Report Name: Microsoft Patch Tuesday, October 2023
Generated: 2023-11-04 22:13:53

Vulristics Vulnerability Scores
Basic Vulnerability Scores
Products

Product NamePrevalenceUCHMLAComment
HTTP/2 protocol0.911HTTP/2 is a major revision of the HTTP network protocol used by the World Wide Web
Microsoft Message Queuing0.92020Microsoft Message Queuing or MSMQ is a message queue implementation developed by Microsoft and deployed in its Windows Server operating systems since Windows NT 4 and Windows 95
Named Pipe File System0.911Windows component
Windows Container Manager Service0.911Windows component
Windows Kernel0.944Windows Kernel
Windows Media Foundation Core0.911Windows component
Windows TCP/IP0.9213Windows component
Windows Win32k0.955Windows kernel-mode driver
Active Template Library0.811Active Template Library
Chromium0.816815Chromium is a free and open-source web browser project, mainly developed and maintained by Google
Microsoft Edge0.833Web browser
Microsoft Exchange0.811Microsoft Exchange Server is a mail server and calendaring server developed by Microsoft
Microsoft Office0.811Microsoft Office is a suite of applications designed to help with productivity and completing common tasks on a computer
Windows Client Server Run-time Subsystem (CSRSS)0.811Client Server Runtime Subsystem, or csrss.exe, is a component of the Windows NT family of operating systems that provides the user mode side of the Win32 subsystem and is included in Windows NT 3.1 and later
Windows Common Log File System Driver0.811Windows component
Windows Deployment Services0.833Windows component
Windows Error Reporting Service0.811Windows component
Windows Graphics Component0.822Windows component
Windows IIS Server0.811Windows component
Windows Internet Key Exchange (IKE) Extension0.811Windows component
Windows MSHTML Platform0.811Windows component
Windows Mark of the Web0.811Windows component
Windows Mixed Reality Developer Tools0.811Windows component
Windows Named Pipe Filesystem0.811Windows component
Windows Power Management Service0.811Windows component
Windows RDP Encoder Mirror Driver0.811Windows component
Windows Remote Desktop Gateway (RD Gateway)0.811Windows component
Windows Runtime0.811Windows component
Windows Runtime C++ Template Library0.811Windows component
Windows Search0.811Windows component
Windows Setup Files Cleanup0.811Windows component
Windows Virtual Trusted Platform Module0.811Windows component
Microsoft Office Graphics0.611Microsoft Office Graphics
Skype for Business0.6134Skype for Business
Active Directory Domain Services0.511Active Directory Domain Services
Azure DevOps Server0.511Azure DevOps Server
Azure HDInsight Apache Oozie Workflow Scheduler0.511Azure HDInsight Apache Oozie Workflow Scheduler
Azure Identity SDK0.522Azure Identity SDK
Azure Network Watcher VM Agent0.511Azure Network Watcher VM Agent
Azure RTOS GUIX Studio0.511Azure RTOS GUIX Studio
DHCP Server Service0.511DHCP Server Service
Layer 2 Tunneling Protocol0.599Layer 2 Tunneling Protocol
Microsoft AllJoyn API0.511Microsoft AllJoyn API
Microsoft Common Data Model SDK0.511Microsoft Common Data Model SDK
Microsoft DirectMusic0.511Microsoft DirectMusic
Microsoft Dynamics 365 (On-Premises)0.522Microsoft Dynamics 365 (On-Premises)
Microsoft Dynamics 365 (on-premises)0.511Microsoft Dynamics 365 (on-premises)
Microsoft ODBC Driver for SQL Server0.533Microsoft ODBC Driver for SQL Server
Microsoft Office Click-To-Run0.511Microsoft Office Click-To-Run
Microsoft QUIC0.522Microsoft QUIC
Microsoft Resilient File System (ReFS)0.511Microsoft Resilient File System (ReFS)
Microsoft SQL OLE DB0.511Microsoft SQL OLE DB
Microsoft SQL Server0.511Microsoft SQL Server
Microsoft Virtual Trusted Platform Module0.511Microsoft Virtual Trusted Platform Module
Microsoft WDAC ODBC Driver0.511Microsoft WDAC ODBC Driver
Microsoft WDAC OLE DB provider for SQL Server0.511Microsoft WDAC OLE DB provider for SQL Server
Microsoft WordPad0.511Microsoft WordPad
PrintHTML API0.511PrintHTML API
Remote Procedure Call0.511Remote Procedure Call


Vulnerability Types

Vulnerability TypeCriticalityUCHMLA
Remote Code Execution1.044145
Security Feature Bypass0.9718
Denial of Service0.7161017
Memory Corruption0.61135
Elevation of Privilege0.5132428
Cross Site Scripting0.411
Information Disclosure0.411112
Spoofing0.466


Comments

SourceUCHMLA
MS PT Extended161118
Qualys12281041
Tenable1218122
Rapid71212217
ZDI1225
KrebsOnSecurity2226
TheHackersNews1214


Vulnerabilities

Urgent (2)

1. Denial of Service - HTTP/2 protocol (CVE-2023-44487) - Urgent [905]

Description: The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (cisa_kev object), Microsoft, NVD CISA KEV websites
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on github.com website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.914HTTP/2 is a major revision of the HTTP network protocol used by the World Wide Web
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile1.010EPSS Probability is 0.52748, EPSS Percentile is 0.97218

Qualys: MITRE: CVE-2023-44487 HTTP/2 Rapid Reset Attack Microsoft has addressed the new “HTTP/2 Rapid Reset” zero-day DDoS attack method, which has been extensively exploited since August. The vulnerability exists in the HTTP/2’s stream cancellation feature. An attacker may exploit this vulnerability to repeatedly send and cancel requests, resulting in a DDoS condition. There is no “fix” for the method other than rate limiting or blocking the protocol, as the feature is part of the HTTP/2 standard. In the advisory, Microsoft has given a workaround to mitigate the vulnerability. CISA has added the vulnerability to its Known Exploited Vulnerabilities Catalog and requested users to patch it before October 31, 2023.

Qualys: CVE-2023-44487: HTTP/2 Rapid Reset Attack This vulnerability has a CVSS:3.1 Policy Compliance Control IDs (CIDs): 17331 Status of the ‘HTTP/2’ feature on the host (EnableHttp2Cleartext) 17330    Status of the ‘HTTP/2’ feature on the host (EnableHttp2Tls)

Qualys: CVE-2023-44487: HTTP/2 Rapid Reset Attack

Tenable: Microsoft patched 103 CVEs in its October Patch Tuesday release, with 12 rated as critical and 91 rated as important. We omitted CVE-2023-44487 from our counts as this vulnerability was reported to MITRE and not Microsoft and does not exclusively affect Microsoft products. Details about this flaw are included in our analysis below.

Tenable: CVE-2023-44487 | HTTP/2 Rapid Reset Attack

Tenable: CVE-2023-44487 is a denial of service (DoS) vulnerability affecting HTTP/2 web servers that was exploited in the wild. While this vulnerability was not exclusive to affecting Microsoft servers, patches were made available to address this vulnerability in multiple versions of Windows, including Server Core installations.

Tenable: A list of Tenable plugins to identify CVE-2023-44487 can be found in the plugins section of the individual CVE page as they’re released. This link will display all available plugins for this vulnerability, including upcoming plugins in our Plugins Pipeline.

Rapid7: Rounding out this month’s trio of exploited-in-the-wild vulnerabilities: the cross-platform Kestrel web server for ASP.NET Core receives a fix for CVE-2023-44487, a denial of service vulnerability.

Rapid7: CVE-2023-44487 is perhaps of less concern to defenders, unless the Kestrel instance is internet-facing. Dubbed "HTTP/2 rapid reset", the vulnerability is not specific to Microsoft, but is inherent to HTTP/2. Exploitation involves abuse of the lack of bounds on HTTP/2 request cancellation to bring about severe load on the server for a very low cost to the attacker.

Rapid7: 2023-10-11: expanded discussion of CVE-2023-44487 mechanism and risk.

ZDI: A quick note about CVE-2023-44487 – this was reported as being under active attack across Google systems in August. They have provided a thorough write-up of the exploit, but at a high level, attackers can abuse the Layer 7 stream cancellation feature within HTTP/2 to create a DoS across a service. The problem is shared across many services, and this Microsoft patch addresses any affected Microsoft products.

KrebsOnSecurity: Fortunately, the zero-days affecting Microsoft customers this month are somewhat less severe than usual, with the exception of CVE-2023-44487. This weakness is not specific to Windows but instead exists within the HTTP/2 protocol used by the World Wide Web: Attackers have figured out how to use a feature of HTTP/2 to massively increase the size of distributed denial-of-service (DDoS) attacks, and these monster attacks reportedly have been going on for several weeks now.

KrebsOnSecurity: Amazon, Cloudflare and Google all released advisories today about how they’re addressing CVE-2023-44487 in their cloud environments. Google’s Damian Menscher wrote on Twitter/X that the exploit — dubbed a “rapid reset attack” — works by sending a request and then immediately cancelling it (a feature of HTTP/2). “This lets attackers skip waiting for responses, resulting in a more efficient attack,” Menscher explained.

TheHackersNews: The tech giant has also released an update for CVE-2023-44487, also referred to as the HTTP/2 Rapid Reset attack, which has been exploited by unknown actors as a zero-day to stage hyper-volumetric distributed denial-of-service (DDoS) attacks.

2. Memory Corruption - Chromium (CVE-2023-5217) - Urgent [883]

Description: Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (cisa_kev object), Microsoft, NVD CISA KEV websites
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for Out-of-bounds Write in Webmproject Libvpx)
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile1.010EPSS Probability is 0.26047, EPSS Percentile is 0.96188

MS PT Extended: CVE-2023-5217 was published before October 2023 Patch Tuesday from 2023-09-13 to 2023-10-09

KrebsOnSecurity: Apple said it also patched CVE-2023-5217, which is not listed as a zero-day bug. However, as Bleeping Computer pointed out, this flaw is caused by a weakness in the open-source “libvpx” video codec library, which was previously patched as a zero-day flaw by Google in the Chrome browser and by Microsoft in Edge, Teams, and Skype products. For anyone keeping count, this is the 17th zero-day flaw that Apple has patched so far this year.

Critical (2)

3. Elevation of Privilege - Skype for Business (CVE-2023-41763) - Critical [639]

Description: Skype for Business Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (cisa_kev object), Microsoft, NVD CISA KEV websites
Public Exploit Exists0.417The exploit's existence is mentioned in Microsoft CVSS Temporal Metrics (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.614Skype for Business
CVSS Base Score0.510CVSS Base Score is 5.3. According to Microsoft data source
EPSS Percentile0.810EPSS Probability is 0.0098, EPSS Percentile is 0.81785

Qualys: CVE-2023-41763: Skype for Business Elevation of Privilege Vulnerability Skype for Business is an enterprise software application that is used for instant messaging and video calling. The software can be used with the on-premises Skype for Business Server software and a software-as-a-service version offered as part of the 365 suite. An attacker could exploit this vulnerability by making a specially crafted network call to the target server. Successful exploitation of the vulnerability may allow an attacker to parse an HTTP request to an arbitrary address that may disclose IP addresses, port numbers, or both to the attacker. In some cases, successful exploitation may expose sensitive information that could provide access to internal networks. CISA has added the vulnerability to its Known Exploited Vulnerabilities Catalog and requested users to patch it before October 31, 2023.

Tenable: Microsoft’s October 2023 Patch Tuesday Addresses 103 CVEs (CVE-2023-36563, CVE-2023-41763)

Tenable: CVE-2023-41763 | Skype for Business Elevation of Privilege Vulnerability

Tenable: CVE-2023-41763 is an EoP vulnerability in Skype for Business that was assigned a CVSSv3 score of 5.3 and rated important. An unauthenticated, remote attacker could exploit this vulnerability by sending a specially crafted network call to a vulnerable Skype for Business server. Successful exploitation would result in the disclosure of sensitive information, which could be used to gain access to internal networks.

Rapid7: Defenders responsible for a Skype for Business server should take note of an exploited-in-the-wild information disclosure vulnerability for which public exploit code exists. Successful exploitation of CVE-2023-41763 via a specially crafted network call could result in the disclosure of IP addresses and/or port numbers. Although Microsoft does not specify what the scope of the disclosure might be, it will presumably be limited to whatever the Skype for Business server can see; as always, appropriate network segmentation will pay defense-in-depth dividends.

ZDI: CVE-2023-41763 – Skype for Business Elevation of Privilege Vulnerability. This is the other bug under active attack this month, and it acts more like an information disclosure than a privilege escalation. An attacker could make a malicious call to an affected Skype for Business server that results in the server parsing an HTTP request to an arbitrary address. This could result in disclosing information, which could include sensitive information that provides access to internal networks.

KrebsOnSecurity: Microsoft also patched zero-day bugs in Skype for Business (CVE-2023-41763) and Wordpad (CVE-2023-36563). The latter vulnerability could expose NTLM hashes, which are used for authentication in Windows environments.

TheHackersNews: - CVE-2023-41763 (CVSS score: 5.3) - A privilege escalation vulnerability in Skype for Business that could lead to exposure of sensitive information such as IP addresses or port numbers (or both), enabling threat actors to gain access to internal networks

4. Information Disclosure - Microsoft WordPad (CVE-2023-36563) - Critical [616]

Description: Microsoft WordPad Information Disclosure Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (cisa_kev object), AttackerKB, Microsoft, NVD CISA KEV websites
Public Exploit Exists0.417The exploit's existence is mentioned in Microsoft CVSS Temporal Metrics (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.415Information Disclosure
Vulnerable Product is Common0.514Microsoft WordPad
CVSS Base Score0.710CVSS Base Score is 6.5. According to Microsoft data source
EPSS Percentile0.710EPSS Probability is 0.00332, EPSS Percentile is 0.67959

Qualys: CVE-2023-36563: Microsoft WordPad Information Disclosure Vulnerability Microsoft WordPad is a basic text-editing app used to create and edit files, insert pictures, and add links to other files. The word processor software was included with Windows 95 and, later, until Windows 11. An attacker must log on to the system and run a specially crafted application to exploit the vulnerability. An attacker must also convince a user to click a malicious link and open the specially crafted file. Successful exploitation of this vulnerability could allow an attacker to disclose NTLM hashes. The NTLM hashes are encoded by converting the user’s password into a 16-byte key using an MD4 hash function. The key is divided into two halves of 8 bytes. The key is used as input to three rounds of DES encryption that generates a 16-byte output representing the NTLM hash. CISA has added the vulnerability to its Known Exploited Vulnerabilities Catalog and requested users to patch it before October 31, 2023.

