Searching
..

Click anywhere to stop

KLA50774
Multiple vulnerabilities in Microsoft Windows

Обновлено: 25/01/2024
Дата обнаружения
11/07/2023
Уровень угрозы
Critical
Описание

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, obtain sensitive information, bypass security restrictions, gain privileges, spoof user interface.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Office and Windows HTML can be exploited remotely to execute arbitrary code.
  2. A denial of service vulnerability in Remote Procedure Call Runtime can be exploited remotely to cause denial of service.
  3. An information disclosure vulnerability in Remote Procedure Call Runtime can be exploited remotely to obtain sensitive information.
  4. A remote code execution vulnerability in Microsoft Message Queuing can be exploited remotely to execute arbitrary code.
  5. A security feature bypass vulnerability in Azure Active Directory can be exploited remotely to bypass security restrictions.
  6. A denial of service vulnerability in Windows Deployment Services can be exploited remotely to cause denial of service.
  7. An elevation of privilege vulnerability in Connected User Experiences and Telemetry can be exploited remotely to gain privileges.
  8. A remote code execution vulnerability in Windows DNS Server can be exploited remotely to execute arbitrary code.
  9. A denial of service vulnerability in Windows Local Security Authority (LSA) can be exploited remotely to cause denial of service.
  10. A remote code execution vulnerability in Windows Active Directory Certificate Services (AD CS) can be exploited remotely to execute arbitrary code.
  11. An information disclosure vulnerability in VP9 Video Extensions can be exploited remotely to obtain sensitive information.
  12. A remote code execution vulnerability in Windows OLE can be exploited remotely to execute arbitrary code.
  13. An elevation of privilege vulnerability in Windows MSHTML Platform can be exploited remotely to gain privileges.
  14. A security feature bypass vulnerability in Windows Remote Desktop can be exploited remotely to bypass security restrictions.
  15. A remote code execution vulnerability in Windows Network Load Balancing can be exploited remotely to execute arbitrary code.
  16. An information disclosure vulnerability in Windows Print Spooler can be exploited remotely to obtain sensitive information.
  17. An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
  18. A remote code execution vulnerability in Raw Image Extension can be exploited remotely to execute arbitrary code.
  19. An elevation of privilege vulnerability in Microsoft Install Service can be exploited remotely to gain privileges.
  20. An information disclosure vulnerability in Microsoft PostScript and PCL6 Class Printer Driver can be exploited remotely to obtain sensitive information.
  21. An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
  22. An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
  23. A denial of service vulnerability in Windows CryptoAPI can be exploited remotely to cause denial of service.
  24. An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
  25. An elevation of privilege vulnerability in Windows Server Update Service (WSUS) can be exploited remotely to gain privileges.
  26. A spoofing vulnerability in Windows Admin Center can be exploited remotely to spoof user interface.
  27. A denial of service vulnerability in Microsoft Message Queuing can be exploited remotely to cause denial of service.
  28. A remote code execution vulnerability in Windows Geolocation Service can be exploited remotely to execute arbitrary code.
  29. A remote code execution vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to execute arbitrary code.
  30. A remote code execution vulnerability in Windows Pragmatic General Multicast (PGM) can be exploited remotely to execute arbitrary code.
  31. An elevation of privilege vulnerability in Volume Shadow Copy can be exploited remotely to gain privileges.
  32. A remote code execution vulnerability in Microsoft ODBC Driver can be exploited remotely to execute arbitrary code.
  33. An information disclosure vulnerability in Windows Cryptographic can be exploited remotely to obtain sensitive information.
  34. An information disclosure vulnerability in Windows Layer-2 Bridge Network Driver can be exploited remotely to obtain sensitive information.
  35. A denial of service vulnerability in Windows Peer Name Resolution Protocol can be exploited remotely to cause denial of service.
  36. An elevation of privilege vulnerability in Windows Image Acquisition can be exploited remotely to gain privileges.
  37. A remote code execution vulnerability in Windows Online Certificate Status Protocol (OCSP) SnapIn can be exploited remotely to execute arbitrary code.
  38. A remote code execution vulnerability in Remote Procedure Call Runtime can be exploited remotely to execute arbitrary code.
  39. An elevation of privilege vulnerability in Microsoft VOLSNAP.SYS can be exploited remotely to gain privileges.
  40. An elevation of privilege vulnerability in Active Template Library can be exploited remotely to gain privileges.
  41. An information disclosure vulnerability in Windows CDP User Components can be exploited remotely to obtain sensitive information.
  42. An elevation of privilege vulnerability in Windows Transaction Manager can be exploited remotely to gain privileges.
  43. An information disclosure vulnerability in Microsoft DirectMusic can be exploited remotely to obtain sensitive information.
  44. A remote code execution vulnerability in Windows Deployment Services can be exploited remotely to execute arbitrary code.
  45. Security bypass vulnerability in Windows Remote Desktop Protocol can be exploited remotely to bypass security restrictions.
  46. An elevation of privilege vulnerability in Windows Win32k can be exploited remotely to gain privileges.
  47. An elevation of privilege vulnerability in Windows Error Reporting Service can be exploited remotely to gain privileges.
  48. A remote code execution vulnerability in Windows Layer-2 Bridge Network Driver can be exploited remotely to execute arbitrary code.
  49. An information disclosure vulnerability in OLE Automation can be exploited remotely to obtain sensitive information.
  50. A security feature bypass vulnerability in Windows MSHTML Platform can be exploited remotely to bypass security restrictions.
  51. A remote code execution vulnerability in Microsoft PostScript and PCL6 Class Printer Driver can be exploited remotely to execute arbitrary code.
  52. A denial of service vulnerability in HTTP.sys can be exploited remotely to cause denial of service.
  53. An elevation of privilege vulnerability in Windows Partition Management Driver can be exploited remotely to gain privileges.
  54. A remote code execution vulnerability in Microsoft Failover Cluster can be exploited remotely to execute arbitrary code.
  55. A denial of service vulnerability in Windows Authentication can be exploited remotely to cause denial of service.
  56. An information disclosure vulnerability in Windows Netlogon can be exploited remotely to obtain sensitive information.
  57. A remote code execution vulnerability in USB Audio Class System Driver can be exploited remotely to execute arbitrary code.
  58. An elevation of privilege vulnerability in Windows Clip Service can be exploited remotely to gain privileges.
  59. An elevation of privilege vulnerability in Windows Cloud Files Mini Filter Driver can be exploited remotely to gain privileges.
  60. An elevation of privilege vulnerability in Windows CNG Key Isolation Service can be exploited remotely to gain privileges.
  61. A security feature bypass vulnerability in Windows SmartScreen can be exploited remotely to bypass security restrictions.
  62. An information disclosure vulnerability in Windows Update Orchestrator Service can be exploited remotely to obtain sensitive information.
  63. A denial of service vulnerability in Windows Extended Negotiation can be exploited remotely to cause denial of service.
  64. An information disclosure vulnerability in Microsoft Failover Cluster can be exploited remotely to obtain sensitive information.
  65. A security feature bypass vulnerability in Active Directory Federation Service can be exploited remotely to bypass security restrictions.
Эксплуатация

