October 2023 Patch Tuesday: Microsoft releases 104 fixes this month

Microsoft patches this month include 12 Critical and 2 Weaponised Threats

There are 12 Critical and 92 Important fixes this month.  Microsoft Windows and Windows Components, Exchange Server, Microsoft Office and Office Components, ASP.NET, Visual Studio, Azure, Microsoft Dynamics and Skype for Business have all received fixes this month.

Robert Brown, Head of Customer Success for Syxsense said, “We have 2 patches that resolve vulnerabilities which are Weaponised and both of those are Publicly Aware.  If you count all the individual CVSS scores together, October has a combined CVSS score of 756.8 up from 434.3 last month, however the average CVSS score was 7.3 which almost matches last month’s median score even though there were double the updates were fixed.”

Based on the Vendor Severity & CVSS Score, we have made a few recommendations below.  As usual we recommend our customers enter the CVE numbers below into your Patch Management solution and deploy as soon as testing is complete.

 

CVE-2023-36563 – Microsoft WordPad Information Disclosure Vulnerability

This is the same kind of vulnerability as CVE-2023-36761 which was fixed last month.  Exploiting this vulnerability could allow the disclosure of NTLM hashes, and as this was found via the Microsoft Threat Intelligence teams, this is likely being used to ransomware attacks.

Note:  The vulnerability is Weaponised and Publicly Aware

Syxscore

  • Vendor Severity: Important
  • CVSS: 6.5
  • Weaponised: Yes
  • Public Aware: Yes
  • Countermeasure: No

Risk

  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: Required
  • Scope / Jump Point: Unchanged / No

 

CVE-2023-41763 – Skype for Business Elevation of Privilege Vulnerability

This vulnerability is one of four updates fixed for Skype for Business this month.   Although this vulnerability impacts Skype for Business Server 2013 and 2019, we have already found several detections where customers have re-provisioned servers for other purposes once they migrated to Teams, making this a hidden and extremely serious vulnerability to identify and resolve.  Simply turning this off leaves you at risk.

Note:  The vulnerability is Weaponised and Publicly Aware

Syxscore

  • Vendor Severity: Important
  • CVSS: 5.3
  • Weaponised: Yes
  • Public Aware: Yes
  • Countermeasure: No

Risk

  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: None
  • Scope / Jump Point: Unchanged / No

 

CVE-2023-35349 – Microsoft Message Queuing Remote Code Execution Vulnerability

Successful exploitation of this vulnerability could allow an unauthenticated attacker to remotely execute code on the target server.  NOTE: The Windows message queuing service, which is a Windows component, needs to be enabled for a system to be exploitable by this vulnerability. This feature can be added via the Control Panel.

Note:  The vulnerability is one of two fixes with a CVSS score of 9.8

Syxscore

  • Vendor Severity: Critical
  • CVSS: 9.8
  • Weaponised: No
  • Public Aware: No
  • Countermeasure: Yes

Risk

  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: None
  • Scope / Jump Point: Unchanged / No
Reference Description Severity CVSS Score Weaponised Publicly Disclosed Impact Exploitability Assessment Additional Details Impact
CVE-2023-36563 Microsoft WordPad Information Disclosure Vulnerability Important 6.5 Yes Yes Information Disclosure Exploitation Detected Exploiting this vulnerability could allow the disclosure of NTLM hashes. Information Disclosure
CVE-2023-41763 Skype for Business Elevation of Privilege Vulnerability Important 5.3 Yes Yes Elevation of Privilege Exploitation Detected   Elevation of Privilege
CVE-2023-35349 Microsoft Message Queuing Remote Code Execution Vulnerability Critical 9.8 No No Remote Code Execution Exploitation Less Likely Successful exploitation of this vulnerability could allow an unauthenticated attacker to remotely execute code on the target server.

The Windows message queuing service, which is a Windows component, needs to be enabled for a system to be exploitable by this vulnerability. This feature can be added via the Control Panel.

Remote Code Execution
CVE-2023-36434 Windows IIS Server Elevation of Privilege Vulnerability Important 9.8 No No Security Feature Bypass Exploitation Less Likely The attacker would be able to login as another user successfully.

In a network-based attack, an attacker could brute force user account passwords to log in as that user. Microsoft encourages the use of strong passwords that are more difficult for an attacker to brute force.

