Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 96 vulnerabilities that were fixed in 12 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 12 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
This security update contains the following:
Office Click-2-Run and Office 365 Release Notes
QID Detection Logic (Authenticated):
Operating System: Windows
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft office October 2023
Affected Software:
Microsoft Skype for Business Server 2015 CU13
Microsoft Skype for Business Server 2019 CU7
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2023-36780
CVE-2023-36786
CVE-2023-36789
CVE-2023-41763
Affected Software:
Microsoft ODBC Driver 17 for SQL Server on Windows version prior to 17.10.5.1
Microsoft ODBC Driver 18 for SQL Server on Windows version prior to 18.3.2.1
Microsoft ODBC Driver 17 for SQL Server on Linux version prior to 17.10.5.1
Microsoft ODBC Driver 18 for SQL Server on Linux version prior to 18.3.2.1
Microsoft SQL Server 2022 for x64-based Systems (GDR)
Microsoft SQL Server 2019 for x64-based Systems (GDR)
Microsoft SQL Server 2022 for x64-based Systems ( (CU 8))
Microsoft SQL Server 2019 for x64-based Systems (CU 22)
Microsoft SQL Server 2017 for x64-based Systems (CU 31)
Microsoft SQL Server 2017 for x32-based Systems (CU 31)
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR)
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature Pack
Microsoft SQL Server 2014 Service Pack 3 for x64-based Systems (CU 4)
Microsoft SQL Server 2014 Service Pack 3 for x32-based Systems (GDR)
Microsoft OLE DB Driver 19 for SQL Server version prior to 19.3.2.0
Microsoft OLE DB Driver 18 for SQL Server version prior to 18.6.7.0
QID Detection Logic (Authenticated):
On Windows, this QID checks for the vulnerable version of ODBC and OLE DB via the registry keys HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft and HKEY_LOCAL_MACHINE\WOW6432Node\SOFTWARE\Microsoft and the related sub keys for ODBC and OLE DB.
On Linux, this QID checks for the vulnerable version of ODBC based on the installed package.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2023-36417
CVE-2023-36420
CVE-2023-36728
CVE-2023-36730
CVE-2023-36785
QID Detection Logic:(Authenticated)
Through the registry key "HKLM\SYSTEM\CurrentControlSet\Services\HTTP\Parameters", this QID determines if the HTTP/2 protocol is disabled on the computer.
Customers are advised to refer to HTTP/2 for using the registry editor to update a registry key.
KB Articles associated with this update are: KB5030524
Affected Versions:
Microsoft Exchange Server 2016 Cumulative Update 23
Microsoft Exchange Server 2019 Cumulative Update 12
Microsoft Exchange Server 2019 Cumulative Update 13
QID Detection Logic (Authenticated):
The QID checks for vulnerable version of Microsoft Exchange Server by checking the file version of Exsetup.exe.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
5030877
Affected Software:
Microsoft Dynamics 365 (on-premises) prior to 9.0.50.03
Microsoft Dynamics 365 (on-premises) prior to 9.1.22.04
QID Detection Logic(Authenticated):
This authenticated QID flags vulnerable systems by detecting Vulnerable versions for file Microsoft.Crm.Setup.Server.exe:
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2023-36429
CVE-2023-36433
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36416
Affected Products:
Windows Server 2019
Windows Server 2016
Windows Server 2022
Windows 11 Version 21H2
Windows 11 Version 22H2
Windows 10 Version 21H2
Windows 10 Version 22H2
Windows 10 Version 1607
Microsoft Windows 10 Version 1809
.NET 7.0 and 6.0
ASP.NET Core 7.0 and 6.0
Microsoft Visual Studio 2022 version 17.2
Microsoft Visual Studio 2022 version 17.4
Microsoft Visual Studio 2022 version 17.6
Microsoft Visual Studio 2022 version 17.7
QID Detection Logic:
Windows: This QID checks for the file version of 'http.sys'. and also checks for the HTTP/2 protocol is enabled via registry key "HKLM\SYSTEM\CurrentControlSet\Services\HTTP\Parameters"
.Net:
On Windows, this QID detects vulnerable versions of Microsoft .NET by checking the file version.
