iTnews Asia
  • Home
  • News
  • Security

Microsoft patches seven critical bugs

Microsoft patches seven critical bugs

And one bug under exploitation.

By Richard Chirgwin on Apr 12, 2023 11:44AM

Microsoft's monthly Patch Tuesday carries seven critical vulnerabilities and one zero-day already being exploited.

The bug already exploited, CVE-2023-28252, is an escalation of privilege in the Windows common log file system driver, and has a CVSS score of 7.4, according to Microsoft’s advisory.

The US Cybersecurity and Infrastructure Security Agency (CISA) has added this bug to its Known Exploited Vulnerability Catalog.

Microsoft credits discovery of the bug to Genwei Jiang of Mandiant and Quan Jin of DBAPPSecurity WeBin Lab.

Elsewhere, CVE-2023-21554 is a critical (CVSS 9.8) remote code execution (RCE) Microsoft message queuing.

Microsoft said an attacker could send “a specially crafted malicious MSMQ packet to a MSMQ server” to execute code on the server.

It was discovered by Wayne Low of Fortinet's FortiGuard Lab and Haifei Li of Check Point Research.

CVE-2023-28231 is a critical RCE in Microsoft’s DHCP server service, only available to an authenticated attacker, who could send a crafted RPC call to the service; and is credited to YanZiShuang@BigCJTeam.

Microsoft’s Layer 2 Tunneling Protocol has two critical RCEs, CVE-2023-28219 and CVE-2023-28220.

Both vulnerabilities are exploited by sending “a specially crafted connection request to a RAS server”, which grants RCE if the attacker wins the resulting race condition. They are attributed to Yuki Chen of Cyber KunLun.

CVE-2023-28291, an arbitrary code execution bug in Microsoft’s raw image extension, requires the attacker to be logged into a system, and to convince the victim to open a malicous file. Successful exploitation gives the attacker RCE capabilities.

In addition, CVE-2023-28250 is an RCE in Windows pragmatic general multicast. 

This vulnerability requires the Windows message queuing service to be enabled. This allows an attacker to send a crafted file to achieve RCE and trigger malicious code on the target system.

Admins can check if message queuing is running and TCP port 1801 is listening, and if so, the bug can be mitigated by disabling the service.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
microsoft patch tuesday security

Related Articles

  • Ransomware gang Qilin claims attack on Japan’s Asahi breweries
  • IMDA and Enterprise Singapore launch SME-focused cybersecurity initiative
  • Cyberthreats are now targeting critical infrastructure on a larger scale
  • Gemini vulnerabilities threaten potential exposure of user data
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

PhilHealth estimates 13 to 20 million members affected by data breach

PhilHealth estimates 13 to 20 million members affected by data breach

IMDA and Enterprise Singapore launch SME-focused cybersecurity initiative

IMDA and Enterprise Singapore launch SME-focused cybersecurity initiative

Indonesia's national data centre suffers ransomware attack

Indonesia's national data centre suffers ransomware attack

Ransomware gang Qilin claims attack on Japan’s Asahi breweries

Ransomware gang Qilin claims attack on Japan’s Asahi breweries

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.