Detection and Response

Patch Tuesday - January 2023

|Last updated on Apr 20, 2023|1 min read
LinkedInFacebookX
Patch Tuesday - January 2023

Microsoft is starting the new year with a bang! Today’s Patch Tuesday release addresses almost 100 CVEs. After a relatively mild holiday season, defenders and admins now have a wide range of exciting new vulnerabilities to consider.

Two zero-day vulnerabilities emerged today, both affecting a wide range of current Windows operating systems.

CVE-2023-21674 allows Local Privilege Escalation (LPE) to SYSTEM via a vulnerability in Windows Advanced Local Procedure Call (ALPC), which Microsoft has already seen exploited in the wild. Given its low attack complexity, the existence of functional proof-of-concept code, and the potential for sandbox escape, this may be a vulnerability to keep a close eye on. An ALPC zero-day back in 2018 swiftly found its way into a malware campaign.

CVE-2023-21549 is Windows SMB elevation for which Microsoft has not yet seen in-the-wild exploitation or a solid proof-of-concept, although Microsoft has marked it as publicly disclosed.

This Patch Tuesday also includes a batch of seven Critical Remote Code Execution (RCE) vulnerabilities. These are split between Windows Secure Socket Tunneling Protocol (SSTP) – source of another Critical RCE last month – and Windows Layer 2 Tunneling Protocol (L2TP). Happily, none of these has yet been seen exploited in the wild, and Microsoft has assessed all seven as “exploitation less likely” (though time will tell).

Today’s haul includes two Office Remote Code Execution vulnerabilities. Both CVE-2023-21734 and CVE-2023-21735 sound broadly familiar: a user needs to be tricked into running malicious files. Unfortunately, the security update for Microsoft Office 2019 for Mac and Microsoft Office LTSC for Mac 2021 are not immediately available, so admins with affected assets will need to check back later and rely on other defenses for now.

On the server side, five CVEs affecting Microsoft Exchange Server were addressed today: two Spoofing vulnerabilities, two Elevation of Privilege, and an Information Disclosure. Any admins who no longer wish to run on-prem Exchange may wish to add these to the evidence pile.

Anyone responsible for a SharePoint Server instance has three new vulnerabilities to consider. Perhaps the most noteworthy is CVE-2023-21743, a remote authentication bypass. Remediation requires additional admin action after the installation of the SharePoint Server security update; however, exploitation requires no user interaction, and Microsoft already assesses it as “Exploitation More Likely”. This regrettable combination of properties explains the Critical severity assigned by Microsoft despite the relatively low CVSS score.

Another step further away from the Ballmer era: Microsoft recently announced the potential inclusion of CBL-Mariner CVEs as part of Security Update Guide guidance starting as early as tomorrow (Jan 11). First released on the carefully-selected date of April 1, 2020, CBL-Mariner is the Microsoft-developed Linux distro which acts as the base container OS for Azure services, and also underpins elements of WSL2.

Farewell Windows 8.1, we hardly knew ye: today’s security patches include fixes for Windows 8.1 for the final time, since Extended Support for most editions of Windows 8.1 ends today.

Summary charts

2023-01-vuln_count_severity.png2023-01-vuln_count_impact.png2023-01-cvssv3_hist.png2023-01-vuln_count_component.png

Summary tables

Apps vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-217803D Builder Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-217813D Builder Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-217823D Builder Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-217843D Builder Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-217863D Builder Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-217913D Builder Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-217933D Builder Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-217833D Builder Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-217853D Builder Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-217873D Builder Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-217883D Builder Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-217893D Builder Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-217903D Builder Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-217923D Builder Remote Code Execution VulnerabilityNoNo7.8

Azure vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-21531Azure Service Fabric Container Elevation of Privilege VulnerabilityNoNo7

Developer Tools vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-21538.NET Denial of Service VulnerabilityNoNo7.5
CVE-2023-21779Visual Studio Code Remote Code ExecutionNoNo7.3

Exchange Server vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-21762Microsoft Exchange Server Spoofing VulnerabilityNoNo8
CVE-2023-21745Microsoft Exchange Server Spoofing VulnerabilityNoNo8
CVE-2023-21763Microsoft Exchange Server Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-21764Microsoft Exchange Server Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-21761Microsoft Exchange Server Information Disclosure VulnerabilityNoNo7.5

Microsoft Office vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-21742Microsoft SharePoint Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-21744Microsoft SharePoint Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-21736Microsoft Office Visio Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-21737Microsoft Office Visio Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-21734Microsoft Office Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-21735Microsoft Office Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-21738Microsoft Office Visio Remote Code Execution VulnerabilityNoNo7.1
CVE-2023-21741Microsoft Office Visio Information Disclosure VulnerabilityNoNo7.1
CVE-2023-21743Microsoft SharePoint Server Security Feature Bypass VulnerabilityNoNo5.3

