• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • Contact Us

iHash

News and How to's

  • Apple iPad Mini 2 (2013) 7.9" 16GB – Silver (Refurbished: Wi-Fi Only) for $87

    Apple iPad Mini 2 (2013) 7.9" 16GB – Silver (Refurbished: Wi-Fi Only) for $87
  • Seido™ Japanese Master Chef's 8-Piece Knife with Gift Box – Buy One Get One FREE! for $139

    Seido™ Japanese Master Chef's 8-Piece Knife with Gift Box – Buy One Get One FREE! for $139
  • CleanMyMac One-Time Purchase: Lifetime License for $62

    CleanMyMac One-Time Purchase: Lifetime License for $62
  • UltraVPN Secure USA VPN Proxy: 3 Year Subscription + Free Antivirus for 30 Days for $29

    UltraVPN Secure USA VPN Proxy: 3 Year Subscription + Free Antivirus for 30 Days for $29
  • Wordela Vocabulary Mastery: Lifetime Subscription for $39

    Wordela Vocabulary Mastery: Lifetime Subscription for $39
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

February Patch Tuesday 2023: Updates and Analysis

Mar 4, 2023 by iHash Leave a Comment


Microsoft has released 75 security patches for its February 2023 Patch Tuesday rollout: 9 vulnerabilities are rated Critical, and the remaining 66 are rated Important. 

Three actively exploited vulnerabilities were reported by the vendor: an elevation of privilege within Windows Common Log File System Driver (CVE-2023-23376), a security feature bypass in Microsoft Office (CVE-2023-21715), and a remote code execution security flaw in Windows Graphics Component (CVE-2023-21823).

Table of Contents

  • February 2023 Risk Analysis
  • Actively Exploited Vulnerabilities 
  • Critical Vulnerabilities in Microsoft Products
    • Critical Vulnerabilities in Protected Extensible Authentication Protocol (PEAP)
    • Critical Vulnerabilities Affecting Microsoft Word
    • Critical Vulnerabilities Affecting Visual Studio Code
    • Critical Vulnerabilities Affecting Windows iSCSI Discovery Service 
  • Not All Relevant Vulnerabilities Have Patches: Consider Mitigation Strategies
  • Learn More
    • About CVSS Scores
      • Additional Resources

February 2023 Risk Analysis

This month’s leading risk type is Remote Code Execution (48%, up from 34% in January 2023), followed by Elevation of Privilege at nearly 16% (down from nearly 40% in January), and Denial of Service at 13% (up from 10% last month).

Figure 1. Breakdown of February 2023 Patch Tuesday attack types

The Microsoft Windows product family received the most patches this month (36), followed by Extended Support Updates (34), and SQL Server and Developer Tools (such as Visual Studio Code) with seven patches each.

Figure 2. Breakdown of product families affected by February 2023 Patch Tuesday

Actively Exploited Vulnerabilities 

CVE-2023-21823, rated Important, is a vulnerability affecting Windows Graphics Component. This zero-day was discovered by Genwei Jiang and Dhanesh Kizhakkinan of Mandiant. No additional data was provided by Microsoft at this time. It is recommended to patch the operating system in order to mitigate this vulnerability.

CVE-2023-23376, rated Important, is an elevation of privilege security flaw that impacts the Common Log File System(CLFS) Driver, a logging service used by both kernel- and user-mode applications. This vulnerability can be leveraged after an attacker has obtained access to a vulnerable target in order to elevate to SYSTEM privileges. The flaw was discovered by the Microsoft Threat Intelligence Center (MSTIC) and Microsoft Security Response Center (MSRC).

CVE-2023-21715, also rated Important, is a security flaw allowing an attacker to bypass Microsoft Office macro policies that are used to block untrusted or malicious files. An authenticated attacker could exploit the vulnerability by convincing a victim, through social engineering, to download from a website and open a specially crafted file that could lead to a local attack on the victim computer.

