Microsoft sends security admins their first gift for 2023

By

First Patch Tuesday of 2023 covers 98 vulnerabilities.

Microsoft has kicked off its Patch Tuesday cycle for 2023 with 98 patches; 11 of these are critical, and Microsoft is aware of an exploit for one.

Microsoft sends security admins their first gift for 2023

The exploited zero-day is CVE-2023-21674, a Windows Advanced Local Procedure Call (ALPC) escalation of privilege.

According to The SANS Institute’s analysis, CVE-2023-21674 is a sandbox escape that gives the attacker SYSTEM-level privileges.

CVE-2023-21549 is an escalation of privilege that was previously disclosed.

According to Microsoft, a malicious script that execute an RPC call to an RPC host could give the attacker elevated privileges on the server.

CVE-2023-21561 is also a privilege escalation bug, this time in Microsoft Cryptographic Services.

“A locally authenticated attacker could send specially crafted data to the local CSRSS service to elevate their privileges from AppContainer to SYSTEM,” Microsoft’s advisory stated. 

Microsoft has also disclosed five critical vulnerabilities in its Layer 2 Tunneling Protocol (L2TP): CVE-2023-21546, CVE-2023-21543, CVE-2023-21555, CVE-2023-21556, and CVE-2023-21679.

All of these vulnerabilities expose a Windows RAS server to remote code execution by sending the target a crafted packet.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

Palo Alto Networks in talks to buy CyberArk

Palo Alto Networks in talks to buy CyberArk

Gov to encourage vuln research, puts insurers and NFPs on notice

Gov to encourage vuln research, puts insurers and NFPs on notice

"Scattered Spider" evolves with new ransomware and social engineering tactics

"Scattered Spider" evolves with new ransomware and social engineering tactics

Nvidia says its chips have no 'backdoors'

Nvidia says its chips have no 'backdoors'

Log In

  |  Forgot your password?