National Cyber Warfare Foundation (NCWF) Forums


Patch Tuesday - November 2023


0 user ratings
2023-11-14 21:27:11
milo
Red Team (CNA)

 - archive -- 
Zero day vulns in SmartScreen, DWM, Cloud Files mini driver, Office Protected View, ASP.NET. Overall fewer patches than usual. cURL patch.

Patch Tuesday - November 2023

Microsoft is addressing 64 vulnerabilities this November Patch Tuesday, including five zero-day vulnerabilities as well as one critical remote code execution (RCE) vulnerability. Overall, this month sees significantly fewer vulnerabilities addressed across a smaller number of products than has been typical of Patch Tuesday over the past year or two. Browser vulnerabilities account for 20 of the 64 vulnerabilities patched, and 14 of those are republished third-party vulnerabilities in Chromium.

Three vulnerabilities patched today are already present on the CISA Known Exploited Vulnerabilities (KEV) list: CVE-2023-36025, CVE-2023-36033, and CVE-2023-36036.

Windows SmartScreen: zero-day bypass

CVE-2023-36025 describes a Windows SmartScreen security feature bypass. An attacker who convinces a user to open a specially crafted malicious Internet Shortcut file could bypass the anti-phishing and anti-malware protection provided by Windows SmartScreen. This could be abused as an early stage in a more complex attack chain.

Windows DWM: zero-day EoP

Originally introduced in Windows Vista, the Windows Dynamic Window Manager (DWM) enables many of the modern UI features which users have come to expect from a Windows OS. This month, the DWM Core Library receives a patch for CVE-2023-36033, an elevation of privilege (EoP) vulnerability which Microsoft notes is both publicly disclosed and exploited in the wild. Exploitation leads to SYSTEM privileges, but Microsoft does not provide any further guidance on the attack mechanism.

Windows Cloud Files mini driver: zero-day EoP

Microsoft is patching CVE-2023-36036, an EoP vulnerability in the Windows Cloud Files Mini Filter Driver. No details of the attack mechanism are provided in the advisory, but exploitation leads to SYSTEM privileges.

Office Protected View: zero-day bypass

CVE-2023-36413 describes a publicly disclosed Microsoft Office security feature bypass. A user who opens a specially crafted malicious file would find themselves in Editing mode, rather than Protected View, and would thus lose out on warning banners and other defenses designed to detect and quarantine malicious code in Office documents.

ASP.NET Core: zero-day DoS

CVE-2023-36038 describes an ASP.NET Core denial of service (DoS) attack, which affects only .NET 8 RC 1 running on the IIS InProcess hosting model. The mechanism of the attack is resource exhaustion on the web server via cancellation of requests; this sounds very similar to last month’s CVE-2023-44487, dubbed “Rapid Reset”. However, there’s no mention of HTTP/2 in the advisory for CVE-2023-36038.

Advisory pages not listing patches

Curiously, at time of writing, the advisory web pages for most of these vulnerabilities do not list any patches, although backend data sources do list individual KBs (e.g., KB5031356) which include a patch (e.g. CVE-2023-36033). This appears to be an issue with the advisory web page, rather than the patches themselves.

Fewer critical vulns this month

Only three vulnerabilities patched this month qualify as Critical under Microsoft’s proprietary severity ranking scale: one each in Windows Pragmatic General Multicast (PGM), the Azure CLI, and Windows HMAC Key Derivation.

Windows PGM: critical RCE via MSMQ

CVE-2023-36397 describes an RCE vulnerability in Windows PGM. As with other similar previous vulnerabilities, an attacker can send a specially-crafted file over the network to attempt malicious code execution on the target asset. Only systems where Windows Message Queueing Service (MSMQ) is enabled are exploitable, and it isn’t added to a default Windows installation. However, as Rapid7 has noted previously, administrators should be aware that a number of applications — including Microsoft Exchange — quietly introduce MSMQ as part of their own installation routine.

Hyper-V: critical VM escape

Attackers looking to escape from a low privilege Hyper-V guest OS and execute code as SYSTEM on the Hyper-V host system will take note of CVE-2023-36400. Successful exploitation requires running a specially crafted application in the context of the guest OS to exploit a weakness in Windows HMAC Key Derivation, so some prior access is required.

Azure CLI: critical credential leak via log files

The Azure CLI tool prior to version 2.53.1 does not sufficiently redact information published to log files in certain contexts, allowing recovery of plaintext(!) usernames and passwords. The advisory for CVE-2023-36052 notes that log files stored in open-source repositories are a potential avenue for credential leaks in this context. Although Microsoft understandably hasn’t provided any specific examples, it’s unlikely that they would mention this if they weren’t aware of one or more real world examples.