Rank CVSS Score CVE Description
Important 7.8 CVE-2023-21823 Windows Graphics Component Remote Code Execution Vulnerability
Important 7.8 CVE-2023-23376 Windows Common Log File System Driver Elevation of Privilege Vulnerability
Important 7.3 CVE-2023-21715 Microsoft Publisher Security Features Bypass Vulnerability

Figure 3. Actively exploited vulnerabilities patched in February 2023

Critical Vulnerabilities in Microsoft Products

Critical Vulnerabilities in Protected Extensible Authentication Protocol (PEAP)

CVE-2023-21692, CVE-2023-21690 and CVE-2023-21689 are extremely dangerous vulnerabilities, all with a CVSS 9.8 score. To exploit these vulnerabilities, an attacker sends specially crafted PEAP packets over the network to a victim machine, potentially allowing for remote code execution in the user context of the targeted network account. An attacker does not require special privileges or user interaction in order to exploit this vulnerability. However, Microsoft notes that PEAP is only negotiated if the Network Policy Server Service (NPS) is running on the Windows Server endpoint and has a network policy configured to allow PEAP. To stop using PEAP, Microsoft recommends customers ensure that PEAP type is not configured as an allowed EAP type in their network policy. To learn more, Microsoft recommends visiting Configure the New Wireless Network Policy and Configure Network Policies.

Rank CVSS Score CVE Description
Critical 9.8 CVE-2023-21692 Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability
Critical 9.8 CVE-2023-21690 Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability
Critical 9.8 CVE-2023-21689 Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability

Figure 4. Critical vulnerabilities in PEAP

Critical Vulnerabilities Affecting Microsoft Word

Deemed “less likely exploitable” by Microsoft, CVE-2023-21716 is a remote code execution vulnerability affecting Microsoft Word, Sharepoint, Office 365 and Office for Mac and has been assigned a CVSS score of 9.8. The vulnerability does not require authentication and could be exploited by sending an email with a rich text format (RTF) payload that, when opened, leads to a command execution.

For more guidance on how to prevent Word from loading RTF files, refer to MS08-026.

Rank CVSS Score CVE Description
Critical 9.8 CVE-2023-21716 Microsoft Word Remote Code Execution Vulnerability

Figure 5. Critical vulnerabilities in MS Word

Critical Vulnerabilities Affecting Visual Studio Code

CVE-2023-23381 and CVE-2023-21815 are arbitrary code execution vulnerabilities targeting the Visual Studio Code. This means that while the impact is remote code execution, the adversary must be able to run code on the victim machine to exploit the vulnerability. In other words, the adversary sends a crafted file to the victim computer and then the victim runs the malicious code. Microsoft recommends updating to the most recent version of Visual Studio Code in order to mitigate this vulnerability.

Rank CVSS Score CVE Description
Critical 8.4 CVE-2023-23381 Visual Studio Remote Code Execution Vulnerability
Critical 8.4 CVE-2023-21815 Visual Studio Remote Code Execution Vulnerability

Figure 6. Critical vulnerabilities affecting Visual Studio Code

Critical Vulnerabilities Affecting Windows iSCSI Discovery Service 

CVE-2023-21803 could allow an attacker the ability to remotely execute code on a target system. By default, the iSCSI Initiator client application is disabled, and in this state, an attacker cannot exploit this vulnerability. For a system to be vulnerable, the iSCSI Initiator client application would need to be enabled. Only x86 or 32-bit based versions of Windows are affected by this vulnerability.

Rank CVSS Score CVE Description
Critical 9.8 CVE-2023-21803 Windows iSCSI Discovery Service Remote Code Execution Vulnerability

Figure 7. Critical vulnerabilities affecting Windows iSCSI Service

Not All Relevant Vulnerabilities Have Patches: Consider Mitigation Strategies

As we have learned with other notable vulnerabilities, such as Log4j, not every highly exploitable vulnerability can be easily patched. As is the case for the ProxyNotShell vulnerabilities, it’s critically important to develop a response plan for how to defend your environments when no patching protocol exists. 

Regular review of your patching strategy should still be a part of your program, but you should also look more holistically at your organization’s methods for cybersecurity and improve your overall security posture.

The CrowdStrike Falcon platform collects and analyzes trillions of endpoint events every day from millions of sensors deployed across 176 countries. Watch this demo to see the Falcon platform in action.

Learn More

This video on CrowdStrike Falcon® Spotlight vulnerability management shows how you can quickly monitor and prioritize vulnerabilities within the systems and applications in your organization. 

About CVSS Scores

The Common Vulnerability Scoring System (CVSS) is a free and open industry standard that CrowdStrike and many other cybersecurity organizations use to assess and communicate software vulnerabilities’ severity and characteristics. The CVSS Base Score ranges from 0.0 to 10.0, and the National Vulnerability Database (NVD) adds a severity rating for CVSS scores. Learn more about vulnerability scoring in this article. 

