Tripwire's February 2023 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft.
First on the patch priority list this month is a patch for Microsoft Defender for Endpoint that resolves a security feature bypass vulnerability.
Next are patches for Microsoft Edge that resolve 15 vulnerabilities, including remote code execution, spoofing, and tampering vulnerabilities.
Up next on the priority list are patches for Microsoft Word, OneNote, Publisher, and Office that resolve remote code execution, spoofing, security feature bypass, and information disclosure vulnerabilities.
Up next are patches that affect components of the core Windows operating system. These patches resolve over 35 vulnerabilities, including elevation of privilege, information disclosure, security feature bypass, remote code execution, and denial of service vulnerabilities. These vulnerabilities affect core Windows, Kernel, Graphics, ODBC Driver, PostScripter Printer Driver, Windows Installer, PEAP, Secure Channel, iSCSI Service, MSHTML, Fax Service, Common Log File System Driver, and others.
Next are patches for .NET and Visual Studio Code that resolves remove code execution and denial-of-service vulnerabilities.
Lastly, administrators should focus on server-side patches for SharePoint, Exchange, Distributed File System, Dynamics, Azure DevOps, SQL Server and Active Directory. These patches resolve remote code execution, elevation of privilege, spoofing, cross-site scripting, and information disclosure vulnerabilities.
BULLETIN |
CVE |
CVE-2023-21809 |
|
CVE-2023-0697, CVE-2023-0696, CVE-2023-0699, CVE-2023-0698, CVE-2023-0705, CVE-2023-0704, CVE-2023-0701, CVE-2023-0700, CVE-2023-0703, CVE-2023-0702, CVE-2023-23374, CVE-2023-21794, CVE-2023-21720 |
|
CVE-2023-21716 |
|
CVE-2023-21721 |
|
CVE-2023-21715 |
|
CVE-2023-21714 |
|
CVE-2023-21693, CVE-2023-21684, CVE-2023-21801, CVE-2023-21800, CVE-2023-21813, CVE-2023-21819, CVE-2023-21701, CVE-2023-21691, CVE-2023-21695, CVE-2023-21692, CVE-2023-21689, CVE-2023-21690, CVE-2023-21818, CVE-2023-21802, CVE-2023-23390, CVE-2023-23377, CVE-2023-23378, CVE-2023-21804, CVE-2023-21823, CVE-2023-21798, CVE-2023-21797, CVE-2023-21700, CVE-2023-21803, CVE-2023-21702, CVE-2023-21811, CVE-2023-21805, CVE-2023-21686, CVE-2023-21685, CVE-2023-21799, CVE-2023-21822, CVE-2023-21697, CVE-2023-21699, CVE-2023-21817, CVE-2023-21687, CVE-2023-21688, CVE-2023-21694, CVE-2023-23376, CVE-2023-21812 |
|
CVE-2023-21567, CVE-2023-21566, CVE-2023-21815, CVE-2023-23381, CVE-2023-21722, CVE-2023-21808 |
|
CVE-2023-21820 |
|
CVE-2023-21807, CVE-2023-21572, CVE-2023-21573, CVE-2023-21570, CVE-2023-21571, CVE-2023-21778 |
|
CVE-2023-21564, CVE-2023-21553 |
|
CVE-2023-21717 |
|
CVE-2023-21704, CVE-2023-21718, CVE-2023-21568, CVE-2023-21705, CVE-2023-21713, CVE-2023-21528 |
|
CVE-2023-21707, CVE-2023-21706, CVE-2023-21529, CVE-2023-21710 |
|
CVE-2023-21816 |
Mastering Security Configuration Management
Master Security Configuration Management with Tripwire's guide on best practices. This resource explores SCM's role in modern cybersecurity, reducing the attack surface, and achieving compliance with regulations. Gain practical insights for using SCM effectively in various environments.