iTnews Asia
  • Home
  • News
  • Security

Microsoft patches seven critical bugs

Microsoft patches seven critical bugs

And one bug under exploitation.

By Richard Chirgwin on Apr 12, 2023 11:44AM

Microsoft's monthly Patch Tuesday carries seven critical vulnerabilities and one zero-day already being exploited.

The bug already exploited, CVE-2023-28252, is an escalation of privilege in the Windows common log file system driver, and has a CVSS score of 7.4, according to Microsoft’s advisory.

The US Cybersecurity and Infrastructure Security Agency (CISA) has added this bug to its Known Exploited Vulnerability Catalog.

Microsoft credits discovery of the bug to Genwei Jiang of Mandiant and Quan Jin of DBAPPSecurity WeBin Lab.

Elsewhere, CVE-2023-21554 is a critical (CVSS 9.8) remote code execution (RCE) Microsoft message queuing.

Microsoft said an attacker could send “a specially crafted malicious MSMQ packet to a MSMQ server” to execute code on the server.

It was discovered by Wayne Low of Fortinet's FortiGuard Lab and Haifei Li of Check Point Research.

CVE-2023-28231 is a critical RCE in Microsoft’s DHCP server service, only available to an authenticated attacker, who could send a crafted RPC call to the service; and is credited to YanZiShuang@BigCJTeam.

Microsoft’s Layer 2 Tunneling Protocol has two critical RCEs, CVE-2023-28219 and CVE-2023-28220.

Both vulnerabilities are exploited by sending “a specially crafted connection request to a RAS server”, which grants RCE if the attacker wins the resulting race condition. They are attributed to Yuki Chen of Cyber KunLun.

CVE-2023-28291, an arbitrary code execution bug in Microsoft’s raw image extension, requires the attacker to be logged into a system, and to convince the victim to open a malicous file. Successful exploitation gives the attacker RCE capabilities.

In addition, CVE-2023-28250 is an RCE in Windows pragmatic general multicast. 

This vulnerability requires the Windows message queuing service to be enabled. This allows an attacker to send a crafted file to achieve RCE and trigger malicious code on the target system.

Admins can check if message queuing is running and TCP port 1801 is listening, and if so, the bug can be mitigated by disabling the service.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
microsoft patch tuesday security

Related Articles

  • Proofpoint CEO: A tool-based approach for cybersecurity is impractical
  • Akamai: AI-security is both a security imperative and an economic necessity
  • The real-life Tom & Jerry chase
  • How can we bolster our resilience against AI-enabled e-mail attacks?
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Proofpoint CEO: A tool-based approach for cybersecurity is impractical

Proofpoint CEO: A tool-based approach for cybersecurity is impractical

How can we bolster our resilience against AI-enabled e-mail attacks?

How can we bolster our resilience against AI-enabled e-mail attacks?

Akamai: AI-security is both a security imperative and an economic necessity

Akamai: AI-security is both a security imperative and an economic necessity

The real-life Tom & Jerry chase

The real-life Tom & Jerry chase

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.