Detection and Response

Patch Tuesday - April 2023

|Last updated on Apr 20, 2023|1 min read
LinkedInFacebookX
Patch Tuesday - April 2023

Microsoft is offering fixes for 114 vulnerabilities for April 2023 Patch Tuesday. This month’s haul includes a single zero-day vulnerability, as well as seven critical Remote Code Execution (RCE) vulnerabilities. There is a strong focus on fixes for Windows OS this month.

Zero-day vulnerability: CLFS

Over the last 18 months or so, Rapid7 has written several times about the prevalence of driver-based attacks. This month's sole zero-day vulnerability – a driver-based elevation of privilege – will only reinforce the popularity of the vector among threat actors. Successful exploitation of CVE-2023-28252 allows an attacker to obtain SYSTEM privileges via a vulnerability in the Windows Common Log File System (CLFS) driver. Microsoft has patched more than one similar CLFS driver vulnerability over the past year, including CVE-2023-23376 in February 2023 and CVE-2022-37969 in September 2022.

Microsoft has released patches for the zero-day vulnerability CVE-2023-28252 for all current versions of Windows. Microsoft is not aware of public disclosure, but has detected in-the-wild exploitation and is aware of functional exploit code. The assigned base CVSSv3 score of 7.8 lands this vulnerability near the top of the High severity range, which is expected since it gives complete control of an asset, but a remote attacker must first find some other method to access the target.

Critical RCE: MSQS, Raw Image Extension, DHCP etc.

April 2023 also sees 45 separate Remote Code Execution (RCE) vulnerabilities patched, which is a significant uptick from the average of 33 per month over the past three months.

Microsoft rates seven of this month’s RCE vulnerabilities as Critical, including two related vulnerabilities with a CVSSv3 base score of 9.8. CVE-2023-28250 describes a vulnerability in Windows Pragmatic General Multicast (PGM) which allows an attacker to achieve RCE by sending a specially crafted file over the network. CVE-2023-21554 allows an attacker to achieve RCE by sending a specially crafted Microsoft Messaging Queue packet. In both cases, the Microsoft Message Queueing Service must be enabled and listening on port 1801 for an asset to be vulnerable. The Message Queueing Service is not installed by default. Even so, Microsoft considers exploitation of CVE-2023-21554 more likely.

The other five Critical RCE this month are spread across various Windows components: Windows Raw Image Extension, Windows DHCP Protocol, and two frequent fliers: Windows Point-to-Point Tunneling Protocol and the Windows Layer 2 Tunneling Protocol.

The RAW Image Extension vulnerability CVE-2023-28921 is another example of what Microsoft refers to as an Arbitrary Code Execution (ACE), explaining “The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.” For some defenders, this may stretch the definition of the word Remote in Remote Code Execution, but there are many ways to deliver a file to a user, and an unpatched system remains vulnerable regardless.

DHCP server vulnerability CVE-2023-28231 requires an attacker to be on the same network as the target, but offers RCE via a specially crafted RPC call. Microsoft considers that exploitation is more likely.

Defender: Denial-of-Service

The hunter becomes the hunted as Microsoft patches a Denial of Service vulnerability in Defender. The advisory for CVE-2023-24860 includes some unusual guidance: “Systems that have disabled Microsoft Defender are not in an exploitable state.” In practice this vulnerability is less likely to be exploited, and the default update cadence for Defender should mean that most assets are automatically patched in a short timeframe.

Windows Server: remote kernel memory disclosure

Windows Server administrators should take note of CVE-2023-28247. Successful exploitation allows an attacker to view contents of kernel memory remotely from the context of a user process. Microsoft lists Windows Server 2012, 2016, 2019, and 2022 as vulnerable. Although Microsoft assesses that exploitation is less likely, Windows stores many secrets in kernel memory, including cryptographic keys.

