Kaspersky ID:
KLA62389
Erkennungsdatum:
12/12/2023
Aktualisiert:
03/02/2026

Beschreibung

Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, gain privileges, overwrite arbitrary files, cause denial of service, spoof user interface.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Internet Connection Sharing (ICS) can be exploited remotely to execute arbitrary code.
  2. An information disclosure vulnerability in DHCP Server Service can be exploited remotely to obtain sensitive information.
  3. A remote code execution vulnerability in Microsoft WDAC OLE DB provider for SQL Server can be exploited remotely to execute arbitrary code.
  4. An elevation of privilege vulnerability in Windows Telephony Server can be exploited remotely to gain privileges.
  5. A division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality.
  6. A remote code execution vulnerability in Microsoft ODBC Driver can be exploited remotely to execute arbitrary code.
  7. A denial of service vulnerability in Internet Connection Sharing (ICS) can be exploited remotely to cause denial of service.
  8. An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
  9. A remote code execution vulnerability in Windows MSHTML Platform can be exploited remotely to execute arbitrary code.
  10. An elevation of privilege vulnerability in Windows Ancillary Function Driver for WinSock can be exploited remotely to gain privileges.
  11. A spoofing vulnerability in Windows DPAPI (Data Protection Application Programming Interface) can be exploited remotely to spoof user interface.
  12. A denial of service vulnerability in DHCP Server Service can be exploited remotely to cause denial of service.
  13. An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
  14. A remote code execution vulnerability in Microsoft USBHUB 3.0 Device Driver can be exploited remotely to execute arbitrary code.
  15. A remote code execution vulnerability in Windows Media can be exploited remotely to execute arbitrary code.
  16. A spoofing vulnerability in Windows DNS can be exploited remotely to spoof user interface.

Ursprüngliche Informationshinweise

Ausnutzung

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Betroffene Produkte

CVE Liste

  • CVE-2023-20588
    high
  • CVE-2023-35630
    critical
  • CVE-2023-35641
    critical
  • CVE-2023-35643
    critical
  • CVE-2023-36006
    critical
  • CVE-2023-36005
    critical
  • CVE-2023-35639
    critical
  • CVE-2023-35642
    high
  • CVE-2023-36011
    critical
  • CVE-2023-35628
    critical
  • CVE-2023-36004
    critical
  • CVE-2023-35638
    critical
  • CVE-2023-36012
    high
  • CVE-2023-35633
    critical
  • CVE-2023-35622
    critical
  • CVE-2023-35629
    high
  • CVE-2023-21740
    critical
  • CVE-2023-35632
    critical

KB Liste

Mehr erfahren

Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com

Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!
Kaspersky Next
Let´s go Next: Cybersicherheit neu gedacht
Erfahren Sie mehr
Neu: Kaspersky!
Dein digitales Leben verdient umfassenden Schutz!
Erfahren Sie mehr
Do you want to save your changes?
Your message has been sent successfully.