National Cyber Warfare Foundation (NCWF) Forums


Patch Tuesday - September 2023


0 user ratings
2023-09-12 23:06:06
milo
Red Team (CNA)

 - archive -- 
A relatively light month. Word NTLM hash disclosure. Streaming Service Proxy elevation to SYSTEM. Internet Connection Sharing critical RCE.

Patch Tuesday - September 2023

Microsoft is addressing 65 vulnerabilities this September Patch Tuesday, including two zero-day vulnerabilities, as well as four critical remote code execution (RCE) vulnerabilities, and six republished third-party vulnerabilities.

Word: zero-day NTLM hash disclosure

Microsoft Word receives a patch for CVE-2023-36761, which is marked as exploited in the wild as well as publicly disclosed; successful exploitation results in disclosure of NTLM hashes, which could provide an attacker with the means to “Pass the Hash” and authenticate remotely without any need to brute force the hash. Microsoft is clearly concerned about the potential impact of CVE-2023-36761, since they are providing patches not only for current versions of Word, but also for Word 2013, which reached its Extended End Date back in April 2023. In March, Microsoft patched CVE-2023-23397, a vulnerability in Outlook which also led to NTLM hash leaks, and which received significant attention at the time.

Streaming Service Proxy: zero-day elevation to SYSTEM

The second second zero-day vulnerability patched this month is CVE-2023-36802, an elevation of privilege vulnerability in Microsoft Streaming Service Proxy, which could grant SYSTEM privileges via exploitation of a kernel driver. Microsoft has detected in-the-wild exploitation, but is not aware of publicly available exploit code. This is a debut Patch Tuesday appearance for Microsoft Streaming Service, but with several researchers from across the globe acknowledged on the advisory, it’s unlikely to be the last. Today’s confirmation of in-the-wild exploitation prior to publication all but guarantees that this will remain an area of interest.

Internet Connection Sharing: same-network critical RCE

CVE-2023-38148 describes a critical remote code execution (RCE) in the Windows Internet Connection Sharing (ICS) functionality. Although the advisory is light on detail, it’s likely that successful exploitation would lead to arbitrary code execution on the ICS host at SYSTEM level. The silver lining is that the attack cannot be carried out from another network, so attackers must first establish an adjacent foothold.

Visual Studio & .NET: critical RCE via malicious package file

This month’s three other critical RCE vulnerabilities have quite a lot in common: CVE-2023-36792, CVE-2023-36793, and CVE-2023-36796 all rely on the user opening a malicious package file, and are thus classed as arbitrary code execution rather than no-interaction RCE. In each case, patches are available for a long list of Visual Studio and .NET installations. Organizations with large developer headcount are likely to be disproportionately at risk.

Exchange (as usual):  RCE

Microsoft is patching five vulnerabilities in Exchange this month. Although Microsoft doesn’t rate any of these higher than “Important” under their proprietary severity rating system, three of the five are RCE vulnerabilities with CVSSv3 base score of 8.0. CVE-2023-36744 CVE-2023-36745, and CVE-2023-36756 would surely receive higher severity if not for several mitigating factors. Successful exploitation requires that the attacker must be present on the same LAN as the Exchange server, and must already possess valid credentials for an Exchange user. Additionally, Microsoft notes that the August 2023 patches already protect against these newly published vulnerabilities, further underscoring the value of timely patching.

SharePoint: elevation to admin

SharePoint receives a patch for CVE-2023-36764, which allows an attacker to achieve administrator privileges via a specially-crafted ASP.NET page. As is often the case with SharePoint vulnerabilities, a level of access is already required, but Site Member privileges are typically widely granted.

Azure DevOps Server: elevation of privilege & RCE

Azure DevOps Server receives two fixes this month. While CVE-2023-38155 requires that an attacker carry out significant recon and preparation of the environment, successful exploitation would lead to administrator privileges. Potentially of greater concern is CVE-2023-33136, which allows an attacker with Queue Build permissions to abuse an overridable input variable to achieve RCE. While most DevOps Server installations are hopefully managed by people both willing and able to apply prompt upgrades, CI/CD environments are prime targets for supply chain attacks.

They do it with Mira

A vulnerability in the Windows implementation of wireless display standard Miracast allows for an unauthenticated user to project to a vulnerable system. Although CVE-2023-38147 requires that an attacker be in close physical proximity to the target, consider that wireless display technology is often used in high-traffic environments such as conventions, which could allow an opportunistic attacker to inflict reputational damage. While exploitation requires that the target asset is configured to allow "Projecting to this PC" and marked as "Available Everywhere" – and Microsoft points out that this is not the default configuration – most administrators will know from long experience that many users will simply select whichever options cause them the least friction.

Summary Charts

Patch Tuesday - September 2023
A relatively light month, albeit with some seldom-seen components like Streaming Service and Internet Connection Sharing.
Patch Tuesday - September 2023
Still holding the #1 spot: Remote Code Excution.
Patch Tuesday - September 2023
The typical cluster around 8.0.
Patch Tuesday - September 2023
3D Builder: not as innocent as it looks.