On Linux, this QID detects vulnerable versions of Microsoft .NET by checking the .NET version present in "/usr/share/dotnet/shared/Microsoft.NETCore.App/" and "/root/shared/Microsoft.NETCore.App" folders.
On Mac, this QID detects vulnerable versions of Microsoft .NET by checking the .NET version present in "/usr/share/dotnet/shared/Microsoft.NETCore.App/" folder.
Asp.Net: The qid looks for sub directories under %programfiles%\dotnet\shared\Microsoft.NETCore.App, %programfiles(x86)%\dotnet\shared\Microsoft.NETCore.App and checks for vulnerable versions in .version file on Windows.
Visual Studio: This QID detects vulnerable versions of Microsoft Visual Studio by checking the registry key "HKLM\SOFTWARE\Microsoft" and file "evenv.exe" to check the version of the Visual Studio.
1. Disable the HTTP/2 protocol on your web server by using the Registry Editor
2. Include a protocols setting for each Kestral endpoint to limit your application to HTTP1.1
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Security Advisory
Azure DevOps Server is a Microsoft product that provides version control, reporting, requirements management, project management, automated builds, testing, and release management capabilities.
Affected Software:
Azure DevOps Server 2020.1.2
Azure DevOps Server 2020.0.2
Azure DevOps Server 2022.0.1
QID Detection Logic(Authenticated):
This authenticated QID flags vulnerable systems by detecting Vulnerable versions for file Microsoft.TeamFoundation.Framework.Server.dll.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2023-36561
Patch version is 6.3.9600.21620 for KB5031419
Patch version is 6.3.9600.21620 for KB5031407
Patch version is 6.2.9200.24523 for KB5031442
Patch version is 6.2.9200.24523 for KB5031427
Patch version is 6.1.7601.26769 for KB5031408
Patch version is 6.1.7601.26769 for KB5031441
Patch version is 6.0.6003.22317 for KB5031416
Patch version is 6.0.6003.22317 for KB5031411
Patch version is 10.0.14393.6343 for KB5031362
Patch version is 10.0.10240.20232 for KB5031377
Patch version is 10.0.19041.3570 for KB5031356
Patch version is 10.0.22621.2428 for KB5031354
Patch version is 10.0.22000.2538 for KB5031358
Patch version is 10.0.20348.2031 for KB5031364
Patch version is 10.0.17763.4974 for KB5031361
QID Detection Logic (Authenticated):
This QID checks for the file version of 'ntoskrnl.exe'.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB5031354
KB5031356
KB5031358
KB5031361
KB5031362
KB5031364
KB5031377
KB5031407
KB5031408
KB5031411
KB5031416
KB5031419
KB5031427
KB5031441
KB5031442
A complete Qualys vulnerability scan report for Microsoft Azure Stack Hub can be obtained at Azure Stack Vulnerability Scan Report.
QID Detection Logic (Authenticated):
This QID checks for the file version of ntoskrnl.exe, if this file version is less than 10.0.17763.11748, it is considered as vulnerable.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Azure Stack Hub
Affected Software:
Microsoft Visual Studio 2022 version 17.7
Microsoft Visual Studio 2022 version 17.6
Microsoft Visual Studio 2022 version 17.4
Microsoft Visual Studio 2022 version 17.2
QID Detection Logic: Authenticated : Windows
This QID detects vulnerable versions of Microsoft Visual Studio by checking the registry key "HKLM\SOFTWARE\Microsoft" and file "devenv.exe" to check the version of the Visual Studio.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2023-38171
Affected versions:
.NET 7.0 before version 7.0.12
QID Detection Logic: Authenticated
On Windows, this QID detects vulnerable versions of Microsoft .NET by checking the file version.
On Linux, this QID detects vulnerable versions of Microsoft .NET by checking the .NET version present in "/usr/share/dotnet/shared/Microsoft.NETCore.App/" and "/root/shared/Microsoft.NETCore.App" folders.
On Mac, this QID detects vulnerable versions of Microsoft .NET by checking the .NET version present in "/usr/share/dotnet/shared/Microsoft.NETCore.App/" folder.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2023-36435
CVE-2023-38171
These new vulnerability checks are included in Qualys vulnerability signature 2.5.884-3. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.