And, as you know, it’s the second Tuesday of the month, which means that Windows users are looking towards the tech giant in hopes that some of the flaws they’ve been struggling with will finally get fixed. We have already taken the liberty of providing the direct download links for the cumulative updates released today for Windows 7, 8.1, 10, and 11, but now it’s time to talk CVEs again. For April, Microsoft released 97 new patches, which is still more than some people were expecting for the third month of 2023. These software updates address CVEs in:

Windows and Windows components Office and Office Components Windows Defender SharePoint Server Windows Hyper-V PostScript Printer Microsoft Dynamic

You probably want to know more on the matter, so let’s dive right into it and see what all the fuss is about this month.

Almost 100 security fixes for the Windows OS in April 2023

Let’s just say that March was far from being a busy month for Microsoft, and still, they managed to release a total of 97 updates. Even though some might see this as a high number, Microsoft released a total of 128 security patches in April of 2022, so this number is actually lower. Please keep in mind that, out of all the patches released today, seven are rated Critical and 90 are rated Important in severity. Even though this high volume does seem to be in line with past years, the number of remote code execution (RCE) bugs makes up nearly half the release. Experts say it is a bit peculiar to see that many RCE fixes in a single month. Keep in mind that none of the bugs disclosed over Teams during Pwn2Own Vancouver are being addressed by Microsoft this month. Furthermore, one of the new CVEs is listed as under active attack at the time of release. Let’s take a closer look at some of the more interesting updates for this month. Let’s look at CVE-2023-2825 for one second. This is the one bug under active attack this month, and you might know it because there was a similar 0-day patched in the same component just two months ago. Apparently, the original fix was insufficient and attackers have found a method to bypass that fix. There is still no information about how widespread these attacks may be. Please note that this type of exploit is typically paired with a code execution bug to spread malware or ransomware. SPONSORED On the other hand, CVE-2023-21554 receives Microsoft’s highest exploitability rating. This one allows a remote, unauthenticated attacker to run their code with elevated privileges on affected servers with the Message Queuing service enabled. Know that this service is disabled by default but is commonly used by many contact center applications, as it listens to TCP port 1801 by default, so blocking this at the perimeter would prevent external attacks. CVE-2013-3900 is a 10-year-old patch being reissued. You might find this one a bit familiar, and it’s because it was used by a threat actor in the recent 3CX attacks. Back in the day, this was an opt-in fix, meaning admins had to opt in to get this fix. With this revision, add fixes for additional platforms and adds further recommendations for enterprises. Looking at the remaining Critical-rated patches, there’s another dangerous bug in Pragmatic General Multicast (PGM) that’s similar to the MSMQ bug already discussed. That being said, this bug is listed as not exploitable as the Messaging Queue vulnerability. There’s also a bug in the DHCP server, but it may not be as severe as it initially seems. In fact, it requires a network-adjacent attacker to send an affected DHCP server a specially crafted RPC call. DHCP is not a routable protocol (or a secure one), so external threat actors can’t take advantage of this vulnerability. Moving on, there are a couple of Critical-rated bugs in the Layer 2 Tunneling Protocol and the Point-to-Point Tunneling Protocol. There have been plenty of similar bugs that received fixes over the last few months, but none have ever been reported as being exploited in the wild. This final Critical-rated bug impacts the Raw Image Extension, and viewing a specially-crafted file could actually lead to code execution. Let’s also mention the three cross-site scripting (XSS) bugs in Dynamics 365, which break the streak of five XSS bugs in Dynamics seen in the last two months. Feel free to check each individual CVE and find out more about what it means, how it manifests, and what scenarios can malicious third parties use to exploit them. Have you found any other issues after installing this month’s security updates? Share your experience with us in the comments section below.

Name * Email * Commenting as . Not you? Save information for future comments
Comment

Δ

The 2023 April Patch Tuesday comes with fixes for 97 CVEs - 15The 2023 April Patch Tuesday comes with fixes for 97 CVEs - 61The 2023 April Patch Tuesday comes with fixes for 97 CVEs - 98The 2023 April Patch Tuesday comes with fixes for 97 CVEs - 76