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Пораженные продукты

Windows 11 version 21H2 for ARM64-based Systems
Windows Server 2016 (Server Core installation)
Windows Server 2019 (Server Core installation)
Windows 10 Version 21H2 for x64-based Systems
Windows Server 2022 (Server Core installation)
Windows Server 2016
Windows 10 Version 22H2 for ARM64-based Systems
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2 (Server Core installation)
Windows 10 Version 1607 for x64-based Systems
Windows 10 for x64-based Systems
Windows 10 for 32-bit Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows Server 2019
Windows 10 Version 1607 for 32-bit Systems
Windows Server 2022
Raw Image Extension
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 11 version 21H2 for x64-based Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows Admin Center
Windows Server 2012 R2
Windows 10 Version 1809 for 32-bit Systems
VP9 Video Extensions
Windows Server 2012

Решение

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Первичный источник обнаружения
CVE-2023-33167
CVE-2023-35316
CVE-2023-32034
CVE-2023-32057
CVE-2023-35318
CVE-2023-33169
CVE-2023-36871
CVE-2023-35321
CVE-2023-35320
CVE-2023-35345
CVE-2023-35331
CVE-2023-35309
CVE-2023-33168
CVE-2023-35350
CVE-2023-36872
CVE-2023-35323
CVE-2023-32046
CVE-2023-35344
CVE-2023-35352
CVE-2023-33166
CVE-2023-32035
CVE-2023-33163
CVE-2023-35325
CVE-2023-35356
CVE-2023-32051
CVE-2023-35347
CVE-2023-35296
CVE-2023-32085
CVE-2023-35337
CVE-2023-35364
CVE-2023-35299
CVE-2023-35358
CVE-2023-35339
CVE-2023-32053
CVE-2023-35351
CVE-2023-35363
CVE-2023-35317
CVE-2023-29347
CVE-2023-32045
CVE-2023-35353
CVE-2023-35343
CVE-2023-35367
CVE-2023-35297
CVE-2023-32054
CVE-2023-32056
CVE-2023-32038
CVE-2023-33174
CVE-2023-35346
CVE-2023-32037
CVE-2023-35338
CVE-2023-35342
CVE-2023-35313
CVE-2023-33164
CVE-2023-35300
CVE-2023-35312
CVE-2023-32040
CVE-2023-35360
CVE-2023-32055
CVE-2023-35326
CVE-2023-32039
CVE-2023-35365
CVE-2023-32044
CVE-2023-35328
CVE-2023-35341
CVE-2023-35322
CVE-2023-35332
CVE-2023-32043
CVE-2023-21756
CVE-2023-35361
CVE-2023-36884
CVE-2023-36874
CVE-2023-35315
CVE-2023-32042
CVE-2023-35308
CVE-2023-35314
CVE-2023-35302
CVE-2023-33173
CVE-2023-35298
CVE-2023-33154
CVE-2023-32033
CVE-2023-35357
CVE-2023-35329
CVE-2023-35319
CVE-2023-35336
CVE-2023-35304
CVE-2023-32084
CVE-2023-35306
CVE-2023-35324
CVE-2023-21526
CVE-2023-35303
CVE-2023-35366
CVE-2023-33172
CVE-2023-35362
CVE-2023-33155
CVE-2023-35305
CVE-2023-35310
CVE-2023-35340
CVE-2023-32049
CVE-2023-32041
CVE-2023-35330
CVE-2023-32083
CVE-2023-35348
Оказываемое влияние
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

