Sintesi

Microsoft ha rilasciato gli aggiornamenti di sicurezza mensili che risolvono un totale di 80 nuove vulnerabilità, di cui 2 di tipo 0-day.

Note: il vendor afferma che le CVE-2023-23397 e CVE-2023-24880 risultano essere sfruttatate attivamente in rete.

Note (aggiornamento del 21/03/2023): dei Proof of Concept (PoC) per lo sfruttamento delle CVE-2023-24880 e CVE-2023-23415 risultano disponibili in rete.

Rischio

Stima d’impatto della vulnerabilità sulla comunità di riferimento: GRAVE/ROSSO (76,12/100)1.

Tipologia

  • Spoofing
  • Remote Code Execution
  • Security Feature Bypass
  • Information Disclosure
  • Denial of Service
  • Elevation of Privilege

Prodotti e versioni affette

  • Azure
  • Client Server Run-time Subsystem (CSRSS)
  • Internet Control Message Protocol (ICMP)
  • Microsoft Bluetooth Driver
  • Microsoft Dynamics
  • Microsoft Edge (Chromium-based)
  • Microsoft Graphics Component
  • Microsoft Office Excel
  • Microsoft Office Outlook
  • Microsoft Office SharePoint
  • Microsoft OneDrive
  • Microsoft PostScript Printer Driver
  • Microsoft Printer Drivers
  • Microsoft Windows Codecs Library
  • Office for Android
  • Remote Access Service Point-to-Point Tunneling Protocol
  • DNS Server
  • Windows Hyper-V
  • Service Fabric
  • Visual Studio
  • Windows Accounts Control
  • Windows Bluetooth Service
  • Windows Central Resource Manager
  • Windows Cryptographic Services
  • Windows Defender
  • Windows HTTP Protocol Stack
  • Windows HTTP.sys
  • Windows Internet Key Exchange (IKE) Protocol
  • Windows Kernel
  • Windows Partition Management Driver
  • Windows Point-to-Point Protocol over Ethernet (PPPoE)
  • Windows Remote Procedure Call
  • Windows Remote Procedure Call Runtime
  • Windows Resilient File System (ReFS)
  • Windows Secure Channel
  • Windows SmartScreen
  • Windows TPM
  • Windows Win32K

Azioni di mitigazione

In linea con le dichiarazioni del vendor, si raccomanda di procedere all’aggiornamento dei prodotti impattati attraverso l’apposita funzione di Windows Update.

Identificatori univoci vulnerabilità

CVE-ID
CVE-2023-23389 CVE-2023-23421 CVE-2023-22743 CVE-2023-23618
CVE-2023-24911 CVE-2023-24870 CVE-2023-23423 CVE-2023-24863
CVE-2023-23400 CVE-2023-24930 CVE-2023-24908 CVE-2023-23406
CVE-2023-24922 CVE-2023-23397 CVE-2023-23399 CVE-2023-24907
CVE-2023-24910 CVE-2023-23420 CVE-2023-23946 CVE-2023-24890
CVE-2023-24858 CVE-2023-24880 CVE-2023-23394 CVE-2023-22490
CVE-2023-23385 CVE-2023-21708 CVE-2023-24913 CVE-2023-24856
CVE-2023-23407 CVE-2023-24909 CVE-2023-24872 CVE-2023-23413
CVE-2023-24862 CVE-2023-23417 CVE-2023-24882 CVE-2023-23409
CVE-2023-24876 CVE-2023-24859 CVE-2023-24864 CVE-2023-23391
CVE-2023-1017 CVE-2023-23395 CVE-2023-24906 CVE-2023-23393
CVE-2023-23408 CVE-2023-23422 CVE-2023-24892 CVE-2023-23410
CVE-2023-24879 CVE-2023-23392 CVE-2023-24861 CVE-2023-1018
CVE-2023-23383 CVE-2023-23416 CVE-2023-23396 CVE-2023-23419
CVE-2023-23404 CVE-2023-24921 CVE-2023-24871 CVE-2023-23402
CVE-2023-24867 CVE-2023-23415 CVE-2023-24891 CVE-2023-23412
CVE-2023-24868 CVE-2023-24923 CVE-2023-23405 CVE-2023-23411
CVE-2023-23398 CVE-2023-24869 CVE-2023-24920 CVE-2023-23403
CVE-2023-24857 CVE-2023-24919 CVE-2023-23401 CVE-2023-23418
CVE-2023-24865 CVE-2023-23414 CVE-2023-23388 CVE-2023-24866

Riferimenti

https://msrc.microsoft.com/update-guide/releaseNote/2023-Mar

https://msrc.microsoft.com/update-guide (NB: filtro: patch tuesday – March 2023)

1La presente stima è effettuata tenendo conto di diversi parametri, tra i quali: CVSS, disponibilità di patch/workaround e PoC, diffusione dei software/dispositivi interessati nella comunità di riferimento.