Tenable: Microsoft’s October 2023 Patch Tuesday Addresses 103 CVEs (CVE-2023-36563, CVE-2023-41763)

Tenable: CVE-2023-36563 | Microsoft WordPad Information Disclosure Vulnerability

Tenable: CVE-2023-36563 is an information disclosure vulnerability in Microsoft WordPad that was assigned a CVSSv3 score of 6.5. It was exploited in the wild as a zero-day and was publicly disclosed prior to the October 2023 Patch Tuesday release. An unauthenticated, remote attacker could exploit this vulnerability using social engineering in order to convince a target to open a link or download a malicious file and run it on the vulnerable system. Alternatively, an attacker could execute a specially crafted application to exploit the flaw after gaining access to a vulnerable system. Successful exploitation could lead to the disclosure of New Technology LAN Manager (NTLM) hashes.

Rapid7: Another Patch Tuesday, another zero-day vulnerability offering NTLM hash disclosure, this time in WordPad. The advisory for CVE-2023-36563 describes two possible attack vectors:. enticing the user to open a specially crafted malicious file delivered via email, IM, or some other means, or;

Rapid7: 2023-10-11: added detail about CVE-2023-36563 vulnerability location.

ZDI: CVE-2023-36563 - Microsoft WordPad Information Disclosure Vulnerability. This bug is one of the two being exploited in the wild. Successful exploitation could lead to the disclosure of NTLM hashes. Microsoft doesn’t list any Preview Pane vector, so user interaction is required. In addition to applying this patch, you should consider blocking outbound NTLM over SMB on Windows 11. This new feature hasn’t received much attention, but it could significantly hamper NTLM-relay exploits.

KrebsOnSecurity: Microsoft also patched zero-day bugs in Skype for Business (CVE-2023-41763) and Wordpad (CVE-2023-36563). The latter vulnerability could expose NTLM hashes, which are used for authentication in Windows environments.

TheHackersNews: - CVE-2023-36563 (CVSS score: 6.5) - An information disclosure vulnerability in Microsoft WordPad that could result in the leak of NTLM hashes

TheHackersNews: "To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system," Microsoft said in an advisory for CVE-2023-36563.

High (61)

5. Elevation of Privilege - Windows Container Manager Service (CVE-2023-36723) - High [596]

Description: Windows Container Manager Service Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for Vulnerability in Microsoft)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.914Windows component
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.510EPSS Probability is 0.00146, EPSS Percentile is 0.50474

6. Remote Code Execution - Microsoft Message Queuing (CVE-2023-35349) - High [542]

Description: Microsoft Message Queuing Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.914Microsoft Message Queuing or MSMQ is a message queue implementation developed by Microsoft and deployed in its Windows Server operating systems since Windows NT 4 and Windows 95
CVSS Base Score1.010CVSS Base Score is 9.8. According to Microsoft data source
EPSS Percentile0.810EPSS Probability is 0.01074, EPSS Percentile is 0.82673

Qualys: CVE-2023-35349: Microsoft Message Queuing Remote Code Execution Vulnerability Message Queuing (MSMQ) is a protocol developed by Microsoft to ensure reliable communication between Windows computers across different networks, even when a host is temporarily not connected (by maintaining a message queue of undelivered messages). Successful exploitation of the vulnerability may allow an attacker to perform remote code execution on the target server.

Qualys: CVE-2023-36591, CVE-2023-36578, CVE-2023-36575, CVE-2023-36571, CVE-2023-35349, CVE-2023-36574, CVE-2023-36590, CVE-2023-36573, CVE-2023-36583, CVE-2023-36570, CVE-2023-36572, CVE-2023-36582, CVE-2023-36589, CVE-2023-36593, CVE-2023-36592 – Microsoft Message Queuing Remote Code Execution Vulnerability This vulnerability has a CVSS:3.1 7.3 / 6.4 Policy Compliance Control IDs (CIDs): 4030 Status of the ‘Windows Message Queuing Service’ 14916 Status of Windows Services 14297 Status of the open network connections and listening ports (Qualys Agent only) The following QQL will return a posture assessment for the CIDs for this Patch Tuesday: control.id: [4030, 14916, 14297, 18266, 17331, 17330]

Qualys: CVE-2023-36591, CVE-2023-36578, CVE-2023-36575, CVE-2023-36571, CVE-2023-35349, CVE-2023-36574, CVE-2023-36590, CVE-2023-36573, CVE-2023-36583, CVE-2023-36570, CVE-2023-36572, CVE-2023-36582, CVE-2023-36589, CVE-2023-36593, CVE-2023-36592 – Microsoft Message Queuing Remote Code Execution Vulnerability  Visit the October 2023 Security Updates page to access the full description of The next Patch Tuesday falls on November 14, and we’ll be back with details and patch analysis. Until next Patch Tuesday, stay safe and secure. Be sure to subscribe to the ‘This Month in Vulnerabilities and Patch’s webinar.’

Tenable: CVE-2023-35349 | Microsoft Message Queuing Remote Code Execution Vulnerability

Tenable: CVE-2023-35349 is a RCE vulnerability in the Microsoft Message Queuing (MSMQ) component of Windows operating systems that was assigned a CVSSv3 score of 9.8 and rated critical. An unauthenticated, remote attacker could exploit this vulnerability by sending a specially crafted packet to a vulnerable target.

Tenable: In addition to CVE-2023-35349, Microsoft has patched 15 additional RCE vulnerabilities in MSMQ:

Tenable: CVE-2023-35349 and CVE-2023-36697 are two of several critical RCE vulnerabilities in MSMQ that have been patched this year. CVE-2023-35385, CVE-2023-36910 and CVE-2023-36911 were patched in August, CVE-2023-32057 in July and CVE-2023-21554 in April. Although all of these vulnerabilities were rated “Exploitation Less Likely” using the Microsoft Exploitability Index, customers are encouraged to apply these patches as soon as possible.

Rapid7: CVE-2023-35349 describes an RCE vulnerability in the Message Queueing Service. Microsoft does not describe the attack vector, but other similar vulnerabilities require that the attacker send specially crafted malicious MSMQ packet to a MSMQ server. One mitigating factor: the Microsoft Message Queueing Service must be enabled and listening on port 1801 for an asset to be vulnerable, and the Message Queueing Service is not installed by default. As Rapid7 has noted previously, however, a number of applications – including Microsoft Exchange – may quietly introduce MSMQ as part of their own installation routine.

ZDI: CVE-2023-35349 - Microsoft Message Queuing Remote Code Execution Vulnerability. This is one of 20(!) Message Queuing patches this month and the highest CVSS (9.8) of the bunch. A remote, unauthenticated attacker could execute arbitrary code at the level of the service without user interaction. That makes this bug wormable – at least on systems where Message Queuing is enabled. You should definitely check your systems to see if it’s installed and also consider blocking TCP port 1801 at your perimeter.

KrebsOnSecurity: Other notable bugs addressed by Microsoft include CVE-2023-35349, a remote code execution weakness in the Message Queuing (MSMQ) service, a technology that allows applications across multiple servers or hosts to communicate with each other. This vulnerability has earned a CVSS severity score of 9.8 (10 is the worst possible). Happily, the MSMQ service is not enabled by default in Windows, although Immersive Labs notes that Microsoft Exchange Server can enable this service during installation.

7. Security Feature Bypass - Windows Mark of the Web (CVE-2023-36584) - High [522]

Description: Windows Mark of the Web Security Feature Bypass Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists0.617The exploit's existence is mentioned in Microsoft CVSS Temporal Metrics (Functional Exploit)
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.510CVSS Base Score is 5.4. According to Microsoft data source
EPSS Percentile0.410EPSS Probability is 0.00106, EPSS Percentile is 0.43025

8. Remote Code Execution - Microsoft Message Queuing (CVE-2023-36697) - High [483]

Description: Microsoft Message Queuing Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.914Microsoft Message Queuing or MSMQ is a message queue implementation developed by Microsoft and deployed in its Windows Server operating systems since Windows NT 4 and Windows 95
CVSS Base Score0.710CVSS Base Score is 6.8. According to Microsoft data source
EPSS Percentile0.610EPSS Probability is 0.00272, EPSS Percentile is 0.64475

Qualys: CVE-2023-36697: Microsoft Message Queuing Remote Code Execution Vulnerability To exploit this vulnerability, an attacker must convince a user on the target machine to connect to a malicious server or compromise a legitimate MSMQ server host and make it run as a malicious server. Successful exploitation of this vulnerability could allow an authenticated domain user to execute code on the target server remotely.

Tenable: |CVE-2023-36697||Microsoft Message Queuing Remote Code Execution Vulnerability||6.8||Exploitation Less Likely|

Tenable: While CVE-2023-36697 was also rated critical, successful exploitation requires either user interaction or for the attacker to be authenticated as a domain user and to have compromised a MSMQ server within the target network.

Tenable: CVE-2023-35349 and CVE-2023-36697 are two of several critical RCE vulnerabilities in MSMQ that have been patched this year. CVE-2023-35385, CVE-2023-36910 and CVE-2023-36911 were patched in August, CVE-2023-32057 in July and CVE-2023-21554 in April. Although all of these vulnerabilities were rated “Exploitation Less Likely” using the Microsoft Exploitability Index, customers are encouraged to apply these patches as soon as possible.

Rapid7: Another MSMQ RCE vulnerability also receives a patch this month: CVE-2023-36697 has a lower CVSS score than its sibling, both because valid domain credentials are required, and because exploitation requires that a user on the target machine connects to a malicious server. Alternatively, Microsoft suggests that an attacker could compromise a legitimate MSMQ server host and make it run as a malicious server to exploit this vulnerability, although it’s not immediately clear how the attacker could do that without already having significant control over the MSMQ host.

9. Remote Code Execution - Microsoft WDAC OLE DB provider for SQL Server (CVE-2023-36577) - High [476]

Description: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Microsoft WDAC OLE DB provider for SQL Server
CVSS Base Score0.910CVSS Base Score is 8.8. According to Microsoft data source
EPSS Percentile0.910EPSS Probability is 0.02137, EPSS Percentile is 0.88044

10. Remote Code Execution - Windows Media Foundation Core (CVE-2023-36710) - High [471]

Description: Windows Media Foundation Core Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.914Windows component
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.410EPSS Probability is 0.00113, EPSS Percentile is 0.44687

11. Remote Code Execution - Windows MSHTML Platform (CVE-2023-36436) - High [454]

Description: Windows MSHTML Platform Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.410EPSS Probability is 0.00113, EPSS Percentile is 0.44687

12. Remote Code Execution - Windows Setup Files Cleanup (CVE-2023-36704) - High [454]

Description: Windows Setup Files Cleanup Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.410EPSS Probability is 0.00113, EPSS Percentile is 0.44687

13. Remote Code Execution - Microsoft Message Queuing (CVE-2023-36593) - High [447]

Description: Microsoft Message Queuing Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.914Microsoft Message Queuing or MSMQ is a message queue implementation developed by Microsoft and deployed in its Windows Server operating systems since Windows NT 4 and Windows 95
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.210EPSS Probability is 0.00061, EPSS Percentile is 0.24442

Qualys: CVE-2023-36591, CVE-2023-36578, CVE-2023-36575, CVE-2023-36571, CVE-2023-35349, CVE-2023-36574, CVE-2023-36590, CVE-2023-36573, CVE-2023-36583, CVE-2023-36570, CVE-2023-36572, CVE-2023-36582, CVE-2023-36589, CVE-2023-36593, CVE-2023-36592 – Microsoft Message Queuing Remote Code Execution Vulnerability This vulnerability has a CVSS:3.1 7.3 / 6.4 Policy Compliance Control IDs (CIDs): 4030 Status of the ‘Windows Message Queuing Service’ 14916 Status of Windows Services 14297 Status of the open network connections and listening ports (Qualys Agent only) The following QQL will return a posture assessment for the CIDs for this Patch Tuesday: control.id: [4030, 14916, 14297, 18266, 17331, 17330]

Qualys: CVE-2023-36591, CVE-2023-36578, CVE-2023-36575, CVE-2023-36571, CVE-2023-35349, CVE-2023-36574, CVE-2023-36590, CVE-2023-36573, CVE-2023-36583, CVE-2023-36570, CVE-2023-36572, CVE-2023-36582, CVE-2023-36589, CVE-2023-36593, CVE-2023-36592 – Microsoft Message Queuing Remote Code Execution Vulnerability  Visit the October 2023 Security Updates page to access the full description of The next Patch Tuesday falls on November 14, and we’ll be back with details and patch analysis. Until next Patch Tuesday, stay safe and secure. Be sure to subscribe to the ‘This Month in Vulnerabilities and Patch’s webinar.’

Tenable: |CVE-2023-36593||Microsoft Message Queuing Remote Code Execution Vulnerability||7.8||Exploitation Less Likely|

14. Remote Code Execution - Windows Runtime (CVE-2023-36902) - High [442]

Description: Windows Runtime Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.710CVSS Base Score is 7.0. According to Microsoft data source
EPSS Percentile0.410EPSS Probability is 0.00108, EPSS Percentile is 0.4345

15. Remote Code Execution - Azure Identity SDK (CVE-2023-36414) - High [440]

Description: Azure Identity SDK Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Azure Identity SDK
CVSS Base Score0.910CVSS Base Score is 8.8. According to Microsoft data source
EPSS Percentile0.610EPSS Probability is 0.00189, EPSS Percentile is 0.56306

16. Remote Code Execution - Azure Identity SDK (CVE-2023-36415) - High [440]

Description: Azure Identity SDK Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Azure Identity SDK
CVSS Base Score0.910CVSS Base Score is 8.8. According to Microsoft data source
EPSS Percentile0.610EPSS Probability is 0.00189, EPSS Percentile is 0.56306

17. Remote Code Execution - Layer 2 Tunneling Protocol (CVE-2023-38166) - High [440]

Description: Layer 2 Tunneling Protocol Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Layer 2 Tunneling Protocol
CVSS Base Score0.810CVSS Base Score is 8.1. According to Microsoft data source
EPSS Percentile0.710EPSS Probability is 0.00411, EPSS Percentile is 0.711

Qualys: CVE-2023-41765, CVE-2023-41767, CVE-2023-41768, CVE-2023-41769, CVE-2023-41770, CVE-2023-41771, CVE-2023-41773, CVE-2023-41774, CVE-2023-38166 – Layer 2 Tunneling Protocol Remote Code Execution Vulnerability Layer 2 Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP) used mainly by Internet Service Providers and Virtual Private Networks (VPNs). L2TP is one of the protocols that help ensure security and privacy by enabling a tunnel for Layer 2 traffic over a Layer 3 network. To exploit these vulnerabilities, an attacker is required to win a race condition. An unauthenticated attacker could send a specially crafted connection request to a RAS server and perform remote code execution on the RAS server machine.

Rapid7: Twelve critical RCE vulnerabilities seems like a lot, and it is. Fully three-quarters of these are in the same Windows component — the Layer 2 Tunneling Protocol — which has already received fixes for a significant number of critical RCEs in recent months. Exploitation of each of the Layer 2 Tunneling Protocol critical RCEs this month — CVE-2023-41765 CVE-2023-41767 CVE-2023-41768 CVE-2023-41769 CVE-2023-41770 CVE-2023-41771 CVE-2023-41773 CVE-2023-41774 and CVE-2023-38166 — is via a specially crafted protocol message to a Routing and Remote Access Service (RRAS) server.