SB 
[?]

PE 
[?]

SUI 
[?]
Связанные продукты
Microsoft Windows
Microsoft Windows Server
Microsoft Windows Server 2012
Microsoft Windows 10
Microsoft Windows Server 2016
Microsoft Windows Server 2019
Microsoft Windows 11
CVE-IDS
CVE-2023-368847.5Critical
CVE-2023-331677.5Critical
CVE-2023-353166.5High
CVE-2023-320347.5Critical
CVE-2023-320579.8Critical
CVE-2023-353186.5High
CVE-2023-331697.5Critical
CVE-2023-368716.5High
CVE-2023-353216.5High
CVE-2023-353207.8Critical
CVE-2023-353456.6High
CVE-2023-353316.5High
CVE-2023-353097.5Critical
CVE-2023-331687.5Critical
CVE-2023-353507.2High
CVE-2023-368725.5High
CVE-2023-353237.8Critical
CVE-2023-320467.8Critical
CVE-2023-353446.6High
CVE-2023-353527.5Critical
CVE-2023-331667.5Critical
CVE-2023-320357.5Critical
CVE-2023-331637.5Critical
CVE-2023-353257.5Critical
CVE-2023-353567.8Critical
CVE-2023-320517.8Critical
CVE-2023-353477.1High
CVE-2023-352966.5High
CVE-2023-320855.5High
CVE-2023-353377.8Critical
CVE-2023-353648.8Critical
CVE-2023-352997.8Critical
CVE-2023-353587.8Critical
CVE-2023-353397.5Critical
CVE-2023-320537.8Critical
CVE-2023-353516.6High
CVE-2023-353637.8Critical
CVE-2023-353177.8Critical
CVE-2023-293476.8High
CVE-2023-320457.5Critical
CVE-2023-353537.8Critical
CVE-2023-353437.8Critical
CVE-2023-353679.8Critical
CVE-2023-352977.5Critical
CVE-2023-320547.3High
CVE-2023-320569.8Critical
CVE-2023-320388.8Critical
CVE-2023-331745.5High
CVE-2023-353466.6High
CVE-2023-320376.5High
CVE-2023-353387.5Critical
CVE-2023-353427.8Critical
CVE-2023-353137.8Critical
CVE-2023-331646.5High
CVE-2023-353008.8Critical
CVE-2023-353127.8Critical
CVE-2023-320405.5High
CVE-2023-353607.0High
CVE-2023-320556.7High
CVE-2023-353265.5High
CVE-2023-320395.5High
CVE-2023-353659.8Critical
CVE-2023-320447.5Critical
CVE-2023-353287.8Critical
CVE-2023-353415.5High
CVE-2023-353228.8Critical
CVE-2023-353326.8High
CVE-2023-320436.8High
CVE-2023-217567.8Critical
CVE-2023-353617.0High
CVE-2023-368747.8Critical
CVE-2023-353158.8Critical
CVE-2023-320427.5Critical
CVE-2023-353086.5High
CVE-2023-353146.5High
CVE-2023-353028.8Critical
CVE-2023-331737.5Critical
CVE-2023-352987.5Critical
CVE-2023-331549.8Critical
CVE-2023-320337.2High
CVE-2023-353577.8Critical
CVE-2023-353296.5High
CVE-2023-353196.5High
CVE-2023-353365.4High
CVE-2023-353047.8Critical
CVE-2023-320847.5Critical
CVE-2023-353065.5High
CVE-2023-353245.5High
CVE-2023-215267.4High
CVE-2023-353038.8Critical
CVE-2023-353669.8Critical
CVE-2023-331727.5Critical
CVE-2023-353627.8Critical
CVE-2023-331557.8Critical
CVE-2023-353057.8Critical
CVE-2023-353106.6High
CVE-2023-353407.8Critical
CVE-2023-320498.8Critical
CVE-2023-320415.5High
CVE-2023-353307.5Critical
CVE-2023-320834.9Warning
CVE-2023-353486.5High
KB list

5028223
5028182
5028185
5028186
5028166
5028171
5028228
5028168
5028169
5028232
5028233
5028167
5029263
5029242
5029259
5029304
5029367
5029253
5029244
5029247
5029295
5029308
5029250
5029312