System Center vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-21725Windows Malicious Software Removal Tool Elevation of Privilege VulnerabilityNoNo6.3

Windows vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-21676Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-21674Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege VulnerabilityYesNo8.8
CVE-2023-21767Windows Overlay Filter Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-21755Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-21558Windows Error Reporting Service Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-21768Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-21724Microsoft DWM Core Library Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-21551Microsoft Cryptographic Services Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-21677Windows Internet Key Exchange (IKE) Extension Denial of Service VulnerabilityNoNo7.5
CVE-2023-21683Windows Internet Key Exchange (IKE) Extension Denial of Service VulnerabilityNoNo7.5
CVE-2023-21758Windows Internet Key Exchange (IKE) Extension Denial of Service VulnerabilityNoNo7.5
CVE-2023-21539Windows Authentication Remote Code Execution VulnerabilityNoNo7.5
CVE-2023-21547Internet Key Exchange (IKE) Protocol Denial of Service VulnerabilityNoNo7.5
CVE-2023-21771Windows Local Session Manager (LSM) Elevation of Privilege VulnerabilityNoNo7
CVE-2023-21739Windows Bluetooth Driver Elevation of Privilege VulnerabilityNoNo7
CVE-2023-21733Windows Bind Filter Driver Elevation of Privilege VulnerabilityNoNo7
CVE-2023-21540Windows Cryptographic Information Disclosure VulnerabilityNoNo5.5
CVE-2023-21550Windows Cryptographic Information Disclosure VulnerabilityNoNo5.5
CVE-2023-21559Windows Cryptographic Information Disclosure VulnerabilityNoNo5.5
CVE-2023-21753Event Tracing for Windows Information Disclosure VulnerabilityNoNo5.5
CVE-2023-21766Windows Overlay Filter Information Disclosure VulnerabilityNoNo4.7
CVE-2023-21536Event Tracing for Windows Information Disclosure VulnerabilityNoNo4.7
CVE-2023-21759Windows Smart Card Resource Management Server Security Feature Bypass VulnerabilityNoNo3.3

Windows ESU vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-21549Windows SMB Witness Service Elevation of Privilege VulnerabilityNoYes8.8
CVE-2023-21681Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-21732Microsoft ODBC Driver Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-21561Microsoft Cryptographic Services Elevation of Privilege VulnerabilityNoNo8.8
CVE-2023-21535Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution VulnerabilityNoNo8.1
CVE-2023-21548Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution VulnerabilityNoNo8.1
CVE-2023-21546Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution VulnerabilityNoNo8.1
CVE-2023-21543Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution VulnerabilityNoNo8.1
CVE-2023-21555Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution VulnerabilityNoNo8.1
CVE-2023-21556Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution VulnerabilityNoNo8.1
CVE-2023-21679Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution VulnerabilityNoNo8.1
CVE-2023-21680Windows Win32k Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-21541Windows Task Scheduler Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-21678Windows Print Spooler Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-21765Windows Print Spooler Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-21746Windows NTLM Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-21524Windows Local Security Authority (LSA) Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-21747Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-21748Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-21749Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-21754Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-21772Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-21773Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-21774Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-21675Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-21552Windows GDI Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-21726Windows Credential Manager User Interface Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-21537Microsoft Message Queuing (MSMQ) Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-21730Microsoft Cryptographic Services Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-21527Windows iSCSI Service Denial of Service VulnerabilityNoNo7.5
CVE-2023-21728Windows Netlogon Denial of Service VulnerabilityNoNo7.5
CVE-2023-21557Windows Lightweight Directory Access Protocol (LDAP) Denial of Service VulnerabilityNoNo7.5
CVE-2023-21757Windows Layer 2 Tunneling Protocol (L2TP) Denial of Service VulnerabilityNoNo7.5
CVE-2023-21760Windows Print Spooler Elevation of Privilege VulnerabilityNoNo7.1
CVE-2023-21750Windows Kernel Elevation of Privilege VulnerabilityNoNo7.1
CVE-2023-21752Windows Backup Service Elevation of Privilege VulnerabilityNoNo7.1
CVE-2023-21542Windows Installer Elevation of Privilege VulnerabilityNoNo7
CVE-2023-21532Windows GDI Elevation of Privilege VulnerabilityNoNo7
CVE-2023-21563BitLocker Security Feature Bypass VulnerabilityNoNo6.8
CVE-2023-21560Windows Boot Manager Security Feature Bypass VulnerabilityNoNo6.6
CVE-2023-21776Windows Kernel Information Disclosure VulnerabilityNoNo5.5
CVE-2023-21682Windows Point-to-Point Protocol (PPP) Information Disclosure VulnerabilityNoNo5.3
CVE-2023-21525Remote Procedure Call Runtime Denial of Service VulnerabilityNoNo5.3

Related blog posts