Kaspersky ID:
KLA50774
Detect Date:
07/11/2023
Updated:
06/28/2024

Description

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, obtain sensitive information, bypass security restrictions, gain privileges, spoof user interface.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Office and Windows HTML can be exploited remotely to execute arbitrary code.
  2. A denial of service vulnerability in Remote Procedure Call Runtime can be exploited remotely to cause denial of service.
  3. An information disclosure vulnerability in Remote Procedure Call Runtime can be exploited remotely to obtain sensitive information.
  4. A remote code execution vulnerability in Microsoft Message Queuing can be exploited remotely to execute arbitrary code.
  5. A security feature bypass vulnerability in Azure Active Directory can be exploited remotely to bypass security restrictions.
  6. A denial of service vulnerability in Windows Deployment Services can be exploited remotely to cause denial of service.
  7. An elevation of privilege vulnerability in Connected User Experiences and Telemetry can be exploited remotely to gain privileges.
  8. A remote code execution vulnerability in Windows DNS Server can be exploited remotely to execute arbitrary code.
  9. A denial of service vulnerability in Windows Local Security Authority (LSA) can be exploited remotely to cause denial of service.
  10. A remote code execution vulnerability in Windows Active Directory Certificate Services (AD CS) can be exploited remotely to execute arbitrary code.
  11. An information disclosure vulnerability in VP9 Video Extensions can be exploited remotely to obtain sensitive information.
  12. A remote code execution vulnerability in Windows OLE can be exploited remotely to execute arbitrary code.
  13. An elevation of privilege vulnerability in Windows MSHTML Platform can be exploited remotely to gain privileges.
  14. A security feature bypass vulnerability in Windows Remote Desktop can be exploited remotely to bypass security restrictions.
  15. A remote code execution vulnerability in Windows Network Load Balancing can be exploited remotely to execute arbitrary code.
  16. An information disclosure vulnerability in Windows Print Spooler can be exploited remotely to obtain sensitive information.
  17. An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
  18. A remote code execution vulnerability in Raw Image Extension can be exploited remotely to execute arbitrary code.
  19. An elevation of privilege vulnerability in Microsoft Install Service can be exploited remotely to gain privileges.
  20. An information disclosure vulnerability in Microsoft PostScript and PCL6 Class Printer Driver can be exploited remotely to obtain sensitive information.
  21. An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
  22. An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
  23. A denial of service vulnerability in Windows CryptoAPI can be exploited remotely to cause denial of service.
  24. An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
  25. An elevation of privilege vulnerability in Windows Server Update Service (WSUS) can be exploited remotely to gain privileges.
  26. A spoofing vulnerability in Windows Admin Center can be exploited remotely to spoof user interface.
  27. A denial of service vulnerability in Microsoft Message Queuing can be exploited remotely to cause denial of service.
  28. A remote code execution vulnerability in Windows Geolocation Service can be exploited remotely to execute arbitrary code.
  29. A remote code execution vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to execute arbitrary code.
  30. A remote code execution vulnerability in Windows Pragmatic General Multicast (PGM) can be exploited remotely to execute arbitrary code.
  31. An elevation of privilege vulnerability in Volume Shadow Copy can be exploited remotely to gain privileges.
  32. A remote code execution vulnerability in Microsoft ODBC Driver can be exploited remotely to execute arbitrary code.
  33. An information disclosure vulnerability in Windows Cryptographic can be exploited remotely to obtain sensitive information.
  34. An information disclosure vulnerability in Windows Layer-2 Bridge Network Driver can be exploited remotely to obtain sensitive information.
  35. A denial of service vulnerability in Windows Peer Name Resolution Protocol can be exploited remotely to cause denial of service.
  36. An elevation of privilege vulnerability in Windows Image Acquisition can be exploited remotely to gain privileges.
  37. A remote code execution vulnerability in Windows Online Certificate Status Protocol (OCSP) SnapIn can be exploited remotely to execute arbitrary code.
  38. A remote code execution vulnerability in Remote Procedure Call Runtime can be exploited remotely to execute arbitrary code.
  39. An elevation of privilege vulnerability in Microsoft VOLSNAP.SYS can be exploited remotely to gain privileges.
  40. An elevation of privilege vulnerability in Active Template Library can be exploited remotely to gain privileges.
  41. An information disclosure vulnerability in Windows CDP User Components can be exploited remotely to obtain sensitive information.
  42. An elevation of privilege vulnerability in Windows Transaction Manager can be exploited remotely to gain privileges.
  43. An information disclosure vulnerability in Microsoft DirectMusic can be exploited remotely to obtain sensitive information.
  44. A remote code execution vulnerability in Windows Deployment Services can be exploited remotely to execute arbitrary code.
  45. Security bypass vulnerability in Windows Remote Desktop Protocol can be exploited remotely to bypass security restrictions.
  46. An elevation of privilege vulnerability in Windows Win32k can be exploited remotely to gain privileges.
  47. An elevation of privilege vulnerability in Windows Error Reporting Service can be exploited remotely to gain privileges.
  48. A remote code execution vulnerability in Windows Layer-2 Bridge Network Driver can be exploited remotely to execute arbitrary code.
  49. An information disclosure vulnerability in OLE Automation can be exploited remotely to obtain sensitive information.
  50. A security feature bypass vulnerability in Windows MSHTML Platform can be exploited remotely to bypass security restrictions.
  51. A remote code execution vulnerability in Microsoft PostScript and PCL6 Class Printer Driver can be exploited remotely to execute arbitrary code.
  52. A denial of service vulnerability in HTTP.sys can be exploited remotely to cause denial of service.
  53. An elevation of privilege vulnerability in Windows Partition Management Driver can be exploited remotely to gain privileges.
  54. A remote code execution vulnerability in Microsoft Failover Cluster can be exploited remotely to execute arbitrary code.
  55. A denial of service vulnerability in Windows Authentication can be exploited remotely to cause denial of service.
  56. An information disclosure vulnerability in Windows Netlogon can be exploited remotely to obtain sensitive information.
  57. A remote code execution vulnerability in USB Audio Class System Driver can be exploited remotely to execute arbitrary code.
  58. An elevation of privilege vulnerability in Windows Clip Service can be exploited remotely to gain privileges.
  59. An elevation of privilege vulnerability in Windows Cloud Files Mini Filter Driver can be exploited remotely to gain privileges.
  60. An elevation of privilege vulnerability in Windows CNG Key Isolation Service can be exploited remotely to gain privileges.
  61. A security feature bypass vulnerability in Windows SmartScreen can be exploited remotely to bypass security restrictions.
  62. An information disclosure vulnerability in Windows Update Orchestrator Service can be exploited remotely to obtain sensitive information.
  63. A denial of service vulnerability in Windows Extended Negotiation can be exploited remotely to cause denial of service.
  64. An information disclosure vulnerability in Microsoft Failover Cluster can be exploited remotely to obtain sensitive information.
  65. A security feature bypass vulnerability in Active Directory Federation Service can be exploited remotely to bypass security restrictions.

