Business

Microsoft March 2023 Patch Tuesday fixes 2 zero-days, 83 flaws

Published

on

Today is Microsoft’s March 2023 Patch Tuesday, and security updates fix two actively exploited zero-day vulnerabilities and a total of 83 flaws.

Nine vulnerabilities have been classified as ‘Critical’ for allowing remote code execution, denial of service, or elevation of privileges attacks.

The number of bugs in each vulnerability category is listed below:

  • 21 Elevation of Privilege Vulnerabilities
  • 2 Security Feature Bypass Vulnerabilities
  • 27 Remote Code Execution Vulnerabilities
  • 15 Information Disclosure Vulnerabilities
  • 4 Denial of Service Vulnerabilities
  • 10 Spoofing Vulnerabilities
  • 1 Edge – Chromium Vulnerability

This count does not include twenty-one Microsoft Edge vulnerabilities fixed yesterday.

To learn more about the non-security updates released today, you can review our dedicated articles on the new Windows 11 KB5023706 and KB5023698 cumulative updates and Windows 10 KB5023696 and KB5023697 updates.

Two zero-days fixed

This month’s Patch Tuesday fixes two zero-day vulnerabilities actively exploited in attacks.

Microsoft classifies a vulnerability as a zero-day if it is publicly disclosed or actively exploited with no official fix available.

The two actively exploited zero-day vulnerabilities fixed in today’s updates are:

CVE-2023-23397 – Microsoft Outlook Elevation of Privilege Vulnerability

Microsoft has fixed a Microsoft Outlook privilege elevation bug that allows specially crafted emails to force a target’s device to connect to a remote URL and transmit the Windows account’s Net-NTLMv2 hash.

“External attackers could send specially crafted emails that will cause a connection from the victim to an external UNC location of attackers’ control. This will leak the Net-NTLMv2 hash of the victim to the attacker who can then relay this to another service and authenticate as the victim.,” reads Microsoft’s advisory.

Microsoft warns that this flaw will be triggered before it is read in the preview pane as the vulnerability “triggers automatically when it is retrieved and processed by the email server.”

In a private threat analytics report seen by BleepingComputer, Microsoft says that this Outlook vulnerability was exploited by STRONTIUM, a state-sponsored Russian hacking group.

Using this vulnerability, the threat actors gathered target’s NTLM hashes to breach the victims’ networks, where the threat actors stole emails for specific accounts.

This vulnerability was disclosed by CERT-UA, Microsoft Incident, Microsoft Threat Intelligence (MSTI).

CVE-2023-24880 – Windows SmartScreen Security Feature Bypass Vulnerability

Microsoft has fixed an actively exploited zero-day vulnerability in Windows SmartScreen that can be used to create executables that bypass the Windows Mark of the Web security warning.

“An attacker can craft a malicious file that would evade Mark of the Web (MOTW) defenses, resulting in a limited loss of integrity and availability of security features such as Protected View in Microsoft Office, which rely on MOTW tagging,” reads Microsoft’s advisory.

This vulnerability was discovered by Google’s Threat Analysis Group, who spotted it being exploited by the Magniber ransomware operation.

After analyzing the vulnerability, Google TAG determined that it was a bypass to a previous CVE-2022-44698 zero-day exploited by Magniber and fixed by Microsoft in December.

When exploiting the CVE-2022-44698, the threat actors utilized stand-alone, signed JavaScript (.JS) files with a malformed signature. This flaw caused Windows SmartScreen to generate an error and bypass the MoTW warnings.

After Microsoft fixed CVE-2022-44698 in December, Google found that the Magniber operation switched to using malformed authenticode signatures in MSI files to bypass the fix.

Google explained that this bypass was caused by Microsoft fixing only the initially reported JavaScript file abuse rather than fixing the root cause of the bug.

Microsoft says that the vulnerability was disclosed by Benoît Sevens and Vlad Stolyarov of Google’s Threat Analysis Group and Bill Demirkapi of Microsoft.

Recent updates from other companies

Other vendors who released updates in March 2023 include:

The March 2023 Patch Tuesday Security Updates

Below is the complete list of resolved vulnerabilities and released advisory for the March 2023 Patch Tuesday updates. To access the full description of each vulnerability and the systems it affects, you can view the full report here.

