Microsoft Reveals 3 Spooky October Cyber Flaws
26 Elevation of Privilege Vulnerabilities
3 Security Feature Bypass Vulnerabilities
45 Remote Code Execution Vulnerabilities
12 Information Disclosure Vulnerabilities
17 Denial of Service Vulnerabilities
1 Spoofing Vulnerabilities
The total count of 104 flaws does not include one Chromium vulnerability
Three actively exploited zero-day vulnerabilities:
As part of this month's Patch Tuesday, Microsoft has addressed and patched three zero-day vulnerabilities, all of which were used in targeted attacks:
CVE-2023-41763 - Skype for Business Elevation of Privilege Vulnerability
Microsoft has corrected a vulnerability in Skype for Business that was actively being abused. Microsoft has stated that if an attacker were able to exploit this flaw, they could gain access to certain sensitive information.
"An attacker who successfully exploited the vulnerability could view some sensitive information (Confidentiality) but not all resources within the impacted component may be divulged to the attacker.," explains Microsoft.
"While the attacker cannot make changes to disclosed information (Integrity) or limit access to the resource (Availability)."
Dr. Florian Hauser (@frycos) discovered the flaw, which he disclosed in September 2022, but Microsoft declined to fix it at the time until recently.
CVE-2023-36563 - Microsoft WordPad Information Disclosure Vulnerability
Microsoft has successfully addressed a flaw that was being actively exploited to steal NTLM (Windows New Technology LAN Manager ) hashes through WordPad.
To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system," explains Microsoft.
"Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file."
The flaw was discovered by Microsoft Threat Intelligence last month when patching a related flaw, CVE-2023-36761, during last month's patch rollout.
CVE-2023-44487 - HTTP/2 Rapid Reset Attack
Microsoft has announced a newly discovered zero-day exploit that uses a DDoS attack method named 'HTTP/2 Rapid Reset'. Investigations found that the exploit has been active since August. This attack exploits the stream cancellation feature of HTTP/2 to send and cancel requests continuously to the targeted server/application resulting in DoS conditions. As this feature being exploited is built into the HTTP/2 protocol, it cannot be completely patched. Microsoft has proposed to recommend disabling the HTTP/2 protocol on your web server as a mitigation step and also issued a dedicated article on HTTP/2 Rapid Reset.
Full Patch List of October Below:
CVE-2023-36722 - With a CVSS score of 4.4 | Vulnerability: Active Directory Domain Services Information Disclosure | Important
CVE-2023-36737 - With a CVSS score of 7.8 | Vulnerability: Azure Network Watcher VM Agent Elevation of Privilege |
ImportantCVE-2023-36419 - With a CVSS score of 8.8 | Vulnerability: Azure HDInsight Apache Oozie Workflow Scheduler Elevation of Privilege | Important
CVE-2023-36561 - With a CVSS score of 7.3 | Vulnerability: Azure DevOps Server Elevation of Privilege | Important
CVE-2023-36418 - With a CVSS score of 7.8 | Vulnerability: Azure RTOS GUIX Studio Remote Code Execution | Important
CVE-2023-36414 - With a CVSS score of 8.8 | Vulnerability: Azure Identity SDK Remote Code Execution | Important
CVE-2023-36415 - With a CVSS score of 8.8 | Vulnerability: Azure Identity SDK Remote Code Execution | Important
CVE-2023-41766 - With a CVSS score of 7.8 | Vulnerability: Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege | Important
CVE-2023-44487 - No CVSS score | Vulnerability: 3D Builder Remote Code Execution | Important
CVE-2023-36566 - With a CVSS score of 6.5 | Vulnerability: Microsoft Common Data Model SDK Denial of Service | Important
CVE-2023-44487 - No CVSS score | Vulnerability: MITRE: CVE-2023-44487 HTTP/2 Rapid Reset Attack | Important
