Scroll Top
19th Ave New York, NY 95822, USA

Microsoft February 2023 Patch Tuesday fixes over 75 flaws

patch tuesday

Today is Microsoft’s February 2023 Patch Tuesday, and security updates fix three actively exploited zero-day vulnerabilities and a total of 77 flaws.

Nine vulnerabilities have been classified as ‘Critical’ as they allow remote code execution on vulnerable devices.

The number of bugs in each vulnerability category is listed below:

  • 12 Elevation of Privilege Vulnerabilities
  • 2 Security Feature Bypass Vulnerabilities
  • 38 Remote Code Execution Vulnerabilities
  • 8 Information Disclosure Vulnerabilities
  • 10 Denial of Service Vulnerabilities
  • 8 Spoofing Vulnerabilities

This count does not include three Microsoft Edge vulnerabilities fixed earlier this month.

To learn more about the non-security updates released today, you can review our dedicated articles on the new Windows 11 KB5022845 and KB5022836 cumulative updates and Windows 10 KB5022834 and KB5022840 updates.

Three zero-days fixed

This month’s Patch Tuesday fixes three actively exploited zero-day vulnerabilities used in attacks

Microsoft classifies a vulnerability as a zero-day if it is publicly disclosed or actively exploited with no official fix available.

The three actively exploited zero-day vulnerabilities fixed in today’s updates are:

CVE-2023-21823 – Windows Graphics Component Remote Code Execution Vulnerability discovered by Dhanesh Kizhakkinan, Genwei Jiang, and Dhanesh Kizhakkinan of Mandiant.

Microsoft says this remote code execution vulnerability allows attackers to execute commands with SYSTEM privileges.

This security update will be pushed out to users via the Microsoft Store rather than Windows Update. Therefore, for those customers who disable automatic updates in the Microsoft Store, Microsoft will not be pushing out the update automatically.

BleepingComputer has contacted Mandiant to learn more about these vulnerabilities were actively exploited.

CVE-2023-21715 – Microsoft Publisher Security Features Bypass Vulnerability discovered by Hidetake Jo of Microsoft.

The second zero-day vulnerability is in Microsoft Publisher and allows a specially crafted document to bypass Office macro policies that block untrusted or malicious files.

Exploiting this flaw would effectively allow macros in a malicious Publisher document to run without first warning the user.

“The attack itself is carried out locally by a user with authentication to the targeted system,” explains Microsoft.

“An authenticated attacker could exploit the vulnerability by convincing a victim, through social engineering, to download and open a specially crafted file from a website which could lead to a local attack on the victim computer.”

CVE-2023-23376 – Windows Common Log File System Driver Elevation of Privilege Vulnerability discovered by the Microsoft Threat Intelligence Center (MSTIC) and Microsoft Security Response Center (MSRC).

The third actively exploited vulnerability allows an “attacker who successfully exploited this vulnerability could gain SYSTEM privileges.”

BleepingComputer has contacted Microsoft to learn more about how the CVE-2023-21715 and CVE-2023-23376 vulnerabilities were exploited in attacks.

Patch Tuesday

Recent updates from other companies

Other vendors who released updates in February 2023 include:

  • Adobe released security updates for numerous products.
  • Apple fixed an actively exploited WebKit zero-day vulnerability in iOS and MacOS.
  • Atlassian released security updates for a critical Jira Service Management Server and Data Center vulnerability.
  • Cisco released security updates for multiple products, including Cisco Identity Services, Cisco Broadworks, and the Cisco Email Security appliance.
  • Google released the February security updates for Pixel.
  • Fortra released a security update for the actively exploited GoAnywhere MFT zero-day flaw.
  • SAP has released its February 2023 Patch Day updates.

The February 2023 Patch Tuesday Security Updates

Below is the complete list of resolved vulnerabilities and released advisories in the February 2023 Patch Tuesday updates.