TagCVE IDCVE TitleSeverity
AzureCVE-2023-23408Azure Apache Ambari Spoofing VulnerabilityImportant
Client Server Run-time Subsystem (CSRSS)CVE-2023-23409Client Server Run-Time Subsystem (CSRSS) Information Disclosure VulnerabilityImportant
Client Server Run-time Subsystem (CSRSS)CVE-2023-23394Client Server Run-Time Subsystem (CSRSS) Information Disclosure VulnerabilityImportant
Internet Control Message Protocol (ICMP)CVE-2023-23415Internet Control Message Protocol (ICMP) Remote Code Execution VulnerabilityCritical
MarinerCVE-2023-0567UnknownUnknown
MarinerCVE-2023-20052UnknownUnknown
MarinerCVE-2023-20032UnknownUnknown
Microsoft Bluetooth DriverCVE-2023-23388Windows Bluetooth Driver Elevation of Privilege VulnerabilityImportant
Microsoft DynamicsCVE-2023-24920Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityImportant
Microsoft DynamicsCVE-2023-24879Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityImportant
Microsoft DynamicsCVE-2023-24919Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityImportant
Microsoft DynamicsCVE-2023-24891Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityImportant
Microsoft DynamicsCVE-2023-24922Microsoft Dynamics 365 Information Disclosure VulnerabilityImportant
Microsoft DynamicsCVE-2023-24921Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityImportant
Microsoft Edge (Chromium-based)CVE-2023-1236Chromium: CVE-2023-1236 Inappropriate implementation in InternalsUnknown
Microsoft Edge (Chromium-based)CVE-2023-1235Chromium: CVE-2023-1235 Type Confusion in DevToolsUnknown
Microsoft Edge (Chromium-based)CVE-2023-1213Chromium: CVE-2023-1213 Use after free in SwiftshaderUnknown
Microsoft Edge (Chromium-based)CVE-2023-24892Microsoft Edge (Chromium-based) Webview2 Spoofing VulnerabilityImportant
Microsoft Edge (Chromium-based)CVE-2023-1234Chromium: CVE-2023-1234 Inappropriate implementation in IntentsUnknown
Microsoft Edge (Chromium-based)CVE-2023-1223Chromium: CVE-2023-1223 Insufficient policy enforcement in AutofillUnknown
Microsoft Edge (Chromium-based)CVE-2023-1222Chromium: CVE-2023-1222 Heap buffer overflow in Web Audio APIUnknown
Microsoft Edge (Chromium-based)CVE-2023-1221Chromium: CVE-2023-1221 Insufficient policy enforcement in Extensions APIUnknown
Microsoft Edge (Chromium-based)CVE-2023-1229Chromium: CVE-2023-1229 Inappropriate implementation in Permission promptsUnknown
Microsoft Edge (Chromium-based)CVE-2023-1228Chromium: CVE-2023-1228 Insufficient policy enforcement in IntentsUnknown
Microsoft Edge (Chromium-based)CVE-2023-1224Chromium: CVE-2023-1224 Insufficient policy enforcement in Web Payments APIUnknown
Microsoft Edge (Chromium-based)CVE-2023-1220Chromium: CVE-2023-1220 Heap buffer overflow in UMAUnknown
Microsoft Edge (Chromium-based)CVE-2023-1216Chromium: CVE-2023-1216 Use after free in DevToolsUnknown
Microsoft Edge (Chromium-based)CVE-2023-1215Chromium: CVE-2023-1215 Type Confusion in CSSUnknown
Microsoft Edge (Chromium-based)CVE-2023-1214Chromium: CVE-2023-1214 Type Confusion in V8Unknown
Microsoft Edge (Chromium-based)CVE-2023-1219Chromium: CVE-2023-1219 Heap buffer overflow in MetricsUnknown
Microsoft Edge (Chromium-based)CVE-2023-1218Chromium: CVE-2023-1218 Use after free in WebRTCUnknown
Microsoft Edge (Chromium-based)CVE-2023-1217Chromium: CVE-2023-1217 Stack buffer overflow in Crash reportingUnknown
Microsoft Edge (Chromium-based)CVE-2023-1230Chromium: CVE-2023-1230 Inappropriate implementation in WebApp InstallsUnknown
Microsoft Edge (Chromium-based)CVE-2023-1232Chromium: CVE-2023-1232 Insufficient policy enforcement in Resource TimingUnknown
Microsoft Edge (Chromium-based)CVE-2023-1233Chromium: CVE-2023-1233 Insufficient policy enforcement in Resource TimingUnknown
Microsoft Edge (Chromium-based)CVE-2023-1231Chromium: CVE-2023-1231 Inappropriate implementation in AutofillUnknown
Microsoft Graphics ComponentCVE-2023-24910Windows Graphics Component Elevation of Privilege VulnerabilityImportant
