Microsoft sends security admins their first gift for 2023

By

First Patch Tuesday of 2023 covers 98 vulnerabilities.

Microsoft has kicked off its Patch Tuesday cycle for 2023 with 98 patches; 11 of these are critical, and Microsoft is aware of an exploit for one.

Microsoft sends security admins their first gift for 2023

The exploited zero-day is CVE-2023-21674, a Windows Advanced Local Procedure Call (ALPC) escalation of privilege.

According to The SANS Institute’s analysis, CVE-2023-21674 is a sandbox escape that gives the attacker SYSTEM-level privileges.

CVE-2023-21549 is an escalation of privilege that was previously disclosed.

According to Microsoft, a malicious script that execute an RPC call to an RPC host could give the attacker elevated privileges on the server.

CVE-2023-21561 is also a privilege escalation bug, this time in Microsoft Cryptographic Services.

“A locally authenticated attacker could send specially crafted data to the local CSRSS service to elevate their privileges from AppContainer to SYSTEM,” Microsoft’s advisory stated. 

Microsoft has also disclosed five critical vulnerabilities in its Layer 2 Tunneling Protocol (L2TP): CVE-2023-21546, CVE-2023-21543, CVE-2023-21555, CVE-2023-21556, and CVE-2023-21679.

All of these vulnerabilities expose a Windows RAS server to remote code execution by sending the target a crafted packet.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

NSW Police to embark on $126m IT overhaul

NSW Police to embark on $126m IT overhaul

CBA looks to GenAI to assist 1200 'security champions'

CBA looks to GenAI to assist 1200 'security champions'

Australia's super funds told to assess authentication controls

Australia's super funds told to assess authentication controls

WestJet probes cyber security incident

WestJet probes cyber security incident

Log In

  |  Forgot your password?