iTnews Asia
  • Home
  • News
  • Security

Microsoft patches seven critical bugs

Microsoft patches seven critical bugs

And one bug under exploitation.

By Richard Chirgwin on Apr 12, 2023 11:44AM

Microsoft's monthly Patch Tuesday carries seven critical vulnerabilities and one zero-day already being exploited.

The bug already exploited, CVE-2023-28252, is an escalation of privilege in the Windows common log file system driver, and has a CVSS score of 7.4, according to Microsoft’s advisory.

The US Cybersecurity and Infrastructure Security Agency (CISA) has added this bug to its Known Exploited Vulnerability Catalog.

Microsoft credits discovery of the bug to Genwei Jiang of Mandiant and Quan Jin of DBAPPSecurity WeBin Lab.

Elsewhere, CVE-2023-21554 is a critical (CVSS 9.8) remote code execution (RCE) Microsoft message queuing.

Microsoft said an attacker could send “a specially crafted malicious MSMQ packet to a MSMQ server” to execute code on the server.

It was discovered by Wayne Low of Fortinet's FortiGuard Lab and Haifei Li of Check Point Research.

CVE-2023-28231 is a critical RCE in Microsoft’s DHCP server service, only available to an authenticated attacker, who could send a crafted RPC call to the service; and is credited to YanZiShuang@BigCJTeam.

Microsoft’s Layer 2 Tunneling Protocol has two critical RCEs, CVE-2023-28219 and CVE-2023-28220.

Both vulnerabilities are exploited by sending “a specially crafted connection request to a RAS server”, which grants RCE if the attacker wins the resulting race condition. They are attributed to Yuki Chen of Cyber KunLun.

CVE-2023-28291, an arbitrary code execution bug in Microsoft’s raw image extension, requires the attacker to be logged into a system, and to convince the victim to open a malicous file. Successful exploitation gives the attacker RCE capabilities.

In addition, CVE-2023-28250 is an RCE in Windows pragmatic general multicast. 

This vulnerability requires the Windows message queuing service to be enabled. This allows an attacker to send a crafted file to achieve RCE and trigger malicious code on the target system.

Admins can check if message queuing is running and TCP port 1801 is listening, and if so, the bug can be mitigated by disabling the service.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
microsoft patch tuesday security

Related Articles

  • Your organisation’s physical security can be a gateway for cybercriminals
  • The best way to outsmart your threat actors is to think like one
  • How cybercriminals are exploiting LLMs to harm your business
  • Is identity now the next parameter of cybersecurity breaches?
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

The best way to outsmart your threat actors is to think like one

The best way to outsmart your threat actors is to think like one

What are the most pressing cyber security concerns going into 2025?

What are the most pressing cyber security concerns going into 2025?

Philippines Maxicare, Jollibee Foods Corporation hit by data breach

Philippines Maxicare, Jollibee Foods Corporation hit by data breach

How cybercriminals are exploiting LLMs to harm your business

How cybercriminals are exploiting LLMs to harm your business

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.