Microsoft Office ExcelCVE-2023-23398Microsoft Excel Spoofing VulnerabilityImportant
Microsoft Office ExcelCVE-2023-23396Microsoft Excel Denial of Service VulnerabilityImportant
Microsoft Office ExcelCVE-2023-23399Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office OutlookCVE-2023-23397Microsoft Outlook Elevation of Privilege VulnerabilityCritical
Microsoft Office SharePointCVE-2023-23395Microsoft SharePoint Server Spoofing VulnerabilityImportant
Microsoft OneDriveCVE-2023-24890Microsoft OneDrive for iOS Security Feature Bypass VulnerabilityImportant
Microsoft OneDriveCVE-2023-24930Microsoft OneDrive for MacOS Elevation of Privilege VulnerabilityImportant
Microsoft OneDriveCVE-2023-24882Microsoft OneDrive for Android Information Disclosure VulnerabilityImportant
Microsoft OneDriveCVE-2023-24923Microsoft OneDrive for Android Information Disclosure VulnerabilityImportant
Microsoft PostScript Printer DriverCVE-2023-24907Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution VulnerabilityImportant
Microsoft PostScript Printer DriverCVE-2023-24857Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure VulnerabilityImportant
Microsoft PostScript Printer DriverCVE-2023-24868Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution VulnerabilityImportant
Microsoft PostScript Printer DriverCVE-2023-24872Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution VulnerabilityImportant
Microsoft PostScript Printer DriverCVE-2023-24876Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution VulnerabilityImportant
Microsoft PostScript Printer DriverCVE-2023-24913Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution VulnerabilityImportant
Microsoft PostScript Printer DriverCVE-2023-24864Microsoft PostScript and PCL6 Class Printer Driver Elevation of Privilege VulnerabilityImportant
Microsoft PostScript Printer DriverCVE-2023-24866Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure VulnerabilityImportant
Microsoft PostScript Printer DriverCVE-2023-24906Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure VulnerabilityImportant
Microsoft PostScript Printer DriverCVE-2023-24867Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution VulnerabilityImportant
Microsoft PostScript Printer DriverCVE-2023-24863Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure VulnerabilityImportant
Microsoft PostScript Printer DriverCVE-2023-24858Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure VulnerabilityImportant
Microsoft PostScript Printer DriverCVE-2023-24911Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure VulnerabilityImportant
Microsoft PostScript Printer DriverCVE-2023-24870Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure VulnerabilityImportant
Microsoft PostScript Printer DriverCVE-2023-24909Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution VulnerabilityImportant
Microsoft PostScript Printer DriverCVE-2023-23406Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution VulnerabilityImportant
Microsoft PostScript Printer DriverCVE-2023-23413Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution VulnerabilityImportant
Microsoft PostScript Printer DriverCVE-2023-24856Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure VulnerabilityImportant
Microsoft Printer DriversCVE-2023-24865Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure VulnerabilityImportant
Microsoft Printer DriversCVE-2023-23403Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution VulnerabilityImportant
Microsoft Windows Codecs LibraryCVE-2023-23401Windows Media Remote Code Execution VulnerabilityImportant
Microsoft Windows Codecs LibraryCVE-2023-23402Windows Media Remote Code Execution VulnerabilityImportant
Office for AndroidCVE-2023-23391Office for Android Spoofing VulnerabilityImportant
Remote Access Service Point-to-Point Tunneling ProtocolCVE-2023-23404Windows Point-to-Point Tunneling Protocol Remote Code Execution VulnerabilityCritical
