High Threat Security Alert (A23-08-07): Multiple Vulnerabilities in Microsoft Products (August 2023)
10 August 2023
Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. The list of security updates can be found at: https://msrc.microsoft.com/update-guide/releaseNote/2023-Aug
Further to our High Threat Security Alert (A23-07-07), Microsoft has released security updates to stop the attack chain that leads to the remote code execution vulnerability (CVE-2023-36884) in Windows Search. In addition, reports indicated that the denial of service vulnerability (CVE-2023-38180) in Microsoft .NET and Visual Studio is being exploited in the wild, and multiple remote code execution vulnerabilities (CVE-2023-29328, CVE-2023-29330, CVE-2023-35385, CVE-2023-36895, CVE-2023-36910 and CVE-2023-36911) are also at a high risk of exploitation. System administrators and users are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
Microsoft Windows 10, 11
Microsoft Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016, 2019, 2022
Microsoft Exchange Server 2016, 2019
Microsoft Office 2013, 2013 RT, 2016, 2019, 2019 for Mac, LTSC 2021, LTSC for Mac 2021
Microsoft Office Online Server
Microsoft Excel 2013, 2013 RT, 2016
Microsoft Word 2013, 2013 RT, 2016
Microsoft PowerPoint 2013, 2013 RT, 2016
Microsoft Project 2013, 2016
Microsoft Publisher 2013, 2016
Microsoft Outlook 2013, 2013 RT, 2016
Microsoft SharePoint Enterprise Server 2016
Microsoft SharePoint Server 2019, Subscription Edition
Microsoft Teams for Android, for Desktop, for Mac, for iOS
Microsoft Visio 2013, 2016
Microsoft 365 Apps for Enterprise
Microsoft Dynamics 365 (on-premises) version 9.0, version 9.1
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, denial of service, elevation of privilege, information disclosure, security feature bypass and spoofing.
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. System administrators and users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.