iTnews Asia
  • Home
  • News
  • Security

Microsoft patches three exploited zero-days

Microsoft patches three exploited zero-days

Patch Tuesday covers a total of 77 vulnerabilities.

By Richard Chirgwin on Feb 15, 2023 11:57AM

Microsoft has patched 77 vulnerabilities in its monthly cycle, including three zero-days rated high severity and that are being exploited.

CVE-2023-21823 is an RCE bug in Windows graphics component that gives an attacker SYSTEM privileges.

Customers are told fixes will ship through the Windows Store if the user has automatic updates enabled; if not, they will have to install the patch manually.

CVE-2023-21715 is a local exploit that would allow an authenticated attacker to bypass Office macro policies that block malicious files.

Meanwhile, CVE-2023-23376 is a local elevation of privilege bug in the Windows common log filesystem driver.

Five patches cover vulnerabilities with CVSS 3.0 scores above 9.

CVE-2023-21808 is a critical-rated vulnerability that allows RCE attacks against Microsoft Word, via a malicious RTF file.

Microsoft said attack vectors include the preview pane.

“An unauthenticated attacker could send a malicious e-mail containing an RTF payload that would allow them to gain access to execute commands within the application used to open the malicious file," it said.

CVE-2023-21803 is an RCE in the Windows iSCSI discovery service. 

“An attacker could exploit the vulnerability by sending a specially crafted malicious DHCP discovery request to the iSCSI Discovery Service on 32-bit machines," Microsoft said.

"An attacker who successfully exploited the vulnerability could then gain the ability to execute code on the target system."

There are also three vulnerabilities in the Windows Protected Extensible Authentication Protocol (PEAP) with CVSS scores of 9.8.

Two of them, CVE-2023-21692 and CVE-2023-21690, provide an attack vector to PEAP servers by sending crafted PEAP packets over the network; while CVE-2023-21689 lets the attacker “target the server accounts in an arbitrary or remote code execution and attempt to trigger malicious code in the context of the server's account through a network call.”

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
microsoft patch tuesday rce remote code execution security software

Related Articles

  • Your organisation’s physical security can be a gateway for cybercriminals
  • The best way to outsmart your threat actors is to think like one
  • How cybercriminals are exploiting LLMs to harm your business
  • Is identity now the next parameter of cybersecurity breaches?
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Your organisation’s physical security can be a gateway for cybercriminals

Your organisation’s physical security can be a gateway for cybercriminals

The best way to outsmart your threat actors is to think like one

The best way to outsmart your threat actors is to think like one

Malaysia's Maxis Berhad investigates claims on alleged data breach

Malaysia's Maxis Berhad investigates claims on alleged data breach

Malaysia's Perkeso ramps up security measures after cyber attack

Malaysia's Perkeso ramps up security measures after cyber attack

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.