Kaspersky ID:
KLA50775
Detect Date:
07/11/2023
Updated:
05/30/2024

Description

Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, obtain sensitive information, gain privileges, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Office and Windows HTML can be exploited remotely to execute arbitrary code.
  2. A denial of service vulnerability in Remote Procedure Call Runtime can be exploited remotely to cause denial of service.
  3. An information disclosure vulnerability in Remote Procedure Call Runtime can be exploited remotely to obtain sensitive information.
  4. A remote code execution vulnerability in Microsoft Message Queuing can be exploited remotely to execute arbitrary code.
  5. A denial of service vulnerability in Windows Deployment Services can be exploited remotely to cause denial of service.
  6. A remote code execution vulnerability in Windows DNS Server can be exploited remotely to execute arbitrary code.
  7. A remote code execution vulnerability in Windows Active Directory Certificate Services (AD CS) can be exploited remotely to execute arbitrary code.
  8. An elevation of privilege vulnerability in Windows MSHTML Platform can be exploited remotely to gain privileges.
  9. A remote code execution vulnerability in Windows Network Load Balancing can be exploited remotely to execute arbitrary code.
  10. An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
  11. An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
  12. A denial of service vulnerability in Microsoft Message Queuing can be exploited remotely to cause denial of service.
  13. A remote code execution vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to execute arbitrary code.
  14. A remote code execution vulnerability in Windows Pragmatic General Multicast (PGM) can be exploited remotely to execute arbitrary code.
  15. An elevation of privilege vulnerability in Volume Shadow Copy can be exploited remotely to gain privileges.
  16. A remote code execution vulnerability in Microsoft ODBC Driver can be exploited remotely to execute arbitrary code.
  17. An information disclosure vulnerability in Windows Cryptographic can be exploited remotely to obtain sensitive information.
  18. A denial of service vulnerability in Windows Peer Name Resolution Protocol can be exploited remotely to cause denial of service.
  19. An elevation of privilege vulnerability in Windows Image Acquisition can be exploited remotely to gain privileges.
  20. A remote code execution vulnerability in Remote Procedure Call Runtime can be exploited remotely to execute arbitrary code.
  21. An elevation of privilege vulnerability in Microsoft VOLSNAP.SYS can be exploited remotely to gain privileges.
  22. An elevation of privilege vulnerability in Active Template Library can be exploited remotely to gain privileges.
  23. An elevation of privilege vulnerability in Windows Transaction Manager can be exploited remotely to gain privileges.
  24. An information disclosure vulnerability in Microsoft DirectMusic can be exploited remotely to obtain sensitive information.
  25. A remote code execution vulnerability in Windows Deployment Services can be exploited remotely to execute arbitrary code.
  26. Security bypass vulnerability in Windows Remote Desktop Protocol can be exploited remotely to bypass security restrictions.
  27. A security feature bypass vulnerability in Windows Remote Desktop can be exploited remotely to bypass security restrictions.
  28. An elevation of privilege vulnerability in Windows Error Reporting Service can be exploited remotely to gain privileges.
  29. An information disclosure vulnerability in OLE Automation can be exploited remotely to obtain sensitive information.
  30. An elevation of privilege vulnerability in Windows Partition Management Driver can be exploited remotely to gain privileges.
  31. A remote code execution vulnerability in Microsoft Failover Cluster can be exploited remotely to execute arbitrary code.
  32. An information disclosure vulnerability in Windows Netlogon can be exploited remotely to obtain sensitive information.
  33. A remote code execution vulnerability in USB Audio Class System Driver can be exploited remotely to execute arbitrary code.
  34. An elevation of privilege vulnerability in Windows CNG Key Isolation Service can be exploited remotely to gain privileges.
  35. A denial of service vulnerability in Windows Extended Negotiation can be exploited remotely to cause denial of service.
  36. An elevation of privilege vulnerability in Windows Win32k can be exploited remotely to gain privileges.
  37. A security feature bypass vulnerability in Windows MSHTML Platform can be exploited remotely to bypass security restrictions.
  38. An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
  39. An information disclosure vulnerability in Windows Print Spooler can be exploited remotely to obtain sensitive information.
  40. An information disclosure vulnerability in Microsoft PostScript and PCL6 Class Printer Driver can be exploited remotely to obtain sensitive information.
  41. A denial of service vulnerability in Windows Authentication can be exploited remotely to cause denial of service.
  42. An elevation of privilege vulnerability in Windows Server Update Service (WSUS) can be exploited remotely to gain privileges.
  43. A denial of service vulnerability in Windows Local Security Authority (LSA) can be exploited remotely to cause denial of service.
  44. A remote code execution vulnerability in Microsoft PostScript and PCL6 Class Printer Driver can be exploited remotely to execute arbitrary code.

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2023-36884
    high
  • CVE-2023-33167
    high
  • CVE-2023-35316
    high
  • CVE-2023-32034
    high
  • CVE-2023-32057
    critical
  • CVE-2023-35318
    high
  • CVE-2023-33169
    high
  • CVE-2023-35321
    high
  • CVE-2023-35345
    high
  • CVE-2023-35331
    high
  • CVE-2023-35309
    high
  • CVE-2023-33168
    high
  • CVE-2023-35350
    high
  • CVE-2023-32046
    high
  • CVE-2023-35344
    high
  • CVE-2023-35352
    high
  • CVE-2023-33166
    high
  • CVE-2023-32035
    high
  • CVE-2023-33163
    high
  • CVE-2023-35325
    high
  • CVE-2023-35296
    high
  • CVE-2023-32085
    high
  • CVE-2023-35299
    high
  • CVE-2023-32053
    high
  • CVE-2023-35351
    high
  • CVE-2023-35317
    high
  • CVE-2023-32045
    high
  • CVE-2023-35367
    critical
  • CVE-2023-35297
    high
  • CVE-2023-32054
    high
  • CVE-2023-32038
    high
  • CVE-2023-33174
    high
  • CVE-2023-35346
    high
  • CVE-2023-35338
    high
  • CVE-2023-35342
    high
  • CVE-2023-33164
    high
  • CVE-2023-35300
    high
  • CVE-2023-35312
    high
  • CVE-2023-32040
    high
  • CVE-2023-35360
    high
  • CVE-2023-32055
    high
  • CVE-2023-32039
    high
  • CVE-2023-35365
    critical
  • CVE-2023-32044
    high
  • CVE-2023-35328
    high
  • CVE-2023-35341
    high
  • CVE-2023-35322
    high
  • CVE-2023-35332
    high
  • CVE-2023-32043
    high
  • CVE-2023-21756
    high
  • CVE-2023-35361
    high
  • CVE-2023-36874
    high
  • CVE-2023-32042
    high
  • CVE-2023-35308
    high
  • CVE-2023-35314
    high
  • CVE-2023-35302
    high
  • CVE-2023-33173
    high
  • CVE-2023-33154
    high
  • CVE-2023-32033
    high
  • CVE-2023-35329
    high
  • CVE-2023-35319
    high
  • CVE-2023-35336
    high
  • CVE-2023-35306
    high
  • CVE-2023-35324
    high
  • CVE-2023-21526
    high
  • CVE-2023-35303
    high
  • CVE-2023-35366
    critical
  • CVE-2023-33172
    high
  • CVE-2023-35310
    high
  • CVE-2023-35340
    high
  • CVE-2023-35330
    high
  • CVE-2023-32050
    high

KB list

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky IT Security Calculator
Calculate
Check now
Learn more about cybersecurity on Kaspersky Encyclopedia
For free
Learn more
Confirm changes?
Your message has been sent successfully.