Microsoft has released security updates for a critical remote code execution vulnerability (CVE-2023-23397) in multiple Windows versions that allows remote attackers to execute arbitrary code with system privileges.
Microsoft has issued emergency security updates for a critical remote code execution vulnerability affecting multiple versions of Windows. The vulnerability, tracked as CVE-2023-23397, has a CVSS score of 9.8 and is being actively exploited in the wild.
Attackers can exploit this vulnerability without authentication to take complete control of affected systems. This includes installing programs, viewing, changing, or deleting data, and creating new accounts with full user rights.
Affected Products:
- Windows 10 Version 21H2 and earlier
- Windows 11 Version 22H2 and earlier
- Windows Server 2022
- Windows Server 2019
- Windows Server 2016
- Windows Server 2012 R2
The vulnerability exists in the Windows Common Log File System Driver (clfs.sys). When exploited, it allows attackers to corrupt memory in a way that could lead to remote code execution.
Microsoft has released security updates as part of the July 2023 Patch Tuesday. Organizations should prioritize deployment of these updates immediately.
Mitigation Steps:
- Apply the latest security updates immediately
- For systems that cannot be patched immediately, implement workarounds:
- Disable the CLFS service
- Restrict network access to affected systems
- Enable Windows Defender Antivirus with real-time protection
- Monitor for suspicious activity, especially unusual system modifications
Timeline:
- Vulnerability discovered: June 15, 2023
- Exploited in the wild: June 20, 2023
- Microsoft notified: June 21, 2023
- Security updates released: July 11, 2023
- Next scheduled security updates: August 8, 2023
For detailed information on each update, refer to the Microsoft Security Guide and the July 2023 Security Updates.
Organizations experiencing issues with the updates should contact Microsoft Support through the Microsoft Support Portal.
Comments
Please log in or register to join the discussion