Searching
..

Click anywhere to stop

KLA48553
Multiple vulnerabilities in Microsoft Windows

Updated: 01/25/2024
Detect date
?
03/14/2023
Severity
?
Critical
Description

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, obtain sensitive information, cause denial of service, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability in Windows Graphics Component can be exploited remotely to gain privileges.
  2. A remote code execution vulnerability in Windows DNS Server can be exploited remotely to execute arbitrary code.
  3. An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
  4. A remote code execution vulnerability in Microsoft PostScript and PCL6 Class Printer Driver can be exploited remotely to execute arbitrary code.
  5. An information disclosure vulnerability in Microsoft PostScript and PCL6 Class Printer Driver can be exploited remotely to obtain sensitive information.
  6. An elevation of privilege vulnerability in Windows Resilient File System (ReFS) can be exploited remotely to gain privileges.
  7. A remote code execution vulnerability in Internet Control Message Protocol (ICMP) can be exploited remotely to execute arbitrary code.
  8. An elevation of privilege vulnerability in CERT/CC can be exploited remotely to gain privileges.
  9. A remote code execution vulnerability in Remote Procedure Call Runtime can be exploited remotely to execute arbitrary code.
  10. An elevation of privilege vulnerability in Windows Point-to-Point Protocol over Ethernet (PPPoE) can be exploited remotely to gain privileges.
  11. An elevation of privilege vulnerability in Windows BrokerInfrastructure Service can be exploited remotely to gain privileges.
  12. A remote code execution vulnerability in Windows Point-to-Point Protocol over Ethernet (PPPoE) can be exploited remotely to execute arbitrary code.
  13. A remote code execution vulnerability in Windows Bluetooth Service can be exploited remotely to execute arbitrary code.
  14. An elevation of privilege vulnerability in Windows HTTP.sys can be exploited remotely to gain privileges.
  15. A denial of service vulnerability in Windows Hyper-V can be exploited remotely to cause denial of service.
  16. A remote code execution vulnerability in Windows Media can be exploited remotely to execute arbitrary code.
  17. A denial of service vulnerability in Windows Internet Key Exchange (IKE) Extension can be exploited remotely to cause denial of service.
  18. A remote code execution vulnerability in Windows Point-to-Point Tunneling Protocol can be exploited remotely to execute arbitrary code.
  19. A remote code execution vulnerability in HTTP Protocol Stack can be exploited remotely to execute arbitrary code.
  20. A security feature bypass vulnerability in Windows SmartScreen can be exploited remotely to bypass security restrictions.
  21. An elevation of privilege vulnerability in Windows Accounts Picture can be exploited remotely to gain privileges.
  22. A denial of service vulnerability in Windows Secure Channel can be exploited remotely to cause denial of service.
  23. An information disclosure vulnerability in Client Server Run-Time Subsystem (CSRSS) can be exploited remotely to obtain sensitive information.
  24. An elevation of privilege vulnerability in Windows Partition Management Driver can be exploited remotely to gain privileges.
  25. A remote code execution vulnerability in Windows Cryptographic Services can be exploited remotely to execute arbitrary code.
  26. An elevation of privilege vulnerability in TPM2.0 Module Library can be exploited remotely to gain privileges.
  27. An elevation of privilege vulnerability in Microsoft PostScript and PCL6 Class Printer Driver can be exploited remotely to gain privileges.
  28. An elevation of privilege vulnerability in Windows Bluetooth Driver can be exploited remotely to gain privileges.
Exploitation

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Affected products

Windows 10 Version 22H2 for ARM64-based Systems
Windows Server 2019 (Server Core installation)
Windows 10 Version 20H2 for 32-bit Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows 10 for x64-based Systems
Windows 10 Version 20H2 for x64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 10 for 32-bit Systems
Windows 11 version 21H2 for x64-based Systems
Windows Server 2012 R2 (Server Core installation)
Windows 10 Version 20H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows Server 2016 (Server Core installation)
Windows Server 2012 R2
Windows 10 Version 1607 for x64-based Systems
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows 10 Version 1809 for 32-bit Systems
Windows Server 2016
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows Server 2019