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2023-36884
    critical
  • CVE-2023-33167
    critical
  • CVE-2023-35316
    high
  • CVE-2023-32034
    critical
  • CVE-2023-32057
    critical
  • CVE-2023-35318
    high
  • CVE-2023-33169
    critical
  • CVE-2023-36871
    high
  • CVE-2023-35321
    high
  • CVE-2023-35320
    critical
  • CVE-2023-35345
    high
  • CVE-2023-35331
    high
  • CVE-2023-35309
    critical
  • CVE-2023-33168
    critical
  • CVE-2023-35350
    high
  • CVE-2023-36872
    high
  • CVE-2023-35323
    critical
  • CVE-2023-32046
    critical
  • CVE-2023-35344
    high
  • CVE-2023-35352
    critical
  • CVE-2023-33166
    critical
  • CVE-2023-32035
    critical
  • CVE-2023-33163
    critical
  • CVE-2023-35325
    critical
  • CVE-2023-35356
    critical
  • CVE-2023-32051
    critical
  • CVE-2023-35347
    high
  • CVE-2023-35296
    high
  • CVE-2023-32085
    high
  • CVE-2023-35337
    critical
  • CVE-2023-35364
    critical
  • CVE-2023-35299
    critical
  • CVE-2023-35358
    critical
  • CVE-2023-35339
    critical
  • CVE-2023-32053
    critical
  • CVE-2023-35351
    high
  • CVE-2023-35363
    critical
  • CVE-2023-35317
    critical
  • CVE-2023-29347
    high
  • CVE-2023-32045
    critical
  • CVE-2023-35353
    critical
  • CVE-2023-35343
    critical
  • CVE-2023-35367
    critical
  • CVE-2023-35297
    critical
  • CVE-2023-32054
    high
  • CVE-2023-32056
    critical
  • CVE-2023-32038
    critical
  • CVE-2023-33174
    high
  • CVE-2023-35346
    high
  • CVE-2023-32037
    high
  • CVE-2023-35338
    critical
  • CVE-2023-35342
    critical
  • CVE-2023-35313
    critical
  • CVE-2023-33164
    high
  • CVE-2023-35300
    critical
  • CVE-2023-35312
    critical
  • CVE-2023-32040
    high
  • CVE-2023-35360
    high
  • CVE-2023-32055
    high
  • CVE-2023-35326
    high
  • CVE-2023-32039
    high
  • CVE-2023-35365
    critical
  • CVE-2023-32044
    critical
  • CVE-2023-35328
    critical
  • CVE-2023-35341
    high
  • CVE-2023-35322
    critical
  • CVE-2023-35332
    high
  • CVE-2023-32043
    high
  • CVE-2023-21756
    critical
  • CVE-2023-35361
    high
  • CVE-2023-36874
    critical
  • CVE-2023-35315
    critical
  • CVE-2023-32042
    critical
  • CVE-2023-35308
    high
  • CVE-2023-35314
    high
  • CVE-2023-35302
    critical
  • CVE-2023-33173
    critical
  • CVE-2023-35298
    critical
  • CVE-2023-33154
    critical
  • CVE-2023-32033
    high
  • CVE-2023-35357
    critical
  • CVE-2023-35329
    high
  • CVE-2023-35319
    high
  • CVE-2023-35336
    high
  • CVE-2023-35304
    critical
  • CVE-2023-32084
    critical
  • CVE-2023-35306
    high
  • CVE-2023-35324
    high
  • CVE-2023-21526
    high
  • CVE-2023-35303
    critical
  • CVE-2023-35366
    critical
  • CVE-2023-33172
    critical
  • CVE-2023-35362
    critical
  • CVE-2023-33155
    critical
  • CVE-2023-35305
    critical
  • CVE-2023-35310
    high
  • CVE-2023-35340
    critical
  • CVE-2023-32049
    critical
  • CVE-2023-32041
    high
  • CVE-2023-35330
    critical
  • CVE-2023-32083
    warning
  • CVE-2023-35348
    high
  • ADV230001
    unknown
  • ADV230002
    unknown

KB list

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.