18. Remote Code Execution - Layer 2 Tunneling Protocol (CVE-2023-41765) - High [440]

Description: Layer 2 Tunneling Protocol Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Layer 2 Tunneling Protocol
CVSS Base Score0.810CVSS Base Score is 8.1. According to Microsoft data source
EPSS Percentile0.710EPSS Probability is 0.00411, EPSS Percentile is 0.711

Qualys: CVE-2023-41765, CVE-2023-41767, CVE-2023-41768, CVE-2023-41769, CVE-2023-41770, CVE-2023-41771, CVE-2023-41773, CVE-2023-41774, CVE-2023-38166 – Layer 2 Tunneling Protocol Remote Code Execution Vulnerability Layer 2 Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP) used mainly by Internet Service Providers and Virtual Private Networks (VPNs). L2TP is one of the protocols that help ensure security and privacy by enabling a tunnel for Layer 2 traffic over a Layer 3 network. To exploit these vulnerabilities, an attacker is required to win a race condition. An unauthenticated attacker could send a specially crafted connection request to a RAS server and perform remote code execution on the RAS server machine.

Rapid7: Twelve critical RCE vulnerabilities seems like a lot, and it is. Fully three-quarters of these are in the same Windows component — the Layer 2 Tunneling Protocol — which has already received fixes for a significant number of critical RCEs in recent months. Exploitation of each of the Layer 2 Tunneling Protocol critical RCEs this month — CVE-2023-41765 CVE-2023-41767 CVE-2023-41768 CVE-2023-41769 CVE-2023-41770 CVE-2023-41771 CVE-2023-41773 CVE-2023-41774 and CVE-2023-38166 — is via a specially crafted protocol message to a Routing and Remote Access Service (RRAS) server.

19. Remote Code Execution - Layer 2 Tunneling Protocol (CVE-2023-41767) - High [440]

Description: Layer 2 Tunneling Protocol Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Layer 2 Tunneling Protocol
CVSS Base Score0.810CVSS Base Score is 8.1. According to Microsoft data source
EPSS Percentile0.710EPSS Probability is 0.00411, EPSS Percentile is 0.711

Qualys: CVE-2023-41765, CVE-2023-41767, CVE-2023-41768, CVE-2023-41769, CVE-2023-41770, CVE-2023-41771, CVE-2023-41773, CVE-2023-41774, CVE-2023-38166 – Layer 2 Tunneling Protocol Remote Code Execution Vulnerability Layer 2 Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP) used mainly by Internet Service Providers and Virtual Private Networks (VPNs). L2TP is one of the protocols that help ensure security and privacy by enabling a tunnel for Layer 2 traffic over a Layer 3 network. To exploit these vulnerabilities, an attacker is required to win a race condition. An unauthenticated attacker could send a specially crafted connection request to a RAS server and perform remote code execution on the RAS server machine.

Rapid7: Twelve critical RCE vulnerabilities seems like a lot, and it is. Fully three-quarters of these are in the same Windows component — the Layer 2 Tunneling Protocol — which has already received fixes for a significant number of critical RCEs in recent months. Exploitation of each of the Layer 2 Tunneling Protocol critical RCEs this month — CVE-2023-41765 CVE-2023-41767 CVE-2023-41768 CVE-2023-41769 CVE-2023-41770 CVE-2023-41771 CVE-2023-41773 CVE-2023-41774 and CVE-2023-38166 — is via a specially crafted protocol message to a Routing and Remote Access Service (RRAS) server.

20. Remote Code Execution - Layer 2 Tunneling Protocol (CVE-2023-41768) - High [440]

Description: Layer 2 Tunneling Protocol Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Layer 2 Tunneling Protocol
CVSS Base Score0.810CVSS Base Score is 8.1. According to Microsoft data source
EPSS Percentile0.710EPSS Probability is 0.00411, EPSS Percentile is 0.711

Qualys: CVE-2023-41765, CVE-2023-41767, CVE-2023-41768, CVE-2023-41769, CVE-2023-41770, CVE-2023-41771, CVE-2023-41773, CVE-2023-41774, CVE-2023-38166 – Layer 2 Tunneling Protocol Remote Code Execution Vulnerability Layer 2 Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP) used mainly by Internet Service Providers and Virtual Private Networks (VPNs). L2TP is one of the protocols that help ensure security and privacy by enabling a tunnel for Layer 2 traffic over a Layer 3 network. To exploit these vulnerabilities, an attacker is required to win a race condition. An unauthenticated attacker could send a specially crafted connection request to a RAS server and perform remote code execution on the RAS server machine.

Rapid7: Twelve critical RCE vulnerabilities seems like a lot, and it is. Fully three-quarters of these are in the same Windows component — the Layer 2 Tunneling Protocol — which has already received fixes for a significant number of critical RCEs in recent months. Exploitation of each of the Layer 2 Tunneling Protocol critical RCEs this month — CVE-2023-41765 CVE-2023-41767 CVE-2023-41768 CVE-2023-41769 CVE-2023-41770 CVE-2023-41771 CVE-2023-41773 CVE-2023-41774 and CVE-2023-38166 — is via a specially crafted protocol message to a Routing and Remote Access Service (RRAS) server.

21. Remote Code Execution - Layer 2 Tunneling Protocol (CVE-2023-41769) - High [440]

Description: Layer 2 Tunneling Protocol Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Layer 2 Tunneling Protocol
CVSS Base Score0.810CVSS Base Score is 8.1. According to Microsoft data source
EPSS Percentile0.710EPSS Probability is 0.00411, EPSS Percentile is 0.711

Qualys: CVE-2023-41765, CVE-2023-41767, CVE-2023-41768, CVE-2023-41769, CVE-2023-41770, CVE-2023-41771, CVE-2023-41773, CVE-2023-41774, CVE-2023-38166 – Layer 2 Tunneling Protocol Remote Code Execution Vulnerability Layer 2 Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP) used mainly by Internet Service Providers and Virtual Private Networks (VPNs). L2TP is one of the protocols that help ensure security and privacy by enabling a tunnel for Layer 2 traffic over a Layer 3 network. To exploit these vulnerabilities, an attacker is required to win a race condition. An unauthenticated attacker could send a specially crafted connection request to a RAS server and perform remote code execution on the RAS server machine.

Rapid7: Twelve critical RCE vulnerabilities seems like a lot, and it is. Fully three-quarters of these are in the same Windows component — the Layer 2 Tunneling Protocol — which has already received fixes for a significant number of critical RCEs in recent months. Exploitation of each of the Layer 2 Tunneling Protocol critical RCEs this month — CVE-2023-41765 CVE-2023-41767 CVE-2023-41768 CVE-2023-41769 CVE-2023-41770 CVE-2023-41771 CVE-2023-41773 CVE-2023-41774 and CVE-2023-38166 — is via a specially crafted protocol message to a Routing and Remote Access Service (RRAS) server.

22. Remote Code Execution - Layer 2 Tunneling Protocol (CVE-2023-41770) - High [440]

Description: Layer 2 Tunneling Protocol Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Layer 2 Tunneling Protocol
CVSS Base Score0.810CVSS Base Score is 8.1. According to Microsoft data source
EPSS Percentile0.710EPSS Probability is 0.00411, EPSS Percentile is 0.711

Qualys: CVE-2023-41765, CVE-2023-41767, CVE-2023-41768, CVE-2023-41769, CVE-2023-41770, CVE-2023-41771, CVE-2023-41773, CVE-2023-41774, CVE-2023-38166 – Layer 2 Tunneling Protocol Remote Code Execution Vulnerability Layer 2 Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP) used mainly by Internet Service Providers and Virtual Private Networks (VPNs). L2TP is one of the protocols that help ensure security and privacy by enabling a tunnel for Layer 2 traffic over a Layer 3 network. To exploit these vulnerabilities, an attacker is required to win a race condition. An unauthenticated attacker could send a specially crafted connection request to a RAS server and perform remote code execution on the RAS server machine.

Rapid7: Twelve critical RCE vulnerabilities seems like a lot, and it is. Fully three-quarters of these are in the same Windows component — the Layer 2 Tunneling Protocol — which has already received fixes for a significant number of critical RCEs in recent months. Exploitation of each of the Layer 2 Tunneling Protocol critical RCEs this month — CVE-2023-41765 CVE-2023-41767 CVE-2023-41768 CVE-2023-41769 CVE-2023-41770 CVE-2023-41771 CVE-2023-41773 CVE-2023-41774 and CVE-2023-38166 — is via a specially crafted protocol message to a Routing and Remote Access Service (RRAS) server.

23. Remote Code Execution - Layer 2 Tunneling Protocol (CVE-2023-41771) - High [440]

Description: Layer 2 Tunneling Protocol Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Layer 2 Tunneling Protocol
CVSS Base Score0.810CVSS Base Score is 8.1. According to Microsoft data source
EPSS Percentile0.710EPSS Probability is 0.00411, EPSS Percentile is 0.711

Qualys: CVE-2023-41765, CVE-2023-41767, CVE-2023-41768, CVE-2023-41769, CVE-2023-41770, CVE-2023-41771, CVE-2023-41773, CVE-2023-41774, CVE-2023-38166 – Layer 2 Tunneling Protocol Remote Code Execution Vulnerability Layer 2 Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP) used mainly by Internet Service Providers and Virtual Private Networks (VPNs). L2TP is one of the protocols that help ensure security and privacy by enabling a tunnel for Layer 2 traffic over a Layer 3 network. To exploit these vulnerabilities, an attacker is required to win a race condition. An unauthenticated attacker could send a specially crafted connection request to a RAS server and perform remote code execution on the RAS server machine.

Rapid7: Twelve critical RCE vulnerabilities seems like a lot, and it is. Fully three-quarters of these are in the same Windows component — the Layer 2 Tunneling Protocol — which has already received fixes for a significant number of critical RCEs in recent months. Exploitation of each of the Layer 2 Tunneling Protocol critical RCEs this month — CVE-2023-41765 CVE-2023-41767 CVE-2023-41768 CVE-2023-41769 CVE-2023-41770 CVE-2023-41771 CVE-2023-41773 CVE-2023-41774 and CVE-2023-38166 — is via a specially crafted protocol message to a Routing and Remote Access Service (RRAS) server.

24. Remote Code Execution - Layer 2 Tunneling Protocol (CVE-2023-41773) - High [440]

Description: Layer 2 Tunneling Protocol Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Layer 2 Tunneling Protocol
CVSS Base Score0.810CVSS Base Score is 8.1. According to Microsoft data source
EPSS Percentile0.710EPSS Probability is 0.00411, EPSS Percentile is 0.711

Qualys: CVE-2023-41765, CVE-2023-41767, CVE-2023-41768, CVE-2023-41769, CVE-2023-41770, CVE-2023-41771, CVE-2023-41773, CVE-2023-41774, CVE-2023-38166 – Layer 2 Tunneling Protocol Remote Code Execution Vulnerability Layer 2 Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP) used mainly by Internet Service Providers and Virtual Private Networks (VPNs). L2TP is one of the protocols that help ensure security and privacy by enabling a tunnel for Layer 2 traffic over a Layer 3 network. To exploit these vulnerabilities, an attacker is required to win a race condition. An unauthenticated attacker could send a specially crafted connection request to a RAS server and perform remote code execution on the RAS server machine.

Rapid7: Twelve critical RCE vulnerabilities seems like a lot, and it is. Fully three-quarters of these are in the same Windows component — the Layer 2 Tunneling Protocol — which has already received fixes for a significant number of critical RCEs in recent months. Exploitation of each of the Layer 2 Tunneling Protocol critical RCEs this month — CVE-2023-41765 CVE-2023-41767 CVE-2023-41768 CVE-2023-41769 CVE-2023-41770 CVE-2023-41771 CVE-2023-41773 CVE-2023-41774 and CVE-2023-38166 — is via a specially crafted protocol message to a Routing and Remote Access Service (RRAS) server.

25. Remote Code Execution - Layer 2 Tunneling Protocol (CVE-2023-41774) - High [440]

Description: Layer 2 Tunneling Protocol Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Layer 2 Tunneling Protocol
CVSS Base Score0.810CVSS Base Score is 8.1. According to Microsoft data source
EPSS Percentile0.710EPSS Probability is 0.00411, EPSS Percentile is 0.711

Qualys: CVE-2023-41765, CVE-2023-41767, CVE-2023-41768, CVE-2023-41769, CVE-2023-41770, CVE-2023-41771, CVE-2023-41773, CVE-2023-41774, CVE-2023-38166 – Layer 2 Tunneling Protocol Remote Code Execution Vulnerability Layer 2 Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP) used mainly by Internet Service Providers and Virtual Private Networks (VPNs). L2TP is one of the protocols that help ensure security and privacy by enabling a tunnel for Layer 2 traffic over a Layer 3 network. To exploit these vulnerabilities, an attacker is required to win a race condition. An unauthenticated attacker could send a specially crafted connection request to a RAS server and perform remote code execution on the RAS server machine.

Rapid7: Twelve critical RCE vulnerabilities seems like a lot, and it is. Fully three-quarters of these are in the same Windows component — the Layer 2 Tunneling Protocol — which has already received fixes for a significant number of critical RCEs in recent months. Exploitation of each of the Layer 2 Tunneling Protocol critical RCEs this month — CVE-2023-41765 CVE-2023-41767 CVE-2023-41768 CVE-2023-41769 CVE-2023-41770 CVE-2023-41771 CVE-2023-41773 CVE-2023-41774 and CVE-2023-38166 — is via a specially crafted protocol message to a Routing and Remote Access Service (RRAS) server.

26. Security Feature Bypass - Windows Search (CVE-2023-36564) - High [436]

Description: Windows Search Security Feature Bypass Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.710CVSS Base Score is 6.5. According to Microsoft data source
EPSS Percentile0.510EPSS Probability is 0.0013, EPSS Percentile is 0.47622

27. Remote Code Execution - Microsoft Message Queuing (CVE-2023-36570) - High [435]

Description: Microsoft Message Queuing Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.914Microsoft Message Queuing or MSMQ is a message queue implementation developed by Microsoft and deployed in its Windows Server operating systems since Windows NT 4 and Windows 95
CVSS Base Score0.710CVSS Base Score is 7.3. According to Microsoft data source
EPSS Percentile0.210EPSS Probability is 0.00061, EPSS Percentile is 0.24442

Qualys: CVE-2023-36591, CVE-2023-36578, CVE-2023-36575, CVE-2023-36571, CVE-2023-35349, CVE-2023-36574, CVE-2023-36590, CVE-2023-36573, CVE-2023-36583, CVE-2023-36570, CVE-2023-36572, CVE-2023-36582, CVE-2023-36589, CVE-2023-36593, CVE-2023-36592 – Microsoft Message Queuing Remote Code Execution Vulnerability This vulnerability has a CVSS:3.1 7.3 / 6.4 Policy Compliance Control IDs (CIDs): 4030 Status of the ‘Windows Message Queuing Service’ 14916 Status of Windows Services 14297 Status of the open network connections and listening ports (Qualys Agent only) The following QQL will return a posture assessment for the CIDs for this Patch Tuesday: control.id: [4030, 14916, 14297, 18266, 17331, 17330]

Qualys: CVE-2023-36591, CVE-2023-36578, CVE-2023-36575, CVE-2023-36571, CVE-2023-35349, CVE-2023-36574, CVE-2023-36590, CVE-2023-36573, CVE-2023-36583, CVE-2023-36570, CVE-2023-36572, CVE-2023-36582, CVE-2023-36589, CVE-2023-36593, CVE-2023-36592 – Microsoft Message Queuing Remote Code Execution Vulnerability  Visit the October 2023 Security Updates page to access the full description of The next Patch Tuesday falls on November 14, and we’ll be back with details and patch analysis. Until next Patch Tuesday, stay safe and secure. Be sure to subscribe to the ‘This Month in Vulnerabilities and Patch’s webinar.’