Exchange: RCE, spoofing, and ZDI disclosures

Patch Tuesday typically sees at least one Exchange remote code execution vulnerability fixed, and this month is no exception. Exploitation of CVE-2023-36439 requires that the attacker have valid credentials for an Exchange user, and be present on the local network, but grants execution as NT AUTHORITY\SYSTEM on Exchange server host; this is a built-in account with extensive privileges, including the ability to act as the computer on the network.

A trio of Exchange server spoofing vulnerabilities — CVE-2023-36035 CVE-2023-36039 and CVE-2023-36050 — are also patched today. Successful exploitation requires that an attacker be present on the local network with valid Exchange credentials, but can lead to exposure of credentials or an NTLM hash for other users. Two of these vulnerabilities are exploited via PowerShell remoting.

Somewhat conspicuous by their absence: four flaws in Exchange published by Trend Micro’s Zero Day Initiative (ZDI) on 2023-11-02 do not appear to have received patches today. Microsoft had previously told ZDI that these vulnerabilities did not require immediate servicing. Since Microsoft is the CVE Numbering Authority (CNA) for its own products, there are no publicly available CVE numbers for these vulnerabilities yet.

cURL: patch for much-anticipated vuln

Microsoft admins who have been waiting for a patch for last month’s cURL SOCKS5 vulnerability CVE-2023-38545 will be pleased to see that Microsoft has included curl.exe 8.4.0 as part of the November updates for current versions of Windows. Many observers ultimately concluded that this vulnerability was perhaps of more limited scope and attacker value than the pre-publication buzz may have suggested, but a patch is always appreciated.

Is it 23H2 already?

A new arrival: Windows 11 23H2 was released on 2023-10-31 across all editions, and receives its first patches today.

Summary Charts

Patch Tuesday - November 2023
All those Edge vulns make the Exchange bar look smaller.
Patch Tuesday - November 2023
A big month for Elevation of Privilege!
Patch Tuesday - November 2023
Very few Critical vulns this month, but more Moderate than we often see.
Patch Tuesday - November 2023
A cluster of Microsoft Dynamics spoofing and XSS vulns.

Summary Tables

Azure vulnerabilities










































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-38151Microsoft Host Integration Server 2020 Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-36437Azure DevOps Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-36052Azure CLI REST Command Information Disclosure VulnerabilityNoNo8.6
CVE-2023-36021Microsoft On-Prem Data Gateway Security Feature Bypass VulnerabilityNoNo8

Browser vulnerabilities


























































































































































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-36034Microsoft Edge (Chromium-based) Remote Code Execution VulnerabilityNoNo7.3
CVE-2023-36014Microsoft Edge (Chromium-based) Remote Code Execution VulnerabilityNoNo7.3
CVE-2023-36024Microsoft Edge (Chromium-based) Elevation of Privilege VulnerabilityNoNo7.1
CVE-2023-36027Microsoft Edge (Chromium-based) Elevation of Privilege VulnerabilityNoNo7.1
CVE-2023-36022Microsoft Edge (Chromium-based) Remote Code Execution VulnerabilityNoNo6.6
CVE-2023-36029Microsoft Edge (Chromium-based) Spoofing VulnerabilityNoNo4.3
CVE-2023-5996Chromium: CVE-2023-5996 Use after free in WebAudioNoNoN/A
CVE-2023-5859Chromium: CVE-2023-5859 Incorrect security UI in Picture In PictureNoNoN/A
CVE-2023-5858Chromium: CVE-2023-5858 Inappropriate implementation in WebApp ProviderNoNoN/A
CVE-2023-5857Chromium: CVE-2023-5857 Inappropriate implementation in DownloadsNoNoN/A
CVE-2023-5856Chromium: CVE-2023-5856 Use after free in Side PanelNoNoN/A
CVE-2023-5855Chromium: CVE-2023-5855 Use after free in Reading ModeNoNoN/A
CVE-2023-5854Chromium: CVE-2023-5854 Use after free in ProfilesNoNoN/A
CVE-2023-5853Chromium: CVE-2023-5853 Incorrect security UI in DownloadsNoNoN/A
CVE-2023-5852Chromium: CVE-2023-5852 Use after free in PrintingNoNoN/A
CVE-2023-5851Chromium: CVE-2023-5851 Inappropriate implementation in DownloadsNoNoN/A
CVE-2023-5850Chromium: CVE-2023-5850 Incorrect security UI in DownloadsNoNoN/A
CVE-2023-5849Chromium: CVE-2023-5849 Integer overflow in USBNoNoN/A
CVE-2023-5482Chromium: CVE-2023-5482 Insufficient data validation in USBNoNoN/A
CVE-2023-5480Chromium: CVE-2023-5480 Inappropriate implementation in PaymentsNoNoN/A

Developer Tools vulnerabilities
























































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-36560ASP.NET Security Feature Bypass VulnerabilityNoNo8.8
CVE-2023-36038ASP.NET Core Denial of Service VulnerabilityNoYes8.2
CVE-2023-36018Visual Studio Code Jupyter Extension Spoofing VulnerabilityNoNo7.8
CVE-2023-36049.NET, .NET Framework, and Visual Studio Elevation of Privilege VulnerabilityNoNo7.6
CVE-2023-36042Visual Studio Denial of Service VulnerabilityNoNo6.2
CVE-2023-36558ASP.NET Core - Security Feature Bypass VulnerabilityNoNo6.2