Active Directory Certificate Services: tighter Kerberos authentication

Back in May 2022, Microsoft publicized a trio of related Elevation of Privilege vulnerabilities affecting the Key Distribution Center (KDC) via Kerberos: CVE-2022-26923 (aka Certifried), CVE-2022-26931, and CVE-2022-34691. Insufficient validation allowed certificate spoofing under certain circumstances. The April 2023 security updates introduce further relevant changes.

The May 2022 patches for all affected versions of Windows introduced a two-tiered remediation for this trio of vulnerabilities:

  • Full Enforcement mode: require strong mapping for certificates, otherwise authentication is denied. Microsoft intends to make this the default setting by November 2023.
  • Compatibility mode: some allowance for weak mapping of certificates, but old certificates will still result in denial. This has been the default behaviour since May 2022.

Microsoft provided a time-limited ability to disable this security remediation entirely using a registry key. Although none of these vulnerabilities are listed in Microsoft's April 2023 Security Updates Release Notes, administrators should note that Windows assets with the April 2023 updates installed will now ignore the registry key which previously disabled these certificate mapping checks. Microsoft provides guidance to administrators concerned with the balance of usability vs. security.

In addition to detection of vulnerable assets via InsightVM, Rapid7 offers a Metasploit module allowing fully-automated privilege escalation using the Certifried vulnerability, as well as a thorough AttackerKB analysis.

Azure: information disclosure and security bypass

Machine learning is everywhere these days, and this month’s Patch Tuesday is no exception: CVE-2023-28312 describes a vulnerability in Azure Machine Learning which allows an attacker to access system logs, although any attack would need to be launched from within the same secure network. The advisory contains links to Microsoft detection and remediation guidance.

The other Azure vulnerability this month is a Azure Service Connector Security Feature Bypass. Microsoft rates Attack Complexity for CVE-2023-28300 as High, since this vulnerability is only useful when chained with other exploits to defeat other security measures. However, the Azure Service Connector only updates when the Azure Command-Line Interface is updated, and automatic updates are not enabled by default.

End-of-life: the class of 2013

Final curtain call tonight for a raft of familiar names, since April 2023 Patch Tuesday includes the very last round of Extended Security Updates (ESU) for a number of Microsoft products. These include:

As always, the end of ESU means that Microsoft does not expect to patch or even disclose any future vulnerabilities which might emerge in these venerable software products, so it is no longer possible to secure them; these dates have been well-publicized far in advance under the fixed lifecycle policy. No vendor can feasibly support ancient software indefinitely, and some administrators may be glad that they will never have to install another Exchange Server 2013 patch.

Summary Charts

image.pngimage-1.pngimage-2.pngimage-3.pngimage-4.png

Summary tables

Azure vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-28300Azure Service Connector Security Feature Bypass VulnerabilityNoNo7.5
CVE-2023-28312Azure Machine Learning Information Disclosure VulnerabilityNoNo6.5

Browser vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-28284Microsoft Edge (Chromium-based) Security Feature Bypass VulnerabilityNoNo4.3
CVE-2023-28301Microsoft Edge (Chromium-based) Tampering VulnerabilityNoNo4.2
CVE-2023-24935Microsoft Edge (Chromium-based) Spoofing VulnerabilityNoNoN/A
CVE-2023-1823Chromium: CVE-2023-1823 Inappropriate implementation in FedCMNoNoN/A
CVE-2023-1822Chromium: CVE-2023-1822 Incorrect security UI in NavigationNoNoN/A
CVE-2023-1821Chromium: CVE-2023-1821 Inappropriate implementation in WebShareNoNoN/A
CVE-2023-1820Chromium: CVE-2023-1820 Heap buffer overflow in Browser HistoryNoNoN/A
CVE-2023-1819Chromium: CVE-2023-1819 Out of bounds read in AccessibilityNoNoN/A
CVE-2023-1818Chromium: CVE-2023-1818 Use after free in VulkanNoNoN/A
CVE-2023-1817Chromium: CVE-2023-1817 Insufficient policy enforcement in IntentsNoNoN/A
CVE-2023-1816Chromium: CVE-2023-1816 Incorrect security UI in Picture In PictureNoNoN/A
CVE-2023-1815Chromium: CVE-2023-1815 Use after free in Networking APIsNoNoN/A
CVE-2023-1814Chromium: CVE-2023-1814 Insufficient validation of untrusted input in Safe BrowsingNoNoN/A
CVE-2023-1813Chromium: CVE-2023-1813 Inappropriate implementation in ExtensionsNoNoN/A
CVE-2023-1812Chromium: CVE-2023-1812 Out of bounds memory access in DOM BindingsNoNoN/A
CVE-2023-1811Chromium: CVE-2023-1811 Use after free in FramesNoNoN/A
CVE-2023-1810Chromium: CVE-2023-1810 Heap buffer overflow in VisualsNoNoN/A