Tenable: |CVE-2023-36570||Microsoft Message Queuing Remote Code Execution Vulnerability||7.3||Exploitation Less Likely|

28. Remote Code Execution - Microsoft Message Queuing (CVE-2023-36571) - High [435]

Description: Microsoft Message Queuing Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.914Microsoft Message Queuing or MSMQ is a message queue implementation developed by Microsoft and deployed in its Windows Server operating systems since Windows NT 4 and Windows 95
CVSS Base Score0.710CVSS Base Score is 7.3. According to Microsoft data source
EPSS Percentile0.210EPSS Probability is 0.00061, EPSS Percentile is 0.24442

Qualys: CVE-2023-36591, CVE-2023-36578, CVE-2023-36575, CVE-2023-36571, CVE-2023-35349, CVE-2023-36574, CVE-2023-36590, CVE-2023-36573, CVE-2023-36583, CVE-2023-36570, CVE-2023-36572, CVE-2023-36582, CVE-2023-36589, CVE-2023-36593, CVE-2023-36592 – Microsoft Message Queuing Remote Code Execution Vulnerability This vulnerability has a CVSS:3.1 7.3 / 6.4 Policy Compliance Control IDs (CIDs): 4030 Status of the ‘Windows Message Queuing Service’ 14916 Status of Windows Services 14297 Status of the open network connections and listening ports (Qualys Agent only) The following QQL will return a posture assessment for the CIDs for this Patch Tuesday: control.id: [4030, 14916, 14297, 18266, 17331, 17330]

Qualys: CVE-2023-36591, CVE-2023-36578, CVE-2023-36575, CVE-2023-36571, CVE-2023-35349, CVE-2023-36574, CVE-2023-36590, CVE-2023-36573, CVE-2023-36583, CVE-2023-36570, CVE-2023-36572, CVE-2023-36582, CVE-2023-36589, CVE-2023-36593, CVE-2023-36592 – Microsoft Message Queuing Remote Code Execution Vulnerability  Visit the October 2023 Security Updates page to access the full description of The next Patch Tuesday falls on November 14, and we’ll be back with details and patch analysis. Until next Patch Tuesday, stay safe and secure. Be sure to subscribe to the ‘This Month in Vulnerabilities and Patch’s webinar.’

Tenable: |CVE-2023-36571||Microsoft Message Queuing Remote Code Execution Vulnerability||7.3||Exploitation Less Likely|

29. Remote Code Execution - Microsoft Message Queuing (CVE-2023-36572) - High [435]

Description: Microsoft Message Queuing Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.914Microsoft Message Queuing or MSMQ is a message queue implementation developed by Microsoft and deployed in its Windows Server operating systems since Windows NT 4 and Windows 95
CVSS Base Score0.710CVSS Base Score is 7.3. According to Microsoft data source
EPSS Percentile0.210EPSS Probability is 0.00061, EPSS Percentile is 0.24442

Qualys: CVE-2023-36591, CVE-2023-36578, CVE-2023-36575, CVE-2023-36571, CVE-2023-35349, CVE-2023-36574, CVE-2023-36590, CVE-2023-36573, CVE-2023-36583, CVE-2023-36570, CVE-2023-36572, CVE-2023-36582, CVE-2023-36589, CVE-2023-36593, CVE-2023-36592 – Microsoft Message Queuing Remote Code Execution Vulnerability This vulnerability has a CVSS:3.1 7.3 / 6.4 Policy Compliance Control IDs (CIDs): 4030 Status of the ‘Windows Message Queuing Service’ 14916 Status of Windows Services 14297 Status of the open network connections and listening ports (Qualys Agent only) The following QQL will return a posture assessment for the CIDs for this Patch Tuesday: control.id: [4030, 14916, 14297, 18266, 17331, 17330]

Qualys: CVE-2023-36591, CVE-2023-36578, CVE-2023-36575, CVE-2023-36571, CVE-2023-35349, CVE-2023-36574, CVE-2023-36590, CVE-2023-36573, CVE-2023-36583, CVE-2023-36570, CVE-2023-36572, CVE-2023-36582, CVE-2023-36589, CVE-2023-36593, CVE-2023-36592 – Microsoft Message Queuing Remote Code Execution Vulnerability  Visit the October 2023 Security Updates page to access the full description of The next Patch Tuesday falls on November 14, and we’ll be back with details and patch analysis. Until next Patch Tuesday, stay safe and secure. Be sure to subscribe to the ‘This Month in Vulnerabilities and Patch’s webinar.’

Tenable: |CVE-2023-36572||Microsoft Message Queuing Remote Code Execution Vulnerability||7.3||Exploitation Less Likely|

30. Remote Code Execution - Microsoft Message Queuing (CVE-2023-36573) - High [435]

Description: Microsoft Message Queuing Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.914Microsoft Message Queuing or MSMQ is a message queue implementation developed by Microsoft and deployed in its Windows Server operating systems since Windows NT 4 and Windows 95
CVSS Base Score0.710CVSS Base Score is 7.3. According to Microsoft data source
EPSS Percentile0.210EPSS Probability is 0.00061, EPSS Percentile is 0.24442

Qualys: CVE-2023-36591, CVE-2023-36578, CVE-2023-36575, CVE-2023-36571, CVE-2023-35349, CVE-2023-36574, CVE-2023-36590, CVE-2023-36573, CVE-2023-36583, CVE-2023-36570, CVE-2023-36572, CVE-2023-36582, CVE-2023-36589, CVE-2023-36593, CVE-2023-36592 – Microsoft Message Queuing Remote Code Execution Vulnerability This vulnerability has a CVSS:3.1 7.3 / 6.4 Policy Compliance Control IDs (CIDs): 4030 Status of the ‘Windows Message Queuing Service’ 14916 Status of Windows Services 14297 Status of the open network connections and listening ports (Qualys Agent only) The following QQL will return a posture assessment for the CIDs for this Patch Tuesday: control.id: [4030, 14916, 14297, 18266, 17331, 17330]

Qualys: CVE-2023-36591, CVE-2023-36578, CVE-2023-36575, CVE-2023-36571, CVE-2023-35349, CVE-2023-36574, CVE-2023-36590, CVE-2023-36573, CVE-2023-36583, CVE-2023-36570, CVE-2023-36572, CVE-2023-36582, CVE-2023-36589, CVE-2023-36593, CVE-2023-36592 – Microsoft Message Queuing Remote Code Execution Vulnerability  Visit the October 2023 Security Updates page to access the full description of The next Patch Tuesday falls on November 14, and we’ll be back with details and patch analysis. Until next Patch Tuesday, stay safe and secure. Be sure to subscribe to the ‘This Month in Vulnerabilities and Patch’s webinar.’

Tenable: |CVE-2023-36573||Microsoft Message Queuing Remote Code Execution Vulnerability||7.3||Exploitation Less Likely|

31. Remote Code Execution - Microsoft Message Queuing (CVE-2023-36574) - High [435]

Description: Microsoft Message Queuing Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.914Microsoft Message Queuing or MSMQ is a message queue implementation developed by Microsoft and deployed in its Windows Server operating systems since Windows NT 4 and Windows 95
CVSS Base Score0.710CVSS Base Score is 7.3. According to Microsoft data source
EPSS Percentile0.210EPSS Probability is 0.00061, EPSS Percentile is 0.24442

Qualys: CVE-2023-36591, CVE-2023-36578, CVE-2023-36575, CVE-2023-36571, CVE-2023-35349, CVE-2023-36574, CVE-2023-36590, CVE-2023-36573, CVE-2023-36583, CVE-2023-36570, CVE-2023-36572, CVE-2023-36582, CVE-2023-36589, CVE-2023-36593, CVE-2023-36592 – Microsoft Message Queuing Remote Code Execution Vulnerability This vulnerability has a CVSS:3.1 7.3 / 6.4 Policy Compliance Control IDs (CIDs): 4030 Status of the ‘Windows Message Queuing Service’ 14916 Status of Windows Services 14297 Status of the open network connections and listening ports (Qualys Agent only) The following QQL will return a posture assessment for the CIDs for this Patch Tuesday: control.id: [4030, 14916, 14297, 18266, 17331, 17330]

Qualys: CVE-2023-36591, CVE-2023-36578, CVE-2023-36575, CVE-2023-36571, CVE-2023-35349, CVE-2023-36574, CVE-2023-36590, CVE-2023-36573, CVE-2023-36583, CVE-2023-36570, CVE-2023-36572, CVE-2023-36582, CVE-2023-36589, CVE-2023-36593, CVE-2023-36592 – Microsoft Message Queuing Remote Code Execution Vulnerability  Visit the October 2023 Security Updates page to access the full description of The next Patch Tuesday falls on November 14, and we’ll be back with details and patch analysis. Until next Patch Tuesday, stay safe and secure. Be sure to subscribe to the ‘This Month in Vulnerabilities and Patch’s webinar.’

Tenable: |CVE-2023-36574||Microsoft Message Queuing Remote Code Execution Vulnerability||7.3||Exploitation Less Likely|

32. Remote Code Execution - Microsoft Message Queuing (CVE-2023-36575) - High [435]

Description: Microsoft Message Queuing Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.914Microsoft Message Queuing or MSMQ is a message queue implementation developed by Microsoft and deployed in its Windows Server operating systems since Windows NT 4 and Windows 95
CVSS Base Score0.710CVSS Base Score is 7.3. According to Microsoft data source
EPSS Percentile0.210EPSS Probability is 0.00061, EPSS Percentile is 0.24442

Qualys: CVE-2023-36591, CVE-2023-36578, CVE-2023-36575, CVE-2023-36571, CVE-2023-35349, CVE-2023-36574, CVE-2023-36590, CVE-2023-36573, CVE-2023-36583, CVE-2023-36570, CVE-2023-36572, CVE-2023-36582, CVE-2023-36589, CVE-2023-36593, CVE-2023-36592 – Microsoft Message Queuing Remote Code Execution Vulnerability This vulnerability has a CVSS:3.1 7.3 / 6.4 Policy Compliance Control IDs (CIDs): 4030 Status of the ‘Windows Message Queuing Service’ 14916 Status of Windows Services 14297 Status of the open network connections and listening ports (Qualys Agent only) The following QQL will return a posture assessment for the CIDs for this Patch Tuesday: control.id: [4030, 14916, 14297, 18266, 17331, 17330]

Qualys: CVE-2023-36591, CVE-2023-36578, CVE-2023-36575, CVE-2023-36571, CVE-2023-35349, CVE-2023-36574, CVE-2023-36590, CVE-2023-36573, CVE-2023-36583, CVE-2023-36570, CVE-2023-36572, CVE-2023-36582, CVE-2023-36589, CVE-2023-36593, CVE-2023-36592 – Microsoft Message Queuing Remote Code Execution Vulnerability  Visit the October 2023 Security Updates page to access the full description of The next Patch Tuesday falls on November 14, and we’ll be back with details and patch analysis. Until next Patch Tuesday, stay safe and secure. Be sure to subscribe to the ‘This Month in Vulnerabilities and Patch’s webinar.’

Tenable: |CVE-2023-36575||Microsoft Message Queuing Remote Code Execution Vulnerability||7.3||Exploitation Less Likely|

33. Remote Code Execution - Microsoft Message Queuing (CVE-2023-36578) - High [435]

Description: Microsoft Message Queuing Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.914Microsoft Message Queuing or MSMQ is a message queue implementation developed by Microsoft and deployed in its Windows Server operating systems since Windows NT 4 and Windows 95
CVSS Base Score0.710CVSS Base Score is 7.3. According to Microsoft data source
EPSS Percentile0.210EPSS Probability is 0.00061, EPSS Percentile is 0.24442

Qualys: CVE-2023-36591, CVE-2023-36578, CVE-2023-36575, CVE-2023-36571, CVE-2023-35349, CVE-2023-36574, CVE-2023-36590, CVE-2023-36573, CVE-2023-36583, CVE-2023-36570, CVE-2023-36572, CVE-2023-36582, CVE-2023-36589, CVE-2023-36593, CVE-2023-36592 – Microsoft Message Queuing Remote Code Execution Vulnerability This vulnerability has a CVSS:3.1 7.3 / 6.4 Policy Compliance Control IDs (CIDs): 4030 Status of the ‘Windows Message Queuing Service’ 14916 Status of Windows Services 14297 Status of the open network connections and listening ports (Qualys Agent only) The following QQL will return a posture assessment for the CIDs for this Patch Tuesday: control.id: [4030, 14916, 14297, 18266, 17331, 17330]

Qualys: CVE-2023-36591, CVE-2023-36578, CVE-2023-36575, CVE-2023-36571, CVE-2023-35349, CVE-2023-36574, CVE-2023-36590, CVE-2023-36573, CVE-2023-36583, CVE-2023-36570, CVE-2023-36572, CVE-2023-36582, CVE-2023-36589, CVE-2023-36593, CVE-2023-36592 – Microsoft Message Queuing Remote Code Execution Vulnerability  Visit the October 2023 Security Updates page to access the full description of The next Patch Tuesday falls on November 14, and we’ll be back with details and patch analysis. Until next Patch Tuesday, stay safe and secure. Be sure to subscribe to the ‘This Month in Vulnerabilities and Patch’s webinar.’

