
Microsoft releases 38 fixes this month including 7 Critical and 1 Weaponised Threat
- Vendor Severity: Important
- CVSS: 7.8
- Weaponised: Yes
- Public Aware: No
- Countermeasure: No
- Attack Vector: Local
- Attack Complexity: Low
- Privileges: Low
- User Interaction: None
- Scope (Jump Point): Unchanged / No
- Vendor Severity: Critical
- CVSS: 8.1
- Weaponised: No
- Public Aware: Yes
- Countermeasure: No
- Attack Vector: Network
- Attack Complexity: High
- Privileges: None
- User Interaction: None
- Scope (Jump Point): Unchanged / No
- Vendor Severity: Critical
- CVSS: 9.8
- Weaponised: No
- Public Aware: Yes
- Countermeasure: No
- Attack Vector: Network
- Attack Complexity: High
- Privileges: None
- User Interaction: None
- Scope (Jump Point): Unchanged / No
Reference | Description | Vendor Severity | CVSS Score | Weaponised | Publicly Aware | Impact | Countermeasure | Exploitability Assessment | Additional Details |
CVE-2023-29336 | Win32k Elevation of Privilege Vulnerability | Important | 7.8 | Yes | No | Elevation of Privilege | Exploitation Detected | An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. | |
CVE-2023-29325 | Windows OLE Remote Code Execution Vulnerability | Critical | 8.1 | No | Yes | Remote Code Execution | Exploitation More Likely | ||
CVE-2023-24932 | Secure Boot Security Feature Bypass Vulnerability | Important | 6.7 | No | Yes | Security Feature Bypass | Exploitation Less Likely | An attacker who successfully exploited this vulnerability could bypass Secure Boot. | |
CVE-2023-24941 | Windows Network File System Remote Code Execution Vulnerability | Critical | 9.8 | No | No | Remote Code Execution |
This vulnerability is not exploitable in NFSV2.0 or NFSV3.0. Prior to updating your version of Windows that protects against this vulnerability, you can mitigate an attack by disabling NFSV4.1. This could adversely affect your ecosystem and should only be used as a temporary mitigation. Warning You should NOT apply this mitigation unless you have installed the May 2022 Windows security updates. Those updates address CVE-2022-26937 which is a Critical vulnerability in NFSV2.0 and NFSV3.0. |
Exploitation More Likely | This vulnerability could be exploited over the network by making an unauthenticated, specially crafted call to a Network File System (NFS) service to trigger a Remote Code Execution (RCE). |
CVE-2023-24943 | Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability | Critical | 9.8 | No | No | Remote Code Execution | Only PGM Server is vulnerable to this vulnerability. To mitigate risk, Microsoft recommends customers deploy newer technologies such as Unicast or Multicast server. | Exploitation Less Likely | When Windows Message Queuing service is running in a PGM Server environment, a specially crafted file over the network to achieve remote code execution and attempt to trigger malicious code. |
CVE-2023-24947 | Windows Bluetooth Driver Remote Code Execution Vulnerability | Important | 8.8 | No | No | Remote Code Execution | Exploitation Less Likely | An unauthorized attacker could exploit the Windows Bluetooth driver vulnerability by programmatically running certain functions that could lead to remote code execution on the Bluetooth component. | |
CVE-2023-24903 | Windows Secure Socket Tunnelling Protocol (SSTP) Remote Code Execution Vulnerability | Critical | 8.1 | No | No | Remote Code Execution | Exploitation Less Likely | ||
CVE-2023-28283 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability | Critical | 8.1 | No | No | Remote Code Execution | Exploitation Less Likely | ||
CVE-2023-24902 | Win32k Elevation of Privilege Vulnerability | Important | 7.8 | No | No | Elevation of Privilege | Exploitation More Likely | An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. | |
CVE-2023-24905 | Remote Desktop Client Remote Code Execution Vulnerability | Important | 7.8 | No | No | Remote Code Execution | Exploitation Less Likely | An attacker could host the malicious .rdp file on a file share, a user accessing the .rdp file from the share would be vulnerable to remote code execution. | |
CVE-2023-24946 | Windows Backup Service Elevation of Privilege Vulnerability | Important | 7.8 | No | No | Elevation of Privilege | Exploitation Less Likely | An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. | |
CVE-2023-24949 | Windows Kernel Elevation of Privilege Vulnerability | Important | 7.8 | No | No | Elevation of Privilege | Exploitation More Likely | An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. | |
CVE-2023-24953 | Microsoft Excel Remote Code Execution Vulnerability | Important | 7.8 | No | No | Remote Code Execution | Exploitation Less Likely | ||
CVE-2023-29340 | AV1 Video Extension Remote Code Execution Vulnerability | Important | 7.8 | No | No | Remote Code Execution | Exploitation Less Likely | ||
CVE-2023-29341 | AV1 Video Extension Remote Code Execution Vulnerability | Important | 7.8 | No | No | Remote Code Execution | Exploitation Less Likely | ||
CVE-2023-29343 | SysInternals Sysmon for Windows Elevation of Privilege Vulnerability | Important | 7.8 | No | No | Elevation of Privilege | Exploitation Less Likely | An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. | |
CVE-2023-29344 | Microsoft Office Remote Code Execution Vulnerability | Important | 7.8 | No | No | Remote Code Execution | Exploitation Less Likely | ||
CVE-2023-29324 | Windows MSHTML Platform Elevation of Privilege Vulnerability | Critical | 7.5 | No | No | Security Feature Bypass | Exploitation More Likely | An attacker who successfully exploited this vulnerability could gain administrator privileges. | |
CVE-2023-24898 | Windows SMB Denial of Service Vulnerability | Important | 7.5 | No | No | Denial of Service | Exploitation Less Likely | ||
CVE-2023-24901 | Windows NFS Portmapper Information Disclosure Vulnerability | Important | 7.5 | No | No | Information Disclosure | Exploitation Less Likely | ||
CVE-2023-24939 | Server for NFS Denial of Service Vulnerability | Important | 7.5 | No | No | Denial of Service | Exploitation Less Likely | ||
CVE-2023-24940 | Windows Pragmatic General Multicast (PGM) Denial of Service Vulnerability | Important | 7.5 | No | No | Denial of Service | Exploitation Less Likely | ||
CVE-2023-24942 | Remote Procedure Call Runtime Denial of Service Vulnerability | Important | 7.5 | No | No | Denial of Service | Exploitation Less Likely |

Schedule Your Syxsense Demo
Syxsense combines IT management, patch management, and security vulnerability scanning in one powerful solution. Get started today.