of Service Vulnerability
CVE-2023-35317Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability
CVE-2023-35316Remote Procedure Call Runtime Information Disclosure Vulnerability
CVE-2023-35315Windows Layer-2 Bridge Network Driver Remote Code Execution Vulnerability
CVE-2023-35314Remote Procedure Call Runtime Denial of Service Vulnerability
CVE-2023-35313Windows Online Certificate Status Protocol (OCSP) SnapIn Remote Code Execution Vulnerability
CVE-2023-35312Microsoft VOLSNAP.SYS Elevation of Privilege Vulnerability
CVE-2023-35311Microsoft Outlook Security Feature Bypass Vulnerability
CVE-2023-35310Windows DNS Server Remote Code Execution Vulnerability
CVE-2023-35309Microsoft Message Queuing Remote Code Execution Vulnerability
CVE-2023-35308Windows MSHTML Platform Security Feature Bypass Vulnerability
CVE-2023-35306Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
CVE-2023-35305Windows Kernel Elevation of Privilege Vulnerability
CVE-2023-35304Windows Kernel Elevation of Privilege Vulnerability
CVE-2023-35303USB Audio Class System Driver Remote Code Execution Vulnerability
CVE-2023-35302Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVE-2023-35300Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVE-2023-35299Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2023-35298HTTP.sys Denial of Service Vulnerability
CVE-2023-35297Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
CVE-2023-35296Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
CVE-2023-33174Windows Cryptographic Information Disclosure Vulnerability
CVE-2023-33173Remote Procedure Call Runtime Denial of Service Vulnerability
CVE-2023-33172Remote Procedure Call Runtime Denial of Service Vulnerability
CVE-2023-33171Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
CVE-2023-33170ASP.NET and Visual Studio Security Feature Bypass Vulnerability
CVE-2023-33169Remote Procedure Call Runtime Denial of Service Vulnerability
CVE-2023-33168Remote Procedure Call Runtime Denial of Service Vulnerability
CVE-2023-33167Remote Procedure Call Runtime Denial of Service Vulnerability
CVE-2023-33166Remote Procedure Call Runtime Denial of Service Vulnerability
CVE-2023-33165Microsoft SharePoint Server Security Feature Bypass Vulnerability
CVE-2023-33164Remote Procedure Call Runtime Denial of Service Vulnerability
CVE-2023-33163Windows Network Load Balancing Remote Code Execution Vulnerability
CVE-2023-33162Microsoft Excel Information Disclosure Vulnerability
CVE-2023-33161Microsoft Excel Remote Code Execution Vulnerability
CVE-2023-33160Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2023-33159Microsoft SharePoint Server Spoofing Vulnerability
CVE-2023-33158Microsoft Excel Remote Code Execution Vulnerability
CVE-2023-33157Microsoft SharePoint Remote Code Execution Vulnerability
CVE-2023-33156Microsoft Defender Elevation of Privilege Vulnerability
CVE-2023-33155Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2023-33154Windows Partition Management Driver Elevation of Privilege Vulnerability
CVE-2023-33153Microsoft Outlook Remote Code Execution Vulnerability
CVE-2023-33152Microsoft ActiveX Remote Code Execution Vulnerability
CVE-2023-33151Microsoft Outlook Spoofing Vulnerability
CVE-2023-33150Microsoft Office Security Feature Bypass Vulnerability
CVE-2023-33149Microsoft Office Graphics Remote Code Execution Vulnerability
CVE-2023-33148Microsoft Office Elevation of Privilege Vulnerability
CVE-2023-33134Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2023-33127.NET and Visual Studio Elevation of Privilege Vulnerability
CVE-2023-32085Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
CVE-2023-32084HTTP.sys Denial of Service Vulnerability
CVE-2023-32083Microsoft Failover Cluster Information Disclosure Vulnerability
CVE-2023-32057Microsoft Message Queuing Remote Code Execution Vulnerability
CVE-2023-32056Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability
CVE-2023-32055Active Template Library Elevation of Privilege Vulnerability
CVE-2023-32054Volume Shadow Copy Elevation of Privilege Vulnerability
CVE-2023-32053Windows Installer Elevation of Privilege Vulnerability
CVE-2023-32052Microsoft Power Apps Spoofing Vulnerability
CVE-2023-32051Raw Image Extension Remote Code Execution Vulnerability
CVE-2023-32050Windows Installer Elevation of Privilege Vulnerability
CVE-2023-32049Windows SmartScreen Security Feature Bypass Vulnerability
CVE-2023-32047Paint 3D Remote Code Execution Vulnerability
CVE-2023-32046Windows MSHTML Platform Elevation of Privilege Vulnerability
CVE-2023-32045Microsoft Message Queuing Denial of Service Vulnerability
CVE-2023-32044Microsoft Message Queuing Denial of Service Vulnerability
CVE-2023-32043Windows Remote Desktop Security Feature Bypass Vulnerability
CVE-2023-32042OLE Automation Information Disclosure Vulnerability
CVE-2023-32041Windows Update Orchestrator Service Information Disclosure Vulnerability
CVE-2023-32040Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
CVE-2023-32039Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
CVE-2023-32038Microsoft ODBC Driver Remote Code Execution Vulnerability
CVE-2023-32037Windows Layer-2 Bridge Network Driver Information Disclosure Vulnerability
CVE-2023-32035Remote Procedure Call Runtime Denial of Service Vulnerability
CVE-2023-32034Remote Procedure Call Runtime Denial of Service Vulnerability
CVE-2023-32033Microsoft Failover Cluster Remote Code Execution Vulnerability
CVE-2023-32028Microsoft OLE DB Remote Code Execution Vulnerability
CVE-2023-32027Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2023-32026Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2023-32025Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2023-29356Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2023-29349Microsoft ODBC and OLE DB Remote Code Execution Vulnerability
CVE-2023-29347Windows Admin Center Spoofing Vulnerability
CVE-2023-24932Secure Boot Security Feature Bypass Vulnerability
CVE-2023-21756Windows Win32k Elevation of Privilege Vulnerability
CVE-2023-21526Windows Netlogon Information Disclosure Vulnerability
CVE-2022-38023Netlogon RPC Elevation of Privilege Vulnerability
CVE-2022-37967Windows Kerberos Elevation of Privilege Vulnerability

Receive the Latest Patch Tuesday Report for FREE Every Month

"*" señala los campos obligatorios

This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
Este campo es un campo de validación y debe quedar sin cambios.