Microsoft Monthly Security Update (August 2023)
Microsoft has released monthly security update for their products:
Vulnerable Product | Risk Level | Impacts | Notes |
Browser | Security Restriction Bypass | ||
Microsoft Office | Remote Code Execution Information Disclosure Spoofing | CVE-2023-36884 is being exploited in the wild. The vulnerability can be exploited to bypass the Mark of the Web (MoTW) security feature. This allows the files to be opened without triggering a security warning, and facilitated the execution of remote code. It is rated as extremely high risk. | |
Windows | Elevation of Privilege Remote Code Execution Security Restriction Bypass Information Disclosure Denial of Service | ||
Extended Security Updates (ESU) | Elevation of Privilege Remote Code Execution Security Restriction Bypass Information Disclosure Denial of Service | ||
Exchange Server | Remote Code Execution Elevation of Privilege Spoofing | ||
Developer Tools | Spoofing Elevation of Privilege Remote Code Execution Information Disclosure Denial of Service | CVE-2023-38180 is being exploited in the wild. The vulnerability can cause a DDoS attack on .NET applications and Visual Studio. It is rated as extremely high risk. | |
Azure | Spoofing Elevation of Privilege | ||
Microsoft Dynamics | Remote Code Execution Elevation of Privilege | ||
System Center | Elevation of Privilege | ||
SQL Server | Remote Code Execution |
Number of ‘Extremely High Risk’ product(s): 2
Number of ‘High Risk’ product(s): 0
Number of ‘Medium Risk’ product(s): 8
Number of ‘Low Risk’ product(s): 0
Evaluation of overall ‘Risk Level’: Extremely High Risk
RISK: Extremely High Risk
TYPE: Operating Systems – Windows OS
Impact
- Denial of Service
- Elevation of Privilege
- Information Disclosure
- Remote Code Execution
- Spoofing
- Security Restriction Bypass
System / Technologies affected
- Browser
- Microsoft Office
- Windows
- Extended Security Updates (ESU)
- Exchange Server
- Developer Tools
- Azure
- Microsoft Dynamics
- System Center
- SQL Server
Solutions
Before installation of the software, please visit the vendor web-site for more details.
- Apply fixes issued by the vendor.
Vulnerability Identifier
Source
Related Link
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.