Additional Resources



Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: Security Tagged With: analysis, February, patch, Tuesday, Updates

Special Offers

  • Apple iPad Mini 2 (2013) 7.9" 16GB – Silver (Refurbished: Wi-Fi Only) for $87

    Apple iPad Mini 2 (2013) 7.9" 16GB – Silver (Refurbished: Wi-Fi Only) for $87
  • Seido™ Japanese Master Chef's 8-Piece Knife with Gift Box – Buy One Get One FREE! for $139

    Seido™ Japanese Master Chef's 8-Piece Knife with Gift Box – Buy One Get One FREE! for $139
  • CleanMyMac One-Time Purchase: Lifetime License for $62

    CleanMyMac One-Time Purchase: Lifetime License for $62
  • UltraVPN Secure USA VPN Proxy: 3 Year Subscription + Free Antivirus for 30 Days for $29

    UltraVPN Secure USA VPN Proxy: 3 Year Subscription + Free Antivirus for 30 Days for $29
  • Wordela Vocabulary Mastery: Lifetime Subscription for $39

    Wordela Vocabulary Mastery: Lifetime Subscription for $39

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

AI Empowers Microfinance: Revolutionizing Fraud Detection

Jun 1, 2023 By iHash

Apple, MLB announce July “Friday Night Baseball” schedule on Apple TV+

Jun 1, 2023 By iHash

Tags

* Apple Cisco computer security cyber attacks cyber crime cyber news cybersecurity Cyber Security cyber security news cyber security news today cyber security updates cyber threats cyber updates data data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS 7 iOS 8 iPhone Malware microsoft network security ransomware ransomware malware risk management Secure security security breaches security vulnerabilities software vulnerability the hacker news Threat update video web applications

Latest

A Guide to Log File Parsing Tools

A Guide to Log File Parsing Tools

While log parsing isn’t very sexy and never gets much credit, it is fundamental to productive and centralized log analysis. Log parsing extracts information in your logs and organizes them into fields. Without well-structured fields in your logs, searching and visualizing your log data is near impossible. In this article, we’ll review some of the […]

Triangulation: Trojan for iOS

Triangulation: Trojan for iOS | Kaspersky official blog

Hi all, today we have very big and important news. Kaspersky experts have discovered an extremely complex, professionally targeted cyberattack that uses Apple’s mobile devices. The purpose of this attack is the inconspicuous introduction of spyware into the iPhones of employees of the company – both top and middle-management. The attack is carried out using […]

Apple iPad Mini 2 (2013) 7.9" 16GB – Silver (Refurbished: Wi-Fi Only) for $87

Expires June 01, 2123 23:59 PST Buy now and get 37% off KEY FEATURES The Apple iPad Mini 2nd Gen is a compact, portable tablet with a powerful and versatile experience. Its 7.9-inch Retina display delivers vibrant visuals and sharp image quality. The Wi-Fi-only model ensures easy connectivity to wireless networks for browsing, streaming, and […]

Dark Pink APT Group Leverages TelePowerBot and KamiKakaBot in Sophisticated Attacks

May 31, 2023Ravie LakshmananAdvanced Persistent Threat The threat actor known as Dark Pink has been linked to five new attacks aimed at various entities in Belgium, Brunei, Indonesia, Thailand, and Vietnam between February 2022 and April 2023. This includes educational entities, government agencies, military bodies, and non-profit organizations, indicating the adversarial crew’s continued focus on […]

How to give back to the Elastic community

How to give back to the Elastic community

One of the most beautiful things about having a front-row seat in the Elastic Community is witnessing folks helping each other. From Discuss and the Elastic Community Slack workspace to the Official Elastic YouTube channel no matter where you turn, you’ll see Elasticsearch pros and beginners sharing their knowledge. That’s why we created the Elastic […]

Safeguards against firmware signed with stolen MSI keys

Safeguards against firmware signed with stolen MSI keys

What could be worse than a ransomware attack on your company? Only an incident that hits your company’s clients, I guess. Well, that’s exactly what happened to MSI — the large Taiwanese manufacturer of laptops, video adapters and motherboards. In the beginning of April, word got out that the company was attacked by a new […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2023
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT