Tripwire's July 2023 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft.
First on the patch priority list this month are patches for Microsoft Office, Access, Excel, and Outlook. The patches resolve 10 issues including remote code execution, information disclosure, security feature bypass, and spoofing vulnerabilities.
Next are patches that affect components of the core Windows operating system. These patches resolve over 90 vulnerabilities, including elevation of privilege, information disclosure, security feature bypass, remote code execution, and denial of service vulnerabilities. These vulnerabilities affect core Windows, Kernel, Remote Desktop, Pragmatic General Multicast (PGM), Paint 3D, MSHTML, Netlogon, Installer, Raw Image Extension, Error Reporting, RPC, Message Queuing, and many others.
Up next are patches for Visual Studio and .NET that resolve elevation of privilege, remote code execution, and security feature bypass vulnerabilities.
Lastly, administrators should focus on server-side patches for Dynamics, SharePoint, DNS Server, WSUS, Windows Admin Center, Windows Routing and Remote Access Service (RRAS), Active Directory, and Failover cluster. These patches resolve numerous issues including remote code execution, spoofing, cross-site scripting, elevation of privilege, and information disclosure vulnerabilities.
BULLETIN |
CVE |
CVE-2023-33152 |
|
CVE-2023-33162, CVE-2023-33158, CVE-2023-33161 |
|
CVE-2023-33153, CVE-2023-35311, CVE-2023-33151 |
|
CVE-2023-33148, CVE-2023-33150, CVE-2023-36884 |
|
CVE-2023-35342, CVE-2023-35321, CVE-2023-35322, CVE-2023-35332, CVE-2023-32043, CVE-2023-35352, CVE-2023-36874, CVE-2023-35341, CVE-2023-33174, CVE-2023-32050, CVE-2023-32053, CVE-2023-21526, CVE-2023-35328, CVE-2023-35373, CVE-2023-32054, CVE-2023-32052, CVE-2023-35297, CVE-2023-32051, CVE-2023-35303, CVE-2023-36872, CVE-2023-35330, CVE-2023-32049, CVE-2023-32055, CVE-2023-32041, CVE-2023-35338, CVE-2023-33155, CVE-2023-35353, CVE-2023-35320, CVE-2023-33149, CVE-2023-21756, CVE-2023-32046, CVE-2023-35336, CVE-2023-35308, CVE-2023-35357, CVE-2023-35356, CVE-2023-35358, CVE-2023-35304, CVE-2023-35305, CVE-2023-35363, CVE-2023-35329, CVE-2023-35374, CVE-2023-32047 |
|
CVE-2023-32037, CVE-2023-33156, CVE-2023-35315, CVE-2023-33154, CVE-2023-35362, CVE-2023-35339, CVE-2023-35331, CVE-2023-32035, CVE-2023-32034, CVE-2023-33166, CVE-2023-33167, CVE-2023-33172, CVE-2023-33164, CVE-2023-33168, CVE-2023-33169, CVE-2023-33173, CVE-2023-35319, CVE-2023-35318, CVE-2023-35314, CVE-2023-35316, CVE-2023-35300, CVE-2023-35333, CVE-2023-32042, CVE-2023-35337, CVE-2023-32044, CVE-2023-32045, CVE-2023-32057, CVE-2023-35309, CVE-2023-35298, CVE-2023-32084, CVE-2023-35340, CVE-2023-35296, CVE-2023-32039, CVE-2023-32040, CVE-2023-35324, CVE-2023-35306, CVE-2023-32085, CVE-2023-35302, CVE-2023-35325, CVE-2023-35299, CVE-2023-35312, CVE-2023-33163, CVE-2023-32038, CVE-2023-35343, CVE-2023-35326, CVE-2023-35347, CVE-2023-35364, CVE-2023-35360, CVE-2023-35361 |
|
CVE-2023-33127, CVE-2023-36867, CVE-2023-33170 |
|
CVE-2023-33157, CVE-2023-33134, CVE-2023-33160, CVE-2023-33165, CVE-2023-33159 |
|
CVE-2023-35344, CVE-2023-35345, CVE-2023-35346, CVE-2023-35310 |
|
CVE-2023-32056, CVE-2023-35317 |
|
CVE-2023-35335, CVE-2023-33171 |
|
CVE-2023-29347 |
|
CVE-2023-35323, CVE-2023-35313 |
|
CVE-2023-35366, CVE-2023-35367, CVE-2023-35365 |
|
CVE-2023-35348, CVE-2023-36871, CVE-2023-35351, CVE-2023-35350 |
|
CVE-2023-32083 |
Mastering Security Configuration Management
Master Security Configuration Management with Tripwire's guide on best practices. This resource explores SCM's role in modern cybersecurity, reducing the attack surface, and achieving compliance with regulations. Gain practical insights for using SCM effectively in various environments.