Detection and Response

Patch Tuesday - July 2023

|Last updated on Aug 10, 2023|1 min read
LinkedInFacebookX
Patch Tuesday - July 2023

Microsoft is addressing 130 vulnerabilities this July Patch Tuesday, including five zero-day vulnerabilities, and eight further critical remote code execution (RCE) vulnerabilities. Overall, it’s safe to say that this is a busier Patch Tuesday than the past couple of months. Note that the total count of vulnerabilities reported no longer includes any Edge-on-Chromium fixes.

Office zero-day maldoc vuln: no patch, no problem

Surprisingly, there is no patch yet for one of the five zero-day vulnerabilities. Microsoft is actively investigating publicly-disclosed Office RCE CVE-2023-36884, and promises to update the advisory as soon as further guidance is available. Exploitation requires the victim to open a specially crafted malicious document, which would typically be delivered via email.

A Microsoft Security Research Centre (MSRC) blog post links exploitation of this vulnerability with Storm-0978, Microsoft’s designation for a cybercriminal group based out of Russia also tracked across the wider industry under the name RomCom. MSRC suggests that RomCom / Storm-0978 is operating in support of Russian intelligence operations. The same threat actor has also been associated with ransomware attacks targeting a wide array of victims.

Defenders who are understandably unsettled by the lack of immediate patches for CVE-2023-36884 should consult the multiple mitigation options on the advisory. Microsoft claims that assets with Defender for Office 365 are already protected. Further options include an existing optional Defender for Endpoint Attack Surface Reduction (ASR) rule to prevent Office from creating child processes, and a registry modification to disable the vulnerable cross-protocol file navigation. The registry option might be the most straightforward option for organizations without a mature Defender program, but Microsoft does warn that certain use cases relying on the functionality would be impacted if this mitigation is deployed.

There are broad similarities to last year’s Follina vulnerability, which was discussed publicly for over two weeks starting late May 2023 before Microsoft patched it on June 14th as part of Patch Tuesday. While it’s possible that a patch for CVE-2023-36884 will be issued as part of next month’s Patch Tuesday, Microsoft Office is deployed just about everywhere, and this threat actor is making waves; admins should be ready for an out-of-cycle security update for CVE-2023-36884.

The menu of mitigation options here should offer something for every Microsoft shop, but it will come as something of a relief that Microsoft is offering patches for the four other zero-day vulnerabilities mentioned in this month’s Security Update Guide.

MSHTML, Windows Error Reporting: zero-day elevation of privilege vulns

CVE-2023-32046 describes a vulnerability in the MSHTML browser rendering engine which would allow an attacker to act with the same rights as the exploited user account. Successful exploitation requires the victim to open a specially-crafted malicious file, typically delivered either via email or a web page. Assets where Internet Explorer 11 has been fully disabled are still vulnerable until patched; the MSHTML engine remains installed within Windows regardless of the status of IE11, since it is used in other contexts (e.g. Outlook).

A separate vulnerability in the Windows Error Reporting Service allows elevation to the Administrator role via abuse of Windows performance tracing. To exploit CVE-2023-36874, an attacker must already have existing local access to an asset, so this vulnerability will most likely make up part of a longer exploit chain.

SmartScreen & Outlook: zero-day security feature bypass vulns

Rounding out this month’s zero-day vulnerabilities are two security feature bypass flaws. CVE-2023-32049 allows an attacker to formulate a URL which will bypass the Windows SmartScreen “Do you want to open this file?” dialog. Previous SmartScreen bypasses have been exploited extensively, not least for no-notice delivery of ransomware.

Broadly similar is CVE-2023-35311, which describes a bypass of the Microsoft Outlook Security Notice dialog via a specially-crafted URL.

Windows RRAS: critical RCEs

Eight further critical RCE vulnerabilities are also patched, including three related vulnerabilities in the Windows Routing and Remote Access Service (RRAS) with CVSS v3 base score of 9.8 (CVE-2023-35365, CVE-2023-35366, and CVE-2023-35367). In each case, an attacker can send specially-crafted packets to vulnerable assets to achieve RCE. Happily, RRAS is not installed or configured by default, but admins with RRAS-enabled Windows Server installations will undoubtedly want to prioritize remediation.