Tenable: |CVE-2023-36578||Microsoft Message Queuing Remote Code Execution Vulnerability||7.3||Exploitation Less Likely|

34. Remote Code Execution - Microsoft Message Queuing (CVE-2023-36582) - High [435]

Description: Microsoft Message Queuing Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.914Microsoft Message Queuing or MSMQ is a message queue implementation developed by Microsoft and deployed in its Windows Server operating systems since Windows NT 4 and Windows 95
CVSS Base Score0.710CVSS Base Score is 7.3. According to Microsoft data source
EPSS Percentile0.210EPSS Probability is 0.00061, EPSS Percentile is 0.24442

Qualys: CVE-2023-36591, CVE-2023-36578, CVE-2023-36575, CVE-2023-36571, CVE-2023-35349, CVE-2023-36574, CVE-2023-36590, CVE-2023-36573, CVE-2023-36583, CVE-2023-36570, CVE-2023-36572, CVE-2023-36582, CVE-2023-36589, CVE-2023-36593, CVE-2023-36592 – Microsoft Message Queuing Remote Code Execution Vulnerability This vulnerability has a CVSS:3.1 7.3 / 6.4 Policy Compliance Control IDs (CIDs): 4030 Status of the ‘Windows Message Queuing Service’ 14916 Status of Windows Services 14297 Status of the open network connections and listening ports (Qualys Agent only) The following QQL will return a posture assessment for the CIDs for this Patch Tuesday: control.id: [4030, 14916, 14297, 18266, 17331, 17330]

Qualys: CVE-2023-36591, CVE-2023-36578, CVE-2023-36575, CVE-2023-36571, CVE-2023-35349, CVE-2023-36574, CVE-2023-36590, CVE-2023-36573, CVE-2023-36583, CVE-2023-36570, CVE-2023-36572, CVE-2023-36582, CVE-2023-36589, CVE-2023-36593, CVE-2023-36592 – Microsoft Message Queuing Remote Code Execution Vulnerability  Visit the October 2023 Security Updates page to access the full description of The next Patch Tuesday falls on November 14, and we’ll be back with details and patch analysis. Until next Patch Tuesday, stay safe and secure. Be sure to subscribe to the ‘This Month in Vulnerabilities and Patch’s webinar.’

Tenable: |CVE-2023-36582||Microsoft Message Queuing Remote Code Execution Vulnerability||7.3||Exploitation Less Likely|

35. Remote Code Execution - Microsoft Message Queuing (CVE-2023-36583) - High [435]

Description: Microsoft Message Queuing Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.914Microsoft Message Queuing or MSMQ is a message queue implementation developed by Microsoft and deployed in its Windows Server operating systems since Windows NT 4 and Windows 95
CVSS Base Score0.710CVSS Base Score is 7.3. According to Microsoft data source
EPSS Percentile0.210EPSS Probability is 0.00061, EPSS Percentile is 0.24442

Qualys: CVE-2023-36591, CVE-2023-36578, CVE-2023-36575, CVE-2023-36571, CVE-2023-35349, CVE-2023-36574, CVE-2023-36590, CVE-2023-36573, CVE-2023-36583, CVE-2023-36570, CVE-2023-36572, CVE-2023-36582, CVE-2023-36589, CVE-2023-36593, CVE-2023-36592 – Microsoft Message Queuing Remote Code Execution Vulnerability This vulnerability has a CVSS:3.1 7.3 / 6.4 Policy Compliance Control IDs (CIDs): 4030 Status of the ‘Windows Message Queuing Service’ 14916 Status of Windows Services 14297 Status of the open network connections and listening ports (Qualys Agent only) The following QQL will return a posture assessment for the CIDs for this Patch Tuesday: control.id: [4030, 14916, 14297, 18266, 17331, 17330]

Qualys: CVE-2023-36591, CVE-2023-36578, CVE-2023-36575, CVE-2023-36571, CVE-2023-35349, CVE-2023-36574, CVE-2023-36590, CVE-2023-36573, CVE-2023-36583, CVE-2023-36570, CVE-2023-36572, CVE-2023-36582, CVE-2023-36589, CVE-2023-36593, CVE-2023-36592 – Microsoft Message Queuing Remote Code Execution Vulnerability  Visit the October 2023 Security Updates page to access the full description of The next Patch Tuesday falls on November 14, and we’ll be back with details and patch analysis. Until next Patch Tuesday, stay safe and secure. Be sure to subscribe to the ‘This Month in Vulnerabilities and Patch’s webinar.’

Tenable: |CVE-2023-36583||Microsoft Message Queuing Remote Code Execution Vulnerability||7.3||Exploitation Less Likely|

36. Remote Code Execution - Microsoft Message Queuing (CVE-2023-36589) - High [435]

Description: Microsoft Message Queuing Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.914Microsoft Message Queuing or MSMQ is a message queue implementation developed by Microsoft and deployed in its Windows Server operating systems since Windows NT 4 and Windows 95
CVSS Base Score0.710CVSS Base Score is 7.3. According to Microsoft data source
EPSS Percentile0.210EPSS Probability is 0.00061, EPSS Percentile is 0.24442

Qualys: CVE-2023-36591, CVE-2023-36578, CVE-2023-36575, CVE-2023-36571, CVE-2023-35349, CVE-2023-36574, CVE-2023-36590, CVE-2023-36573, CVE-2023-36583, CVE-2023-36570, CVE-2023-36572, CVE-2023-36582, CVE-2023-36589, CVE-2023-36593, CVE-2023-36592 – Microsoft Message Queuing Remote Code Execution Vulnerability This vulnerability has a CVSS:3.1 7.3 / 6.4 Policy Compliance Control IDs (CIDs): 4030 Status of the ‘Windows Message Queuing Service’ 14916 Status of Windows Services 14297 Status of the open network connections and listening ports (Qualys Agent only) The following QQL will return a posture assessment for the CIDs for this Patch Tuesday: control.id: [4030, 14916, 14297, 18266, 17331, 17330]

Qualys: CVE-2023-36591, CVE-2023-36578, CVE-2023-36575, CVE-2023-36571, CVE-2023-35349, CVE-2023-36574, CVE-2023-36590, CVE-2023-36573, CVE-2023-36583, CVE-2023-36570, CVE-2023-36572, CVE-2023-36582, CVE-2023-36589, CVE-2023-36593, CVE-2023-36592 – Microsoft Message Queuing Remote Code Execution Vulnerability  Visit the October 2023 Security Updates page to access the full description of The next Patch Tuesday falls on November 14, and we’ll be back with details and patch analysis. Until next Patch Tuesday, stay safe and secure. Be sure to subscribe to the ‘This Month in Vulnerabilities and Patch’s webinar.’

Tenable: |CVE-2023-36589||Microsoft Message Queuing Remote Code Execution Vulnerability||7.3||Exploitation Less Likely|

37. Remote Code Execution - Microsoft Message Queuing (CVE-2023-36590) - High [435]

Description: Microsoft Message Queuing Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.914Microsoft Message Queuing or MSMQ is a message queue implementation developed by Microsoft and deployed in its Windows Server operating systems since Windows NT 4 and Windows 95
CVSS Base Score0.710CVSS Base Score is 7.3. According to Microsoft data source
EPSS Percentile0.210EPSS Probability is 0.00061, EPSS Percentile is 0.24442

Qualys: CVE-2023-36591, CVE-2023-36578, CVE-2023-36575, CVE-2023-36571, CVE-2023-35349, CVE-2023-36574, CVE-2023-36590, CVE-2023-36573, CVE-2023-36583, CVE-2023-36570, CVE-2023-36572, CVE-2023-36582, CVE-2023-36589, CVE-2023-36593, CVE-2023-36592 – Microsoft Message Queuing Remote Code Execution Vulnerability This vulnerability has a CVSS:3.1 7.3 / 6.4 Policy Compliance Control IDs (CIDs): 4030 Status of the ‘Windows Message Queuing Service’ 14916 Status of Windows Services 14297 Status of the open network connections and listening ports (Qualys Agent only) The following QQL will return a posture assessment for the CIDs for this Patch Tuesday: control.id: [4030, 14916, 14297, 18266, 17331, 17330]

Qualys: CVE-2023-36591, CVE-2023-36578, CVE-2023-36575, CVE-2023-36571, CVE-2023-35349, CVE-2023-36574, CVE-2023-36590, CVE-2023-36573, CVE-2023-36583, CVE-2023-36570, CVE-2023-36572, CVE-2023-36582, CVE-2023-36589, CVE-2023-36593, CVE-2023-36592 – Microsoft Message Queuing Remote Code Execution Vulnerability  Visit the October 2023 Security Updates page to access the full description of The next Patch Tuesday falls on November 14, and we’ll be back with details and patch analysis. Until next Patch Tuesday, stay safe and secure. Be sure to subscribe to the ‘This Month in Vulnerabilities and Patch’s webinar.’

Tenable: |CVE-2023-36590||Microsoft Message Queuing Remote Code Execution Vulnerability||7.3||Exploitation Less Likely|

38. Remote Code Execution - Microsoft Message Queuing (CVE-2023-36591) - High [435]

Description: Microsoft Message Queuing Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.914Microsoft Message Queuing or MSMQ is a message queue implementation developed by Microsoft and deployed in its Windows Server operating systems since Windows NT 4 and Windows 95
CVSS Base Score0.710CVSS Base Score is 7.3. According to Microsoft data source
EPSS Percentile0.210EPSS Probability is 0.00061, EPSS Percentile is 0.24442

Qualys: CVE-2023-36591, CVE-2023-36578, CVE-2023-36575, CVE-2023-36571, CVE-2023-35349, CVE-2023-36574, CVE-2023-36590, CVE-2023-36573, CVE-2023-36583, CVE-2023-36570, CVE-2023-36572, CVE-2023-36582, CVE-2023-36589, CVE-2023-36593, CVE-2023-36592 – Microsoft Message Queuing Remote Code Execution Vulnerability This vulnerability has a CVSS:3.1 7.3 / 6.4 Policy Compliance Control IDs (CIDs): 4030 Status of the ‘Windows Message Queuing Service’ 14916 Status of Windows Services 14297 Status of the open network connections and listening ports (Qualys Agent only) The following QQL will return a posture assessment for the CIDs for this Patch Tuesday: control.id: [4030, 14916, 14297, 18266, 17331, 17330]

Qualys: CVE-2023-36591, CVE-2023-36578, CVE-2023-36575, CVE-2023-36571, CVE-2023-35349, CVE-2023-36574, CVE-2023-36590, CVE-2023-36573, CVE-2023-36583, CVE-2023-36570, CVE-2023-36572, CVE-2023-36582, CVE-2023-36589, CVE-2023-36593, CVE-2023-36592 – Microsoft Message Queuing Remote Code Execution Vulnerability  Visit the October 2023 Security Updates page to access the full description of The next Patch Tuesday falls on November 14, and we’ll be back with details and patch analysis. Until next Patch Tuesday, stay safe and secure. Be sure to subscribe to the ‘This Month in Vulnerabilities and Patch’s webinar.’

Tenable: |CVE-2023-36591||Microsoft Message Queuing Remote Code Execution Vulnerability||7.3||Exploitation Less Likely|

39. Remote Code Execution - Microsoft Message Queuing (CVE-2023-36592) - High [435]

Description: Microsoft Message Queuing Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.914Microsoft Message Queuing or MSMQ is a message queue implementation developed by Microsoft and deployed in its Windows Server operating systems since Windows NT 4 and Windows 95
CVSS Base Score0.710CVSS Base Score is 7.3. According to Microsoft data source
EPSS Percentile0.210EPSS Probability is 0.00061, EPSS Percentile is 0.24442

Qualys: CVE-2023-36591, CVE-2023-36578, CVE-2023-36575, CVE-2023-36571, CVE-2023-35349, CVE-2023-36574, CVE-2023-36590, CVE-2023-36573, CVE-2023-36583, CVE-2023-36570, CVE-2023-36572, CVE-2023-36582, CVE-2023-36589, CVE-2023-36593, CVE-2023-36592 – Microsoft Message Queuing Remote Code Execution Vulnerability This vulnerability has a CVSS:3.1 7.3 / 6.4 Policy Compliance Control IDs (CIDs): 4030 Status of the ‘Windows Message Queuing Service’ 14916 Status of Windows Services 14297 Status of the open network connections and listening ports (Qualys Agent only) The following QQL will return a posture assessment for the CIDs for this Patch Tuesday: control.id: [4030, 14916, 14297, 18266, 17331, 17330]

Qualys: CVE-2023-36591, CVE-2023-36578, CVE-2023-36575, CVE-2023-36571, CVE-2023-35349, CVE-2023-36574, CVE-2023-36590, CVE-2023-36573, CVE-2023-36583, CVE-2023-36570, CVE-2023-36572, CVE-2023-36582, CVE-2023-36589, CVE-2023-36593, CVE-2023-36592 – Microsoft Message Queuing Remote Code Execution Vulnerability  Visit the October 2023 Security Updates page to access the full description of The next Patch Tuesday falls on November 14, and we’ll be back with details and patch analysis. Until next Patch Tuesday, stay safe and secure. Be sure to subscribe to the ‘This Month in Vulnerabilities and Patch’s webinar.’

Tenable: |CVE-2023-36592||Microsoft Message Queuing Remote Code Execution Vulnerability||7.3||Exploitation Less Likely|

40. Remote Code Execution - Skype for Business (CVE-2023-36780) - High [433]

Description: Skype for Business Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Skype for Business
CVSS Base Score0.710CVSS Base Score is 7.2. According to Microsoft data source
EPSS Percentile0.610EPSS Probability is 0.00189, EPSS Percentile is 0.56263

Qualys: Other Microsoft Vulnerability Highlights CVE-2023-36780 is a remote code execution vulnerability in Skype for Business. The vulnerability exists in PowerShell when exposed through Microsoft Exchange or Skype. To exploit this vulnerability, an attacker must be granted an administrative role in the Skype for Business Control Panel. Successful exploitation of the vulnerability would allow an attacker to perform remote code execution on the Skype for Business Server backend. CVE-2023-36778 is a remote code execution vulnerability in Microsoft Exchange Server. An attacker must have LAN access and credentials for a valid Exchange user to exploit this vulnerability. An authenticated attacker who is on the same intranet as the Exchange server may perform remote code execution via a PowerShell remoting session. CVE-2023-36713 is an information disclosure vulnerability in the Windows Common Log File System Driver. Successful exploitation of the vulnerability would allow an attacker to read small portions of heap memory potentially. CVE-2023-36594 and CVE-2023-38159 are elevation of privilege vulnerabilities in the Microsoft Graphics Component. Successful exploitation of the vulnerability may allow an attacker to gain SYSTEM privileges. CVE-2023-36731, CVE-2023-36732, CVE-2023-36743, CVE-2023-36776, and CVE-2023-41772 are elevation of privilege vulnerabilities in Win32k. Successful exploitation of the vulnerability may allow an attacker to gain SYSTEM privileges.

