High Threat Security Alert (A23-05-05): Multiple Vulnerabilities in Microsoft Products (May 2023)
10 May 2023
Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. The list of security updates can be found at: https://msrc.microsoft.com/update-guide/releaseNote/2023-May
Reports indicated that the vulnerabilities (CVE-2023-24932 and CVE-2023-29336) in Microsoft Windows and Server are being exploited in the wild and the technical details of another remote code execution vulnerability (CVE-2023-29325) in Microsoft Windows and Server were publicly disclosed. In addition, multiple remote code execution vulnerabilities (CVE-2023-24941 and CVE-2023-24943) are also at a high risk of exploitation. System administrators and users are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
Reports indicated that the security feature bypass vulnerability (CVE-2023-29324) affecting Windows MSHTML platform is being exploited in the wild. System administrators are advised to take immediate action to ensure the latest patches have been applied to your affected systems to mitigate the elevated risk of cyber attacks.
Microsoft Windows 10, 11
Microsoft Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016, 2019, 2022
Microsoft Office 2019, 2019 for Mac, LTSC 2021, LTSC for Mac 2021
Microsoft Office Online Server
Microsoft Excel 2013, 2013 RT, 2016
Microsoft Word 2013, 2013 RT, 2016
Microsoft 365 Apps for Enterprise
Microsoft SharePoint Enterprise Server 2016
Microsoft SharePoint Server 2019, Subscription Edition
Microsoft Remote Desktop
Visual Studio Code
AV1 Video Extension
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, denial of service, elevation of privilege, information disclosure, security feature bypass and spoofing.
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. System administrators and users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.