Microsoft on Tuesday launched patches for 104 vulnerabilities, together with 80 for Home windows. Ten different product teams are additionally affected. Of the 104 CVEs addressed, 11 are thought of Crucial in severity; ten of these are in Home windows, whereas one falls within the Microsoft Widespread Information Mannequin SDK. (The Widespread Information Mannequin is a metadata system for business-related information.) One CVE, an Vital-severity denial-of-service subject (CVE-2023-38171), impacts not solely Home windows however each .NET and Visible Studio.
At patch time, two points involving WordPad and Skype are identified to be underneath exploit within the wild. An extra 10 vulnerabilities in Home windows, Alternate, and Skype are by the corporate’s estimation extra more likely to be exploited within the subsequent 30 days. For ease of prioritization, these 12 points are:
| Product household | CVE | Lively exploitation | Suggestion |
| Skype | CVE-2023-41763 | Detected within the wild | Patch instantly |
| Home windows (WordPad) | CVE-2023-36563 | Detected within the wild | Patch instantly |
| Alternate | CVE-2023-36778 | Seemingly with 30 days | Patch ASAP |
| Skype | CVE-2023-36780 | Seemingly with 30 days | Patch ASAP |
| Home windows | CVE-2023-36594 | Seemingly with 30 days | Patch ASAP |
| Home windows | CVE-2023-36713 | Seemingly with 30 days | Patch ASAP |
| Home windows | CVE-2023-36731 | Seemingly with 30 days | Patch ASAP |
| Home windows | CVE-2023-36732 | Seemingly with 30 days | Patch ASAP |
| Home windows | CVE-2023-36743 | Seemingly with 30 days | Patch ASAP |
| Home windows | CVE-2023-36776 | Seemingly with 30 days | Patch ASAP |
| Home windows | CVE-2023-38159 | Seemingly with 30 days | Patch ASAP |
| Home windows | CVE-2023-41772 | Seemingly with 30 days | Patch ASAP |
Some of the fascinating gadgets on this month’s launch isn’t even a patch – although to be truthful, it’s not a difficulty that may be “patched” within the normal sense, for Microsoft merchandise or many others. CVE-2023-44487, an Vital-severity denial of service subject, describes a rapid-reset assault in opposition to HTTP/2, presently underneath extraordinarily lively exploit within the wild. It carries a MITRE-assigned CVE quantity (a rarity; normally Microsoft assigns its personal CVEs numbers) and, in accordance with Microsoft’s finder-acknowledgement system, is “credited” to Google, Amazon, and Cloudflare. The checklist of affected product households is lengthy: .NET, ASP.NET, Visible Studio, and numerous iterations of Home windows. Microsoft has printed an article on the matter. It’s not included within the patch tallies on this put up, although the article states that the corporate is releasing mitigations – not patches, mitigation — for IIS, .NET, and Home windows. There’s a really useful workaround, although – going into RegEdit and disabling the HTTP/2 protocol in your net server. Google has posted a great rationalization of this assault.
Past Patch Tuesday, the keepers of curl (the open-source command-line software) additionally had a major patch on faucet for Wednesday, 11 October. In line with the advisory posted to GitHub, CVE-2023-38545 and CVE-2023-38546 each describe points in libcurl, with CVE-2023-38545, a heap-overflow subject, additionally touching curl itself. These are critical enterprise; in accordance with Daniel Stenberg, the maintainer who wrote the GitHub advisory, “[CVE-2023-38545] might be the worst curl safety flaw in a very long time.” Since curl lies on the coronary heart of such in style protocols as SSL, TLS, HTTP, and FTP, system directors are suggested within the strongest doable phrases to familiarize themselves with the brand new curl 8.4.0 launch, which addresses this subject.
October can also be an enormous month for goodbyes. The tables in Appendix E on the finish of this text checklist the Microsoft merchandise reaching end-of-servicing (coated underneath the Trendy Coverage) and finish of help (coated underneath the Fastened Coverage) right now, in addition to these transferring from Mainstream to Prolonged help. Prolonged help consists of free safety updates, however no extra new options or design modifications. The checklist of merchandise affected is lengthy and thrilling – particularly, Workplace 2019 not taking function updates is a milestone – however the headline act on this month’s cruise into the sundown is definitely Server 2012 and Server 2012R2. As a going-away current, that venerable model of the platform receives 65 patches, 11 of them critical-severity, one underneath lively exploit within the wild.
