Patch Tuesday March 2023 – Microsoft Releases Fixes for 23 Vulnerabilities

As part of the March vulnerability patching bout, Microsoft has released 23 fixes for Chromium- and OS-based security bugs. The list also features patches for non-Edge vulnerabilities such as the Windows MSHTML Remote Code Execution Vulnerability and the Power BI Report Server spoofing vulnerability. With this in mind, let’s take a closer look at what Patch Tuesday March 2023 has in store for us. Enjoy!

Patch Tuesday March 2023 – Highlights

We’ll start the list with CVE-2023-21805, a Windows MSHTML Platform Remote Code Execution vulnerability. With a CVSS 3.1.7.8 score of 6.8 (i.e. Medium), this defect, which was traced back to a bugged Windows MSHTML Platform component, can potentially allow a threat actor to bypass safeguards and execute arbitrary code on the victim’s machine. A security patch is available on Microsoft’s official website. Next item is CVE-2023-21806, a Power BI Report Server Spoofing vulnerability, with a score of 7.1 (i.e. High) on the CVSS 3.1.8.2 scale.

According to Microsoft, an attacker could potentially trigger a full DOS across the network by passing the victim a specially-crafted package. Upon user interaction, the threat actor would have gained elevated permissions within the domain, allowing him to further exploit this web server vulnerability. Furthermore, per Microsoft’s observations, the threat actor could also tamper with report files, an action that would permit him to JavaScript-based attacks. CVE-2023-2180 has been addressed as part of Patch Tuesday March 2023.

The full list of fixed vulnerabilities can be found below.

Release Date CVE Number CVE Title
Mar 13, 2023 CVE-2023-1236 Chromium: CVE-2023-1236 Inappropriate implementation in Internals
Mar 13, 2023 CVE-2023-1235 Chromium: CVE-2023-1235 Type Confusion in DevTools
Mar 13, 2023 CVE-2023-1234 Chromium: CVE-2023-1234 Inappropriate implementation in Intents
Mar 13, 2023 CVE-2023-1233 Chromium: CVE-2023-1233 Insufficient policy enforcement in Resource Timing
Mar 13, 2023 CVE-2023-1232 Chromium: CVE-2023-1232 Insufficient policy enforcement in Resource Timing
Mar 13, 2023 CVE-2023-1231 Chromium: CVE-2023-1231 Inappropriate implementation in Autofill
Mar 13, 2023 CVE-2023-1230 Chromium: CVE-2023-1230 Inappropriate implementation in WebApp Installs
Mar 13, 2023 CVE-2023-1229 Chromium: CVE-2023-1229 Inappropriate implementation in Permission prompts
Mar 13, 2023 CVE-2023-1228 Chromium: CVE-2023-1228 Insufficient policy enforcement in Intents
Mar 13, 2023 CVE-2023-1224 Chromium: CVE-2023-1224 Insufficient policy enforcement in Web Payments API
Mar 13, 2023 CVE-2023-1223 Chromium: CVE-2023-1223 Insufficient policy enforcement in Autofill
Mar 13, 2023 CVE-2023-1222 Chromium: CVE-2023-1222 Heap buffer overflow in Web Audio API
Mar 13, 2023 CVE-2023-1221 Chromium: CVE-2023-1221 Insufficient policy enforcement in Extensions API
Mar 13, 2023 CVE-2023-1220 Chromium: CVE-2023-1220 Heap buffer overflow in UMA
Mar 13, 2023 CVE-2023-1219 Chromium: CVE-2023-1219 Heap buffer overflow in Metrics
Mar 13, 2023 CVE-2023-1218 Chromium: CVE-2023-1218 Use after free in WebRTC
Mar 13, 2023 CVE-2023-1217 Chromium: CVE-2023-1217 Stack buffer overflow in Crash reporting
Mar 13, 2023 CVE-2023-1216 Chromium: CVE-2023-1216 Use after free in DevTools
Mar 13, 2023 CVE-2023-1215 Chromium: CVE-2023-1215 Type Confusion in CSS
Mar 13, 2023 CVE-2023-1214 Chromium: CVE-2023-1214 Type Confusion in V8
Mar 13, 2023 CVE-2023-1213 Chromium: CVE-2023-1213 Use after free in Swiftshader
Feb 14, 2023 CVE-2023-21805 Windows MSHTML Platform Remote Code Execution Vulnerability
Feb 14, 2023 CVE-2023-21806 Power BI Report Server Spoofing Vulnerability

Additional Cybersecurity Advice

This wraps up the spring edition of Heimdal®’s Patch Tuesday updates. As you would expect, here are a couple of things you can try out to bolster your threat defenses and jog up your vulnerability & patch management game.

  1. Backtracking. There’s no true recipe for flawless patching, which means something’s bound to happen at any time (e.g., unexpected patch failure, connection errors, no mobile control, insufficient privileges, failure to meet regulatory compliance requirements, etc.). Ensure that your backups are up and running if you need to revert the app(s) to a previous version.
  2. Frequent vulnerability scans. Don’t forget about your vulnerability scanning schedule. The best practice dictates that scanning should occur at least once per month. Don’t forget about documenting your findings.
  3. Automatic patching. Smaller organizations tend to rely on manual patching in order to deploy all relevant improvement-carrying packages. However, things tend to change a bit when you’re in the shoes of an IT admin catering to the needs of hundreds of users. The best way around this issue is, of course, automatic patching. If configured correctly, an automatic patching solution can ensure timely (and correct) deployment and a low risk of incompatibility. Heimdal®’s Patch & Asset Management can aid you in quickly distributing your patches, regardless if they are OS-specific, 3rd party, proprietary, or UX/UI-oriented.
  4. (Electronic) paper trail. If you’re managing a team, consider drafting up a list of patching protocols. Include dates, times, Operating Systems, tests, and everything you can think of. Don’t forget to scribble down any modifications made to the software.
  • Patch Tuesday, February 2023.
  • Heimdal® Cyber Threat Report 2023
  • Understanding Critical Event Management and How It Can Help Your Organization

If you liked this article, follow us on LinkedIn, Twitter, Facebook, and Youtube, for more cybersecurity news and topics.

图片[1]|Patch Tuesday March 2023 – Microsoft Releases Fixes for 23 Vulnerabilities|黑客技术网图片[2]|Patch Tuesday March 2023 – Microsoft Releases Fixes for 23 Vulnerabilities|黑客技术网If you liked this post, you will enjoy our newsletter.Get cybersecurity updates you\’ll actually want to read directly in your inbox.


Source: /3202-hcram-yadseut-hctap/golb/moc.ytirucesladmieh

© 版权声明
THE END
喜欢就支持一下吧
点赞15 分享
评论 抢沙发

请登录后发表评论