41. Remote Code Execution - Skype for Business (CVE-2023-36786) - High [433]

Description: Skype for Business Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Skype for Business
CVSS Base Score0.710CVSS Base Score is 7.2. According to Microsoft data source
EPSS Percentile0.610EPSS Probability is 0.00189, EPSS Percentile is 0.56263

42. Remote Code Execution - Skype for Business (CVE-2023-36789) - High [433]

Description: Skype for Business Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Skype for Business
CVSS Base Score0.710CVSS Base Score is 7.2. According to Microsoft data source
EPSS Percentile0.610EPSS Probability is 0.00189, EPSS Percentile is 0.56263

43. Remote Code Execution - Microsoft Exchange (CVE-2023-36778) - High [430]

Description: Microsoft Exchange Server Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Microsoft Exchange Server is a mail server and calendaring server developed by Microsoft
CVSS Base Score0.810CVSS Base Score is 8.0. According to Microsoft data source
EPSS Percentile0.210EPSS Probability is 0.00061, EPSS Percentile is 0.24442

Qualys: Other Microsoft Vulnerability Highlights CVE-2023-36780 is a remote code execution vulnerability in Skype for Business. The vulnerability exists in PowerShell when exposed through Microsoft Exchange or Skype. To exploit this vulnerability, an attacker must be granted an administrative role in the Skype for Business Control Panel. Successful exploitation of the vulnerability would allow an attacker to perform remote code execution on the Skype for Business Server backend. CVE-2023-36778 is a remote code execution vulnerability in Microsoft Exchange Server. An attacker must have LAN access and credentials for a valid Exchange user to exploit this vulnerability. An authenticated attacker who is on the same intranet as the Exchange server may perform remote code execution via a PowerShell remoting session. CVE-2023-36713 is an information disclosure vulnerability in the Windows Common Log File System Driver. Successful exploitation of the vulnerability would allow an attacker to read small portions of heap memory potentially. CVE-2023-36594 and CVE-2023-38159 are elevation of privilege vulnerabilities in the Microsoft Graphics Component. Successful exploitation of the vulnerability may allow an attacker to gain SYSTEM privileges. CVE-2023-36731, CVE-2023-36732, CVE-2023-36743, CVE-2023-36776, and CVE-2023-41772 are elevation of privilege vulnerabilities in Win32k. Successful exploitation of the vulnerability may allow an attacker to gain SYSTEM privileges.

Tenable: CVE-2023-36778 | Microsoft Exchange Server Remote Code Execution Vulnerability

Tenable: CVE-2023-36778 is a RCE vulnerability in Microsoft Exchange Server that was assigned a CVSSv3 score of 8 and is rated as important. A local, authenticated attacker could exploit this vulnerability through a remote PowerShell session with the target server. The vulnerability is caused by improper validation of cmdlet arguments within Microsoft Exchange Server. CVE-2023-36778 was rated “Exploitation More Likely” using the Microsoft Exploitability Index.

Rapid7: Exchange administrators should note the existence of CVE-2023-36778, a same-network RCE vulnerability in all current versions of Exchange Server. Successful exploitation requires that the attacker be on the same network as the Exchange Server host, and use valid credentials for an Exchange user in a PowerShell remoting session. By default, PowerShell Remoting only allows connections from members of the Administrators group, and the relevant Windows Firewall rule for connections via public networks rejects connections from outside the same subnet. Defenders may wish to review these rules to ensure that they have not been loosened beyond the default.

KrebsOnSecurity: Speaking of Exchange, Microsoft also patched CVE-2023-36778, a vulnerability in all current versions of Exchange Server that could allow attackers to run code of their choosing. Rapid7’s Barnett said successful exploitation requires that the attacker be on the same network as the Exchange Server host, and use valid credentials for an Exchange user in a PowerShell session.

44. Memory Corruption - Chromium (CVE-2023-5186) - High [407]

Description: Use after free in Passwords in Google Chrome prior to 117.0.5938.132 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: High)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00167, EPSS Percentile is 0.53375

MS PT Extended: CVE-2023-5186 was published before October 2023 Patch Tuesday from 2023-09-13 to 2023-10-09

45. Denial of Service - Microsoft Message Queuing (CVE-2023-36431) - High [405]

Description: Microsoft Message Queuing Denial of Service Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.914Microsoft Message Queuing or MSMQ is a message queue implementation developed by Microsoft and deployed in its Windows Server operating systems since Windows NT 4 and Windows 95
CVSS Base Score0.810CVSS Base Score is 7.5. According to Microsoft data source
EPSS Percentile0.310EPSS Probability is 0.00069, EPSS Percentile is 0.28801

46. Denial of Service - Microsoft Message Queuing (CVE-2023-36579) - High [405]

Description: Microsoft Message Queuing Denial of Service Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.914Microsoft Message Queuing or MSMQ is a message queue implementation developed by Microsoft and deployed in its Windows Server operating systems since Windows NT 4 and Windows 95
CVSS Base Score0.810CVSS Base Score is 7.5. According to Microsoft data source
EPSS Percentile0.310EPSS Probability is 0.00069, EPSS Percentile is 0.28801

47. Denial of Service - Microsoft Message Queuing (CVE-2023-36581) - High [405]

Description: Microsoft Message Queuing Denial of Service Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.914Microsoft Message Queuing or MSMQ is a message queue implementation developed by Microsoft and deployed in its Windows Server operating systems since Windows NT 4 and Windows 95
CVSS Base Score0.810CVSS Base Score is 7.5. According to Microsoft data source
EPSS Percentile0.310EPSS Probability is 0.00069, EPSS Percentile is 0.28801

48. Denial of Service - Microsoft Message Queuing (CVE-2023-36606) - High [405]

Description: Microsoft Message Queuing Denial of Service Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.914Microsoft Message Queuing or MSMQ is a message queue implementation developed by Microsoft and deployed in its Windows Server operating systems since Windows NT 4 and Windows 95
CVSS Base Score0.810CVSS Base Score is 7.5. According to Microsoft data source
EPSS Percentile0.310EPSS Probability is 0.00069, EPSS Percentile is 0.28801

49. Denial of Service - Windows TCP/IP (CVE-2023-36602) - High [405]

Description: Windows TCP/IP Denial of Service Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.914Windows component
CVSS Base Score0.810CVSS Base Score is 7.5. According to Microsoft data source
EPSS Percentile0.310EPSS Probability is 0.00069, EPSS Percentile is 0.28801

50. Denial of Service - Windows TCP/IP (CVE-2023-36603) - High [405]

Description: Windows TCP/IP Denial of Service Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.914Windows component
CVSS Base Score0.810CVSS Base Score is 7.5. According to Microsoft data source
EPSS Percentile0.310EPSS Probability is 0.00069, EPSS Percentile is 0.28801

Qualys: CVE-2023-36603: Windows TCP/IP Denial of Service Vulnerability This vulnerability has a CVSS:3.1 7.5 / 6.5 Policy Compliance Control IDs (CIDs): 18266 Status of the ‘Firewall CSP – EnablePacketQueue’ setting (Microsoft Intune / MDM)

51. Remote Code Execution - Azure RTOS GUIX Studio (CVE-2023-36418) - High [404]

Description: Azure RTOS GUIX Studio Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Azure RTOS GUIX Studio
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.410EPSS Probability is 0.00113, EPSS Percentile is 0.44687

52. Remote Code Execution - Microsoft DirectMusic (CVE-2023-36702) - High [404]

Description: Microsoft DirectMusic Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Microsoft DirectMusic
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.410EPSS Probability is 0.00113, EPSS Percentile is 0.44687

53. Remote Code Execution - Microsoft ODBC Driver for SQL Server (CVE-2023-36420) - High [404]

Description: Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Microsoft ODBC Driver for SQL Server
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.410EPSS Probability is 0.00113, EPSS Percentile is 0.44687

54. Remote Code Execution - Microsoft ODBC Driver for SQL Server (CVE-2023-36730) - High [404]

Description: Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Microsoft ODBC Driver for SQL Server
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.410EPSS Probability is 0.00113, EPSS Percentile is 0.44687

55. Remote Code Execution - Microsoft ODBC Driver for SQL Server (CVE-2023-36785) - High [404]

Description: Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Microsoft ODBC Driver for SQL Server
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.410EPSS Probability is 0.00113, EPSS Percentile is 0.44687

56. Remote Code Execution - Microsoft SQL OLE DB (CVE-2023-36417) - High [404]

Description: Microsoft SQL OLE DB Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Microsoft SQL OLE DB
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.410EPSS Probability is 0.00113, EPSS Percentile is 0.44687

57. Remote Code Execution - Microsoft WDAC ODBC Driver (CVE-2023-36598) - High [404]

Description: Microsoft WDAC ODBC Driver Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Microsoft WDAC ODBC Driver
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.410EPSS Probability is 0.00113, EPSS Percentile is 0.44687

58. Remote Code Execution - PrintHTML API (CVE-2023-36557) - High [404]

Description: PrintHTML API Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514PrintHTML API
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.410EPSS Probability is 0.00113, EPSS Percentile is 0.44687

59. Elevation of Privilege - Azure Network Watcher VM Agent (CVE-2023-36737) - High [401]

Description: Azure Network Watcher VM Agent Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists0.617The exploit's existence is mentioned in Microsoft CVSS Temporal Metrics (Functional Exploit)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Azure Network Watcher VM Agent
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.110EPSS Probability is 0.00048, EPSS Percentile is 0.14877

60. Elevation of Privilege - Windows IIS Server (CVE-2023-36434) - High [401]

Description: Windows IIS Server Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score1.010CVSS Base Score is 9.8. According to Microsoft data source
EPSS Percentile0.510EPSS Probability is 0.00143, EPSS Percentile is 0.50003

Tenable: CVE-2023-36434 | Windows IIS Server Elevation of Privilege Vulnerability

Tenable: CVE-2023-36434 is an EoP vulnerability in Windows IIS server that was assigned a CVSSv3 score of 9.8 and rated as important. According to Microsoft, exploitation of this vulnerability is achieved by an attacker brute forcing a user’s login credentials. Because the chances of success can vary greatly and are less likely when strong passwords are in place, Microsoft’s severity rating is important, despite the critical CVSS score.

ZDI: CVE-2023-36434 - Windows IIS Server Elevation of Privilege Vulnerability. Although labeled Important by Microsoft, it receives a CVSS 9.8 rating. An attacker who successfully exploits this bug could log on to an affected IIS server as another user. Microsoft doesn’t rate this as Critical since it would require a brute-force attack, but these days, brute force attacks can be easily automated. If you’re running IIS, you should treat this as a critical update and patch quickly.

TheHackersNews: The security update further resolves a severe privilege escalation bug in Windows IIS Server (CVE-2023-36434, CVSS score: 9.8) that could permit an attacker to impersonate and login as another user via a brute-force attack.

61. Security Feature Bypass - Chromium (CVE-2023-4900) - High [401]

Description: Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to obfuscate a permission prompt via a crafted HTML page. (Chromium security severity: Medium)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.410CVSS Base Score is 4.3. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00124, EPSS Percentile is 0.46665

MS PT Extended: CVE-2023-4900 was published before October 2023 Patch Tuesday from 2023-09-13 to 2023-10-09

62. Security Feature Bypass - Chromium (CVE-2023-4904) - High [401]

Description: Insufficient policy enforcement in Downloads in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to bypass Enterprise policy restrictions via a crafted download. (Chromium security severity: Medium)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.410CVSS Base Score is 4.3. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00124, EPSS Percentile is 0.46541

MS PT Extended: CVE-2023-4904 was published before October 2023 Patch Tuesday from 2023-09-13 to 2023-10-09

63. Security Feature Bypass - Chromium (CVE-2023-4906) - High [401]

Description: Insufficient policy enforcement in Autofill in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Low)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.410CVSS Base Score is 4.3. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00124, EPSS Percentile is 0.46541

MS PT Extended: CVE-2023-4906 was published before October 2023 Patch Tuesday from 2023-09-13 to 2023-10-09

64. Security Feature Bypass - Chromium (CVE-2023-4907) - High [401]

Description: Inappropriate implementation in Intents in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.410CVSS Base Score is 4.3. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00124, EPSS Percentile is 0.46665

MS PT Extended: CVE-2023-4907 was published before October 2023 Patch Tuesday from 2023-09-13 to 2023-10-09

65. Security Feature Bypass - Chromium (CVE-2023-4909) - High [401]

Description: Inappropriate implementation in Interstitials in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.410CVSS Base Score is 4.3. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00124, EPSS Percentile is 0.46665

MS PT Extended: CVE-2023-4909 was published before October 2023 Patch Tuesday from 2023-09-13 to 2023-10-09

Medium (57)

66. Denial of Service - Active Template Library (CVE-2023-36585) - Medium [389]

Description: Active Template Library Denial of Service Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814Active Template Library
CVSS Base Score0.810CVSS Base Score is 7.5. According to Microsoft data source
EPSS Percentile0.310EPSS Probability is 0.00069, EPSS Percentile is 0.28801

67. Denial of Service - Windows Mixed Reality Developer Tools (CVE-2023-36720) - Medium [389]

Description: Windows Mixed Reality Developer Tools Denial of Service Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810CVSS Base Score is 7.5. According to Microsoft data source
EPSS Percentile0.310EPSS Probability is 0.00069, EPSS Percentile is 0.28801

68. Elevation of Privilege - Microsoft Edge (CVE-2023-36735) - Medium [389]

Description: Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.814Web browser
CVSS Base Score1.010CVSS Base Score is 9.6. According to Microsoft data source
EPSS Percentile0.410EPSS Probability is 0.00106, EPSS Percentile is 0.42805

MS PT Extended: CVE-2023-36735 was published before October 2023 Patch Tuesday from 2023-09-13 to 2023-10-09

69. Memory Corruption - Chromium (CVE-2023-5187) - Medium [383]

Description: Use after free in Extensions in Google Chrome prior to 117.0.5938.132 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00066, EPSS Percentile is 0.27836

MS PT Extended: CVE-2023-5187 was published before October 2023 Patch Tuesday from 2023-09-13 to 2023-10-09

70. Memory Corruption - Chromium (CVE-2023-5346) - Medium [383]

Description: Type confusion in V8 in Google Chrome prior to 117.0.5938.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00082, EPSS Percentile is 0.34262

MS PT Extended: CVE-2023-5346 was published before October 2023 Patch Tuesday from 2023-09-13 to 2023-10-09

71. Remote Code Execution - Microsoft Virtual Trusted Platform Module (CVE-2023-36718) - Medium [380]

Description: Microsoft Virtual Trusted Platform Module Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Microsoft Virtual Trusted Platform Module
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.210EPSS Probability is 0.00051, EPSS Percentile is 0.17914

Qualys: CVE-2023-36718: Microsoft Virtual Trusted Platform Module Remote Code Execution Vulnerability The Trusted Platform Module (TPM) technology is designed to provide hardware-based, security-related functions. A TPM chip is a secure crypto processor that is intended to carry out cryptographic operations. An attacker must perform complex memory-shaping techniques to attempt an attack. To escape the virtual machine, the attacker must be authenticated as a guest mode user. Successful exploitation of the vulnerability could lead to a contained execution environment escape.

Rapid7: The final constituent of this month’s dozen patched critical RCE vulnerabilities is rather more exotic: CVE-2023-36718 describes a vulnerability in the Microsoft Virtual Trusted Platform Module (vTPM), which is a TPM 2.0-compliant virtualized version of a hardware TPM offered as a feature of Azure confidential VMs. Successful exploitation could lead to a container escape. The attacker would first need to access the vulnerable VM, and the advisory notes that exploitation is possible when authenticated as a guest mode user. On the bright side, Microsoft evaluates attack complexity as High, since successful exploitation of this vulnerability would rely upon complex memory shaping techniques to attempt an attack.