We’re as normal together with on the finish of this put up three appendices itemizing all Microsoft’s patches, sorted by severity, by predicted exploitability, and by product household. As per Microsoft’s steering we’ll deal with the Chromium patch as information-only and never embody it within the following charts and totals, although we’ve added a chart on the finish of the put up offering fundamental info on that. (CVE-2023-44487, mentioned above, additionally applies to Chromium; that is additionally famous within the appendix.)
- Whole Microsoft CVEs: 2
- Whole advisories delivery in replace: 2
- Publicly disclosed: 2
- Exploited: 2
- Severity
- Crucial: 13
- Vital: 91
- Impression
- Distant Code Execution: 45
- Elevation of Privilege: 26
- Denial of Service: 16
- Data Disclosure: 12
- Safety Characteristic Bypass: 4
- Spoofing: 1
Determine 1: October is a heavy patch month with a little bit little bit of every part
Merchandise
- Home windows: 80 (together with one shared with .NET and Visible Studio)
- Azure: 6
- SQL: 5
- Skype: 4
- Dynamics 365: 3
- Workplace: 3
- .NET: 1 (shared with Visible Studio and Home windows)
- Alternate: 1
- Microsoft Widespread Information Mannequin SDK: 1
- MMPC: 1
- Visible Studio: 1 (shared with .NET and Home windows)
Determine 2: Merchandise affected by October’s patches. For gadgets that apply to a couple of product household (e.g., the patch shared by Home windows, Visible Studio, and .NET), the chart represents these patches in every household to which they apply, making the workload look barely heavier than it is going to be in observe
Notable October updates
Along with the high-priority points mentioned above, a couple of fascinating gadgets current themselves.
9 CVEs — Layer 2 Tunneling Protocol Distant Code Execution Vulnerability
5 CVEs — Win32k Elevation of Privilege Vulnerability
Identically named CVEs are hardly uncommon in these releases; this month additionally has identically named units of 16 (Microsoft Message Queuing Distant Code Execution Vulnerability), 4 (Microsoft Message Queuing Denial of Service Vulnerability), and three (too many to checklist) CVEs. Nevertheless, the 9 RCEs touching Home windows’ Layer 2 tunnelling protocol additionally share Crucial-severity standing (CVSS 3.1 base is 8.1) and are thus price sooner fairly than later. Fortuitously, Microsoft doesn’t consider any of them to be extra more likely to be exploited within the subsequent 30 days. The 5 EoP points touching Win32K, alternatively, are all thought of extra more likely to see exploitation within the subsequent 30 days.
CVE-2023-36563 — Microsoft WordPad Data Disclosure Vulnerability
That is as talked about one of many two vulnerabilities underneath lively exploit within the wild; Microsoft states that Preview Pane is a vector.
Determine 3: With two months to go in 2023, Microsoft has issued precisely 300 patches in opposition to distant code execution subject, essentially the most of any class of vulnerability this yr
Sophos protections
| CVE | Sophos Intercept X/Endpoint IPS | Sophos XGS Firewall |
| CVE-2023-36594 | Exp/2336594-A | Exp/2336594-A |
| CVE-2023-36713 | Exp/2336713-A | Exp/2336713-A |
| CVE-2023-36731 | Exp/2336731-A | Exp/2336731-A |
| CVE-2023-36743 | Exp/2336743-A | Exp/2336743-A |
| CVE-2023-36776 | Exp/2336776-A | Exp/2336776-A |
| CVE-2023-38159 | Exp/2338159-A | Exp/2338159-A |
| CVE-2023-41772 | Exp/2341772-A | Exp/2341772-A |
As you may each month, in case you don’t wish to wait on your system to drag down Microsoft’s updates itself, you may obtain them manually from the Home windows Replace Catalog web site. Run the winver.exe software to find out which construct of Home windows 10 or 11 you’re operating, then obtain the Cumulative Replace package deal on your particular system’s structure and construct quantity.
With regard to CVE-2023-44487, the best choice for thwarting the denial-of-service assault enabled by the vulnerability is to comply with Microsoft’s printed recommendation.
Appendix A: Vulnerability Impression and Severity
This can be a checklist of October’s patches sorted by impression, then sub-sorted by severity. Every checklist is additional organized by CVE.