Remote Code Execution
CVE-2023-36414 Azure Identity SDK Remote Code Execution Vulnerability Important 8.8 No No Remote Code Execution Exploitation Less Likely An attacker who successfully exploited this vulnerability could gain high privileges, which include read, write, and delete functionality.

An attacker could then exploit an integer overflow vulnerability that results in arbitrary heap writes, which could be used to perform arbitrary code execution.

Elevation of Privilege
CVE-2023-36415 Azure Identity SDK Remote Code Execution Vulnerability Important 8.8 No No Remote Code Execution Exploitation Less Likely The attacker for this vulnerability could target the server accounts in an arbitrary or remote code execution. As an authenticated user, the attacker could attempt to trigger malicious code in the context of the server’s account through a network call. Remote Code Execution
CVE-2023-36419 Azure HDInsight Apache Oozie Workflow Scheduler Elevation of Privilege Vulnerability Important 8.8 No No Elevation of Privilege Exploitation Less Likely An attacker who successfully exploited this vulnerability could gain cluster administrator privileges. Remote Code Execution
CVE-2023-36577 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability Important 8.8 No No Remote Code Execution Exploitation Less Likely   Remote Code Execution
CVE-2023-36569 Microsoft Office Elevation of Privilege Vulnerability Important 8.4 No No Elevation of Privilege Exploitation Less Likely An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Remote Code Execution
CVE-2023-38166 Layer 2 Tunnelling Protocol Remote Code Execution Vulnerability Critical 8.1 No No Remote Code Execution Exploitation Less Likely   Spoofing
CVE-2023-41765 Layer 2 Tunnelling Protocol Remote Code Execution Vulnerability Critical 8.1 No No Remote Code Execution Exploitation Less Likely   Not a Vulnerability
CVE-2023-41767 Layer 2 Tunnelling Protocol Remote Code Execution Vulnerability Critical 8.1 No No Remote Code Execution Exploitation Less Likely   Elevation of Privilege
CVE-2023-41768 Layer 2 Tunnelling Protocol Remote Code Execution Vulnerability Critical 8.1 No No Remote Code Execution Exploitation Less Likely   Remote Code Execution
CVE-2023-41769 Layer 2 Tunnelling Protocol Remote Code Execution Vulnerability Critical 8.1 No No Remote Code Execution Exploitation Less Likely   Remote Code Execution
CVE-2023-41770 Layer 2 Tunnelling Protocol Remote Code Execution Vulnerability Critical 8.1 No No Remote Code Execution Exploitation Less Likely   Remote Code Execution
CVE-2023-41771 Layer 2 Tunnelling Protocol Remote Code Execution Vulnerability Critical 8.1 No No Remote Code Execution Exploitation Less Likely   Elevation of Privilege
CVE-2023-41773 Layer 2 Tunnelling Protocol Remote Code Execution Vulnerability Critical 8.1 No No Remote Code Execution Exploitation Less Likely   Remote Code Execution
CVE-2023-41774 Layer 2 Tunnelling Protocol Remote Code Execution Vulnerability Critical 8.1 No No Remote Code Execution Exploitation Less Likely   Elevation of Privilege
CVE-2023-36778 Microsoft Exchange Server Remote Code Execution Vulnerability Important 8.0 No No Remote Code Execution Exploitation More Likely   Information Disclosure
CVE-2023-36718 Microsoft Virtual Trusted Platform Module Remote Code Execution Vulnerability Critical 7.8 No No Remote Code Execution Exploitation Less Likely Scope = Changed, Jump Point = True

Successful exploitation of this vulnerability would rely upon complex memory shaping techniques to attempt an attack.

