Detection and Response

Patch Tuesday - February 2023

|Last updated on Feb 15, 2023|1 min read
LinkedInFacebookX
Patch Tuesday - February 2023

It’s Patch Tuesday again. Microsoft is addressing fewer individual vulnerabilities this month than last, but there’s still plenty to keep admins and defenders occupied.

Three zero-day vulnerabilities are vying for your attention today: a lone Microsoft Publisher vulnerability as well as a couple affecting Windows itself. None is marked as publicly disclosed, but Microsoft has already observed in-the-wild exploitation of all three.

One zero-day vulnerability is a Security Features Bypass vulnerability in Microsoft Publisher. Successful exploitation of CVE-2023-21715 allows an attacker to bypass Office macro defenses using a specially-crafted document and run code which would otherwise be blocked by policy. Only Publisher installations delivered as part of Microsoft 365 Apps for Enterprise are listed as affected.

CVE-2023-23376 describes a vulnerability in the Windows Common Log File System Driver which allows Local Privilege Escalation (LPE) to SYSTEM. Although Microsoft isn’t necessarily aware of mature exploit code at time of publication, this is worth patching at the first opportunity, since it affects essentially all current Windows hosts.

CVE-2023-21823 is described as a Remote Code Execution (RCE) vulnerability in Windows Graphics Component, but has Attack Vector listed as Local. This apparent inconsistency is often accompanied with a clarification like: “The word Remote in the title refers to the location of the attacker. [...] The attack itself is carried out locally.” No such clarification is available in this case, but this is likely applicable here also. Microsoft also notes the existence of mature exploit code.

Microsoft is also releasing patches for nine critical RCE vulnerabilities. A more varied selection than last month, February 2023 includes critical RCE in an SQL Server ODBC driver, the iSCSI Discovery Service, .NET/Visual Studio, three in network authentication framework PEAP, one in Word, and two in Visual Studio only. Microsoft has not observed in-the-wild exploitation for any of these vulnerabilities, nor is any of them marked as publicly disclosed. Microsoft predicts that most of these are less likely to be exploited, with the exception of the PEAP vulnerabilities.

Microsoft’s recent announcement about the potential inclusion of CBL-Mariner CVEs in the Security Update Guide is now reflected in the list of covered products, but there aren’t any CBL-Mariner vulnerabilities this Patch Tuesday.

SharePoint Server makes another appearance today with CVE-2023-21717, which allows an authenticated user with the Manage List permission to achieve RCE. Admins responsible for a SharePoint Server 2013 instance may be interested in the FAQ, which includes what Microsoft optimistically describes as a clarification of the existing servicing model for SharePoint Server 2013.

This is the first Patch Tuesday after the end of Extended Security Updates (ESU) for Windows 8.1. Admins responsible for Windows Server 2008 instances should note that ESU for Windows Server 2008 is now only available for instances hosted in Azure or on-premises instances hosted via Azure Stack. Instances of Windows Server 2008 hosted in a non-Azure context will no longer receive security updates, so will forever remain vulnerable to any new vulnerabilities, including the two zero-days covered above.

Summary charts

A bar chart showing vulnerability count by severity for Microsoft Patch Tuesday February 2023. Most are rated Important, with some Critical and a very few Low and Moderate.A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday February 2023. Most are categorized as Remote Code Execution, with some Elevation of Privilege, Denial of Service, and a few other options.A bar chart showing vulnerability frequency by CVSSv3 Base Score for Microsoft Patch Tuesday February 2023. Most vulnerabilities are scored in the 5.0-9.0 range, with a few outliers.A bar chart showing vulnerability count by component for Microsoft Patch Tuesday February 2023. Windows Protected EAP, Microsoft Dynamics, and SQL Server are the most frequent components.

Summary tables

Apps vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-23378Print 3D Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-233773D Builder Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-233903D Builder Remote Code Execution VulnerabilityNoNo7.8

Azure vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-21777Azure App Service on Azure Stack Hub Elevation of Privilege VulnerabilityNoNo8.7
CVE-2023-21564Azure DevOps Server Cross-Site Scripting VulnerabilityNoNo7.1
CVE-2023-23382Azure Machine Learning Compute Instance Information Disclosure VulnerabilityNoNo6.5
CVE-2023-21703Azure Data Box Gateway Remote Code Execution VulnerabilityNoNo6.5

Browser vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-23374Microsoft Edge (Chromium-based) Remote Code Execution VulnerabilityNoNo8.3
CVE-2023-21720Microsoft Edge (Chromium-based) Tampering VulnerabilityNoNo5.3
CVE-2023-21794Microsoft Edge (Chromium-based) Spoofing VulnerabilityNoNo4.3

Developer Tools vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-21815Visual Studio Remote Code Execution VulnerabilityNoNo8.4
CVE-2023-23381Visual Studio Remote Code Execution VulnerabilityNoNo8.4
CVE-2023-21808.NET and Visual Studio Remote Code Execution VulnerabilityNoNo8.4
CVE-2023-21566Visual Studio Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-21553Azure DevOps Server Remote Code Execution VulnerabilityNoNo7.5
CVE-2023-21567Visual Studio Denial of Service VulnerabilityNoNo5.6
CVE-2023-21722.NET Framework Denial of Service VulnerabilityNoNo4.4