72. Denial of Service - Windows Deployment Services (CVE-2023-36707) - Medium [377]

Description: Windows Deployment Services Denial of Service Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.710CVSS Base Score is 6.5. According to Microsoft data source
EPSS Percentile0.310EPSS Probability is 0.00069, EPSS Percentile is 0.28801

73. Security Feature Bypass - Windows Kernel (CVE-2023-36698) - Medium [370]

Description: Windows Kernel Security Feature Bypass Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.914Windows Kernel
CVSS Base Score0.410CVSS Base Score is 4.4. According to Microsoft data source
EPSS Percentile0.110EPSS Probability is 0.00048, EPSS Percentile is 0.14877

74. Information Disclosure - Remote Procedure Call (CVE-2023-36596) - Medium [369]

Description: Remote Procedure Call Information Disclosure Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.415Information Disclosure
Vulnerable Product is Common0.514Remote Procedure Call
CVSS Base Score0.810CVSS Base Score is 7.5. According to Microsoft data source
EPSS Percentile1.010EPSS Probability is 0.14124, EPSS Percentile is 0.95088

75. Information Disclosure - Windows TCP/IP (CVE-2023-36438) - Medium [364]

Description: Windows TCP/IP Information Disclosure Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.415Information Disclosure
Vulnerable Product is Common0.914Windows component
CVSS Base Score0.810CVSS Base Score is 7.5. According to Microsoft data source
EPSS Percentile0.410EPSS Probability is 0.00114, EPSS Percentile is 0.44793

76. Elevation of Privilege - Windows Kernel (CVE-2023-36712) - Medium [358]

Description: Windows Kernel Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.914Windows Kernel
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.210EPSS Probability is 0.0005, EPSS Percentile is 0.17163

77. Denial of Service - Windows Virtual Trusted Platform Module (CVE-2023-36717) - Medium [353]

Description: Windows Virtual Trusted Platform Module Denial of Service Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.710CVSS Base Score is 6.5. According to Microsoft data source
EPSS Percentile0.110EPSS Probability is 0.00048, EPSS Percentile is 0.14877

78. Information Disclosure - Windows Deployment Services (CVE-2023-36567) - Medium [347]

Description: Windows Deployment Services Information Disclosure Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.415Information Disclosure
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810CVSS Base Score is 7.5. According to Microsoft data source
EPSS Percentile0.410EPSS Probability is 0.00114, EPSS Percentile is 0.44793

79. Elevation of Privilege - Named Pipe File System (CVE-2023-36729) - Medium [346]

Description: Named Pipe File System Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.914Windows component
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.110EPSS Probability is 0.00048, EPSS Percentile is 0.14877

80. Elevation of Privilege - Windows Kernel (CVE-2023-36725) - Medium [346]

Description: Windows Kernel Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.914Windows Kernel
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.110EPSS Probability is 0.00048, EPSS Percentile is 0.14877

81. Elevation of Privilege - Windows Win32k (CVE-2023-36731) - Medium [346]

Description: Win32k Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.914Windows kernel-mode driver
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.110EPSS Probability is 0.00048, EPSS Percentile is 0.14838

Qualys: Other Microsoft Vulnerability Highlights CVE-2023-36780 is a remote code execution vulnerability in Skype for Business. The vulnerability exists in PowerShell when exposed through Microsoft Exchange or Skype. To exploit this vulnerability, an attacker must be granted an administrative role in the Skype for Business Control Panel. Successful exploitation of the vulnerability would allow an attacker to perform remote code execution on the Skype for Business Server backend. CVE-2023-36778 is a remote code execution vulnerability in Microsoft Exchange Server. An attacker must have LAN access and credentials for a valid Exchange user to exploit this vulnerability. An authenticated attacker who is on the same intranet as the Exchange server may perform remote code execution via a PowerShell remoting session. CVE-2023-36713 is an information disclosure vulnerability in the Windows Common Log File System Driver. Successful exploitation of the vulnerability would allow an attacker to read small portions of heap memory potentially. CVE-2023-36594 and CVE-2023-38159 are elevation of privilege vulnerabilities in the Microsoft Graphics Component. Successful exploitation of the vulnerability may allow an attacker to gain SYSTEM privileges. CVE-2023-36731, CVE-2023-36732, CVE-2023-36743, CVE-2023-36776, and CVE-2023-41772 are elevation of privilege vulnerabilities in Win32k. Successful exploitation of the vulnerability may allow an attacker to gain SYSTEM privileges.

82. Elevation of Privilege - Windows Win32k (CVE-2023-36732) - Medium [346]

Description: Win32k Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.914Windows kernel-mode driver
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.110EPSS Probability is 0.00048, EPSS Percentile is 0.14838

Qualys: Other Microsoft Vulnerability Highlights CVE-2023-36780 is a remote code execution vulnerability in Skype for Business. The vulnerability exists in PowerShell when exposed through Microsoft Exchange or Skype. To exploit this vulnerability, an attacker must be granted an administrative role in the Skype for Business Control Panel. Successful exploitation of the vulnerability would allow an attacker to perform remote code execution on the Skype for Business Server backend. CVE-2023-36778 is a remote code execution vulnerability in Microsoft Exchange Server. An attacker must have LAN access and credentials for a valid Exchange user to exploit this vulnerability. An authenticated attacker who is on the same intranet as the Exchange server may perform remote code execution via a PowerShell remoting session. CVE-2023-36713 is an information disclosure vulnerability in the Windows Common Log File System Driver. Successful exploitation of the vulnerability would allow an attacker to read small portions of heap memory potentially. CVE-2023-36594 and CVE-2023-38159 are elevation of privilege vulnerabilities in the Microsoft Graphics Component. Successful exploitation of the vulnerability may allow an attacker to gain SYSTEM privileges. CVE-2023-36731, CVE-2023-36732, CVE-2023-36743, CVE-2023-36776, and CVE-2023-41772 are elevation of privilege vulnerabilities in Win32k. Successful exploitation of the vulnerability may allow an attacker to gain SYSTEM privileges.

83. Elevation of Privilege - Windows Win32k (CVE-2023-36743) - Medium [346]

Description: Win32k Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.914Windows kernel-mode driver
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.110EPSS Probability is 0.00048, EPSS Percentile is 0.14877

Qualys: Other Microsoft Vulnerability Highlights CVE-2023-36780 is a remote code execution vulnerability in Skype for Business. The vulnerability exists in PowerShell when exposed through Microsoft Exchange or Skype. To exploit this vulnerability, an attacker must be granted an administrative role in the Skype for Business Control Panel. Successful exploitation of the vulnerability would allow an attacker to perform remote code execution on the Skype for Business Server backend. CVE-2023-36778 is a remote code execution vulnerability in Microsoft Exchange Server. An attacker must have LAN access and credentials for a valid Exchange user to exploit this vulnerability. An authenticated attacker who is on the same intranet as the Exchange server may perform remote code execution via a PowerShell remoting session. CVE-2023-36713 is an information disclosure vulnerability in the Windows Common Log File System Driver. Successful exploitation of the vulnerability would allow an attacker to read small portions of heap memory potentially. CVE-2023-36594 and CVE-2023-38159 are elevation of privilege vulnerabilities in the Microsoft Graphics Component. Successful exploitation of the vulnerability may allow an attacker to gain SYSTEM privileges. CVE-2023-36731, CVE-2023-36732, CVE-2023-36743, CVE-2023-36776, and CVE-2023-41772 are elevation of privilege vulnerabilities in Win32k. Successful exploitation of the vulnerability may allow an attacker to gain SYSTEM privileges.

84. Elevation of Privilege - Windows Win32k (CVE-2023-41772) - Medium [346]

Description: Win32k Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.914Windows kernel-mode driver
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.110EPSS Probability is 0.00048, EPSS Percentile is 0.14877

Qualys: Other Microsoft Vulnerability Highlights CVE-2023-36780 is a remote code execution vulnerability in Skype for Business. The vulnerability exists in PowerShell when exposed through Microsoft Exchange or Skype. To exploit this vulnerability, an attacker must be granted an administrative role in the Skype for Business Control Panel. Successful exploitation of the vulnerability would allow an attacker to perform remote code execution on the Skype for Business Server backend. CVE-2023-36778 is a remote code execution vulnerability in Microsoft Exchange Server. An attacker must have LAN access and credentials for a valid Exchange user to exploit this vulnerability. An authenticated attacker who is on the same intranet as the Exchange server may perform remote code execution via a PowerShell remoting session. CVE-2023-36713 is an information disclosure vulnerability in the Windows Common Log File System Driver. Successful exploitation of the vulnerability would allow an attacker to read small portions of heap memory potentially. CVE-2023-36594 and CVE-2023-38159 are elevation of privilege vulnerabilities in the Microsoft Graphics Component. Successful exploitation of the vulnerability may allow an attacker to gain SYSTEM privileges. CVE-2023-36731, CVE-2023-36732, CVE-2023-36743, CVE-2023-36776, and CVE-2023-41772 are elevation of privilege vulnerabilities in Win32k. Successful exploitation of the vulnerability may allow an attacker to gain SYSTEM privileges.

85. Elevation of Privilege - Microsoft Edge (CVE-2023-36562) - Medium [341]

Description: Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.814Web browser
CVSS Base Score0.710CVSS Base Score is 7.1. According to Microsoft data source
EPSS Percentile0.310EPSS Probability is 0.00063, EPSS Percentile is 0.2557

MS PT Extended: CVE-2023-36562 was published before October 2023 Patch Tuesday from 2023-09-13 to 2023-10-09

86. Elevation of Privilege - Microsoft Office (CVE-2023-36569) - Medium [341]

Description: Microsoft Office Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.814Microsoft Office is a suite of applications designed to help with productivity and completing common tasks on a computer
CVSS Base Score0.810CVSS Base Score is 8.4. According to Microsoft data source
EPSS Percentile0.210EPSS Probability is 0.00051, EPSS Percentile is 0.17627

Tenable: CVE-2023-36569 | Microsoft Office Elevation of Privilege Vulnerability

Tenable: CVE-2023-36569 is an EoP vulnerability in Microsoft Office assigned a CVSSv3 score of 8.4 and is rated as important. Successful exploitation of this vulnerability would provide an attacker with SYSTEM level privileges. Microsoft notes that this vulnerability is less likely to be exploited and that the preview pane is not an attack vector for exploiting this vulnerability.

Rapid7: Microsoft Office receives a patch for CVE-2023-36569, a local privilege escalation (LPE) vulnerability. Successful exploitation could lead to SYSTEM privileges, but Microsoft states that the Preview Pane is not a vector. The advisory doesn’t provide much more information; patches are available for Office 2019, 2021, and Apps for Enterprise. Office 2016 is not listed, which might signify that it isn’t vulnerable, or could mean that patches will be provided later.

87. Denial of Service - DHCP Server Service (CVE-2023-36703) - Medium [339]

Description: DHCP Server Service Denial of Service Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514DHCP Server Service
CVSS Base Score0.810CVSS Base Score is 7.5. According to Microsoft data source
EPSS Percentile0.310EPSS Probability is 0.00069, EPSS Percentile is 0.28801

88. Denial of Service - Microsoft AllJoyn API (CVE-2023-36709) - Medium [339]

Description: Microsoft AllJoyn API Denial of Service Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Microsoft AllJoyn API
CVSS Base Score0.810CVSS Base Score is 7.5. According to Microsoft data source
EPSS Percentile0.310EPSS Probability is 0.00069, EPSS Percentile is 0.28801

89. Denial of Service - Microsoft QUIC (CVE-2023-36435) - Medium [339]

Description: Microsoft QUIC Denial of Service Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Microsoft QUIC
CVSS Base Score0.810CVSS Base Score is 7.5. According to Microsoft data source
EPSS Percentile0.310EPSS Probability is 0.00069, EPSS Percentile is 0.28801

90. Denial of Service - Microsoft QUIC (CVE-2023-38171) - Medium [339]

Description: Microsoft QUIC Denial of Service Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Microsoft QUIC
CVSS Base Score0.810CVSS Base Score is 7.5. According to Microsoft data source
EPSS Percentile0.310EPSS Probability is 0.00069, EPSS Percentile is 0.28801

91. Elevation of Privilege - Azure HDInsight Apache Oozie Workflow Scheduler (CVE-2023-36419) - Medium [339]

Description: Azure HDInsight Apache Oozie Workflow Scheduler Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Azure HDInsight Apache Oozie Workflow Scheduler
CVSS Base Score0.910CVSS Base Score is 8.8. According to Microsoft data source
EPSS Percentile0.510EPSS Probability is 0.00143, EPSS Percentile is 0.50003

92. Information Disclosure - Windows Remote Desktop Gateway (RD Gateway) (CVE-2023-29348) - Medium [335]

Description: Windows Remote Desktop Gateway (RD Gateway) Information Disclosure Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.415Information Disclosure
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.710CVSS Base Score is 6.5. According to Microsoft data source
EPSS Percentile0.410EPSS Probability is 0.00114, EPSS Percentile is 0.44793

93. Elevation of Privilege - Windows Win32k (CVE-2023-36776) - Medium [334]

Description: Win32k Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.914Windows kernel-mode driver
CVSS Base Score0.710CVSS Base Score is 7.0. According to Microsoft data source
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.07968

Qualys: Other Microsoft Vulnerability Highlights CVE-2023-36780 is a remote code execution vulnerability in Skype for Business. The vulnerability exists in PowerShell when exposed through Microsoft Exchange or Skype. To exploit this vulnerability, an attacker must be granted an administrative role in the Skype for Business Control Panel. Successful exploitation of the vulnerability would allow an attacker to perform remote code execution on the Skype for Business Server backend. CVE-2023-36778 is a remote code execution vulnerability in Microsoft Exchange Server. An attacker must have LAN access and credentials for a valid Exchange user to exploit this vulnerability. An authenticated attacker who is on the same intranet as the Exchange server may perform remote code execution via a PowerShell remoting session. CVE-2023-36713 is an information disclosure vulnerability in the Windows Common Log File System Driver. Successful exploitation of the vulnerability would allow an attacker to read small portions of heap memory potentially. CVE-2023-36594 and CVE-2023-38159 are elevation of privilege vulnerabilities in the Microsoft Graphics Component. Successful exploitation of the vulnerability may allow an attacker to gain SYSTEM privileges. CVE-2023-36731, CVE-2023-36732, CVE-2023-36743, CVE-2023-36776, and CVE-2023-41772 are elevation of privilege vulnerabilities in Win32k. Successful exploitation of the vulnerability may allow an attacker to gain SYSTEM privileges.