Distant Code Execution (45 CVEs)
| Crucial severity | |
| CVE-2023-35349 | Microsoft Message Queuing Distant Code Execution Vulnerability |
| CVE-2023-36697 | Microsoft Message Queuing Distant Code Execution Vulnerability |
| CVE-2023-36718 | Home windows Digital Trusted Platform Module Elevation of Privilege Vulnerability |
| CVE-2023-38166 | Layer 2 Tunneling Protocol Distant Code Execution Vulnerability |
| CVE-2023-41765 | Layer 2 Tunneling Protocol Distant Code Execution Vulnerability |
| CVE-2023-41767 | Layer 2 Tunneling Protocol Distant Code Execution Vulnerability |
| CVE-2023-41768 | Layer 2 Tunneling Protocol Distant Code Execution Vulnerability |
| CVE-2023-41769 | Layer 2 Tunneling Protocol Distant Code Execution Vulnerability |
| CVE-2023-41770 | Layer 2 Tunneling Protocol Distant Code Execution Vulnerability |
| CVE-2023-41771 | Layer 2 Tunneling Protocol Distant Code Execution Vulnerability |
| CVE-2023-41773 | Layer 2 Tunneling Protocol Distant Code Execution Vulnerability |
| CVE-2023-41774 | Layer 2 Tunneling Protocol Distant Code Execution Vulnerability |
| Vital severity | |
| CVE-2023-36414 | Azure Id SDK Distant Code Execution Vulnerability |
| CVE-2023-36415 | Azure Id SDK Distant Code Execution Vulnerability |
| CVE-2023-36417 | Microsoft SQL OLE DB Distant Code Execution Vulnerability |
| CVE-2023-36418 | Azure RTOS GUIX Studio Distant Code Execution Vulnerability |
| CVE-2023-36420 | Microsoft ODBC Driver for SQL Server Distant Code Execution Vulnerability |
| CVE-2023-36436 | Home windows MSHTML Platform Distant Code Execution Vulnerability |
| CVE-2023-36557 | PrintHTML API Distant Code Execution Vulnerability |
| CVE-2023-36570 | Microsoft Message Queuing Distant Code Execution Vulnerability |
| CVE-2023-36571 | Microsoft Message Queuing Distant Code Execution Vulnerability |
| CVE-2023-36572 | Microsoft Message Queuing Distant Code Execution Vulnerability |
| CVE-2023-36573 | Microsoft Message Queuing Distant Code Execution Vulnerability |
| CVE-2023-36574 | Microsoft Message Queuing Distant Code Execution Vulnerability |
| CVE-2023-36575 | Microsoft Message Queuing Distant Code Execution Vulnerability |
| CVE-2023-36577 | Microsoft WDAC OLE DB supplier for SQL Server Distant Code Execution Vulnerability |
| CVE-2023-36578 | Microsoft Message Queuing Distant Code Execution Vulnerability |
| CVE-2023-36582 | Microsoft Message Queuing Distant Code Execution Vulnerability |
| CVE-2023-36583 | Microsoft Message Queuing Distant Code Execution Vulnerability |
| CVE-2023-36589 | Microsoft Message Queuing Distant Code Execution Vulnerability |
| CVE-2023-36590 | Microsoft Message Queuing Distant Code Execution Vulnerability |
| CVE-2023-36591 | Microsoft Message Queuing Distant Code Execution Vulnerability |
| CVE-2023-36592 | Microsoft Message Queuing Distant Code Execution Vulnerability |
| CVE-2023-36593 | Microsoft Message Queuing Distant Code Execution Vulnerability |
| CVE-2023-36598 | Microsoft WDAC ODBC Driver Distant Code Execution Vulnerability |
| CVE-2023-36702 | Microsoft DirectMusic Distant Code Execution Vulnerability |
| CVE-2023-36704 | Home windows Setup Recordsdata Cleanup Distant Code Execution Vulnerability |
| CVE-2023-36710 | Home windows Media Basis Core Distant Code Execution Vulnerability |
| CVE-2023-36730 | Microsoft ODBC Driver for SQL Server Distant Code Execution Vulnerability |
| CVE-2023-36778 | Microsoft Alternate Server Distant Code Execution Vulnerability |
