Microsoft Monthly Security Update (February 2023)
RISK: Extremely High Risk
TYPE: Operating Systems - Windows OS
[Updated on 2023-03-07]
Proof of Concept exploit code is publicly available for CVE-2023-21716, affecting Microsoft Word. The vulnerability could be exploited by previewing a malicious RTF document and execute arbitrary code after memory corruption.
Microsoft has released monthly security update for their products:
Vulnerable Product | Risk Level | Impacts | Notes |
SQL Server | Medium Risk | Remote Code Execution Spoofing | |
Windows | Extremely High Risk | Remote Code Execution Elevation of Privilege Denial of Service Information Disclosure | Exploit in the wild |
Extended Security Updates (ESU) | Extremely High Risk | Remote Code Execution Elevation of Privilege Denial of Service Information Disclosure | Exploit in the wild |
Azure | Medium Risk | Elevation of Privilege Information Disclosure Remote Code Execution Spoofing | |
Microsoft Dynamics | Medium Risk | Remote Code Execution Spoofing | |
Browser | Medium Risk | Spoofing Data Manipulation Remote Code Execution | |
Exchange Server | Medium Risk | Remote Code Execution | |
Microsoft Office | Extremely High Risk | Spoofing Remote Code Execution Elevation of Privilege Information Disclosure Security Restriction Bypass | Exploit in the wild
Proof of Concept exploit code Is publicly available for CVE-2023-21716 |
Developer Tools | Medium Risk | Elevation of Privilege Denial of Service Remote Code Execution | |
Apps | Medium Risk | Remote Code Execution | |
System Center | Medium Risk | Elevation of Privilege Security Restriction Bypass | |
Device | Medium Risk | Information Disclosure |
Number of 'Extremely High Risk' product(s): 3
Number of 'High Risk' product(s): 0
Number of 'Medium Risk' product(s): 9
Number of 'Low Risk' product(s): 0
Evaluation of overall 'Risk Level': Extremely High Risk
Impact
- Denial of Service
- Remote Code Execution
- Spoofing
- Elevation of Privilege
- Information Disclosure
- Data Manipulation
- Security Restriction Bypass
System / Technologies affected
- SQL Server
- Windows
- Extended Security Updates (ESU)
- Azure
- Microsoft Dynamics
- Browser
- Exchange Server
- Microsoft Office
- Developer Tools
- Apps
- System Center
- Device
Solutions
Before installation of the software, please visit the vendor web-site for more details.
- Apply fixes issued by the vendor.
Vulnerability Identifier
Source
Related Link
Related Tags
Share with