TRY NOW
Patch Tuesday

Microsoft Patch Tuesday – June 2023

7 min. read
13/06/2023
By Esben Dochy
Microsoft-Patch-Tuesday-May-2022

Patch Tuesday is once again upon us. As always, our team has put together the monthly Patch Tuesday Report to help you manage your update progress. The audit report gives you a quick and clear overview of your Windows machines and their patching status. The June 2023 edition of Patch Tuesday brings us 78 new fixes, with 6 rated as critical. We’ve listed the most important changes below.

⚡ TL;DR | Go Straight to the June 2023 Patch Tuesday Audit Report

Microsoft SharePoint Server Elevation of Privilege Vulnerability

Just like last month, the most noteworthy fixes are for SharePoint. Sharepoint got a total of 5 vulnerabilities fixed, one of which is critical.

CVE-2023-29357 is the most critical of the five with a CVSS base score of 9.8 and exploitation being listed as “More Likely”. However, this does come with a sidenote. If you have the AMSI integration feature enabled and use Microsoft Defender across your SharePoint Server farm(s) you are protected.

For the ones that do not, attackers who successfully exploited this vulnerability could gain administrator privileges. An attacker who has gained access to spoofed JWT authentication tokens can use them to execute a network attack which bypasses authentication and allows them to gain access to the privileges of an authenticated user without requiring privileges or user interaction.

The other vulnerabilities, CVE-2023-33129, CVE-2023-33130, CVE-2023-33132, and CVE-2023-33142 range from having a CVSS base score of 7.3 to 6.3 and are less likely to be exploited. They contain one denial of service, two spoofing, and one elevation of privilege vulnerability.

Microsoft Exchange Server Remote Code Execution Vulnerability

CVE-2023-28310 and CVE-2023-32031 are two RCE vulnerabilities that were fixed for Exchange. With a CVSS base score of 8 and 8.8, and not getting the critical tag from Microsoft, they are not the most severe vulnerabilities this month however, they shouldn’t be overlooked as they are the more likely targets of attackers.

For both vulnerabilities, the attacker does require authentication which is likely why they did not receive the critical tag. If authenticated, an attacker exploiting CVE-2023-28310 can achieve remote code execution via a PowerShell remoting session. If CVE-2023-32031 is exploited, the attacker would attempt to trigger malicious code in the context of the server’s account through a network call.

Run the Patch Tuesday June 2023 Audit

To help manage your update progress, we’ve created the Patch Tuesday Audit that checks if the assets in your network are on the latest patch updates. The report has been color-coded to see which machines are up-to-date and which ones still need to be updated. As always, system administrators are urged to update their environment as soon as possible to ensure all endpoints are secured.

The Lansweeper Patch Tuesday report is automatically added to Lansweeper Site. Lansweeper Sites is included in all our licenses without any additional cost and allows you to federate all your installations into one single view so all you need to do is look at one report, automatically added every patch Tuesday!