| CVE-2023-36780 | Skype for Enterprise Distant Code Execution Vulnerability |
| CVE-2023-36785 | Microsoft ODBC Driver for SQL Server Distant Code Execution Vulnerability |
| CVE-2023-36786 | Skype for Enterprise Distant Code Execution Vulnerability |
| CVE-2023-36789 | Skype for Enterprise Distant Code Execution Vulnerability |
| CVE-2023-36902 | Home windows Runtime Distant Code Execution Vulnerability |
Elevation of Privilege (26 CVEs)
| Vital severity | |
| CVE-2023-36419 | Azure HDInsight Apache Oozie Workflow Scheduler Elevation of Privilege Vulnerability |
| CVE-2023-36434 | Home windows IIS Server Elevation of Privilege Vulnerability |
| CVE-2023-36561 | Azure DevOps Server Elevation of Privilege Vulnerability |
| CVE-2023-36565 | Microsoft Workplace Graphics Elevation of Privilege Vulnerability |
| CVE-2023-36568 | Microsoft Workplace Click on-To-Run Elevation of Privilege Vulnerability |
| CVE-2023-36569 | Microsoft Workplace Elevation of Privilege Vulnerability |
| CVE-2023-36594 | Home windows Graphics Element Elevation of Privilege Vulnerability |
| CVE-2023-36605 | Home windows Named Pipe Filesystem Elevation of Privilege Vulnerability |
| CVE-2023-36701 | Microsoft Resilient File System (ReFS) Elevation of Privilege Vulnerability |
| CVE-2023-36711 | Home windows Runtime C++ Template Library Elevation of Privilege Vulnerability |
| CVE-2023-36712 | Home windows Kernel Elevation of Privilege Vulnerability |
| CVE-2023-36721 | Home windows Error Reporting Service Elevation of Privilege Vulnerability |
| CVE-2023-36723 | Home windows Container Supervisor Service Elevation of Privilege Vulnerability |
| CVE-2023-36725 | Home windows Kernel Elevation of Privilege Vulnerability |
| CVE-2023-36726 | Home windows Web Key Alternate (IKE) Extension Elevation of Privilege Vulnerability |
| CVE-2023-36729 | Named Pipe File System Elevation of Privilege Vulnerability |
| CVE-2023-36731 | Win32k Elevation of Privilege Vulnerability |
| CVE-2023-36732 | Win32k Elevation of Privilege Vulnerability |
| CVE-2023-36737 | Azure Community Watcher VM Agent Elevation of Privilege Vulnerability |
| CVE-2023-36743 | Win32k Elevation of Privilege Vulnerability |
| CVE-2023-36776 | Win32k Elevation of Privilege Vulnerability |
| CVE-2023-36790 | Home windows RDP Encoder Mirror Driver Elevation of Privilege Vulnerability |
| CVE-2023-38159 | Home windows Graphics Element Elevation of Privilege Vulnerability |
| CVE-2023-41763 | Skype for Enterprise Elevation of Privilege Vulnerability |
| CVE-2023-41766 | Home windows Shopper Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability |
| CVE-2023-41772 | Win32k Elevation of Privilege Vulnerability |
Denial of Service (16 CVEs)
| Crucial severity | |
| CVE-2023-36566 | Microsoft Widespread Information Mannequin SDK Denial of Service Vulnerability |
| Vital severity | |
| CVE-2023-36431 | Microsoft Message Queuing Denial of Service Vulnerability |
| CVE-2023-36435 | Microsoft QUIC Denial of Service Vulnerability |
| CVE-2023-36579 | Microsoft Message Queuing Denial of Service Vulnerability |
| CVE-2023-36581 | Microsoft Message Queuing Denial of Service Vulnerability |
| CVE-2023-36585 | Lively Template Library Denial of Service Vulnerability |
| CVE-2023-36602 | Home windows TCP/IP Denial of Service Vulnerability |
| CVE-2023-36603 | Home windows TCP/IP Denial of Service Vulnerability |
| CVE-2023-36606 | Microsoft Message Queuing Denial of Service Vulnerability |
| CVE-2023-36703 | DHCP Server Service Denial of Service Vulnerability |
| CVE-2023-36707 | Home windows Deployment Companies Denial of Service Vulnerability |
| CVE-2023-36709 | Microsoft AllJoyn API Denial of Service Vulnerability |
| CVE-2023-36717 | Home windows Digital Trusted Platform Module Denial of Service Vulnerability |
| CVE-2023-36720 | Home windows Combined Actuality Developer Instruments Denial of Service Vulnerability |
| CVE-2023-36728 | Microsoft SQL Server Denial of Service Vulnerability |
| CVE-2023-38171 | Microsoft QUIC Denial of Service Vulnerability |
Data Disclosure (12 CVEs)
| Vital severity | |
| CVE-2023-29348 | Home windows Distant Desktop Gateway (RD Gateway) Data Disclosure Vulnerability |
| CVE-2023-36429 | Microsoft Dynamics 365 Data Disclosure Vulnerability |
| CVE-2023-36433 | Microsoft Dynamics 365 (On-Premises) Data Disclosure Vulnerability |
| CVE-2023-36438 | Home windows TCP/IP Data Disclosure Vulnerability |
| CVE-2023-36563 | Microsoft WordPad Data Disclosure Vulnerability |
| CVE-2023-36567 | Home windows Deployment Companies Data Disclosure Vulnerability |
| CVE-2023-36576 | Home windows Kernel Data Disclosure Vulnerability |
| CVE-2023-36596 | Distant Process Name Data Disclosure Vulnerability |
| CVE-2023-36706 | Home windows Deployment Companies Data Disclosure Vulnerability |
| CVE-2023-36713 | Home windows Widespread Log File System Driver Data Disclosure Vulnerability |
| CVE-2023-36722 | Lively Listing Area Companies Data Disclosure Vulnerability |
| CVE-2023-36724 | Home windows Energy Administration Service Data Disclosure Vulnerability |
Safety Characteristic Bypass (4 CVEs)
| Vital severity | |
| CVE-2023-36564 | Home windows Search Safety Characteristic Bypass Vulnerability |
| CVE-2023-36584 | Home windows Mark of the Net Safety Characteristic Bypass Vulnerability |
| CVE-2023-36698 | Home windows Kernel Safety Characteristic Bypass Vulnerability |
| CVE-2023-36700 | Microsoft Defender Safety Characteristic Bypass Vulnerability |
Spoofing (1 CVE)
| Vital severity | |
| CVE-2023-36416 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability |
Appendix B: Exploitability
This can be a checklist of the October CVEs judged by Microsoft to be extra more likely to be exploited within the wild throughout the first 30 days post-release, in addition to these already identified to be underneath exploit. Every checklist is additional organized by CVE.
| Exploitation detected | |
| CVE-2023-36563 | Microsoft WordPad Data Disclosure Vulnerability |
| CVE-2023-41763 | Skype for Enterprise Elevation of Privilege Vulnerability |
| Exploitation extra probably | |
| CVE-2023-36594 | Home windows Graphics Element Elevation of Privilege Vulnerability |
| CVE-2023-36713 | Home windows Widespread Log File System Driver Data Disclosure Vulnerability |
| CVE-2023-36731 | Win32k Elevation of Privilege Vulnerability |
| CVE-2023-36732 | Win32k Elevation of Privilege Vulnerability |
| CVE-2023-36743 | Win32k Elevation of Privilege Vulnerability |
| CVE-2023-36776 | Win32k Elevation of Privilege Vulnerability |
| CVE-2023-36778 | Microsoft Alternate Server Distant Code Execution Vulnerability |
| CVE-2023-36780 | Skype for Enterprise Distant Code Execution Vulnerability |
| CVE-2023-38159 | Home windows Graphics Element Elevation of Privilege Vulnerability |
| CVE-2023-41772 | Win32k Elevation of Privilege Vulnerability |
Appendix C: Merchandise Affected
This can be a checklist of October’s patches sorted by product household, then sub-sorted by severity. Every checklist is additional organized by CVE.