SharePoint: critical RCEs

Anyone responsible for on-prem SharePoint should patch to avoid a variety of potential impacts from exploitation of CVE-2023-33157 and CVE-2023-33160, including information disclosure and editing, as well as reduced availability of the targeted environment. While both of these vulnerabilities require that an attacker already be authenticated as a user with at least Site Member privileges, this isn’t necessarily much of a defense, since this is the lowest standard permission group with the least privileges other than the read-only Site Visitor role, and will typically be widely granted. Microsoft assesses exploitation as more likely for both of these.

Windows core components: critical RCEs

The remainder of this month’s critical RCE patches target flaws in the Windows Layer-2 Bridge Network Driver (CVE-2023-35315), and usual suspects Windows Message Queuing (CVE-2023-32057) and Windows PGM (CVE-2023-35297).

Windows Remote Desktop: security feature bypass

CVE-2023-35352 will be of interest to anyone running an RDP server. Although the advisory is short on detail, an attacker could bypass certificate or private key authentication when establishing a remote desktop protocol session. Although the CVSS v3 base score of 7.5 falls short of the critical band, this is only because Microsoft has scored this vulnerability as having no impact on either confidentiality or availability, probably because the scoring is against the RDP service itself rather than whatever may be accessed downstream; this seems like a case where CVSS cannot fully capture the potential risk, and Microsoft’s Security Update Severity Rating System does rank this vulnerability as critical.

Summary Charts

2023-07-vuln_count_component.png2023-07-vuln_count_impact.png2023-07-cvssv3_hist.png2023-07-vuln_count_impact-component-heatmap.png

Summary Tables

Apps vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-32047Paint 3D Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-35374Paint 3D Remote Code Execution VulnerabilityNoNo7.8

Azure vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-36868Azure Service Fabric on Windows Information Disclosure VulnerabilityNoNo6.5

Developer Tools vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-35333MediaWiki PandocUpload Extension Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-33170ASP.NET and Visual Studio Security Feature Bypass VulnerabilityNoNo8.1
CVE-2023-33127.NET and Visual Studio Elevation of Privilege VulnerabilityNoNo8.1
CVE-2023-36867Visual Studio Code GitHub Pull Requests and Issues Extension Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-35373Mono Authenticode Validation Spoofing VulnerabilityNoNo5.3

ESU vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-32050Windows Installer Elevation of Privilege VulnerabilityNoNo7

Microsoft Dynamics vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-33171Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityNoNo8.2
CVE-2023-35335Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityNoNo8.2
CVE-2023-32052Microsoft Power Apps (online) Spoofing VulnerabilityNoNo5.4

Microsoft Office vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-33150Microsoft Office Security Feature Bypass VulnerabilityNoNo9.6
CVE-2023-33159Microsoft SharePoint Server Spoofing VulnerabilityNoNo8.8
CVE-2023-33160Microsoft SharePoint Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-33134Microsoft SharePoint Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-33157Microsoft SharePoint Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-35311Microsoft Outlook Security Feature Bypass VulnerabilityYesNo8.8
CVE-2023-33149Microsoft Office Graphics Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-33148Microsoft Office Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-33158Microsoft Excel Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-33161Microsoft Excel Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-33152Microsoft ActiveX Remote Code Execution VulnerabilityNoNo7
CVE-2023-33153Microsoft Outlook Remote Code Execution VulnerabilityNoNo6.8
CVE-2023-33151Microsoft Outlook Spoofing VulnerabilityNoNo6.5
CVE-2023-33162Microsoft Excel Information Disclosure VulnerabilityNoNo5.5
CVE-2023-33165Microsoft SharePoint Server Security Feature Bypass VulnerabilityNoNo4.3

Microsoft Office Windows ESU vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-36884Office and Windows HTML Remote Code Execution VulnerabilityYesYes8.3

System Center vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-33156Microsoft Defender Elevation of Privilege VulnerabilityNoNo6.3