Patch Tuesday June 2023 CVE Codes & Titles

CVE NumberCVE Title
CVE-2023-33146Microsoft Office Remote Code Execution Vulnerability
CVE-2023-33145Microsoft Edge (Chromium-based) Information Disclosure Vulnerability
CVE-2023-33144Visual Studio Code Spoofing Vulnerability
CVE-2023-33142Microsoft SharePoint Server Elevation of Privilege Vulnerability
CVE-2023-33141Yet Another Reverse Proxy (YARP) Denial of Service Vulnerability
CVE-2023-33140Microsoft OneNote Spoofing Vulnerability
CVE-2023-33139Visual Studio Information Disclosure Vulnerability
CVE-2023-33137Microsoft Excel Remote Code Execution Vulnerability
CVE-2023-33135.NET and Visual Studio Elevation of Privilege Vulnerability
CVE-2023-33133Microsoft Excel Remote Code Execution Vulnerability
CVE-2023-33132Microsoft SharePoint Server Spoofing Vulnerability
CVE-2023-33131Microsoft Outlook Remote Code Execution Vulnerability
CVE-2023-33130Microsoft SharePoint Server Spoofing Vulnerability
CVE-2023-33129Microsoft SharePoint Denial of Service Vulnerability
CVE-2023-33128.NET and Visual Studio Remote Code Execution Vulnerability
CVE-2023-33126.NET and Visual Studio Remote Code Execution Vulnerability
CVE-2023-32032.NET and Visual Studio Elevation of Privilege Vulnerability
CVE-2023-32031Microsoft Exchange Server Remote Code Execution Vulnerability
CVE-2023-32030.NET and Visual Studio Denial of Service Vulnerability
CVE-2023-32029Microsoft Excel Remote Code Execution Vulnerability
CVE-2023-32024Microsoft Power Apps Spoofing Vulnerability
CVE-2023-32022Windows Server Service Security Feature Bypass Vulnerability
CVE-2023-32021Windows SMB Witness Service Security Feature Bypass Vulnerability
CVE-2023-32020Windows DNS Spoofing Vulnerability
CVE-2023-32019Windows Kernel Information Disclosure Vulnerability
CVE-2023-32018Windows Hello Remote Code Execution Vulnerability
CVE-2023-32017Microsoft PostScript Printer Driver Remote Code Execution Vulnerability
CVE-2023-32016Windows Installer Information Disclosure Vulnerability
CVE-2023-32015Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
CVE-2023-32014Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
CVE-2023-32013Windows Hyper-V Denial of Service Vulnerability
CVE-2023-32012Windows Container Manager Service Elevation of Privilege Vulnerability
CVE-2023-32011Windows iSCSI Discovery Service Denial of Service Vulnerability
CVE-2023-32010Windows Bus Filter Driver Elevation of Privilege Vulnerability
CVE-2023-32009Windows Collaborative Translation Framework Elevation of Privilege Vulnerability
CVE-2023-32008Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
CVE-2023-29373Microsoft ODBC Driver Remote Code Execution Vulnerability
CVE-2023-29372Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2023-29371Windows GDI Elevation of Privilege Vulnerability
CVE-2023-29370Windows Media Remote Code Execution Vulnerability
CVE-2023-29369Remote Procedure Call Runtime Denial of Service Vulnerability
CVE-2023-29368Windows Filtering Platform Elevation of Privilege Vulnerability
CVE-2023-29367iSCSI Target WMI Provider Remote Code Execution Vulnerability
CVE-2023-29366Windows Geolocation Service Remote Code Execution Vulnerability
CVE-2023-29365Windows Media Remote Code Execution Vulnerability
CVE-2023-29364Windows Authentication Elevation of Privilege Vulnerability
CVE-2023-29363Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
CVE-2023-29362Remote Desktop Client Remote Code Execution Vulnerability
CVE-2023-29361Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2023-29360Windows TPM Device Driver Elevation of Privilege Vulnerability
CVE-2023-29359GDI Elevation of Privilege Vulnerability
CVE-2023-29358Windows GDI Elevation of Privilege Vulnerability
CVE-2023-29357Microsoft SharePoint Server Elevation of Privilege Vulnerability
CVE-2023-29355DHCP Server Service Information Disclosure Vulnerability
CVE-2023-29353Sysinternals Process Monitor for Windows Denial of Service Vulnerability
CVE-2023-29352Windows Remote Desktop Security Feature Bypass Vulnerability
CVE-2023-29351Windows Group Policy Elevation of Privilege Vulnerability
CVE-2023-29346NTFS Elevation of Privilege Vulnerability
CVE-2023-29337NuGet Client Remote Code Execution Vulnerability
CVE-2023-29331.NET, .NET Framework, and Visual Studio Denial of Service Vulnerability
CVE-2023-29326.NET Framework Remote Code Execution Vulnerability
CVE-2023-29012GitHub: CVE-2023-29012 Git CMD erroneously executes `doskey.exe` in current directory, if it exists
CVE-2023-29011GitHub: CVE-2023-29011 The config file of `connect.exe` is susceptible to malicious placing
CVE-2023-29007GitHub: CVE-2023-29007 Arbitrary configuration injection via `git submodule deinit`
CVE-2023-28310Microsoft Exchange Server Remote Code Execution Vulnerability
CVE-2023-27911AutoDesk: CVE-2023-27911 Heap buffer overflow vulnerability in Autodesk® FBX® SDK 2020 or prior
CVE-2023-27910AutoDesk: CVE-2023-27910 stack buffer overflow vulnerability in Autodesk® FBX® SDK 2020 or prior
CVE-2023-27909AutoDesk: CVE-2023-27909 Out-Of-Bounds Write Vulnerability in Autodesk® FBX® SDK 2020 or prior
CVE-2023-25815GitHub: CVE-2023-25815 Git looks for localized messages in an unprivileged place
CVE-2023-25652GitHub: CVE-2023-25652 “git apply –reject” partially-controlled arbitrary file write
CVE-2023-24938Windows CryptoAPI Denial of Service Vulnerability
CVE-2023-24937Windows CryptoAPI Denial of Service Vulnerability
CVE-2023-24936.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability
CVE-2023-24897.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
CVE-2023-24896Dynamics 365 Finance Spoofing Vulnerability
CVE-2023-24895.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
CVE-2023-24880Windows SmartScreen Security Feature Bypass Vulnerability
CVE-2023-23398Microsoft Excel Spoofing Vulnerability
CVE-2023-23396Microsoft Excel Denial of Service Vulnerability
CVE-2023-23383Service Fabric Explorer Spoofing Vulnerability
CVE-2023-21569Azure DevOps Server Spoofing Vulnerability
CVE-2023-21565Azure DevOps Server Spoofing Vulnerability
CVE-2022-38023Netlogon RPC Elevation of Privilege Vulnerability
CVE-2022-37967Windows Kerberos Elevation of Privilege Vulnerability
CVE-2021-34527Windows Print Spooler Remote Code Execution Vulnerability

Receive the Latest Patch Tuesday Report for FREE Every Month

"*" indicates required fields

Hidden
Hidden
Hidden
Hidden
Hidden
Hidden
Hidden
Hidden
Hidden
Hidden
Hidden
Hidden
Hidden
Hidden
This field is for validation purposes and should be left unchanged.

NO CREDIT CARD REQUIRED

Ready to get started?
You’ll be up and running in no time.

Explore all our features, free for 14 days.