Device vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2019-15126MITRE: CVE-2019-15126 Specifically timed and handcrafted traffic can cause internal errors (related to state transitions) in a WLAN deviceNoNoN/A

ESU vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-21800Windows Installer Elevation of Privilege VulnerabilityNoNo7.8

ESU Microsoft Office Windows vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-21823Windows Graphics Component Remote Code Execution VulnerabilityYesNo7.8

ESU Windows vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-21803Windows iSCSI Discovery Service Remote Code Execution VulnerabilityNoNo9.8
CVE-2023-21689Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution VulnerabilityNoNo9.8
CVE-2023-21690Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution VulnerabilityNoNo9.8
CVE-2023-21692Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution VulnerabilityNoNo9.8
CVE-2023-21799Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-21685Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-21686Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-21684Microsoft PostScript Printer Driver Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-21797Microsoft ODBC Driver Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-21798Microsoft ODBC Driver Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-21802Windows Media Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-21805Windows MSHTML Platform Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-21817Windows Kerberos Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-21822Windows Graphics Component Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-21812Windows Common Log File System Driver Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-23376Windows Common Log File System Driver Elevation of Privilege VulnerabilityYesNo7.8
CVE-2023-21688NT OS Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-21801Microsoft PostScript Printer Driver Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-21811Windows iSCSI Service Denial of Service VulnerabilityNoNo7.5
CVE-2023-21702Windows iSCSI Service Denial of Service VulnerabilityNoNo7.5
CVE-2023-21700Windows iSCSI Discovery Service Denial of Service VulnerabilityNoNo7.5
CVE-2023-21813Windows Secure Channel Denial of Service VulnerabilityNoNo7.5
CVE-2023-21818Windows Secure Channel Denial of Service VulnerabilityNoNo7.5
CVE-2023-21816Windows Active Directory Domain Services API Denial of Service VulnerabilityNoNo7.5
CVE-2023-21695Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution VulnerabilityNoNo7.5
CVE-2023-21691Microsoft Protected Extensible Authentication Protocol (PEAP) Information Disclosure VulnerabilityNoNo7.5
CVE-2023-21701Microsoft Protected Extensible Authentication Protocol (PEAP) Denial of Service VulnerabilityNoNo7.5
CVE-2023-21820Windows Distributed File System (DFS) Remote Code Execution VulnerabilityNoNo7.4
CVE-2023-21694Windows Fax Service Remote Code Execution VulnerabilityNoNo6.8
CVE-2023-21697Windows Internet Storage Name Service (iSNS) Server Information Disclosure VulnerabilityNoNo6.2
CVE-2023-21693Microsoft PostScript Printer Driver Information Disclosure VulnerabilityNoNo5.7
CVE-2023-21699Windows Internet Storage Name Service (iSNS) Server Information Disclosure VulnerabilityNoNo5.3

Exchange Server vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-21706Microsoft Exchange Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-21707Microsoft Exchange Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-21529Microsoft Exchange Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-21710Microsoft Exchange Server Remote Code Execution VulnerabilityNoNo7.2

Microsoft Dynamics vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-21778Microsoft Dynamics Unified Service Desk Remote Code Execution VulnerabilityNoNo8.3
CVE-2023-21572Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityNoNo6.5
CVE-2023-21807Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityNoNo5.8
CVE-2023-21570Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityNoNo5.4
CVE-2023-21571Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityNoNo5.4
CVE-2023-21573Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityNoNo5.4

Microsoft Office vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-21716Microsoft Word Remote Code Execution VulnerabilityNoNo9.8
CVE-2023-21717Microsoft SharePoint Server Elevation of Privilege VulnerabilityNoNo8.8
CVE-2023-21715Microsoft Publisher Security Features Bypass VulnerabilityYesNo7.3
CVE-2023-21721Microsoft OneNote Spoofing VulnerabilityNoNo6.5
CVE-2023-21714Microsoft Office Information Disclosure VulnerabilityNoNo5.5

SQL Server vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-21705Microsoft SQL Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-21713Microsoft SQL Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-21806Power BI Report Server Spoofing VulnerabilityNoNo8.2
CVE-2023-21528Microsoft SQL Server Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-21718Microsoft SQL ODBC Driver Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-21704Microsoft ODBC Driver for SQL Server Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-21568Microsoft SQL Server Integration Service (VS extension) Remote Code Execution VulnerabilityNoNo7.3

System Center vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-21809Microsoft Defender for Endpoint Security Feature Bypass VulnerabilityNoNo7.8
CVE-2023-23379Microsoft Defender for IoT Elevation of Privilege VulnerabilityNoNo6.4

Windows vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-21804Windows Graphics Component Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-21819Windows Secure Channel Denial of Service VulnerabilityNoNo7.5
CVE-2023-21687HTTP.sys Information Disclosure VulnerabilityNoNo5.5

Related blog posts