Remote Code Execution
CVE-2023-36417 Microsoft SQL ODBC Driver Remote Code Execution Vulnerability Important 7.8 No No Remote Code Execution Exploitation Less Likely   Remote Code Execution
CVE-2023-36418 Azure RTOS GUIX Studio Remote Code Execution Vulnerability Important 7.8 No No Remote Code Execution Exploitation Less Likely   Remote Code Execution
CVE-2023-36436 Windows MSHTML Platform Remote Code Execution Vulnerability Important 7.8 No No Remote Code Execution Exploitation Less Likely An attacker could successfully exploit this vulnerability by invoking the PrintHTML API from a locally running application (or by tricking a user into doing so) which could allow the attacker to launch an app via application protocols without prompting the user. Remote Code Execution
CVE-2023-36557 PrintHTML API Remote Code Execution Vulnerability Important 7.8 No No Remote Code Execution Exploitation Less Likely An attacker could successfully exploit this vulnerability by invoking the PrintHTML API from a locally running application (or by tricking a user into doing so) which could allow the attacker to launch an app via application protocols without prompting the user. Remote Code Execution
CVE-2023-36593 Microsoft Message Queuing Remote Code Execution Vulnerability Important 7.8 No No Remote Code Execution Exploitation Less Likely Successful exploitation of this vulnerability could allow an authenticated domain user to remotely execute code on the target server. The attacker needs to convince a user on the target machine to connect to a malicious server or compromise a legitimate MSMQ server host and make it run as a malicious server. Remote Code Execution
CVE-2023-36594 Windows Graphics Component Elevation of Privilege Vulnerability Important 7.8 No No Elevation of Privilege Exploitation More Likely An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Remote Code Execution
CVE-2023-36598 Microsoft WDAC ODBC Driver Remote Code Execution Vulnerability Important 7.8 No No Remote Code Execution Exploitation Less Likely   Remote Code Execution
CVE-2023-36701 Microsoft Resilient File System (ReFS) Elevation of Privilege Vulnerability Important 7.8 No No Elevation of Privilege Exploitation Less Likely   Remote Code Execution
CVE-2023-36702 Microsoft DirectMusic Remote Code Execution Vulnerability Important 7.8 No No Remote Code Execution Exploitation Less Likely   Elevation of Privilege
CVE-2023-36703 DHCP Server Service Denial of Service Vulnerability Important 7.8 No No Denial of Service Exploitation Less Likely   Elevation of Privilege
CVE-2023-36704 Windows Setup Files Cleanup Remote Code Execution Vulnerability Important 7.8 No No Remote Code Execution Exploitation Less Likely   Elevation of Privilege
CVE-2023-36710 Windows Media Foundation Core Remote Code Execution Vulnerability Important 7.8 No No Remote Code Execution Exploitation Less Likely   Elevation of Privilege
CVE-2023-36711 Windows Runtime C++ Template Library Elevation of Privilege Vulnerability Important 7.8 No No Elevation of Privilege Exploitation Less Likely An attacker who successfully exploited this vulnerability could create or delete files in the security context of the “NT AUTHORITY\ LOCAL SERVICE” account. Elevation of Privilege
CVE-2023-36712 Windows Kernel Elevation of Privilege Vulnerability Important 7.8 No No Elevation of Privilege Exploitation Less Likely A domain user could use this vulnerability to elevate privileges to SYSTEM assigned integrity level. Elevation of Privilege
CVE-2023-36723 Windows Container Manager Service Elevation of Privilege Vulnerability Important 7.8 No No Elevation of Privilege Exploitation Less Likely An attacker who successfully exploited this vulnerability could gain specific limited SYSTEM privileges. Elevation of Privilege
CVE-2023-36725 Windows Kernel Elevation of Privilege Vulnerability Important 7.8 No No Elevation of Privilege Exploitation Less Likely   Elevation of Privilege
CVE-2023-36726 Windows Internet Key Exchange (IKE) Extension Elevation of Privilege Vulnerability Important 7.8 No No Elevation of Privilege Exploitation Less Likely A domain user could use this vulnerability to elevate privileges to SYSTEM assigned integrity level. Security Feature Bypass
CVE-2023-36729 Named Pipe File System Elevation of Privilege Vulnerability Important 7.8 No No Elevation of Privilege Exploitation Less Likely An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Spoofing
CVE-2023-36730 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability Important 7.8 No No Remote Code Execution Exploitation Less Likely An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. Spoofing
CVE-2023-36731 Win32k Elevation of Privilege Vulnerability Important 7.8 No No Elevation of Privilege Exploitation More Likely An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Spoofing
CVE-2023-36732 Win32k Elevation of Privilege Vulnerability Important 7.8 No No Elevation of Privilege Exploitation More Likely An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Elevation of Privilege
CVE-2023-36737 Azure Network Watcher VM Agent Elevation of Privilege Vulnerability Important 7.8 No No Elevation of Privilege Exploitation Less Likely   Information Disclosure
CVE-2023-36743 Win32k Elevation of Privilege Vulnerability Important 7.8 No No Elevation of Privilege Exploitation More Likely An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Denial of Service
CVE-2023-36785 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability Important 7.8 No No Remote Code Execution Exploitation Less Likely An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. Denial of Service
CVE-2023-36790 Windows RDP Encoder Mirror Driver Elevation of Privilege Vulnerability Important 7.8 No No Elevation of Privilege Exploitation Less Likely An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Remote Code Execution
CVE-2023-41766 Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability Important 7.8 No No Elevation of Privilege Exploitation Less Likely   Elevation of Privilege
