Microsoft has addressed a critical remote code execution vulnerability affecting multiple products including Windows, Office, and Azure. CVSS score 9.8. Patches available now.
Critical Microsoft Vulnerability CVE-2023-23852 Requires Immediate Action
Microsoft has released security updates for a critical remote code execution vulnerability affecting multiple products. Attackers could exploit this vulnerability to take complete control of affected systems without authentication.
What's Affected
The vulnerability impacts:
- Windows 10 (Version 1903 and later)
- Windows 11 (All versions)
- Microsoft Office 2019 and 2021
- Microsoft 365 Apps
- Azure DevOps Server
- Azure SQL Database
Severity Assessment
- CVE ID: CVE-2023-23852
- CVSS Score: 9.8 (Critical)
- Attack Vector: Network
- Privileges Required: None
- User Interaction: None
- Scope: Changed
Technical Details
The vulnerability exists in the way Microsoft Windows handles objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.
Exploitation could allow an attacker to install programs, view, change, or delete data, or create new accounts with full user rights.
Mitigation Steps
Microsoft has released security updates to address this vulnerability. Organizations should apply these patches immediately:
- Install the latest security updates for affected Microsoft products
- For systems unable to receive immediate updates, implement workarounds as specified in Microsoft Security Advisory
- Deploy network segmentation to limit potential lateral movement
- Enable Windows Defender Antivirus with up-to-date definitions
Timeline
- Vulnerability Discovered: June 2023
- Patch Release: July 11, 2023 (Patch Tuesday)
- Exploitation Detected: Limited targeted attacks observed
- Next Review: August 2023
Additional Resources
Organizations should prioritize patching systems exposed to the internet. This vulnerability presents a significant risk due to its potential for remote exploitation without requiring user authentication.
Comments
Please log in or register to join the discussion