ESU Windows vulnerabilities





































































































































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-36397Windows Pragmatic General Multicast (PGM) Remote Code Execution VulnerabilityNoNo9.8
CVE-2023-36025Windows SmartScreen Security Feature Bypass VulnerabilityYesNo8.8
CVE-2023-36017Windows Scripting Engine Memory Corruption VulnerabilityNoNo8.8
CVE-2023-36402Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-36719Microsoft Speech Application Programming Interface (SAPI) Elevation of Privilege VulnerabilityNoNo8.4
CVE-2023-36425Windows Distributed File System (DFS) Remote Code Execution VulnerabilityNoNo8
CVE-2023-36393Windows User Interface Application Core Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-36705Windows Installer Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-36424Windows Common Log File System Driver Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-36036Windows Cloud Files Mini Filter Driver Elevation of Privilege VulnerabilityYesNo7.8
CVE-2023-36395Windows Deployment Services Denial of Service VulnerabilityNoNo7.5
CVE-2023-36392DHCP Server Service Denial of Service VulnerabilityNoNo7.5
CVE-2023-36423Microsoft Remote Registry Service Remote Code Execution VulnerabilityNoNo7.2
CVE-2023-36401Microsoft Remote Registry Service Remote Code Execution VulnerabilityNoNo7.2
CVE-2023-36403Windows Kernel Elevation of Privilege VulnerabilityNoNo7
CVE-2023-36398Windows NTFS Information Disclosure VulnerabilityNoNo6.5
CVE-2023-36428Microsoft Local Security Authority Subsystem Service Information Disclosure VulnerabilityNoNo5.5

Exchange Server vulnerabilities










































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-36050Microsoft Exchange Server Spoofing VulnerabilityNoNo8
CVE-2023-36039Microsoft Exchange Server Spoofing VulnerabilityNoNo8
CVE-2023-36035Microsoft Exchange Server Spoofing VulnerabilityNoNo8
CVE-2023-36439Microsoft Exchange Server Remote Code Execution VulnerabilityNoNo8

Microsoft Dynamics vulnerabilities

















































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-36007Microsoft Send Customer Voice survey from Dynamics 365 Spoofing VulnerabilityNoNo7.6
CVE-2023-36410Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityNoNo7.6
CVE-2023-36031Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityNoNo7.6
CVE-2023-36016Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityNoNo6.2
CVE-2023-36030Microsoft Dynamics 365 Sales Spoofing VulnerabilityNoNo6.1

Microsoft Office vulnerabilities

















































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-36045Microsoft Office Graphics Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-36037Microsoft Excel Security Feature Bypass VulnerabilityNoNo7.8
CVE-2023-36041Microsoft Excel Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-36413Microsoft Office Security Feature Bypass VulnerabilityNoYes6.5
CVE-2023-38177Microsoft SharePoint Server Remote Code Execution VulnerabilityNoNo6.1

System Center vulnerabilities




























CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-36422Microsoft Windows Defender Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-36043Open Management Infrastructure Information Disclosure VulnerabilityNoNo6.5

Windows vulnerabilities























































































































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-36028Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution VulnerabilityNoNo9.8
CVE-2023-36400Windows HMAC Key Derivation Elevation of Privilege VulnerabilityNoNo8.8
CVE-2023-36408Windows Hyper-V Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-36407Windows Hyper-V Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-36033Windows DWM Core Library Elevation of Privilege VulnerabilityYesYes7.8
CVE-2023-36396Windows Compressed Folder Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-36047Windows Authentication Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-36399Windows Storage Elevation of Privilege VulnerabilityNoNo7.1
CVE-2023-36046Windows Authentication Denial of Service VulnerabilityNoNo7.1
CVE-2023-36394Windows Search Service Elevation of Privilege VulnerabilityNoNo7
CVE-2023-36405Windows Kernel Elevation of Privilege VulnerabilityNoNo7
CVE-2023-36427Windows Hyper-V Elevation of Privilege VulnerabilityNoNo7
CVE-2023-36404Windows Kernel Information Disclosure VulnerabilityNoNo5.5
CVE-2023-36406Windows Hyper-V Information Disclosure VulnerabilityNoNo5.5
CVE-2023-24023Mitre: CVE-2023-24023 Bluetooth VulnerabilityNoNoN/A



Source: Rapid7
Source Link: https://blog.rapid7.com/2023/11/14/patch-tuesday-november-2023/


Comments
new comment
Nobody has commented yet. Will you be the first?
 
Forum
Red Team (CNA)



Copyright 2012 through 2024 - National Cyber Warfare Foundation - All rights reserved worldwide.