Microsoft has released security updates for a critical vulnerability affecting multiple Windows versions that could allow remote code execution.
Microsoft has issued an urgent security advisory for CVE-2023-41889, a critical vulnerability affecting multiple Windows operating systems. The vulnerability could allow an attacker to execute arbitrary code on a compromised system with no user interaction required.
CVSS 9.8 severity. Exploitation is likely. Immediate action required.
Affected products include:
- Windows 10 (version 21H2 and later)
- Windows 11 (all versions)
- Windows Server 2022
- Windows Server 2019
- Windows Server 2016
The vulnerability exists in the Windows Graphics Component. A specially crafted image file processed by the affected component could lead to memory corruption. Attackers could leverage this vulnerability to take complete control of an affected system.
Microsoft has addressed the issue in the Security Update Guide released today. Organizations should prioritize deployment of these updates across their infrastructure.
Technical details: The vulnerability stems from improper handling of image files in the Windows Imaging Component. When processing malformed image files, the component fails to validate input parameters correctly, leading to out-of-bounds read and write operations. This memory corruption could be exploited to execute arbitrary code.
Attack vectors include:
- Malicious websites hosting crafted images
- Email attachments containing compromised images
- Network shares with image files
- Office documents embedding malicious images
Mitigation steps:
- Apply the latest security updates immediately
- Block potentially malicious image files at network boundaries
- Implement application control policies to restrict execution of untrusted applications
- Enable Windows Defender Antivirus with real-time protection
- Configure Windows Defender Application Control to block unsigned applications
Timeline:
- Vulnerability discovered: October 2023
- Patch released: November 2023
- Exploitation observed: Not yet in the wild
For detailed information on the specific updates, refer to the Microsoft Security Update Guide.
Organizations unable to immediately patch should implement the following temporary workarounds:
- Block the .WMT, .WMZ, and .JPEG file extensions at network boundaries
- Disable the Windows Imaging Component via Group Policy
- Implement application control policies to block untrusted applications from executing
This vulnerability follows a pattern of critical flaws in Windows components that have been exploited in recent months. Security researchers emphasize the importance of prompt patching given the potential for widespread exploitation. The vulnerability's CVSS score of 9.8 indicates a critical risk that should be addressed immediately.
Comments
Please log in or register to join the discussion