Windows vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-32049Windows SmartScreen Security Feature Bypass VulnerabilityYesNo8.8
CVE-2023-35315Windows Layer-2 Bridge Network Driver Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-35364Windows Kernel Elevation of Privilege VulnerabilityNoNo8.8
CVE-2023-35302Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-29347Windows Admin Center Spoofing VulnerabilityNoNo8.7
CVE-2023-21756Windows Win32k Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-35317Windows Server Update Service (WSUS) Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-32056Windows Server Update Service (WSUS) Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-35313Windows Online Certificate Status Protocol (OCSP) SnapIn Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-35323Windows OLE Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-35356Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-35357Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-35358Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-35363Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-35304Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-35305Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-35343Windows Geolocation Service Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-33155Windows Cloud Files Mini Filter Driver Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-35362Windows Clip Service Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-35337Win32k Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-32051Raw Image Extension Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-35320Connected User Experiences and Telemetry Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-35353Connected User Experiences and Telemetry Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-35352Windows Remote Desktop Security Feature Bypass VulnerabilityNoNo7.5
CVE-2023-35325Windows Print Spooler Information Disclosure VulnerabilityNoNo7.5
CVE-2023-35339Windows CryptoAPI Denial of Service VulnerabilityNoNo7.5
CVE-2023-32084HTTP.sys Denial of Service VulnerabilityNoNo7.5
CVE-2023-35298HTTP.sys Denial of Service VulnerabilityNoNo7.5
CVE-2023-35348Active Directory Federation Service Security Feature Bypass VulnerabilityNoNo7.5
CVE-2023-35347Microsoft Install Service Elevation of Privilege VulnerabilityNoNo7.1
CVE-2023-35360Windows Kernel Elevation of Privilege VulnerabilityNoNo7
CVE-2023-35361Windows Kernel Elevation of Privilege VulnerabilityNoNo7
CVE-2023-35336Windows MSHTML Platform Security Feature Bypass VulnerabilityNoNo6.5
CVE-2023-35308Windows MSHTML Platform Security Feature Bypass VulnerabilityNoNo6.5
CVE-2023-35331Windows Local Security Authority (LSA) Denial of Service VulnerabilityNoNo6.5
CVE-2023-32037Windows Layer-2 Bridge Network Driver Information Disclosure VulnerabilityNoNo6.5
CVE-2023-35329Windows Authentication Denial of Service VulnerabilityNoNo6.5
CVE-2023-35296Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure VulnerabilityNoNo6.5
CVE-2023-32083Microsoft Failover Cluster Information Disclosure VulnerabilityNoNo6.5
CVE-2023-36871Azure Active Directory Security Feature Bypass VulnerabilityNoNo6.5
CVE-2023-32041Windows Update Orchestrator Service Information Disclosure VulnerabilityNoNo5.5
CVE-2023-35326Windows CDP User Components Information Disclosure VulnerabilityNoNo5.5
CVE-2023-36872VP9 Video Extensions Information Disclosure VulnerabilityNoNo5.5
CVE-2023-32039Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure VulnerabilityNoNo5.5
CVE-2023-32040Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure VulnerabilityNoNo5.5
CVE-2023-35324Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure VulnerabilityNoNo5.5
CVE-2023-32085Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure VulnerabilityNoNo5.5
CVE-2023-35306Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure VulnerabilityNoNo5.5