Role: DNS ServerCVE-2023-23400Windows DNS Server Remote Code Execution VulnerabilityImportant
Role: Windows Hyper-VCVE-2023-23411Windows Hyper-V Denial of Service VulnerabilityCritical
Service FabricCVE-2023-23383Service Fabric Explorer Spoofing VulnerabilityImportant
Visual StudioCVE-2023-23618GitHub: CVE-2023-23618 Git for Windows Remote Code Execution VulnerabilityImportant
Visual StudioCVE-2023-22743GitHub: CVE-2023-22743 Git for Windows Installer Elevation of Privilege VulnerabilityImportant
Visual StudioCVE-2023-23946GitHub: CVE-2023-23946 mingit Remote Code Execution VulnerabilityImportant
Visual StudioCVE-2023-22490GitHub: CVE-2023-22490 mingit Information Disclosure VulnerabilityImportant
Windows Accounts ControlCVE-2023-23412Windows Accounts Picture Elevation of Privilege VulnerabilityImportant
Windows Bluetooth ServiceCVE-2023-24871Windows Bluetooth Service Remote Code Execution VulnerabilityImportant
Windows Central Resource ManagerCVE-2023-23393Windows BrokerInfrastructure Service Elevation of Privilege VulnerabilityImportant
Windows Cryptographic ServicesCVE-2023-23416Windows Cryptographic Services Remote Code Execution VulnerabilityCritical
Windows DefenderCVE-2023-23389Microsoft Defender Elevation of Privilege VulnerabilityImportant
Windows HTTP Protocol StackCVE-2023-23392HTTP Protocol Stack Remote Code Execution VulnerabilityCritical
Windows HTTP.sysCVE-2023-23410Windows HTTP.sys Elevation of Privilege VulnerabilityImportant
Windows Internet Key Exchange (IKE) ProtocolCVE-2023-24859Windows Internet Key Exchange (IKE) Extension Denial of Service VulnerabilityImportant
Windows KernelCVE-2023-23420Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2023-23422Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2023-23421Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2023-23423Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows Partition Management DriverCVE-2023-23417Windows Partition Management Driver Elevation of Privilege VulnerabilityImportant
Windows Point-to-Point Protocol over Ethernet (PPPoE)CVE-2023-23407Windows Point-to-Point Protocol over Ethernet (PPPoE) Remote Code Execution VulnerabilityImportant
Windows Point-to-Point Protocol over Ethernet (PPPoE)CVE-2023-23385Windows Point-to-Point Protocol over Ethernet (PPPoE) Elevation of Privilege VulnerabilityImportant
Windows Point-to-Point Protocol over Ethernet (PPPoE)CVE-2023-23414Windows Point-to-Point Protocol over Ethernet (PPPoE) Remote Code Execution VulnerabilityImportant
Windows Remote Procedure CallCVE-2023-21708Remote Procedure Call Runtime Remote Code Execution VulnerabilityCritical
Windows Remote Procedure Call RuntimeCVE-2023-23405Remote Procedure Call Runtime Remote Code Execution VulnerabilityImportant
Windows Remote Procedure Call RuntimeCVE-2023-24869Remote Procedure Call Runtime Remote Code Execution VulnerabilityImportant
Windows Remote Procedure Call RuntimeCVE-2023-24908Remote Procedure Call Runtime Remote Code Execution VulnerabilityImportant
Windows Resilient File System (ReFS)CVE-2023-23419Windows Resilient File System (ReFS) Elevation of Privilege VulnerabilityImportant
Windows Resilient File System (ReFS)CVE-2023-23418Windows Resilient File System (ReFS) Elevation of Privilege VulnerabilityImportant
Windows Secure ChannelCVE-2023-24862Windows Secure Channel Denial of Service VulnerabilityImportant
Windows SmartScreenCVE-2023-24880Windows SmartScreen Security Feature Bypass VulnerabilityModerate
Windows TPMCVE-2023-1017CERT/CC: CVE-2023-1017 TPM2.0 Module Library Elevation of Privilege VulnerabilityCritical
Windows TPMCVE-2023-1018CERT/CC: CVE-2023-1018 TPM2.0 Module Library Elevation of Privilege VulnerabilityCritical
Windows Win32KCVE-2023-24861Windows Graphics Component Elevation of Privilege VulnerabilityImportant

Source: https://www.bleepingcomputer.com/news/microsoft/microsoft-march-2023-patch-tuesday-fixes-2-zero-days-83-flaws/

Click to comment
Exit mobile version