KLA61358
Multiple vulnerabilities in Microsoft Windows

Обновлено: 21/11/2023
Дата обнаружения
10/10/2023
Уровень угрозы
Critical
Описание

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, cause denial of service, bypass security restrictions, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability in Windows Graphics Component can be exploited remotely to gain privileges.
  2. A remote code execution vulnerability in Microsoft Message Queuing can be exploited remotely to execute arbitrary code.
  3. A denial of service vulnerability in Active Template Library can be exploited remotely to cause denial of service.
  4. A security feature bypass vulnerability in Windows Search can be exploited remotely to bypass security restrictions.
  5. A denial of service vulnerability in Microsoft AllJoyn API can be exploited remotely to cause denial of service.
  6. An information disclosure vulnerability in Windows TCP/IP can be exploited remotely to obtain sensitive information.
  7. An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
  8. A denial of service vulnerability in Microsoft QUIC can be exploited remotely to cause denial of service.
  9. A remote code execution vulnerability in Layer 2 Tunneling Protocol can be exploited remotely to execute arbitrary code.
  10. An elevation of privilege vulnerability in Windows Container Manager Service can be exploited remotely to gain privileges.
  11. An information disclosure vulnerability in Windows Power Management Service can be exploited remotely to obtain sensitive information.
  12. A denial of service vulnerability in Windows TCP/IP can be exploited remotely to cause denial of service.
  13. A denial of service vulnerability in Windows Mixed Reality Developer Tools can be exploited remotely to cause denial of service.
  14. A remote code execution vulnerability in Windows MSHTML Platform can be exploited remotely to execute arbitrary code.
  15. A remote code execution vulnerability in Windows Setup Files Cleanup can be exploited remotely to execute arbitrary code.
  16. A denial of service vulnerability in DHCP Server Service can be exploited remotely to cause denial of service.
  17. A remote code execution vulnerability in PrintHTML API can be exploited remotely to execute arbitrary code.
  18. An elevation of privilege vulnerability in Windows Named Pipe Filesystem can be exploited remotely to gain privileges.
  19. An information disclosure vulnerability in Windows Remote Desktop Gateway (RD Gateway) can be exploited remotely to obtain sensitive information.
  20. A denial of service vulnerability in HTTP/2 protocol can be exploited remotely to cause denial of service.
  21. A denial of service vulnerability in Windows Virtual Trusted Platform Module can be exploited remotely to cause denial of service.
  22. A denial of service vulnerability in Microsoft Message Queuing can be exploited remotely to cause denial of service.
  23. An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
  24. An elevation of privilege vulnerability in Microsoft Resilient File System (ReFS) can be exploited remotely to gain privileges.
  25. A remote code execution vulnerability in Microsoft WDAC OLE DB provider for SQL Server can be exploited remotely to execute arbitrary code.
  26. An information disclosure vulnerability in Windows Kernel can be exploited remotely to obtain sensitive information.
  27. An information disclosure vulnerability in Windows Deployment Services can be exploited remotely to obtain sensitive information.
  28. An information disclosure vulnerability in Active Directory Domain Services can be exploited remotely to obtain sensitive information.
  29. An elevation of privilege vulnerability in Named Pipe File System can be exploited remotely to gain privileges.
  30. An elevation of privilege vulnerability in Windows Runtime C++ Template Library can be exploited remotely to gain privileges.
  31. A remote code execution vulnerability in Windows Runtime can be exploited remotely to execute arbitrary code.
  32. A remote code execution vulnerability in Microsoft Virtual Trusted Platform Module can be exploited remotely to execute arbitrary code.
  33. An elevation of privilege vulnerability in Windows Client Server Run-time Subsystem (CSRSS) can be exploited remotely to gain privileges.
  34. An elevation of privilege vulnerability in Windows IIS Server can be exploited remotely to gain privileges.
  35. An elevation of privilege vulnerability in Windows Error Reporting Service can be exploited remotely to gain privileges.
  36. An elevation of privilege vulnerability in Windows Internet Key Exchange (IKE) Extension can be exploited remotely to gain privileges.
  37. A remote code execution vulnerability in Microsoft DirectMusic can be exploited remotely to execute arbitrary code.
  38. A denial of service vulnerability in Windows Deployment Services can be exploited remotely to cause denial of service.
  39. A security feature bypass vulnerability in Windows Mark of the Web can be exploited remotely to bypass security restrictions.
  40. An information disclosure vulnerability in Windows Common Log File System Driver can be exploited remotely to obtain sensitive information.
  41. A remote code execution vulnerability in Microsoft WDAC ODBC Driver can be exploited remotely to execute arbitrary code.
  42. A security feature bypass vulnerability in Windows Kernel can be exploited remotely to bypass security restrictions.
  43. An information disclosure vulnerability in Microsoft WordPad can be exploited remotely to obtain sensitive information.
  44. A remote code execution vulnerability in Windows Media Foundation Core can be exploited remotely to execute arbitrary code.
  45. An information disclosure vulnerability in Remote Procedure Call can be exploited remotely to obtain sensitive information.
Эксплуатация

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Пораженные продукты

Windows 10 Version 1607 for x64-based Systems
Windows Server 2012
Windows 10 for x64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows Server 2016
Windows Server 2022
Windows 10 Version 22H2 for ARM64-based Systems
Windows Server 2016 (Server Core installation)
Windows 11 version 21H2 for ARM64-based Systems
Windows Server 2019
Windows 11 Version 22H2 for ARM64-based Systems
Windows 10 for 32-bit Systems
Windows 11 version 21H2 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 (Server Core installation)
Windows Server 2019 (Server Core installation)
Windows Server 2012 R2
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows Server 2022 (Server Core installation)
Windows 10 Version 1809 for x64-based Systems
Windows 11 Version 22H2 for x64-based Systems

