
Microsoft has released its May 2023 Patch Tuesday security updates to fix multiple vulnerabilities across its products, including two reported vulnerabilities (CVE-2023-24932 and CVE-2023-29336) that are currently being exploited in the wild.
Based on the official release notes from Microsoft, there are a total of 49 vulnerabilities. Of these vulnerabilities, six are classified as critical, 33 are classified as important, one is classified as moderate, and nine are classified as none.
_____________________________
A. List of Vulnerabilities
Product | Details | Impact | Severity |
Microsoft SharePoint Server Subscription Edition | CVE-2023-24950 | Spoofing | Important |
Windows 10 Version 22H2 for 32-bit Systems | CVE-2023-24949 | Elevation of Privilege | Important |
Windows Server 2016 (Server Core installation) | CVE-2023-24947 | Remote Code Execution | Important |
Windows Server 2012 R2 (Server Core installation) | CVE-2023-24903 | Remote Code Execution | Critical |
Microsoft Office LTSC for Mac 2021 | CVE-2023-29344 | Remote Code Execution | Important |
Windows Sysmon | CVE-2023-29343 | Elevation of Privilege | Important |
AV1 Video Extension | CVE-2023-29341 | Remote Code Execution | Important |
AV1 Video Extension | CVE-2023-29340 | Remote Code Execution | Important |
Visual Studio Code | CVE-2023-29338 | Information Disclosure | Important |
Windows Server 2012 R2 (Server Core installation) | CVE-2023-29336 | Elevation of Privilege | Important |
Microsoft Word 2013 Service Pack 1 (64-bit editions) | CVE-2023-29335 | Security Feature Bypass | Important |
Microsoft Office LTSC 2021 for 32-bit editions | CVE-2023-29333 | Denial of Service | Important |
Windows Server 2012 R2 (Server Core installation) | CVE-2023-29325 | Remote Code Execution | Critical |
Windows Server 2012 R2 (Server Core installation) | CVE-2023-29324 | Security Feature Bypass | Important |
Microsoft SharePoint Server Subscription Edition | CVE-2023-24955 | Remote Code Execution | Critical |
Microsoft SharePoint Server Subscription Edition | CVE-2023-24954 | Information Disclosure | Important |
Microsoft Excel 2013 Service Pack 1 (64-bit editions) | CVE-2023-24953 | Remote Code Execution | Important |
Windows Server 2012 R2 (Server Core installation) | CVE-2023-24948 | Elevation of Privilege | Important |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | CVE-2023-24946 | Elevation of Privilege | Important |
Windows Server 2012 R2 (Server Core installation) | CVE-2023-24945 | Information Disclosure | Important |
Windows 10 Version 22H2 for 32-bit Systems | CVE-2023-24944 | Information Disclosure | Important |
Windows 10 Version 22H2 for 32-bit Systems | CVE-2023-24905 | Remote Code Execution | Important |
Windows Server 2012 R2 (Server Core installation) | CVE-2023-24943 | Remote Code Execution | Critical |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | CVE-2023-24904 | Elevation of Privilege | Important |
Windows Server 2012 R2 (Server Core installation) | CVE-2023-24942 | Denial of Service | Important |
Windows 11 Version 22H2 for x64-based Systems | CVE-2023-24902 | Elevation of Privilege | Important |
Windows Server 2012 R2 (Server Core installation) | CVE-2023-24941 | Remote Code Execution | Critical |
Windows Server 2012 R2 (Server Core installation) | CVE-2023-24901 | Information Disclosure | Important |
Windows Server 2012 R2 (Server Core installation) | CVE-2023-24940 | Denial of Service | Important |
Windows Server 2012 R2 (Server Core installation) | CVE-2023-24900 | Information Disclosure | Important |
Windows Server 2012 R2 (Server Core installation) | CVE-2023-24939 | Denial of Service | Important |
Windows 11 Version 22H2 for x64-based Systems | CVE-2023-24899 | Elevation of Privilege | Important |
Windows Server 2022 (Server Core installation) | CVE-2023-24898 | Denial of Service | Important |
Microsoft Remote Desktop | CVE-2023-28290 | Information Disclosure | Important |
Windows Server 2012 R2 (Server Core installation) | CVE-2023-28283 | Remote Code Execution | Critical |
Windows Server 2012 R2 (Server Core installation) | CVE-2023-28251 | Security Feature Bypass | Important |
Windows Server 2012 R2 (Server Core installation) | CVE-2023-24932 | Security Feature Bypass | Important |
Microsoft Teams | CVE-2023-24881 | Information Disclosure | Important |
Microsoft Edge (Chromium-based) | CVE-2023-29354 | Security Feature Bypass | Moderate |
Microsoft Edge (Chromium-based) | CVE-2023-29350 | Elevation of Privilege | Important |
Microsoft Edge (Chromium-based) | CVE-2023-2468 | – | – |
Microsoft Edge (Chromium-based) | CVE-2023-2467 | – | – |
Microsoft Edge (Chromium-based) | CVE-2023-2466 | – | – |
Microsoft Edge (Chromium-based) | CVE-2023-2465 | – | – |
Microsoft Edge (Chromium-based) | CVE-2023-2464 | – | – |
Microsoft Edge (Chromium-based) | CVE-2023-2463 | – | – |
Microsoft Edge (Chromium-based) | CVE-2023-2462 | – | – |
Microsoft Edge (Chromium-based) | CVE-2023-2460 | – | – |
Microsoft Edge (Chromium-based) | CVE-2023-2459 | – | – |
____________________________
B. Actions to be Taken
CERT-PH recommends the following actions be taken:
- Kindly review and apply the necessary updates to mitigate future threats.
- For additional information, kindly refer to the official report
- https://msrc.microsoft.com/update-guide/releaseNote/2023-May
- https://msrc.microsoft.com/update-guide/vulnerability