CVE-2023-36431 Microsoft Message Queuing Denial of Service Vulnerability Important 7.5 No No Denial of Service Exploitation Less Likely   Remote Code Execution
CVE-2023-36435 Microsoft QUIC Denial of Service Vulnerability Important 7.5 No No Denial of Service Exploitation Less Likely   Elevation of Privilege
CVE-2023-36438 Windows TCP/IP Information Disclosure Vulnerability Important 7.5 No No Information Disclosure Exploitation Less Likely The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the unencrypted contents of IPsec packets from other sessions on a server. Denial of Service
CVE-2023-36567 Windows Deployment Services Information Disclosure Vulnerability Important 7.5 No No Information Disclosure Exploitation Less Likely An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory. Denial of Service
CVE-2023-36579 Microsoft Message Queuing Denial of Service Vulnerability Important 7.5 No No Denial of Service Exploitation Less Likely   Information Disclosure
CVE-2023-36581 Microsoft Message Queuing Denial of Service Vulnerability Important 7.5 No No Denial of Service Exploitation Less Likely   Information Disclosure
CVE-2023-36585 Active Template Library Denial of Service Vulnerability Important 7.5 No No Denial of Service Exploitation Less Likely   Information Disclosure
CVE-2023-36602 Windows TCP/IP Denial of Service Vulnerability Important 7.5 No No Denial of Service Exploitation Less Likely   Information Disclosure
CVE-2023-36603 Windows TCP/IP Denial of Service Vulnerability Important 7.5 No No Denial of Service Exploitation Less Likely   Information Disclosure
CVE-2023-36606 Microsoft Message Queuing Denial of Service Vulnerability Important 7.5 No No Denial of Service Exploitation Less Likely   Information Disclosure
CVE-2023-36709 Microsoft AllJoyn API Denial of Service Vulnerability Important 7.5 No No Denial of Service Exploitation Less Likely   Remote Code Execution
CVE-2023-36720 Windows Mixed Reality Developer Tools Denial of Service Vulnerability Important 7.5 No No Denial of Service Exploitation Less Likely   Security Feature Bypass
CVE-2023-38171 Microsoft QUIC Denial of Service Vulnerability Important 7.5 No No Denial of Service Exploitation Less Likely   Spoofing
CVE-2023-36605 Windows Named Pipe Filesystem Elevation of Privilege Vulnerability Important 7.4 No No Elevation of Privilege Exploitation Less Likely  
CVE-2023-36420 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability Important 7.3 No No Remote Code Execution Exploitation Less Likely  
CVE-2023-36561 Azure DevOps Server Elevation of Privilege Vulnerability Important 7.3 No No Elevation of Privilege Exploitation Less Likely The attacker would gain access to the secrets of the user of the affected application.
CVE-2023-36570 Microsoft Message Queuing Remote Code Execution Vulnerability Important 7.3 No No Remote Code Execution Exploitation Less Likely Successful exploitation of this vulnerability could allow an authenticated domain user to remotely execute code on the target server. The attacker needs to convince a user on the target machine to connect to a malicious server or compromise a legitimate MSMQ server host and make it run as a malicious server.
CVE-2023-36571 Microsoft Message Queuing Remote Code Execution Vulnerability Important 7.3 No No Remote Code Execution Exploitation Less Likely Successful exploitation of this vulnerability could allow an authenticated domain user to remotely execute code on the target server. The attacker needs to convince a user on the target machine to connect to a malicious server or compromise a legitimate MSMQ server host and make it run as a malicious server.
CVE-2023-36572 Microsoft Message Queuing Remote Code Execution Vulnerability Important 7.3 No No Remote Code Execution Exploitation Less Likely Successful exploitation of this vulnerability could allow an authenticated domain user to remotely execute code on the target server. The attacker needs to convince a user on the target machine to connect to a malicious server or compromise a legitimate MSMQ server host and make it run as a malicious server.
CVE-2023-36573 Microsoft Message Queuing Remote Code Execution Vulnerability Important 7.3 No No Remote Code Execution Exploitation Less Likely Successful exploitation of this vulnerability could allow an authenticated domain user to remotely execute code on the target server. The attacker needs to convince a user on the target machine to connect to a malicious server or compromise a legitimate MSMQ server host and make it run as a malicious server.
CVE-2023-36574 Microsoft Message Queuing Remote Code Execution Vulnerability Important 7.3 No No Remote Code Execution Exploitation Less Likely Successful exploitation of this vulnerability could allow an authenticated domain user to remotely execute code on the target server. The attacker needs to convince a user on the target machine to connect to a malicious server or compromise a legitimate MSMQ server host and make it run as a malicious server.
CVE-2023-36575 Microsoft Message Queuing Remote Code Execution Vulnerability Important 7.3 No No Remote Code Execution Exploitation Less Likely Successful exploitation of this vulnerability could allow an authenticated domain user to remotely execute code on the target server. The attacker needs to convince a user on the target machine to connect to a malicious server or compromise a legitimate MSMQ server host and make it run as a malicious server.
CVE-2023-36578 Microsoft Message Queuing Remote Code Execution Vulnerability Important 7.3 No No Remote Code Execution Exploitation Less Likely Successful exploitation of this vulnerability could allow an authenticated domain user to remotely execute code on the target server. The attacker needs to convince a user on the target machine to connect to a malicious server or compromise a legitimate MSMQ server host and make it run as a malicious server.
CVE-2023-36582 Microsoft Message Queuing Remote Code Execution Vulnerability Important 7.3 No No Remote Code Execution Exploitation Less Likely  