94. Elevation of Privilege - Windows Client Server Run-time Subsystem (CSRSS) (CVE-2023-41766) - Medium [329]

Description: Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.814Client Server Runtime Subsystem, or csrss.exe, is a component of the Windows NT family of operating systems that provides the user mode side of the Win32 subsystem and is included in Windows NT 3.1 and later
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.110EPSS Probability is 0.00048, EPSS Percentile is 0.14877

95. Elevation of Privilege - Windows Graphics Component (CVE-2023-36594) - Medium [329]

Description: Windows Graphics Component Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.110EPSS Probability is 0.00048, EPSS Percentile is 0.14838

Qualys: Other Microsoft Vulnerability Highlights CVE-2023-36780 is a remote code execution vulnerability in Skype for Business. The vulnerability exists in PowerShell when exposed through Microsoft Exchange or Skype. To exploit this vulnerability, an attacker must be granted an administrative role in the Skype for Business Control Panel. Successful exploitation of the vulnerability would allow an attacker to perform remote code execution on the Skype for Business Server backend. CVE-2023-36778 is a remote code execution vulnerability in Microsoft Exchange Server. An attacker must have LAN access and credentials for a valid Exchange user to exploit this vulnerability. An authenticated attacker who is on the same intranet as the Exchange server may perform remote code execution via a PowerShell remoting session. CVE-2023-36713 is an information disclosure vulnerability in the Windows Common Log File System Driver. Successful exploitation of the vulnerability would allow an attacker to read small portions of heap memory potentially. CVE-2023-36594 and CVE-2023-38159 are elevation of privilege vulnerabilities in the Microsoft Graphics Component. Successful exploitation of the vulnerability may allow an attacker to gain SYSTEM privileges. CVE-2023-36731, CVE-2023-36732, CVE-2023-36743, CVE-2023-36776, and CVE-2023-41772 are elevation of privilege vulnerabilities in Win32k. Successful exploitation of the vulnerability may allow an attacker to gain SYSTEM privileges.

96. Elevation of Privilege - Windows Internet Key Exchange (IKE) Extension (CVE-2023-36726) - Medium [329]

Description: Windows Internet Key Exchange (IKE) Extension Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.110EPSS Probability is 0.00048, EPSS Percentile is 0.14877

97. Elevation of Privilege - Windows RDP Encoder Mirror Driver (CVE-2023-36790) - Medium [329]

Description: Windows RDP Encoder Mirror Driver Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.110EPSS Probability is 0.00048, EPSS Percentile is 0.14877

98. Elevation of Privilege - Windows Runtime C++ Template Library (CVE-2023-36711) - Medium [329]

Description: Windows Runtime C++ Template Library Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.110EPSS Probability is 0.00048, EPSS Percentile is 0.14877

99. Information Disclosure - Windows Deployment Services (CVE-2023-36706) - Medium [323]

Description: Windows Deployment Services Information Disclosure Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.415Information Disclosure
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.710CVSS Base Score is 6.5. According to Microsoft data source
EPSS Percentile0.310EPSS Probability is 0.00068, EPSS Percentile is 0.28663

100. Elevation of Privilege - Windows Error Reporting Service (CVE-2023-36721) - Medium [317]

Description: Windows Error Reporting Service Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.710CVSS Base Score is 7.0. According to Microsoft data source
EPSS Percentile0.110EPSS Probability is 0.00048, EPSS Percentile is 0.14877

101. Elevation of Privilege - Windows Graphics Component (CVE-2023-38159) - Medium [317]

Description: Windows Graphics Component Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.710CVSS Base Score is 7.0. According to Microsoft data source
EPSS Percentile0.110EPSS Probability is 0.00044, EPSS Percentile is 0.11252

Qualys: Other Microsoft Vulnerability Highlights CVE-2023-36780 is a remote code execution vulnerability in Skype for Business. The vulnerability exists in PowerShell when exposed through Microsoft Exchange or Skype. To exploit this vulnerability, an attacker must be granted an administrative role in the Skype for Business Control Panel. Successful exploitation of the vulnerability would allow an attacker to perform remote code execution on the Skype for Business Server backend. CVE-2023-36778 is a remote code execution vulnerability in Microsoft Exchange Server. An attacker must have LAN access and credentials for a valid Exchange user to exploit this vulnerability. An authenticated attacker who is on the same intranet as the Exchange server may perform remote code execution via a PowerShell remoting session. CVE-2023-36713 is an information disclosure vulnerability in the Windows Common Log File System Driver. Successful exploitation of the vulnerability would allow an attacker to read small portions of heap memory potentially. CVE-2023-36594 and CVE-2023-38159 are elevation of privilege vulnerabilities in the Microsoft Graphics Component. Successful exploitation of the vulnerability may allow an attacker to gain SYSTEM privileges. CVE-2023-36731, CVE-2023-36732, CVE-2023-36743, CVE-2023-36776, and CVE-2023-41772 are elevation of privilege vulnerabilities in Win32k. Successful exploitation of the vulnerability may allow an attacker to gain SYSTEM privileges.

102. Elevation of Privilege - Windows Named Pipe Filesystem (CVE-2023-36605) - Medium [317]

Description: Windows Named Pipe Filesystem Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.710CVSS Base Score is 7.4. According to Microsoft data source
EPSS Percentile0.110EPSS Probability is 0.00048, EPSS Percentile is 0.14877

103. Denial of Service - Microsoft Common Data Model SDK (CVE-2023-36566) - Medium [315]

Description: Microsoft Common Data Model SDK Denial of Service Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Microsoft Common Data Model SDK
CVSS Base Score0.710CVSS Base Score is 6.5. According to Microsoft data source
EPSS Percentile0.210EPSS Probability is 0.00057, EPSS Percentile is 0.21948

Qualys: CVE-2023-36566: Microsoft Common Data Model SDK Denial of Service Vulnerability Microsoft Common Data Model is built upon a rich, extensible metadata definition system that allows users to describe and share semantically enhanced data types and structured tags. The tool also helps capture valuable business insight, which can be integrated with heterogeneous data to deliver actionable intelligence. An authenticated attacker may trigger this vulnerability without any admin or other elevated privileges required.

104. Memory Corruption - Chromium (CVE-2023-1999) - Medium [311]

Description: Chromium: CVE-2023-1999 Use after free in libwebp. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.510CVSS Base Score is 5.3. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00046, EPSS Percentile is 0.14317

MS PT Extended: CVE-2023-1999 was published before October 2023 Patch Tuesday from 2023-09-13 to 2023-10-09

105. Spoofing - Chromium (CVE-2023-4901) - Medium [311]

Description: Inappropriate implementation in Prompts in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to potentially spoof security UI via a crafted HTML page. (Chromium security severity: Medium)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.415Spoofing
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.410CVSS Base Score is 4.3. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00124, EPSS Percentile is 0.46665

MS PT Extended: CVE-2023-4901 was published before October 2023 Patch Tuesday from 2023-09-13 to 2023-10-09

106. Spoofing - Chromium (CVE-2023-4902) - Medium [311]

Description: Inappropriate implementation in Input in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.415Spoofing
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.410CVSS Base Score is 4.3. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00124, EPSS Percentile is 0.46665

MS PT Extended: CVE-2023-4902 was published before October 2023 Patch Tuesday from 2023-09-13 to 2023-10-09

107. Spoofing - Chromium (CVE-2023-4903) - Medium [311]

Description: Inappropriate implementation in Custom Mobile Tabs in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.415Spoofing
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.410CVSS Base Score is 4.3. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00124, EPSS Percentile is 0.46665

MS PT Extended: CVE-2023-4903 was published before October 2023 Patch Tuesday from 2023-09-13 to 2023-10-09

108. Spoofing - Chromium (CVE-2023-4905) - Medium [311]

Description: Inappropriate implementation in Prompts in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.415Spoofing
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.410CVSS Base Score is 4.3. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00124, EPSS Percentile is 0.46665

MS PT Extended: CVE-2023-4905 was published before October 2023 Patch Tuesday from 2023-09-13 to 2023-10-09

109. Spoofing - Chromium (CVE-2023-4908) - Medium [311]

Description: Inappropriate implementation in Picture in Picture in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Low)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.415Spoofing
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.410CVSS Base Score is 4.3. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00124, EPSS Percentile is 0.46665

MS PT Extended: CVE-2023-4908 was published before October 2023 Patch Tuesday from 2023-09-13 to 2023-10-09

110. Spoofing - Microsoft Edge (CVE-2023-36727) - Medium [311]

Description: Microsoft Edge (Chromium-based) Spoofing Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.415Spoofing
Vulnerable Product is Common0.814Web browser
CVSS Base Score0.610CVSS Base Score is 6.1. According to Microsoft data source
EPSS Percentile0.310EPSS Probability is 0.00063, EPSS Percentile is 0.2557

MS PT Extended: CVE-2023-36727 was published before October 2023 Patch Tuesday from 2023-09-13 to 2023-10-09

111. Information Disclosure - Windows Kernel (CVE-2023-36576) - Medium [304]

Description: Windows Kernel Information Disclosure Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.415Information Disclosure
Vulnerable Product is Common0.914Windows Kernel
CVSS Base Score0.610CVSS Base Score is 5.5. According to Microsoft data source
EPSS Percentile0.110EPSS Probability is 0.00048, EPSS Percentile is 0.14877

112. Denial of Service - Microsoft SQL Server (CVE-2023-36728) - Medium [291]

Description: Microsoft SQL Server Denial of Service Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Microsoft SQL Server
CVSS Base Score0.610CVSS Base Score is 5.5. According to Microsoft data source
EPSS Percentile0.110EPSS Probability is 0.00048, EPSS Percentile is 0.14877

113. Elevation of Privilege - Azure DevOps Server (CVE-2023-36561) - Medium [291]

Description: Azure DevOps Server Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Azure DevOps Server
CVSS Base Score0.710CVSS Base Score is 7.3. According to Microsoft data source
EPSS Percentile0.310EPSS Probability is 0.00063, EPSS Percentile is 0.2557

114. Information Disclosure - Windows Common Log File System Driver (CVE-2023-36713) - Medium [288]

Description: Windows Common Log File System Driver Information Disclosure Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.415Information Disclosure
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.610CVSS Base Score is 5.5. According to Microsoft data source
EPSS Percentile0.110EPSS Probability is 0.00048, EPSS Percentile is 0.14877

Qualys: Other Microsoft Vulnerability Highlights CVE-2023-36780 is a remote code execution vulnerability in Skype for Business. The vulnerability exists in PowerShell when exposed through Microsoft Exchange or Skype. To exploit this vulnerability, an attacker must be granted an administrative role in the Skype for Business Control Panel. Successful exploitation of the vulnerability would allow an attacker to perform remote code execution on the Skype for Business Server backend. CVE-2023-36778 is a remote code execution vulnerability in Microsoft Exchange Server. An attacker must have LAN access and credentials for a valid Exchange user to exploit this vulnerability. An authenticated attacker who is on the same intranet as the Exchange server may perform remote code execution via a PowerShell remoting session. CVE-2023-36713 is an information disclosure vulnerability in the Windows Common Log File System Driver. Successful exploitation of the vulnerability would allow an attacker to read small portions of heap memory potentially. CVE-2023-36594 and CVE-2023-38159 are elevation of privilege vulnerabilities in the Microsoft Graphics Component. Successful exploitation of the vulnerability may allow an attacker to gain SYSTEM privileges. CVE-2023-36731, CVE-2023-36732, CVE-2023-36743, CVE-2023-36776, and CVE-2023-41772 are elevation of privilege vulnerabilities in Win32k. Successful exploitation of the vulnerability may allow an attacker to gain SYSTEM privileges.

115. Information Disclosure - Windows Power Management Service (CVE-2023-36724) - Medium [288]

Description: Windows Power Management Service Information Disclosure Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.415Information Disclosure
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.610CVSS Base Score is 5.5. According to Microsoft data source
EPSS Percentile0.110EPSS Probability is 0.00048, EPSS Percentile is 0.14877

116. Elevation of Privilege - Microsoft Office Graphics (CVE-2023-36565) - Medium [284]

Description: Microsoft Office Graphics Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.614Microsoft Office Graphics
CVSS Base Score0.710CVSS Base Score is 7.0. According to Microsoft data source
EPSS Percentile0.110EPSS Probability is 0.00048, EPSS Percentile is 0.14877

117. Elevation of Privilege - Microsoft Resilient File System (ReFS) (CVE-2023-36701) - Medium [279]

Description: Microsoft Resilient File System (ReFS) Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Microsoft Resilient File System (ReFS)
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.110EPSS Probability is 0.00048, EPSS Percentile is 0.14877

118. Information Disclosure - Microsoft Dynamics 365 (On-Premises) (CVE-2023-36429) - Medium [273]

Description: Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.415Information Disclosure
Vulnerable Product is Common0.514Microsoft Dynamics 365 (On-Premises)
CVSS Base Score0.710CVSS Base Score is 6.5. According to Microsoft data source
EPSS Percentile0.310EPSS Probability is 0.00069, EPSS Percentile is 0.28932

119. Information Disclosure - Microsoft Dynamics 365 (On-Premises) (CVE-2023-36433) - Medium [273]

Description: Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.415Information Disclosure
Vulnerable Product is Common0.514Microsoft Dynamics 365 (On-Premises)
CVSS Base Score0.710CVSS Base Score is 6.5. According to Microsoft data source
EPSS Percentile0.310EPSS Probability is 0.00068, EPSS Percentile is 0.28663

120. Elevation of Privilege - Microsoft Office Click-To-Run (CVE-2023-36568) - Medium [267]

Description: Microsoft Office Click-To-Run Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Microsoft Office Click-To-Run
CVSS Base Score0.710CVSS Base Score is 7.0. According to Microsoft data source
EPSS Percentile0.110EPSS Probability is 0.00048, EPSS Percentile is 0.14877

121. Cross Site Scripting - Microsoft Dynamics 365 (on-premises) (CVE-2023-36416) - Medium [261]

Description: Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.415Cross Site Scripting
Vulnerable Product is Common0.514Microsoft Dynamics 365 (on-premises)
CVSS Base Score0.610CVSS Base Score is 6.1. According to Microsoft data source
EPSS Percentile0.310EPSS Probability is 0.00063, EPSS Percentile is 0.2557

122. Information Disclosure - Active Directory Domain Services (CVE-2023-36722) - Medium [238]

Description: Active Directory Domain Services Information Disclosure Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Public Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.415Information Disclosure
Vulnerable Product is Common0.514Active Directory Domain Services
CVSS Base Score0.410CVSS Base Score is 4.4. According to Microsoft data source
EPSS Percentile0.310EPSS Probability is 0.00068, EPSS Percentile is 0.28663

Low (0)

Exploitation in the wild detected (4)

Denial of Service (1)

Memory Corruption (1)

Elevation of Privilege (1)

Information Disclosure (1)

Public exploit exists, but exploitation in the wild is NOT detected (1)

Elevation of Privilege (1)

Other Vulnerabilities (117)

Remote Code Execution (45)

Security Feature Bypass (8)

Memory Corruption (4)

Denial of Service (16)

Elevation of Privilege (26)

Information Disclosure (11)

Spoofing (6)

Cross Site Scripting (1)