Developer Tools vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-28296Visual Studio Remote Code Execution VulnerabilityNoNo8.4
CVE-2023-28262Visual Studio Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-24893Visual Studio Code Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-28260.NET DLL Hijacking Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-28299Visual Studio Spoofing VulnerabilityNoNo5.5
CVE-2023-28263Visual Studio Information Disclosure VulnerabilityNoNo5.5

ESU SQL Server vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-23384Microsoft SQL Server Remote Code Execution VulnerabilityNoNo7.3

ESU Windows vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-28250Windows Pragmatic General Multicast (PGM) Remote Code Execution VulnerabilityNoNo9.8
CVE-2023-21554Microsoft Message Queuing Remote Code Execution VulnerabilityNoNo9.8
CVE-2023-28240Windows Network Load Balancing Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-21727Remote Procedure Call Runtime Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-28275Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-28231DHCP Server Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-28244Windows Kerberos Elevation of Privilege VulnerabilityNoNo8.1
CVE-2023-28268Netlogon RPC Elevation of Privilege VulnerabilityNoNo8.1
CVE-2023-28219Layer 2 Tunneling Protocol Remote Code Execution VulnerabilityNoNo8.1
CVE-2023-28220Layer 2 Tunneling Protocol Remote Code Execution VulnerabilityNoNo8.1
CVE-2023-28272Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-28293Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-24912Windows Graphics Component Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-28252Windows Common Log File System Driver Elevation of Privilege VulnerabilityYesNo7.8
CVE-2023-28241Windows Secure Socket Tunneling Protocol (SSTP) Denial of Service VulnerabilityNoNo7.5
CVE-2023-24931Windows Secure Channel Denial of Service VulnerabilityNoNo7.5
CVE-2023-28232Windows Point-to-Point Tunneling Protocol Remote Code Execution VulnerabilityNoNo7.5
CVE-2023-28217Windows Network Address Translation (NAT) Denial of Service VulnerabilityNoNo7.5
CVE-2023-28238Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution VulnerabilityNoNo7.5
CVE-2023-28227Windows Bluetooth Driver Remote Code Execution VulnerabilityNoNo7.5
CVE-2023-21769Microsoft Message Queuing Denial of Service VulnerabilityNoNo7.5
CVE-2023-28302Microsoft Message Queuing Denial of Service VulnerabilityNoNo7.5
CVE-2023-28254Windows DNS Server Remote Code Execution VulnerabilityNoNo7.2
CVE-2023-28222Windows Kernel Elevation of Privilege VulnerabilityNoNo7.1
CVE-2023-28229Windows CNG Key Isolation Service Elevation of Privilege VulnerabilityNoNo7
CVE-2023-28218Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityNoNo7
CVE-2023-28216Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege VulnerabilityNoNo7
CVE-2023-28305Windows DNS Server Remote Code Execution VulnerabilityNoNo6.6
CVE-2023-28255Windows DNS Server Remote Code Execution VulnerabilityNoNo6.6
CVE-2023-28278Windows DNS Server Remote Code Execution VulnerabilityNoNo6.6
CVE-2023-28256Windows DNS Server Remote Code Execution VulnerabilityNoNo6.6
CVE-2023-28306Windows DNS Server Remote Code Execution VulnerabilityNoNo6.6
CVE-2023-28307Windows DNS Server Remote Code Execution VulnerabilityNoNo6.6
CVE-2023-28308Windows DNS Server Remote Code Execution VulnerabilityNoNo6.6
CVE-2023-28223Windows Domain Name Service Remote Code Execution VulnerabilityNoNo6.6
CVE-2023-28267Remote Desktop Protocol Client Information Disclosure VulnerabilityNoNo6.5
CVE-2023-28228Windows Spoofing VulnerabilityNoNo5.5
CVE-2023-28271Windows Kernel Memory Information Disclosure VulnerabilityNoNo5.5
CVE-2023-28253Windows Kernel Information Disclosure VulnerabilityNoNo5.5
CVE-2023-28298Windows Kernel Denial of Service VulnerabilityNoNo5.5
CVE-2023-28266Windows Common Log File System Driver Information Disclosure VulnerabilityNoNo5.5
CVE-2023-28276Windows Group Policy Security Feature Bypass VulnerabilityNoNo4.4
CVE-2023-21729Remote Procedure Call Runtime Information Disclosure VulnerabilityNoNo4.3