CVE-2023-36566 - With a CVSS score of 6.5 | Vulnerability: Microsoft Common Data Model SDK Denial of Service | Important
CVE-2023-36429 - With a CVSS score of 6.5 | Vulnerability: Microsoft Dynamics 365 (On-Premises) Information Disclosure | Important
CVE-2023-36416 - With a CVSS score of 6.1 | Vulnerability: Microsoft Dynamics 365 (on-premises) Cross-site Scripting | Important
CVE-2023-36433 - With a CVSS score of 6.5 | Vulnerability: Microsoft Dynamics 365 (On-Premises) Information Disclosure | Important
CVE-2023-5346 - No CVSS score | Vulnerability: Chromium: CVE-2023-5346 Type Confusion in V8 | Unknown
CVE-2023-36778 - With a CVSS score of 8.0 | Vulnerability: Microsoft Exchange Server Remote Code Execution | Important
CVE-2023-36594 - With a CVSS score of 7.8 | Vulnerability: Windows Graphics Component Elevation of Privilege | Important
CVE-2023-38159 - With a CVSS score of 7.0 | Vulnerability: Windows Graphics Component Elevation of Privilege | Important
CVE-2023-36565 - With a CVSS score of 7.0 | Vulnerability: Microsoft Dynamics 365 (on-premises) Cross-site Scripting | Important
CVE-2023-36569 - With a CVSS score of 8.4 | Vulnerability: Microsoft Office Elevation of Privilege | Important
CVE-2023-36568 - With a CVSS score of 7.0 | Vulnerability: Microsoft Office Click-To-Run Elevation of Privilege | Important
CVE-2023-38171 - With a CVSS score of 7.5 | Vulnerability: Microsoft QUIC Denial of Service | Important
CVE-2023-36435 - With a CVSS score of 7.5 | Vulnerability: Microsoft QUIC Denial of Service | Important
CVE-2023-36577 - With a CVSS score of 8.8 | Vulnerability: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution | Important
CVE-2023-36710 - With a CVSS score of 7.8 | Vulnerability: Windows Media Foundation Core Remote Code Execution | Important
CVE-2023-36564 - With a CVSS score of 6.5 | Vulnerability: Windows Search Security Feature Bypass | Important
CVE-2023-36563 - With a CVSS score of 6.5 | Vulnerability: Microsoft WordPad Information Disclosure | Important
CVE-2023-36786 - With a CVSS score of 7.2 | Vulnerability: Skype for Business Remote Code Execution | Important
CVE-2023-36780 - With a CVSS score of 7.2 | Vulnerability: Skype for Business Remote Code Execution | Important
CVE-2023-36789 - With a CVSS score of 7.2 | Vulnerability: Skype for Business Remote Code Execution | Important
CVE-2023-41763 - With a CVSS score of 5.3 | Vulnerability: Skype for Business Elevation of Privilege | Important
CVE-2023-36728 - With a CVSS score of 5.5 | Vulnerability: Microsoft SQL Server Denial of Service | Important
CVE-2023-36417 - With a CVSS score of 7.8 | Vulnerability: Microsoft SQL ODBC Driver Remote Code Execution | Important
CVE-2023-36785 - With a CVSS score of 7.8 | Vulnerability: Microsoft ODBC Driver for SQL Server Remote Code Execution | Important
CVE-2023-36598 - With a CVSS score of 7.8 | Vulnerability: Microsoft WDAC ODBC Driver Remote Code Execution | Important
CVE-2023-36730 - With a CVSS score of 7.8 | Vulnerability: Microsoft ODBC Driver for SQL Server Remote Code Execution | Important
CVE-2023-36420 - With a CVSS score of 7.3 | Vulnerability: Microsoft ODBC Driver for SQL Server Remote Code Execution | Important
CVE-2023-36585 - With a CVSS score of 7.5 | Vulnerability: Active Template Library Denial of Service | Important
CVE-2023-36709 - With a CVSS score of 7.5 | Vulnerability: Microsoft AllJoyn API Denial of Service | Important
CVE-2023-36902 - With a CVSS score of 7.0 | Vulnerability: Windows Runtime Remote Code Execution | Important
CVE-2023-36713 - With a CVSS score of 5.5 | Vulnerability: Windows Common Log File System Driver Information Disclosure | Important
CVE-2023-36723 - With a CVSS score of 7.8 | Vulnerability: Windows Deployment Services Denial of Service | Important
CVE-2023-36707 - With a CVSS score of 6.5 | Vulnerability: Windows Deployment Services Denial of Service | Important