Summary Table

Apps vulnerabilities






































































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-367603D Viewer Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-367403D Viewer Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-367393D Viewer Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-367733D Builder Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-367723D Builder Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-367713D Builder Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-367703D Builder Remote Code Execution VulnerabilityNoNo7.8
CVE-2022-41303AutoDesk: CVE-2022-41303 use-after-free vulnerability in Autodesk® FBX® SDK 2020 or priorNoNoN/A

Azure vulnerabilities



































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-29332Microsoft Azure Kubernetes Service Elevation of Privilege VulnerabilityNoNo7.5
CVE-2023-38156Azure HDInsight Apache Ambari Elevation of Privilege VulnerabilityNoNo7.2
CVE-2023-36736Microsoft Identity Linux Broker Remote Code Execution VulnerabilityNoNo4.4

Azure Developer Tools vulnerabilities




























CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-33136Azure DevOps Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-38155Azure DevOps Server Remote Code Execution VulnerabilityNoNo7

Browser vulnerabilities

















































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-4863Chromium: CVE-2023-4863 Heap buffer overflow in WebPNoNoN/A
CVE-2023-4764Chromium: CVE-2023-4764 Incorrect security UI in BFCacheNoNoN/A
CVE-2023-4763Chromium: CVE-2023-4763 Use after free in NetworksNoNoN/A
CVE-2023-4762Chromium: CVE-2023-4762 Type Confusion in V8NoNoN/A
CVE-2023-4761Chromium: CVE-2023-4761 Out of bounds memory access in FedCMNoNoN/A

Developer Tools vulnerabilities




















































































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-36796Visual Studio Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-36793Visual Studio Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-36792Visual Studio Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-36794Visual Studio Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-36758Visual Studio Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-36742Visual Studio Code Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-36788.NET Framework Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-36759Visual Studio Elevation of Privilege VulnerabilityNoNo6.7
CVE-2023-36799.NET Core and Visual Studio Denial of Service VulnerabilityNoNo6.5
CVE-2023-39956Electron: CVE-2023-39956 -Visual Studio Code Remote Code Execution VulnerabilityNoNoN/A

Exchange Server vulnerabilities

















































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-36757Microsoft Exchange Server Spoofing VulnerabilityNoNo8
CVE-2023-36756Microsoft Exchange Server Remote Code Execution VulnerabilityNoNo8
CVE-2023-36745Microsoft Exchange Server Remote Code Execution VulnerabilityNoNo8
CVE-2023-36744Microsoft Exchange Server Remote Code Execution VulnerabilityNoNo8
CVE-2023-36777Microsoft Exchange Server Information Disclosure VulnerabilityNoNo5.7

Microsoft Dynamics vulnerabilities



































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-36886Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityNoNo7.6
CVE-2023-38164Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityNoNo7.6
CVE-2023-36800Dynamics Finance and Operations Cross-site Scripting VulnerabilityNoNo7.6

Microsoft Office vulnerabilities






































































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-36764Microsoft SharePoint Server Elevation of Privilege VulnerabilityNoNo8.8
CVE-2023-36765Microsoft Office Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-36766Microsoft Excel Information Disclosure VulnerabilityNoNo7.8
CVE-2023-36763Microsoft Outlook Information Disclosure VulnerabilityNoNo7.5
CVE-2023-36762Microsoft Word Remote Code Execution VulnerabilityNoNo7.3
CVE-2023-36761Microsoft Word Information Disclosure VulnerabilityYesYes6.2
CVE-2023-41764Microsoft Office Spoofing VulnerabilityNoNo5.5
CVE-2023-36767Microsoft Office Security Feature Bypass VulnerabilityNoNo4.3

System Center vulnerabilities





















CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-38163Windows Defender Attack Surface Reduction Security Feature BypassNoNo7.8

Windows vulnerabilities




















































































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-38146Windows Themes Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-38147Windows Miracast Wireless Display Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-38148Internet Connection Sharing (ICS) Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-38150Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-35355Windows Cloud Files Mini Filter Driver Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-36802Microsoft Streaming Service Proxy Elevation of Privilege VulnerabilityYesNo7.8
CVE-2023-38162DHCP Server Service Denial of Service VulnerabilityNoNo7.5
CVE-2023-36805Windows MSHTML Platform Security Feature Bypass VulnerabilityNoNo7
CVE-2023-38140Windows Kernel Information Disclosure VulnerabilityNoNo5.5
CVE-2023-36803Windows Kernel Information Disclosure VulnerabilityNoNo5.5

Windows ESU vulnerabilities



























































































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-38142Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-38141Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-38139Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-38161Windows GDI Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-36804Windows GDI Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-38144Windows Common Log File System Driver Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-38143Windows Common Log File System Driver Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-38149Windows TCP/IP Denial of Service VulnerabilityNoNo7.5
CVE-2023-38160Windows TCP/IP Information Disclosure VulnerabilityNoNo5.5
CVE-2023-38152DHCP Server Service Information Disclosure VulnerabilityNoNo5.3
CVE-2023-36801DHCP Server Service Information Disclosure VulnerabilityNoNo5.3



Source: Rapid7
Source Link: https://blog.rapid7.com/2023/09/12/patch-tuesday-september-2023/


Comments
new comment
Nobody has commented yet. Will you be the first?
 
Forum
Red Team (CNA)



Copyright 2012 through 2024 - National Cyber Warfare Foundation - All rights reserved worldwide.