Решение

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Первичный источник обнаружения
CVE-2023-38159
CVE-2023-36582
CVE-2023-36585
CVE-2023-35349
CVE-2023-36564
CVE-2023-36709
CVE-2023-36571
CVE-2023-36438
CVE-2023-36732
CVE-2023-36435
CVE-2023-36583
CVE-2023-36731
CVE-2023-41774
CVE-2023-36723
CVE-2023-36724
CVE-2023-36590
CVE-2023-36602
CVE-2023-38171
CVE-2023-36720
CVE-2023-36436
CVE-2023-36704
CVE-2023-36703
CVE-2023-38166
CVE-2023-36557
CVE-2023-36605
CVE-2023-29348
CVE-2023-41765
CVE-2023-44487
CVE-2023-36717
CVE-2023-36743
CVE-2023-36579
CVE-2023-36725
CVE-2023-36701
CVE-2023-36577
CVE-2023-36581
CVE-2023-36712
CVE-2023-36576
CVE-2023-36567
CVE-2023-41771
CVE-2023-36722
CVE-2023-36729
CVE-2023-41770
CVE-2023-36711
CVE-2023-36902
CVE-2023-36718
CVE-2023-36570
CVE-2023-41766
CVE-2023-36434
CVE-2023-36721
CVE-2023-41773
CVE-2023-36697
CVE-2023-36593
CVE-2023-36578
CVE-2023-36573
CVE-2023-36572
CVE-2023-36589
CVE-2023-36726
CVE-2023-36702
CVE-2023-36575
CVE-2023-36707
CVE-2023-36776
CVE-2023-36584
CVE-2023-36431
CVE-2023-41772
CVE-2023-36713
CVE-2023-36598
CVE-2023-36574
CVE-2023-41769
CVE-2023-36698
CVE-2023-36563
CVE-2023-36710
CVE-2023-36606
CVE-2023-36594
CVE-2023-36706
CVE-2023-36596
CVE-2023-41768
CVE-2023-41767
CVE-2023-36591
CVE-2023-36592
CVE-2023-36603
Оказываемое влияние
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

SB 
[?]

PE 
[?]
Связанные продукты
Microsoft Windows
Microsoft Windows Server
Microsoft Windows Server 2012
Microsoft Windows 10
Microsoft Windows Server 2016
Microsoft Windows Server 2019
Microsoft Windows 11
CVE-IDS
CVE-2023-381715.0Warning
CVE-2023-364355.0Warning
CVE-2023-444875.0Warning
CVE-2023-381595.0Warning
CVE-2023-365825.0Warning
CVE-2023-365855.0Warning
CVE-2023-353495.0Warning
CVE-2023-365645.0Warning
CVE-2023-367095.0Warning
CVE-2023-365715.0Warning
CVE-2023-364385.0Warning
CVE-2023-367325.0Warning
CVE-2023-365835.0Warning
CVE-2023-367315.0Warning
CVE-2023-417745.0Warning
CVE-2023-367235.0Warning
CVE-2023-367245.0Warning
CVE-2023-365905.0Warning
CVE-2023-366025.0Warning
CVE-2023-367205.0Warning
CVE-2023-364365.0Warning
CVE-2023-367045.0Warning
CVE-2023-367035.0Warning
CVE-2023-381665.0Warning
CVE-2023-365575.0Warning
CVE-2023-366055.0Warning
CVE-2023-293485.0Warning
CVE-2023-417655.0Warning
CVE-2023-367175.0Warning
CVE-2023-367435.0Warning
CVE-2023-365795.0Warning
CVE-2023-367255.0Warning
CVE-2023-367015.0Warning
CVE-2023-365775.0Warning
CVE-2023-365815.0Warning
CVE-2023-367125.0Warning
CVE-2023-365765.0Warning
CVE-2023-365675.0Warning
CVE-2023-417715.0Warning
CVE-2023-367225.0Warning
CVE-2023-367295.0Warning
CVE-2023-417705.0Warning
CVE-2023-367115.0Warning
CVE-2023-369025.0Warning
CVE-2023-367185.0Warning
CVE-2023-365705.0Warning
CVE-2023-417665.0Warning
CVE-2023-364345.0Warning
CVE-2023-367215.0Warning
CVE-2023-417735.0Warning
CVE-2023-366975.0Warning
CVE-2023-365935.0Warning
CVE-2023-365785.0Warning
CVE-2023-365735.0Warning
CVE-2023-365725.0Warning
CVE-2023-365895.0Warning
CVE-2023-367265.0Warning
CVE-2023-367025.0Warning
CVE-2023-365755.0Warning
CVE-2023-367075.0Warning
CVE-2023-367765.0Warning
CVE-2023-365845.0Warning
CVE-2023-364315.0Warning
CVE-2023-417725.0Warning
CVE-2023-367135.0Warning
CVE-2023-365985.0Warning
CVE-2023-365745.0Warning
CVE-2023-417695.0Warning
CVE-2023-366985.0Warning
CVE-2023-365635.0Warning
CVE-2023-367105.0Warning
CVE-2023-366065.0Warning
CVE-2023-365945.0Warning
CVE-2023-367065.0Warning
CVE-2023-365965.0Warning
CVE-2023-417685.0Warning
CVE-2023-417675.0Warning
CVE-2023-365915.0Warning
CVE-2023-365925.0Warning
CVE-2023-366035.0Warning
KB list

5031354
5031356
5031364
5031362
5031361
5031377
5031358