As you know, it’s the second Tuesday of the month, which means that Windows users are looking towards Microsoft in hopes that some of the flaws they’ve been struggling with will finally get fixed. We’ve taken the liberty of providing the direct download links for the cumulative updates released today for Windows 7, 8.1, 10, and 11, but now it’s time to talk CVEs again. For January, Microsoft released 98 new patches, which is a lot more than some people were expecting right at the start of 2023. These software updates address CVEs in:

Microsoft Windows and Windows Components Office and Office Components .NET Core and Visual Studio Code 3D Builder, Azure Service Fabric Container Windows BitLocker Windows Defender Windows Print Spooler Components Microsoft Exchange Server

Microsoft released 98 new important security patches

Seeing how December 2022 was a pretty light month in terms of security patches, developers had to pick up the slack in January, which is exactly what happened. You might like to know that, out of the 98 new CVEs released, 11 are rated Critical and 87 are rated Important in severity. Also, keep in mind that this volume is the largest we’ve seen from Microsoft for a January release in quite some time. Out of all these vulnerabilities addressed this month, only one is listed as publicly known, and one is listed as being in the wild at the time of release. Note that these types of bugs are often wrapped into some form of social engineering attack, such as convincing someone to open a file or click a link. Let’s take a closer look at the full list of CVEs released by Microsoft for January 2023: Taking a closer look at the remaining Critical-rated fixes, there are two patches for Cryptographic Services, but we can classify them as more of privilege escalations rather than RCEs. SPONSORED Furthermore, there are five patches for the Layer 2 Tunneling Protocol (L2TP), which was introduced back in Windows 2000. Looking at the 25 code execution bugs fixed in this Patch Tuesday rollout, there are 14 fixes for the 3D Builder component. There are also two fixes for SharePoint for RCE bugs that require authentication. However, every user by default has the permissions required to exploit these bugs. We’re also looking at a couple of SQL-related fixes. Know that an attacker can execute code if they can convince an authenticated user into attempting to connect to a malicious SQL server via ODBC. We also have to mention the fixes for 11 different information disclosure bugs this month, and seven of these merely result in info leaks consisting of unspecified memory contents. This January release fixes 10 different Denial-of-Service (DoS) bugs, but Microsoft provides no real detail about these bugs, so it isn’t clear if successful exploitation results in the service stopping or the system crashing. Two spoofing bugs in the Exchange server also received critical fixes, although the descriptions imply a different impact. While one notes that successful exploitation could disclose NTLM hashes, the other is about an authenticated attacker could achieve exploitation given a Powershell remoting session to the server. Nonetheless, make sure you update your Exchange server to ensure you remediate the multiple bugs being fixed this month. Have you found any other issues after installing this month’s security updates? Share your experience with us in the comments section below.

Name * Email * Commenting as . Not you? Save information for future comments
Comment

Δ