Home windows (80 CVEs)
| Crucial severity | |
| CVE-2023-35349 | Microsoft Message Queuing Distant Code Execution Vulnerability |
| CVE-2023-36697 | Microsoft Message Queuing Distant Code Execution Vulnerability |
| CVE-2023-36718 | Home windows Digital Trusted Platform Module Elevation of Privilege Vulnerability |
| CVE-2023-38166 | Layer 2 Tunneling Protocol Distant Code Execution Vulnerability |
| CVE-2023-41765 | Layer 2 Tunneling Protocol Distant Code Execution Vulnerability |
| CVE-2023-41767 | Layer 2 Tunneling Protocol Distant Code Execution Vulnerability |
| CVE-2023-41768 | Layer 2 Tunneling Protocol Distant Code Execution Vulnerability |
| CVE-2023-41769 | Layer 2 Tunneling Protocol Distant Code Execution Vulnerability |
| CVE-2023-41770 | Layer 2 Tunneling Protocol Distant Code Execution Vulnerability |
| CVE-2023-41771 | Layer 2 Tunneling Protocol Distant Code Execution Vulnerability |
| CVE-2023-41773 | Layer 2 Tunneling Protocol Distant Code Execution Vulnerability |
| CVE-2023-41774 | Layer 2 Tunneling Protocol Distant Code Execution Vulnerability |
| Vital severity | |
| CVE-2023-29348 | Home windows Distant Desktop Gateway (RD Gateway) Data Disclosure Vulnerability |
| CVE-2023-36431 | Microsoft Message Queuing Denial of Service Vulnerability |
| CVE-2023-36434 | Home windows IIS Server Elevation of Privilege Vulnerability |
| CVE-2023-36435 | Microsoft QUIC Denial of Service Vulnerability |
| CVE-2023-36436 | Home windows MSHTML Platform Distant Code Execution Vulnerability |
| CVE-2023-36438 | Home windows TCP/IP Data Disclosure Vulnerability |
| CVE-2023-36557 | PrintHTML API Distant Code Execution Vulnerability |
| CVE-2023-36563 | Microsoft WordPad Data Disclosure Vulnerability |
| CVE-2023-36564 | Home windows Search Safety Characteristic Bypass Vulnerability |
| CVE-2023-36567 | Home windows Deployment Companies Data Disclosure Vulnerability |
| CVE-2023-36570 | Microsoft Message Queuing Distant Code Execution Vulnerability |
| CVE-2023-36571 | Microsoft Message Queuing Distant Code Execution Vulnerability |
| CVE-2023-36572 | Microsoft Message Queuing Distant Code Execution Vulnerability |
| CVE-2023-36573 | Microsoft Message Queuing Distant Code Execution Vulnerability |
| CVE-2023-36574 | Microsoft Message Queuing Distant Code Execution Vulnerability |
| CVE-2023-36575 | Microsoft Message Queuing Distant Code Execution Vulnerability |
| CVE-2023-36576 | Home windows Kernel Data Disclosure Vulnerability |
| CVE-2023-36577 | Microsoft WDAC OLE DB supplier for SQL Server Distant Code Execution Vulnerability |
| CVE-2023-36578 | Microsoft Message Queuing Distant Code Execution Vulnerability |
| CVE-2023-36579 | Microsoft Message Queuing Denial of Service Vulnerability |
| CVE-2023-36581 | Microsoft Message Queuing Denial of Service Vulnerability |
| CVE-2023-36582 | Microsoft Message Queuing Distant Code Execution Vulnerability |
| CVE-2023-36583 | Microsoft Message Queuing Distant Code Execution Vulnerability |
| CVE-2023-36584 | Home windows Mark of the Net Safety Characteristic Bypass Vulnerability |
| CVE-2023-36585 | Lively Template Library Denial of Service Vulnerability |
| CVE-2023-36589 | Microsoft Message Queuing Distant Code Execution Vulnerability |
| CVE-2023-36590 | Microsoft Message Queuing Distant Code Execution Vulnerability |
| CVE-2023-36591 | Microsoft Message Queuing Distant Code Execution Vulnerability |
| CVE-2023-36592 | Microsoft Message Queuing Distant Code Execution Vulnerability |
| CVE-2023-36593 | Microsoft Message Queuing Distant Code Execution Vulnerability |
| CVE-2023-36594 | Home windows Graphics Element Elevation of Privilege Vulnerability |
| CVE-2023-36596 | Distant Process Name Data Disclosure Vulnerability |
| CVE-2023-36598 | Microsoft WDAC ODBC Driver Distant Code Execution Vulnerability |
| CVE-2023-36602 | Home windows TCP/IP Denial of Service Vulnerability |
| CVE-2023-36603 | Home windows TCP/IP Denial of Service Vulnerability |
| CVE-2023-36605 | Home windows Named Pipe Filesystem Elevation of Privilege Vulnerability |
| CVE-2023-36606 | Microsoft Message Queuing Denial of Service Vulnerability |
| CVE-2023-36698 | Home windows Kernel Safety Characteristic Bypass Vulnerability |
| CVE-2023-36701 | Microsoft Resilient File System (ReFS) Elevation of Privilege Vulnerability |
| CVE-2023-36702 | Microsoft DirectMusic Distant Code Execution Vulnerability |
| CVE-2023-36703 | DHCP Server Service Denial of Service Vulnerability |
| CVE-2023-36704 | Home windows Setup Recordsdata Cleanup Distant Code Execution Vulnerability |
| CVE-2023-36706 | Home windows Deployment Companies Data Disclosure Vulnerability |
| CVE-2023-36707 | Home windows Deployment Companies Denial of Service Vulnerability |
| CVE-2023-36709 | Microsoft AllJoyn API Denial of Service Vulnerability |
| CVE-2023-36710 | Home windows Media Basis Core Distant Code Execution Vulnerability |
| CVE-2023-36711 | Home windows Runtime C++ Template Library Elevation of Privilege Vulnerability |
| CVE-2023-36712 | Home windows Kernel Elevation of Privilege Vulnerability |
| CVE-2023-36713 | Home windows Widespread Log File System Driver Data Disclosure Vulnerability |
| CVE-2023-36717 | Home windows Digital Trusted Platform Module Denial of Service Vulnerability |
| CVE-2023-36720 | Home windows Combined Actuality Developer Instruments Denial of Service Vulnerability |
| CVE-2023-36721 | Home windows Error Reporting Service Elevation of Privilege Vulnerability |
| CVE-2023-36722 | Lively Listing Area Companies Data Disclosure Vulnerability |
| CVE-2023-36723 | Home windows Container Supervisor Service Elevation of Privilege Vulnerability |
| CVE-2023-36724 | Home windows Energy Administration Service Data Disclosure Vulnerability |
| CVE-2023-36725 | Home windows Kernel Elevation of Privilege Vulnerability |
| CVE-2023-36726 | Home windows Web Key Alternate (IKE) Extension Elevation of Privilege Vulnerability |
| CVE-2023-36729 | Named Pipe File System Elevation of Privilege Vulnerability |
| CVE-2023-36731 | Win32k Elevation of Privilege Vulnerability |
| CVE-2023-36732 | Win32k Elevation of Privilege Vulnerability |
| CVE-2023-36743 | Win32k Elevation of Privilege Vulnerability |
| CVE-2023-36776 | Win32k Elevation of Privilege Vulnerability |
| CVE-2023-36790 | Home windows RDP Encoder Mirror Driver Elevation of Privilege Vulnerability |
| CVE-2023-36902 | Home windows Runtime Distant Code Execution Vulnerability |
| CVE-2023-38159 | Home windows Graphics Element Elevation of Privilege Vulnerability |
| CVE-2023-38171 | Microsoft QUIC Denial of Service Vulnerability |
| CVE-2023-41766 | Home windows Shopper Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability |
| CVE-2023-41772 | Win32k Elevation of Privilege Vulnerability |
Azure (6 CVEs)
| Vital severity | |
| CVE-2023-36414 | Azure Id SDK Distant Code Execution Vulnerability |
| CVE-2023-36415 | Azure Id SDK Distant Code Execution Vulnerability |
| CVE-2023-36418 | Azure RTOS GUIX Studio Distant Code Execution Vulnerability |
| CVE-2023-36419 | Azure HDInsight Apache Oozie Workflow Scheduler Elevation of Privilege Vulnerability |
| CVE-2023-36561 | Azure DevOps Server Elevation of Privilege Vulnerability |
| CVE-2023-36737 | Azure Community Watcher VM Agent Elevation of Privilege Vulnerability |
SQL (5 CVEs)
| Vital severity | |
| CVE-2023-36417 | Microsoft SQL OLE DB Distant Code Execution Vulnerability |
| CVE-2023-36420 | Microsoft ODBC Driver for SQL Server Distant Code Execution Vulnerability |