CVE-2023-36583 Microsoft Message Queuing Remote Code Execution Vulnerability Important 7.3 No No Remote Code Execution Exploitation Less Likely Successful exploitation of this vulnerability could allow an authenticated domain user to remotely execute code on the target server. The attacker needs to convince a user on the target machine to connect to a malicious server or compromise a legitimate MSMQ server host and make it run as a malicious server.
CVE-2023-36589 Microsoft Message Queuing Remote Code Execution Vulnerability Important 7.3 No No Remote Code Execution Exploitation Less Likely Successful exploitation of this vulnerability could allow an authenticated domain user to remotely execute code on the target server. The attacker needs to convince a user on the target machine to connect to a malicious server or compromise a legitimate MSMQ server host and make it run as a malicious server.
CVE-2023-36590 Microsoft Message Queuing Remote Code Execution Vulnerability Important 7.3 No No Remote Code Execution Exploitation Less Likely Successful exploitation of this vulnerability could allow an authenticated domain user to remotely execute code on the target server. The attacker needs to convince a user on the target machine to connect to a malicious server or compromise a legitimate MSMQ server host and make it run as a malicious server.
CVE-2023-36591 Microsoft Message Queuing Remote Code Execution Vulnerability Important 7.3 No No Remote Code Execution Exploitation Less Likely Successful exploitation of this vulnerability could allow an authenticated domain user to remotely execute code on the target server. The attacker needs to convince a user on the target machine to connect to a malicious server or compromise a legitimate MSMQ server host and make it run as a malicious server.
CVE-2023-36592 Microsoft Message Queuing Remote Code Execution Vulnerability Important 7.3 No No Remote Code Execution Exploitation Less Likely Successful exploitation of this vulnerability could allow an authenticated domain user to remotely execute code on the target server. The attacker needs to convince a user on the target machine to connect to a malicious server or compromise a legitimate MSMQ server host and make it run as a malicious server.
CVE-2023-36780 Skype for Business Remote Code Execution Vulnerability Important 7.2 No No Remote Code Execution Exploitation More Likely  
CVE-2023-36786 Skype for Business Remote Code Execution Vulnerability Important 7.2 No No Remote Code Execution Exploitation Less Likely  
CVE-2023-36789 Skype for Business Remote Code Execution Vulnerability Important 7.2 No No Remote Code Execution Exploitation Less Likely  
CVE-2023-36565 Microsoft Office Graphics Elevation of Privilege Vulnerability Important 7.0 No No Remote Code Execution Exploitation Less Likely An attacker who successfully exploited this vulnerability could gain administrator privileges.
CVE-2023-36568 Microsoft Office Click-To-Run Elevation of Privilege Vulnerability Important 7.0 No No Elevation of Privilege Exploitation Less Likely An attacker who successfully exploited this vulnerability could gain administrator privileges.
CVE-2023-36721 Windows Error Reporting Service Elevation of Privilege Vulnerability Important 7.0 No No Elevation of Privilege Exploitation Less Likely An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
CVE-2023-36776 Win32k Elevation of Privilege Vulnerability Important 7.0 No No Elevation of Privilege Exploitation More Likely A local, authenticated attacker could gain elevated local system or administrator privileges through a vulnerability in the Win32k.sys driver.
CVE-2023-36902 Windows Runtime Remote Code Execution Vulnerability Important 7.0 No No Remote Code Execution Exploitation Less Likely  
CVE-2023-38159 Windows Graphics Component Elevation of Privilege Vulnerability Important 7.0 No No Elevation of Privilege Exploitation More Likely An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
CVE-2023-36697 Microsoft Message Queuing Remote Code Execution Vulnerability Critical 6.8 No No Remote Code Execution Exploitation Less Likely  
CVE-2023-29348 Windows Remote Desktop Gateway (RD Gateway) Information Disclosure Vulnerability Important 6.5 No No Information Disclosure Exploitation Less Likely The type of information that could be disclosed if an attacker successfully exploited this vulnerability is remote heap memory.
CVE-2023-36429 Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability Important 6.5 No No Information Disclosure Exploitation Less Likely  
CVE-2023-36433 Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability Important 6.5 No No Remote Code Execution Exploitation Less Likely  
CVE-2023-36564 Windows Search Security Feature Bypass Vulnerability Important 6.5 No No Security Feature Bypass Exploitation Less Likely A security feature bypass vulnerability exists when MapUrlToZone fails to correctly handle certain paths. This could allow an attacker to plant files without Mark-of-the-Web (MotW).
CVE-2023-36566 Microsoft Common Data Model SDK Denial of Service Vulnerability Important 6.5 No No Denial of Service Exploitation Less Likely Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.
CVE-2023-36596 Remote Procedure Call Information Disclosure Vulnerability Important 6.5 No No Information Disclosure Exploitation Less Likely An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.
CVE-2023-36706 Windows Deployment Services Information Disclosure Vulnerability Important 6.5 No No Information Disclosure Exploitation Less Likely An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.
CVE-2023-36707 Windows Deployment Services Denial of Service Vulnerability Important 6.5 No No Denial of Service Exploitation Less Likely  
CVE-2023-36717 Windows Virtual Trusted Platform Module Denial of Service Vulnerability Important 6.5 No No Denial of Service Exploitation Less Likely Scope = Changes, Jump Point = True

