Skip to content

Microsoft January 2023 Security Updates - 20230111001

Overview

Microsoft's January 2023 security updates fix 98 vulnerabilities, including remote code execution, bypass security features, or elevate privileges, to address multiple vulnerabilities in Microsoft software. An attacker could exploit some of these vulnerabilities to take control of an affected system.

The Office of Digital Government (DGov) encourages Western Australian Government organisations to regularly check Microsoft’s Release Notes regarding these CVEs, and implement any actions and updates as required.

What is the vulnerability ?

Out of Microsoft's 118 vulnerabilities security updated, a few more notable due to the high severity score:


CVE Vulnerability Name Security Update Released Threat Description Action
CVE-2023-21674 CVSSv3: 8.8 HIGH Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability 2023-01-10 Microsoft Windows Cryptographic Next Generation (CNG) Key Isolation Service contains an unspecified vulnerability which allows an attacker to gain SYSTEM-level privileges. Immediately apply updates per vendor instructions due to vulnerability already being exploited.
CVE-2022-21549 CVSSv3: 8.8 HIGH Windows SMB Witness Service Elevation of Privilege Vulnerability 2023-01-10 An attacker could execute a specially crafted malicious script that executes an RPC call to an RPC host. This could result in elevation of privilege on the server. An attacker who successfully exploited this vulnerability could execute RPC functions that are restricted to privileged accounts only. Immediately apply updates per vendor instructions.
CVE-2023-21561 CVSSv3: 8.8 HIGH Microsoft Cryptographic Services Elevation of Privilege Vulnerability 2023-01-10 The vulnerability allows a remote attacker to perform a denial of service (DoS) attack. The vulnerability exists due to insufficient validation of user-supplied input in Windows iSCSI Service. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack. Immediately apply updates per vendor instructions.
CVE-2023-21563 BitLocker Security Feature Bypass Vulnerability 2023-01-10 A successful attacker could bypass the BitLocker Device Encryption feature on the system storage device. An attacker with physical access to the target could exploit this vulnerability to gain access to encrypted data.. Apply updates per vendor instructions.
CVE-2023-21527 Windows iSCSI Service Denial of Service Vulnerability 2023-01-10 The vulnerability allows a remote attacker to perform a denial of service (DoS) attack. The vulnerability exists due to insufficient validation of user-supplied input in Windows iSCSI Service. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack. Apply updates per vendor instructions.

What is vulnerable ?

The total number of issue types identified by Microsoft in each vulnerability category are listed below:

  • 39 Elevation of Privilege Vulnerabilities
  • 4 Security Feature Bypass Vulnerabilities
  • 33 Remote Code Execution Vulnerabilities
  • 10 Information Disclosure Vulnerabilities
  • 10 Denial of Service Vulnerabilities
  • 2 Spoofing Vulnerabilities

Recommendation

The WA SOC recommends administrators immediately apply the solutions and updates as per vendor instructions to all affected platforms: https://msrc.microsoft.com/update-guide/deployments

Additional References