Microsoft Dynamics vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-28309Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityNoNo7.6
CVE-2023-28313Microsoft Dynamics 365 Customer Voice Cross-Site Scripting VulnerabilityNoNo6.1
CVE-2023-28314Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityNoNo6.1

Microsoft Office vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-28311Microsoft Word Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-28287Microsoft Publisher Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-28295Microsoft Publisher Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-28285Microsoft Office Graphics Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-28288Microsoft SharePoint Server Spoofing VulnerabilityNoNo6.5

SQL Server vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-23375Microsoft ODBC and OLE DB Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-28304Microsoft ODBC and OLE DB Remote Code Execution VulnerabilityNoNo7.8

System Center vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-24860Microsoft Defender Denial of Service VulnerabilityNoNo7.5

Windows vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-28297Windows Remote Procedure Call Service (RPCSS) Elevation of Privilege VulnerabilityNoNo8.8
CVE-2023-24924Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-24925Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-24884Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-24926Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-24885Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-24927Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-24886Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-24928Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-24887Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-24929Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-28243Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-28291Raw Image Extension Remote Code Execution VulnerabilityNoNo8.4
CVE-2023-28274Windows Win32k Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-28246Windows Registry Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-28225Windows NTLM Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-28237Windows Kernel Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-28236Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-28248Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-28292Raw Image Extension Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-28233Windows Secure Channel Denial of Service VulnerabilityNoNo7.5
CVE-2023-28234Windows Secure Channel Denial of Service VulnerabilityNoNo7.5
CVE-2023-28247Windows Network File System Information Disclosure VulnerabilityNoNo7.5
CVE-2023-28224Windows Point-to-Point Protocol over Ethernet (PPPoE) Remote Code Execution VulnerabilityNoNo7.1
CVE-2023-28221Windows Error Reporting Service Elevation of Privilege VulnerabilityNoNo7
CVE-2023-28273Windows Clip Service Elevation of Privilege VulnerabilityNoNo7
CVE-2023-24914Win32k Elevation of Privilege VulnerabilityNoNo7
CVE-2023-28235Windows Lock Screen Security Feature Bypass VulnerabilityNoNo6.8
CVE-2023-28270Windows Lock Screen Security Feature Bypass VulnerabilityNoNo6.8
CVE-2023-24883Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure VulnerabilityNoNo6.5
CVE-2023-28269Windows Boot Manager Security Feature Bypass VulnerabilityNoNo6.2
CVE-2023-28249Windows Boot Manager Security Feature Bypass VulnerabilityNoNo6.2
CVE-2023-28226Windows Enroll Engine Security Feature Bypass VulnerabilityNoNo5.3
CVE-2023-28277Windows DNS Server Information Disclosure VulnerabilityNoNo4.9

Related blog posts