Multiple critical vulnerabilities require immediate patching across Microsoft products. CVSS scores range from 7.8 to 9.8. Update deployment recommended within 72 hours.
Critical Microsoft Security Updates: Immediate Action Required
Microsoft has released critical security updates addressing multiple vulnerabilities affecting Windows, Office, and Exchange Server. Organizations must prioritize patch deployment immediately to prevent exploitation.
Affected Products and Vulnerabilities
Windows Operating System
CVE-2023-23397: CVSS 9.8 - Windows Support Diagnostic Tool Remote Code Execution
- Affected: Windows 10, Windows 11, Windows Server 2008-2022
- Exploitation: Remote code execution with system privileges
- Timeline: Public disclosure occurred January 10, 2023
CVE-2023-23398: CVSS 8.1 - Windows Common Log File System Driver Elevation of Privilege
- Affected: Windows 10, Windows 11, Windows Server
- Exploitation: Local privilege escalation
- Timeline: Public disclosure occurred January 10, 2023
Microsoft Office Suite
- CVE-2023-21716: CVSS 7.8 - Office Remote Code Execution Vulnerability
- Affected: Microsoft Office 2019, 2021, Microsoft 365 Apps
- Exploitation: Remote code execution via crafted document
- Timeline: Public disclosure occurred January 10, 2023
Exchange Server
- CVE-2023-23397: CVSS 9.8 - Exchange Server Remote Code Execution
- Affected: Exchange Server 2013-2019, Exchange Online
- Exploitation: Remote code execution with system privileges
- Timeline: Public disclosure occurred January 10, 2023
Update Deployment Process
Windows Updates
- Open Windows Update settings (Settings → Update & Security → Windows Update)
- Click "Check for updates"
- Install all critical and security updates
- Restart when prompted
For enterprise environments:
- Use Windows Server Update Services (WSUS)
- Deploy updates via Microsoft Endpoint Configuration Manager
Microsoft Office Updates
- Open any Office application
- Go to File → Account → Update Options
- Select "Update Now"
- Follow prompts to complete installation
For enterprise deployments:
- Use Microsoft 365 admin center
- Deploy via Microsoft Endpoint Manager
Exchange Server Updates
- Download updates from Microsoft Update Catalog
- Follow Exchange Server Update Deployment Guide
- Apply updates during maintenance window
- Verify functionality post-update
Mitigation Steps
For systems unable to receive immediate updates:
Windows Workarounds
- Disable the Windows Support Diagnostic Tool via Group Policy
- Implement Attack Surface Reduction Rules
- Enable Controlled Folder Access
Office Workarounds
- Block macros from internet sources
- Enable Protected View
- Configure File Block settings
Exchange Server Workarounds
- Restrict access to Exchange admin center
- Implement Transport Rules
- Configure anti-phishing policies
Timeline and Prioritization
Immediate Action (0-24 hours)
- Deploy patches for Windows systems with public internet exposure
- Apply Exchange Server updates for internet-facing servers
- Enable mitigations for systems unable to patch immediately
Short-term (24-72 hours)
- Deploy Office patches across organization
- Complete Windows update deployment for internal systems
- Verify all patches applied successfully
Long-term (72+ hours)
- Conduct vulnerability scans to confirm complete remediation
- Review update deployment process for future improvements
- Schedule regular patch management procedures
Resources
- Microsoft Security Response Center (MSRC)
- Microsoft Security Advisories
- Windows Security Updates
- Microsoft Security Blog
Organizations experiencing issues with these updates should contact Microsoft Support or engage their Microsoft account team for assistance.
Comments
Please log in or register to join the discussion