| CVE-2023-36728 | Microsoft SQL Server Denial of Service Vulnerability |
| CVE-2023-36730 | Microsoft ODBC Driver for SQL Server Distant Code Execution Vulnerability |
| CVE-2023-36785 | Microsoft ODBC Driver for SQL Server Distant Code Execution Vulnerability |
Skype (4 CVEs)
| Vital severity | |
| CVE-2023-36780 | Skype for Enterprise Distant Code Execution Vulnerability |
| CVE-2023-36786 | Skype for Enterprise Distant Code Execution Vulnerability |
| CVE-2023-36789 | Skype for Enterprise Distant Code Execution Vulnerability |
| CVE-2023-41763 | Skype for Enterprise Elevation of Privilege Vulnerability |
Dynamics 365 (3 CVEs)
| Vital severity | |
| CVE-2023-36416 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability |
| CVE-2023-36429 | Microsoft Dynamics 365 Data Disclosure Vulnerability |
| CVE-2023-36433 | Microsoft Dynamics 365 (On-Premises) Data Disclosure Vulnerability |
Workplace (3 CVEs)
| Vital severity | |
| CVE-2023-36565 | Microsoft Workplace Graphics Elevation of Privilege Vulnerability |
| CVE-2023-36568 | Microsoft Workplace Click on-To-Run Elevation of Privilege Vulnerability |
| CVE-2023-36569 | Microsoft Workplace Elevation of Privilege Vulnerability |
.NET (1 CVE)
| Vital severity | |
| CVE-2023-38171 | Microsoft QUIC Denial of Service Vulnerability |
Alternate (1 CVE)
| Vital severity | |
| CVE-2023-36778 | Microsoft Alternate Server Distant Code Execution Vulnerability |
Microsoft Widespread Information Mannequin SDK (1 CVE)
| Crucial severity | |
| CVE-2023-36566 | Microsoft Widespread Information Mannequin SDK Denial of Service Vulnerability |
MMPC (1 CVE)
| Vital severity | |
| CVE-2023-36700 | Microsoft Defender Safety Characteristic Bypass Vulnerability |
Visible Studio (1 CVE)
| Vital severity | |
| CVE-2023-38171 | Microsoft QUIC Denial of Service Vulnerability |
Appendix D: Different Merchandise
This can be a checklist of advisories within the October Microsoft launch, sorted by product group.
Chromium / Edge (1 subject)
| CVE-2023-5346 | Chromium: CVE-2023-5346 Sort Confusion in V8 |
The CVE-2023-44487 coated extensively above additionally applies to Chromium / Edge.
Appendix E: Finish of Servicing, Finish of Help, and different modifications
These three tables cowl Microsoft merchandise altering standing on 10 October 2023.
| Finish of Servicing (2 merchandise) |
| Dynamics 365 Enterprise Central on-premises (Trendy Coverage), 2022 launch wave 1, model 20.x |
| Home windows 11 Dwelling and Professional, Model 21H2 |
| Finish of Help (21 merchandise) |
| Excel 2019 for Mac |
| Hyper-V Server 2012 |
| Hyper-V Server 2012 R2 |
| Web Explorer 7 |
| Web Data Companies (IIS), IIS 8 on Home windows Server 2012 |
| Web Data Companies (IIS), IIS 8.5 on Home windows Server 2012 R2 |
| Microsoft Workplace 2019 for Mac |
| Microsoft Workplace Audit and Management Administration Server 2013 |
| Outlook 2019 for Mac |
| PowerPoint 2019 for Mac |
| Home windows Embedded Compact 2013 |
| Home windows Embedded POSReady 7, Prolonged Safety Replace Yr 2* |
| Home windows Embedded Normal 7, Prolonged Safety Replace Yr 3* |
| Home windows MultiPoint Server 2012 |
| Home windows Server 2012 |
| Home windows Server 2012 R2 |
| Home windows Server Replace Companies for Home windows Server 2012 |
| Home windows Server Replace Companies for Home windows Server 2012 R2 |
| Home windows Storage Server 2012 |
| Home windows Storage Server 2012 R2 |
| Phrase 2019 for Mac |
| Transferring from Mainstream to Prolonged Help (11 merchandise) |
| Entry 2019 |
| Dynamics 365 Enterprise Central on-premises (Fastened Coverage) |
| Excel 2019 |
| Microsoft Workplace 2019 |
| OneNote 2016 |
| Outlook 2019 |
| PowerPoint 2019 |
| Mission 2019 |
| Writer 2019 |
| Visio 2019 |
| Phrase 2019 |


