• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
update now: microsoft releases patches for 3 actively exploited windows

Update Now: Microsoft Releases Patches for 3 Actively Exploited Windows Vulnerabilities

You are here: Home / General Cyber Security News / Update Now: Microsoft Releases Patches for 3 Actively Exploited Windows Vulnerabilities
February 15, 2023

Microsoft on Tuesday introduced security updates to handle 75 flaws spanning its products portfolio, a few of which have arrive less than active exploitation in the wild.

The updates are in addition to 22 flaws the Windows maker patched in its Chromium-based mostly Edge browser above the past thirty day period.

Of the 75 vulnerabilities, 9 are rated Critical and 66 are rated Crucial in severity. 37 out of 75 bugs are classified as distant code execution (RCE) flaws. The 3 zero-times of note that have been exploited are as follows –

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


  • CVE-2023-21715 (CVSS score: 7.3) – Microsoft Place of work Security Element Bypass Vulnerability
  • CVE-2023-21823 (CVSS rating: 7.8) – Windows Graphics Element Elevation of Privilege Vulnerability
  • CVE-2023-23376 (CVSS score: 7.8) – Windows Popular Log File Technique (CLFS) Driver Elevation of Privilege Vulnerability

“The attack alone is carried out domestically by a user with authentication to the focused method,” Microsoft claimed in advisory for CVE-2023-21715.

“An authenticated attacker could exploit the vulnerability by convincing a target, as a result of social engineering, to download and open a specially crafted file from a web site which could direct to a local attack on the victim personal computer.”

Successful exploitation of the previously mentioned flaws could enable an adversary to bypass Business office macro insurance policies used to block untrusted or malicious documents or acquire Technique privileges.

CVE-2023-23376 is also the third actively exploited zero-working day flaw in the CLFS part soon after CVE-2022-24521 and CVE-2022-37969 (CVSS scores: 7.8), which had been resolved by Microsoft in April and September 2022.

“The Windows Popular Log File Method Driver is a component of the Windows running process that manages and maintains a higher-functionality, transaction-based mostly log file system,” Immersive Labs’ Nikolas Cemerikic claimed.

“It is an important ingredient of the Windows running program, and any vulnerabilities in this driver could have substantial implications for the security and trustworthiness of the procedure.”

It’s well worth noting that Microsoft OneNote for Android is susceptible to CVE-2023-21823, and with the be aware-getting services increasingly rising as a conduit for offering malware, it really is essential that users use the fixes.

Also addressed by Microsoft are several RCE flaws in Trade Server, ODBC Driver, PostScript Printer Driver, and SQL Server as nicely as denial-of-support (DoS) issues impacting Windows iSCSI Company and Windows Protected Channel.

3 of the Trade Server flaws are categorised by the corporation as “Exploitation More Most likely,” although effective exploitation calls for the attacker to be previously authenticated.

Exchange servers have demonstrated to be superior-value targets in recent many years as they can help unauthorized entry to sensitive facts, or facilitate Small business Email Compromise (BEC) attacks.

Software Patches from Other Distributors

Moreover Microsoft, security updates have also been produced by other distributors about the past couple months to rectify various vulnerabilities, like —

  • Adobe
  • AMD
  • Android
  • Apple
  • Atlassian
  • Cisco
  • Citrix
  • CODESYS
  • Dell
  • Drupal
  • F5
  • GitLab
  • Google Chrome
  • HP
  • IBM
  • Intel
  • Juniper Networks
  • Lenovo
  • Linux distributions Debian, Oracle Linux, Red Hat, SUSE, and Ubuntu
  • MediaTek
  • Mozilla Firefox, Firefox ESR, and Thunderbird
  • NETGEAR
  • NVIDIA
  • Palo Alto Networks
  • Qualcomm
  • Samba
  • Samsung
  • SAP
  • Schneider Electric
  • Siemens
  • Sophos
  • Synology
  • Development Micro
  • VMware
  • Zoho, and
  • Zyxel

Located this posting fascinating? Observe us on Twitter  and LinkedIn to browse far more exceptional material we article.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Lokibot, AgentTesla Grow in January 2023’s Most Wanted Malware List
Next Post: Google Rolling Out Privacy Sandbox Beta on Android 13 Devices google rolling out privacy sandbox beta on android 13 devices»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Telegram, WhatsApp Trojanized to Target Cryptocurrency Wallets
  • Pro-Russian Winter Vivern APT Targets Governments and Telecom Firm
  • Google Exposes 18 Zero-Day Flaws in Samsung Exynos Chips
  • Free decryptor released for Conti ransomware variant infecting hundreds of organisations
  • Bitwarden to release fix for four-year-old vulnerability
  • THN Webinar: 3 Research-Backed Ways to Secure Your Identity Perimeter
  • New GoLang-Based HinataBot Exploiting Router and Server Flaws for DDoS Attacks
  • A New Security Category Addresses Web-borne Threats
  • ICO Reprimands Metropolitan Police for Data Snafu
  • Lookalike Telegram and WhatsApp Websites Distributing Cryptocurrency Stealing Malware

Copyright © TheCyberSecurity.News, All Rights Reserved.