Tripwire's May 2023 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft.
First on the patch priority list this month are patches for Microsoft Edge. These patches resolve elevation and security feature bypass vulnerabilities.
Up next are 3 patches for Microsoft Office, Word, Excel, and Access that resolve remote code execution, security feature bypass, and denial of service vulnerabilities.
Next are patches that affect components of the core Windows operating system. These patches resolve over 25 vulnerabilities, including elevation of privilege, information disclosure, security feature bypass, remote code execution, and denial of service vulnerabilities. These vulnerabilities affect core Windows, Kernel, Graphics, MSHTML, NTLM, Secure Socket Tunneling, iSCSI, Installer, Secure Boot, Remote Desktop Client, LDAP, SMB, and others.
Up next are patches for Visual Studio and Microsoft Teams that resolve 2 information disclosure vulnerabilities.
Lastly, administrators should focus on server-side patches for NFS and SharePoint. These patches resolve remote code execution, spoofing, denial of service, and information disclosure vulnerabilities.
BULLETIN |
CVE |
CVE-2023-29350, CVE-2023-29354 |
|
CVE-2023-29335 |
|
CVE-2023-24953 |
|
CVE-2023-29333 |
|
CVE-2023-29344 |
|
CVE-2023-24903, CVE-2023-24945, CVE-2023-24904, CVE-2023-29343, CVE-2023-24932, CVE-2023-28251, CVE-2023-24941, CVE-2023-24940, CVE-2023-24943, CVE-2023-29341, CVE-2023-29340, CVE-2023-24899, CVE-2023-24949, CVE-2023-24948, CVE-2023-24944, CVE-2023-24947, CVE-2023-28290, CVE-2023-24942, CVE-2023-24900, CVE-2023-29324, CVE-2023-29325, CVE-2023-24946, CVE-2023-24902, CVE-2023-29336, CVE-2023-24905, CVE-2023-28283, CVE-2023-24898 |
|
CVE-2023-29338 |
|
CVE-2023-24881 |
|
CVE-2023-24939, CVE-2023-24901 |
|
CVE-2023-24954, CVE-2023-24955, CVE-2023-24950 |
Mastering Security Configuration Management
Master Security Configuration Management with Tripwire's guide on best practices. This resource explores SCM's role in modern cybersecurity, reducing the attack surface, and achieving compliance with regulations. Gain practical insights for using SCM effectively in various environments.