CVE-2023-36567 - With a CVSS score of 7.5 | Vulnerability: Windows Deployment Services Information Disclosure | Important
CVE-2023-36706 - With a CVSS score of 6.5 | Vulnerability: Windows Deployment Services Information Disclosure | Important
CVE-2023-36703 - With a CVSS score of 7.5 | Vulnerability: DHCP Server Service Denial of Service | Important
CVE-2023-36721 - With a CVSS score of 7.0 | Vulnerability: Windows Error Reporting Service Elevation of Privilege | Important
CVE-2023-36436 - With a CVSS score of 7.8 | Vulnerability: Windows MSHTML Platform Remote Code Execution | Important
CVE-2023-36557 - With a CVSS score of 7.8 | Vulnerability: PrintHTML API Remote Code Execution | Important
CVE-2023-36434 - With a CVSS score of 9.8 | Vulnerability: Windows IIS Server Elevation of Privilege | Important
CVE-2023-36726 - With a CVSS score of 7.8 | Vulnerability: Windows Internet Key Exchange (IKE) Extension Elevation of Privilege | Important
CVE-2023-36576 - With a CVSS score of 5.5 | Vulnerability: Windows Kernel Information Disclosure | Important
CVE-2023-36712 - With a CVSS score of 7.8 | Vulnerability: Windows Kernel Elevation of Privilege | Important
CVE-2023-36698 - With a CVSS score of 3.6 | Vulnerability: Windows Kernel Security Feature Bypass | Important
CVE-2023-41770 - With a CVSS score of 8.1 | Vulnerability: Layer 2 Tunneling Protocol Remote Code Execution | Critical
CVE-2023-41765 - With a CVSS score of 8.1 | Vulnerability: Layer 2 Tunneling Protocol Remote Code Execution | Critical
CVE-2023-41767 - With a CVSS score of 8.1 | Vulnerability: Layer 2 Tunneling Protocol Remote Code Execution | Critical
CVE-2023-38166 - With a CVSS score of 8.1 | Vulnerability: Layer 2 Tunneling Protocol Remote Code Execution | Critical
CVE-2023-41774 - With a CVSS score of 8.1 | Vulnerability: Layer 2 Tunneling Protocol Remote Code Execution | Critical
CVE-2023-41773 - With a CVSS score of 8.1 | Vulnerability: Layer 2 Tunneling Protocol Remote Code Execution | Critical
CVE-2023-41771 - With a CVSS score of 8.1 | Vulnerability: Layer 2 Tunneling Protocol Remote Code Execution | Critical
CVE-2023-41769 - With a CVSS score of 8.1 | Vulnerability: Layer 2 Tunneling Protocol Remote Code Execution | Critical
CVE-2023-41768 - With a CVSS score of 8.1 | Vulnerability: Layer 2 Tunneling Protocol Remote Code Execution | Critical
CVE-2023-36584 - With a CVSS score of 5.4 | Vulnerability: Windows Mark of the Web Security Feature Bypass | Important
CVE-2023-36571 - With a CVSS score of 7.3 | Vulnerability: Microsoft Message Queuing Remote Code Execution | Important
CVE-2023-36570 - With a CVSS score of 7.3 | Vulnerability: Microsoft Message Queuing Remote Code Execution | Important
CVE-2023-36431 - With a CVSS score of 7.5 | Vulnerability: Microsoft Message Queuing Denial of Service | Important
CVE-2023-35349 - With a CVSS score of 9.8 | Vulnerability: Microsoft Message Queuing Remote Code Execution | Critical
CVE-2023-36591 - With a CVSS score of 7.3 | Vulnerability: Microsoft Message Queuing Remote Code Execution | Important
CVE-2023-36590 - With a CVSS score of 7.3 | Vulnerability: Microsoft Message Queuing Remote Code Execution | Important
CVE-2023-36589 - With a CVSS score of 7.3 | Vulnerability: Microsoft Message Queuing Remote Code Execution | Important
CVE-2023-36583 - With a CVSS score of 7.3 | Vulnerability: Microsoft Message Queuing Remote Code Execution | Important
CVE-2023-36592 - With a CVSS score of 7.3 | Vulnerability: Microsoft Message Queuing Remote Code Execution | Important
CVE-2023-36697 - With a CVSS score of 6.8 | Vulnerability: Microsoft Message Queuing Remote Code Execution | Critical
CVE-2023-36606 - With a CVSS score of 7.5 | Vulnerability: Microsoft Message Queuing Denial of Service | Important
CVE-2023-36593 - With a CVSS score of 7.8 | Vulnerability: Microsoft Message Queuing Remote Code Execution | Important