TagCVE IDCVE TitleSeverity
.NET and Visual StudioCVE-2023-21808.NET and Visual Studio Remote Code Execution VulnerabilityCritical
.NET FrameworkCVE-2023-21722.NET Framework Denial of Service VulnerabilityImportant
3D BuilderCVE-2023-233903D Builder Remote Code Execution VulnerabilityImportant
3D BuilderCVE-2023-233773D Builder Remote Code Execution VulnerabilityImportant
3D BuilderCVE-2023-23378Print 3D Remote Code Execution VulnerabilityImportant
Azure App ServiceCVE-2023-21777Azure App Service on Azure Stack Hub Elevation of Privilege VulnerabilityImportant
Azure Data Box GatewayCVE-2023-21703Azure Data Box Gateway Remote Code Execution VulnerabilityImportant
Azure DevOpsCVE-2023-21564Azure DevOps Server Cross-Site Scripting VulnerabilityImportant
Azure DevOpsCVE-2023-21553Azure DevOps Server Remote Code Execution VulnerabilityImportant
Azure Machine LearningCVE-2023-23382Azure Machine Learning Compute Instance Information Disclosure VulnerabilityImportant
HoloLensCVE-2019-15126MITRE: CVE-2019-15126 Specifically timed and handcrafted traffic can cause internal errors (related to state transitions) in a WLAN deviceUnknown
Internet Storage Name ServiceCVE-2023-21699Windows Internet Storage Name Service (iSNS) Server Information Disclosure VulnerabilityImportant
Internet Storage Name ServiceCVE-2023-21697Windows Internet Storage Name Service (iSNS) Server Information Disclosure VulnerabilityImportant
MarinerCVE-2022-43552UnknownUnknown
Microsoft Defender for EndpointCVE-2023-21809Microsoft Defender for Endpoint Security Feature Bypass VulnerabilityImportant
Microsoft Defender for IoTCVE-2023-23379Microsoft Defender for IoT Elevation of Privilege VulnerabilityImportant
Microsoft DynamicsCVE-2023-21807Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityImportant
Microsoft DynamicsCVE-2023-21573Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityImportant
Microsoft DynamicsCVE-2023-21571Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityImportant
Microsoft DynamicsCVE-2023-21572Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityImportant
Microsoft DynamicsCVE-2023-21778Microsoft Dynamics Unified Service Desk Remote Code Execution VulnerabilityImportant
Microsoft DynamicsCVE-2023-21570Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityImportant
Microsoft Edge (Chromium-based)CVE-2023-23374Microsoft Edge (Chromium-based) Remote Code Execution VulnerabilityModerate
Microsoft Edge (Chromium-based)CVE-2023-21794Microsoft Edge (Chromium-based) Spoofing VulnerabilityLow
Microsoft Edge (Chromium-based)CVE-2023-21720Microsoft Edge (Chromium-based) Tampering VulnerabilityLow
Microsoft Exchange ServerCVE-2023-21710Microsoft Exchange Server Remote Code Execution VulnerabilityImportant
Microsoft Exchange ServerCVE-2023-21707Microsoft Exchange Server Remote Code Execution VulnerabilityImportant
Microsoft Exchange ServerCVE-2023-21706Microsoft Exchange Server Remote Code Execution VulnerabilityImportant
Microsoft Exchange ServerCVE-2023-21529Microsoft Exchange Server Remote Code Execution VulnerabilityImportant
Microsoft Graphics ComponentCVE-2023-21804Windows Graphics Component Elevation of Privilege VulnerabilityImportant
Microsoft Graphics ComponentCVE-2023-21823Windows Graphics Component Remote Code Execution VulnerabilityImportant
Microsoft OfficeCVE-2023-21714Microsoft Office Information Disclosure VulnerabilityImportant
Microsoft Office OneNoteCVE-2023-21721Microsoft OneNote Spoofing VulnerabilityImportant
Microsoft Office PublisherCVE-2023-21715Microsoft Publisher Security Features Bypass VulnerabilityImportant
Microsoft Office SharePointCVE-2023-21717Microsoft SharePoint Server Elevation of Privilege VulnerabilityImportant
Microsoft Office WordCVE-2023-21716Microsoft Word Remote Code Execution VulnerabilityCritical
Microsoft PostScript Printer DriverCVE-2023-21693Microsoft PostScript Printer Driver Information Disclosure VulnerabilityImportant
Microsoft PostScript Printer DriverCVE-2023-21801Microsoft PostScript Printer Driver Remote Code Execution VulnerabilityImportant
Microsoft PostScript Printer DriverCVE-2023-21684Microsoft PostScript Printer Driver Remote Code Execution VulnerabilityImportant
Microsoft WDAC OLE DB provider for SQLCVE-2023-21686Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityImportant
Microsoft WDAC OLE DB provider for SQLCVE-2023-21685Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityImportant
Microsoft WDAC OLE DB provider for SQLCVE-2023-21799Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityImportant
Microsoft Windows Codecs LibraryCVE-2023-21802Windows Media Remote Code Execution VulnerabilityImportant
Power BICVE-2023-21806Power BI Report Server Spoofing VulnerabilityImportant
SQL ServerCVE-2023-21713Microsoft SQL Server Remote Code Execution VulnerabilityImportant
SQL ServerCVE-2023-21718Microsoft SQL ODBC Driver Remote Code Execution VulnerabilityCritical
SQL ServerCVE-2023-21528Microsoft SQL Server Remote Code Execution VulnerabilityImportant
SQL ServerCVE-2023-21705Microsoft SQL Server Remote Code Execution VulnerabilityImportant
SQL ServerCVE-2023-21568Microsoft SQL Server Integration Service (VS extension) Remote Code Execution VulnerabilityImportant
SQL ServerCVE-2023-21704Microsoft ODBC Driver for SQL Server Remote Code Execution VulnerabilityImportant
Visual StudioCVE-2023-21566Visual Studio Elevation of Privilege VulnerabilityImportant
Visual StudioCVE-2023-21815Visual Studio Remote Code Execution VulnerabilityCritical
Visual StudioCVE-2023-23381Visual Studio Remote Code Execution VulnerabilityCritical
Visual StudioCVE-2023-21567Visual Studio Denial of Service VulnerabilityImportant
Windows Active DirectoryCVE-2023-21816Windows Active Directory Domain Services API Denial of Service VulnerabilityImportant
Windows ALPCCVE-2023-21688NT OS Kernel Elevation of Privilege VulnerabilityImportant
Windows Common Log File System DriverCVE-2023-23376Windows Common Log File System Driver Elevation of Privilege VulnerabilityImportant
Windows Common Log File System DriverCVE-2023-21812Windows Common Log File System Driver Elevation of Privilege VulnerabilityImportant
Windows Cryptographic ServicesCVE-2023-21813Windows Secure Channel Denial of Service VulnerabilityImportant
Windows Cryptographic ServicesCVE-2023-21819Windows Secure Channel Denial of Service VulnerabilityImportant
Windows Distributed File System (DFS)CVE-2023-21820Windows Distributed File System (DFS) Remote Code Execution VulnerabilityImportant
Windows Fax and Scan ServiceCVE-2023-21694Windows Fax Service Remote Code Execution VulnerabilityImportant
Windows HTTP.sysCVE-2023-21687HTTP.sys Information Disclosure VulnerabilityImportant
Windows InstallerCVE-2023-21800Windows Installer Elevation of Privilege VulnerabilityImportant
Windows iSCSICVE-2023-21803Windows iSCSI Discovery Service Remote Code Execution VulnerabilityCritical
Windows iSCSICVE-2023-21700Windows iSCSI Discovery Service Denial of Service VulnerabilityImportant
Windows iSCSICVE-2023-21702Windows iSCSI Service Denial of Service VulnerabilityImportant
Windows iSCSICVE-2023-21811Windows iSCSI Service Denial of Service VulnerabilityImportant
Windows KerberosCVE-2023-21817Windows Kerberos Elevation of Privilege VulnerabilityImportant
Windows MSHTML PlatformCVE-2023-21805Windows MSHTML Platform Remote Code Execution VulnerabilityImportant
Windows ODBC DriverCVE-2023-21797Microsoft ODBC Driver Remote Code Execution VulnerabilityImportant
Windows ODBC DriverCVE-2023-21798Microsoft ODBC Driver Remote Code Execution VulnerabilityImportant
Windows Protected EAP (PEAP)CVE-2023-21695Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution VulnerabilityImportant
Windows Protected EAP (PEAP)CVE-2023-21701Microsoft Protected Extensible Authentication Protocol (PEAP) Denial of Service VulnerabilityImportant
Windows Protected EAP (PEAP)CVE-2023-21692Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution VulnerabilityCritical
Windows Protected EAP (PEAP)CVE-2023-21691Microsoft Protected Extensible Authentication Protocol (PEAP) Information Disclosure VulnerabilityImportant
Windows Protected EAP (PEAP)CVE-2023-21690Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution VulnerabilityCritical
Windows Protected EAP (PEAP)CVE-2023-21689Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution VulnerabilityCritical
Windows SChannelCVE-2023-21818Windows Secure Channel Denial of Service VulnerabilityImportant
Windows Win32KCVE-2023-21822Windows Graphics Component Elevation of Privilege VulnerabilityImportant

Source: www.bleepingcomputer.com

Related Posts