Successful exploitation of this vulnerability could allow a Hyper-V guest to affect the functionality of the Hyper-V host.

CVE-2023-36416 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability Important 6.1 No No Spoofing Exploitation Less Likely Scope = Changed, Jump Point = True

The vulnerability is in the web server, but the malicious scripts execute in the victim’s browser on their machine.

CVE-2023-36576 Windows Kernel Information Disclosure Vulnerability Important 5.5 No No Information Disclosure Exploitation Less Likely The type of information that could be disclosed if an attacker successfully exploited this vulnerability is device information like resource ids, Sas tokens, user properties, and other sensitive information.
CVE-2023-36700 Microsoft Defender Security Feature Bypass Vulnerability Important 5.5 No No Security Feature Bypass Exploitation Less Likely  
CVE-2023-36713 Windows Common Log File System Driver Information Disclosure Vulnerability Important 5.5 No No Information Disclosure Exploitation More Likely An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.
CVE-2023-36724 Windows Power Management Service Information Disclosure Vulnerability Important 5.5 No No Information Disclosure Exploitation Less Likely  
CVE-2023-36728 Microsoft SQL Server Denial of Service Vulnerability Important 5.5 No No Denial of Service Exploitation Less Likely  
CVE-2023-36584 Windows Mark of the Web Security Feature Bypass Vulnerability Important 5.4 No No Security Feature Bypass Exploitation Less Likely  
CVE-2023-36722 Active Directory Domain Services Information Disclosure Vulnerability Important 4.4 No No Information Disclosure Exploitation Less Likely Successful exploitation of this vulnerability requires an attacker to have specific privileges and to use a brute force method to discover an attribute.
CVE-2023-36698 Windows Kernel Security Feature Bypass Vulnerability Important 3.6 No No Security Feature Bypass Exploitation Less Likely  
CVE-2023-41772 Win32k Elevation of Privilege Vulnerability Important NA No No Elevation of Privilege Exploitation More Likely