CVE-2023-36582 - With a CVSS score of 7.3 | Vulnerability: Microsoft Message Queuing Remote Code Execution | Important
CVE-2023-36574 - With a CVSS score of 7.3 | Vulnerability: Microsoft Message Queuing Remote Code Execution | Important
CVE-2023-36575 - With a CVSS score of 7.3 | Vulnerability: Microsoft Message Queuing Remote Code Execution | Important
CVE-2023-36573 - With a CVSS score of 7.3 | Vulnerability: Microsoft Message Queuing Remote Code Execution | Important
CVE-2023-36572 - With a CVSS score of 7.3 | Vulnerability: Microsoft Message Queuing Remote Code Execution | Important
CVE-2023-36581 - With a CVSS score of 7.5 | Vulnerability: Microsoft Message Queuing Denial of Service | Important
CVE-2023-36579 - With a CVSS score of 7.5 | Vulnerability: Microsoft Message Queuing Denial of Service | Important
CVE-2023-36578 - With a CVSS score of 7.3 | Vulnerability: Microsoft Message Queuing Remote Code Execution | Important
CVE-2023-36702 - With a CVSS score of 7.8 | Vulnerability: Microsoft DirectMusic Remote Code Execution | Important
CVE-2023-36720 - With a CVSS score of 7.5 | Vulnerability: Windows Mixed Reality Developer Tools Denial of Service | Important
CVE-2023-36729 - With a CVSS score of 7.8 | Vulnerability: Named Pipe File System Elevation of Privilege | Important
CVE-2023-36605 - With a CVSS score of 7.4 | Vulnerability: Windows Named Pipe Filesystem Elevation of Privilege | Important
CVE-2023-36725 - With a CVSS score of 7.8 | Vulnerability: Windows Kernel Elevation of Privilege | Important
CVE-2023-36724 - With a CVSS score of 5.5 | Vulnerability: Windows Power Management Service Information Disclosure | Important
CVE-2023-36790 - With a CVSS score of 7.8 | Vulnerability: Windows RDP Encoder Mirror Driver Elevation of Privilege | Important
CVE-2023-29348 - With a CVSS score of 6.5 | Vulnerability: Windows Remote Desktop Gateway (RD Gateway) Information Disclosure | Important
CVE-2023-36596 - With a CVSS score of 6.5 | Vulnerability: Remote Procedure Call Information Disclosure | Important
CVE-2023-36701 - With a CVSS score of 7.8 | Vulnerability: Microsoft Resilient File System (ReFS) Elevation of Privilege | Important
CVE-2023-36711 - With a CVSS score of 7.8 | Vulnerability: Windows Runtime C++ Template Library Elevation of Privilege | Important
CVE-2023-36704 - With a CVSS score of 7.8 | Vulnerability: Windows Setup Files Cleanup Remote Code Execution | Important
CVE-2023-36438 - With a CVSS score of 7.5 | Vulnerability: Windows TCP/IP Information Disclosure | Important
CVE-2023-36603 - With a CVSS score of 7.5 | Vulnerability: Windows TCP/IP Denial of Service | Important
CVE-2023-36602 - With a CVSS score of 7.5 | Vulnerability: Windows TCP/IP Denial of Service | Important
CVE-2023-36717 - With a CVSS score of 6.5 | Vulnerability: Windows Virtual Trusted Platform Module Denial of Service | Important
CVE-2023-36718 - With a CVSS score of 7.8 | Vulnerability: Microsoft Virtual Trusted Platform Module Remote Code Execution | Critical
CVE-2023-36731 - With a CVSS score of 7.8 | Vulnerability: Win32k Elevation of Privilege | Important
CVE-2023-36732 - With a CVSS score of 7.8 | Vulnerability: Win32k Elevation of Privilege | Important
CVE-2023-36776 - With a CVSS score of 7.0 | Vulnerability: Win32k Elevation of Privilege | Important
CVE-2023-36743 - With a CVSS score of 7.8 | Vulnerability: Win32k Elevation of Privilege | Important
CVE-2023-41772 - With a CVSS score of 7.8 | Vulnerability: Win32k Elevation of Privilege | Important
Your Security is our Priority
Your friendly Support Team
Speak to us about all your computer needs
This is Part of our Cyber Security awareness educational campaign. Through this training, you will learn awareness and key principles, and best practices to protect yourself, your organisation, and the public from cyber attackers. You will also be equipped with the knowledge to identify potential threats and take action before any damage can occur.