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Original advisories

CVE-2023-24861
CVE-2023-23400
CVE-2023-23423
CVE-2023-24910
CVE-2023-24868
CVE-2023-24858
CVE-2023-23413
CVE-2023-23418
CVE-2023-24907
CVE-2023-23422
CVE-2023-24870
CVE-2023-23415
CVE-2023-1018
CVE-2023-21708
CVE-2023-24865
CVE-2023-23385
CVE-2023-23393
CVE-2023-24913
CVE-2023-24866
CVE-2023-23414
CVE-2023-23421
CVE-2023-24871
CVE-2023-23410
CVE-2023-23407
CVE-2023-23403
CVE-2023-23411
CVE-2023-23406
CVE-2023-23401
CVE-2023-24859
CVE-2023-24911
CVE-2023-24867
CVE-2023-24909
CVE-2023-23405
CVE-2023-23404
CVE-2023-23392
CVE-2023-24880
CVE-2023-24856
CVE-2023-24876
CVE-2023-23412
CVE-2023-24863
CVE-2023-24872
CVE-2023-24862
CVE-2023-23420
CVE-2023-23409
CVE-2023-23417
CVE-2023-24908
CVE-2023-24869
CVE-2023-23416
CVE-2023-23419
CVE-2023-23394
CVE-2023-24857
CVE-2023-1017
CVE-2023-23402
CVE-2023-24906
CVE-2023-24864
CVE-2023-23388

Impacts
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

SB 
[?]

PE 
[?]

SUI 
[?]
Related products
Microsoft Windows
Microsoft Windows Server
Microsoft Windows Server 2012
Microsoft Windows 10
Microsoft Windows Server 2016
Microsoft Windows Server 2019
Microsoft Windows 11
CVE-IDS
?
CVE-2023-248617.0High
CVE-2023-234007.2High
CVE-2023-234237.8Critical
CVE-2023-249107.8Critical
CVE-2023-248688.8Critical
CVE-2023-248587.5Critical
CVE-2023-234138.8Critical
CVE-2023-234187.8Critical
CVE-2023-249078.8Critical
CVE-2023-234227.8Critical
CVE-2023-248706.5High
CVE-2023-234159.8Critical
CVE-2023-10185.5High
CVE-2023-217089.8Critical
CVE-2023-248656.5High
CVE-2023-233857.0High
CVE-2023-233937.0High
CVE-2023-249138.8Critical
CVE-2023-248666.5High
CVE-2023-234147.1High
CVE-2023-234217.8Critical
CVE-2023-248718.8Critical
CVE-2023-234107.8Critical
CVE-2023-234077.1High
CVE-2023-234038.8Critical
CVE-2023-234116.5High
CVE-2023-234068.8Critical
CVE-2023-234017.8Critical
CVE-2023-248597.5Critical
CVE-2023-249114.3Warning
CVE-2023-248678.8Critical
CVE-2023-249098.8Critical
CVE-2023-234058.1Critical
CVE-2023-234048.1Critical
CVE-2023-233929.8Critical
CVE-2023-248804.4Warning
CVE-2023-248567.5Critical
CVE-2023-248768.8Critical
CVE-2023-234127.8Critical
CVE-2023-248636.5High
CVE-2023-248728.8Critical
CVE-2023-248625.5High
CVE-2023-234207.8Critical
CVE-2023-234095.5High
CVE-2023-234177.8Critical
CVE-2023-249088.1Critical
CVE-2023-248698.1Critical
CVE-2023-234167.8Critical
CVE-2023-234197.8Critical
CVE-2023-233945.5High
CVE-2023-248576.5High
CVE-2023-10177.8Critical
CVE-2023-234027.8Critical
CVE-2023-249066.5High
CVE-2023-248648.8Critical
CVE-2023-233888.8Critical
KB list

5023786
5023752
5023764
5023706
5023756
5023713
5023765
5023698
5023702
5023696
5023697
5023705

Microsoft official advisories
Microsoft Security Update Guide
Find out the statistics of the vulnerabilities spreading in your region