Microsoft September Patches Fix 59 Flaws, Including Two Zero-days

Microsoft has released software updates as part of its September Patch Tuesday. The software updates fix 59 security vulnerabilities in total, and it includes two zero-day vulnerabilities that are actively exploited.

The breakdown of the vulnerabilities are as follows:

  • 3 security feature bypass

  • 24 remote code execution

  • 9 information disclosure

  • 3 denial of service

  • 5 spoofing

  • 5 Edge - Chromium

The two actively exploited zero-day vulnerabilities are as follows:

  • CVE-2023-36802 - vulnerability in Microsoft Streaming Service Proxy that can allow an attacker to elevate privileges to SYSTEM

  • CVE-2023-36761 - vulnerability in Word that allows an attacker to steal NTLM hashes, which in turn can allow an attacker to gain access to the account

Why Should You Care?

Vulnerabilities already being exploited in the wild means attackers are already attacking victims using that vulnerability, and it is only a matter of time they start attacking YOUR organization and infrastructure. It is crucial to take action ASAP to mitigate the vulnerability or at the very least reduce impact.

What Should You Do?

  • Test the patches ASAP at your organization, and make sure it does not break any business applications

  • Prioritize patching against the two zero-days

    • If the patches cannot be deployed quickly, then reduce usage of Microsoft Streaming Proxy, and Word until patches can be deployed

  • Roll out the rest of the Patch Tuesday updates

References

  • https://www.bleepingcomputer.com/news/microsoft/microsoft-september-2023-patch-tuesday-fixes-2-zero-days-59-flaws/

Previous
Previous

Weekly Roundup - Sept 17, 2023

Next
Next

Weekly Roundup - Sept 10, 2023