Windows ESU vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-35365Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityNoNo9.8
CVE-2023-35366Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityNoNo9.8
CVE-2023-35367Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityNoNo9.8
CVE-2023-32057Microsoft Message Queuing Remote Code Execution VulnerabilityNoNo9.8
CVE-2023-35322Windows Deployment Services Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-35303USB Audio Class System Driver Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-35300Remote Procedure Call Runtime Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-32038Microsoft ODBC Driver Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-35328Windows Transaction Manager Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-33154Windows Partition Management Driver Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-32046Windows MSHTML Platform Elevation of Privilege VulnerabilityYesNo7.8
CVE-2023-32053Windows Installer Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-35342Windows Image Acquisition Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-36874Windows Error Reporting Service Elevation of Privilege VulnerabilityYesNo7.8
CVE-2023-35299Windows Common Log File System Driver Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-35340Windows CNG Key Isolation Service Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-35312Microsoft VOLSNAP.SYS Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-35297Windows Pragmatic General Multicast (PGM) Remote Code Execution VulnerabilityNoNo7.5
CVE-2023-35338Windows Peer Name Resolution Protocol Denial of Service VulnerabilityNoNo7.5
CVE-2023-33163Windows Network Load Balancing Remote Code Execution VulnerabilityNoNo7.5
CVE-2023-35330Windows Extended Negotiation Denial of Service VulnerabilityNoNo7.5
CVE-2023-35309Microsoft Message Queuing Remote Code Execution VulnerabilityNoNo7.5
CVE-2023-32044Microsoft Message Queuing Denial of Service VulnerabilityNoNo7.5
CVE-2023-32045Microsoft Message Queuing Denial of Service VulnerabilityNoNo7.5
CVE-2023-21526Windows Netlogon Information Disclosure VulnerabilityNoNo7.4
CVE-2023-32054Volume Shadow Copy Elevation of Privilege VulnerabilityNoNo7.3
CVE-2023-35350Windows Active Directory Certificate Services (AD CS) Remote Code Execution VulnerabilityNoNo7.2
CVE-2023-32043Windows Remote Desktop Security Feature Bypass VulnerabilityNoNo6.8
CVE-2023-35332Windows Remote Desktop Protocol Security Feature BypassNoNo6.8
CVE-2023-32055Active Template Library Elevation of Privilege VulnerabilityNoNo6.7
CVE-2023-35344Windows DNS Server Remote Code Execution VulnerabilityNoNo6.6
CVE-2023-35345Windows DNS Server Remote Code Execution VulnerabilityNoNo6.6
CVE-2023-35346Windows DNS Server Remote Code Execution VulnerabilityNoNo6.6
CVE-2023-35310Windows DNS Server Remote Code Execution VulnerabilityNoNo6.6
CVE-2023-35351Windows Active Directory Certificate Services (AD CS) Remote Code Execution VulnerabilityNoNo6.6
CVE-2023-32033Microsoft Failover Cluster Remote Code Execution VulnerabilityNoNo6.6
CVE-2023-35321Windows Deployment Services Denial of Service VulnerabilityNoNo6.5
CVE-2023-35316Remote Procedure Call Runtime Information Disclosure VulnerabilityNoNo6.5
CVE-2023-33166Remote Procedure Call Runtime Denial of Service VulnerabilityNoNo6.5
CVE-2023-33167Remote Procedure Call Runtime Denial of Service VulnerabilityNoNo6.5
CVE-2023-33168Remote Procedure Call Runtime Denial of Service VulnerabilityNoNo6.5
CVE-2023-33169Remote Procedure Call Runtime Denial of Service VulnerabilityNoNo6.5
CVE-2023-33172Remote Procedure Call Runtime Denial of Service VulnerabilityNoNo6.5
CVE-2023-33173Remote Procedure Call Runtime Denial of Service VulnerabilityNoNo6.5
CVE-2023-32034Remote Procedure Call Runtime Denial of Service VulnerabilityNoNo6.5
CVE-2023-32035Remote Procedure Call Runtime Denial of Service VulnerabilityNoNo6.5
CVE-2023-35314Remote Procedure Call Runtime Denial of Service VulnerabilityNoNo6.5
CVE-2023-35318Remote Procedure Call Runtime Denial of Service VulnerabilityNoNo6.5
CVE-2023-35319Remote Procedure Call Runtime Denial of Service VulnerabilityNoNo6.5
CVE-2023-33164Remote Procedure Call Runtime Denial of Service VulnerabilityNoNo6.5
CVE-2023-32042OLE Automation Information Disclosure VulnerabilityNoNo6.5
CVE-2023-35341Microsoft DirectMusic Information Disclosure VulnerabilityNoNo6.2
CVE-2023-33174Windows Cryptographic Information Disclosure VulnerabilityNoNo5.5

Download Rapid7's Annual Vulnerability Intelligence Report ▶︎

Related blog posts