Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 78 vulnerabilities that were fixed in 15 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 15 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
This security update contains the following KBs:
KB5002449
KB5002459
QID Detection Logic:
This authenticated QID checks the file versions from the Microsoft advisory with the versions on affected outlook applications.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
August 2023
This security update contains the following KBs:
KB5002437
KB5002436
KB5002422
KB5002453
KB5002398
QID Detection Logic (Authenticated):
Operating System: Windows
KB5002437
KB5002436
KB5002422
KB5002453
KB5002398
Patches:
The following are links for downloading patches to fix these vulnerabilities:
August 2023
This security update contains the following:
Office Click-2-Run and Office 365 Release Notes
KB5002451
KB5002463
KB5002435
KB5002445
KB5002464
QID Detection Logic (Authenticated):
Operating System: Windows
The detection extracts the Install Path for Microsoft Office via the Windows Registry. The QID checks the file version of "graph.exe" to identify vulnerable versions of Microsoft Office.
Patched Versions for Microsoft 365 Apps for enterprise, Microsoft 365 Apps for business, Office 2016 Retail (C2R), Office 2019, Office Current Channel: Version 2307 (Build 16626.20170)
Monthly Enterprise Channel: Version 2306 (Build 16529.20226).
Monthly Enterprise Channel: Version 2305 (Build 16501.20286).
Semi-Annual Enterprise Channel (Preview): Version 2302 (Build 16130.20714).
Semi-Annual Enterprise Channel: Version 2302 (Build 16130.20714).
Semi-Annual Enterprise Channel: Version 2208 (Build 15601.20742).
Semi-Annual Enterprise Channel: Version 2202 (Build 14931.21078).
Office 2021 Retail: Version 2307 (Build 16626.20170).
Office 2019 Retail: Version 2307 (Build 16626.20170).
Office 2016 Retail: Version 2306 Version 2307 (Build 16626.20170).
Office LTSC 2021 Volume Licensed: Version 2108 (Build 14332.20546).
Office 2019 Volume Licensed: Version 1808 (Build 10401.20025).
Note: Office click-2-run and Office 365 installations need to be updated manually or need to be set to automatic update. There is no direct download for the patch.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft office July 2023
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Edge (chromium based) 115.0.1901.200
Affected Versions:
Microsoft Teams for Desktop Versions Prior to 1.6.00.18681
QID Detection Logic(Auth):
QID checks for the vulnerable version of Teams.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2023-29328
CVE-2023-29330
KB Articles associated with this update are: KB5029388 or KB5030524
Affected Versions:
Microsoft Exchange Server 2016 Cumulative Update 23
Microsoft Exchange Server 2019 Cumulative Update 12
Microsoft Exchange Server 2019 Cumulative Update 13
QID Detection Logic (Authenticated):
The QID checks for vulnerable version of Microsoft Exchange Server by checking the file version of Exsetup.exe.
Note: For CVE-2023-21709: There is script available, run the CVE-2023-21709.ps1 script
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB5029388
KB5030524
Following KBs are covered in this detection:
KB5029654
KB5029569
KB5029649
KB5029655
KB5029653
KB5029568
KB5029647
KB5029650
KB5028952
KB5028948
KB5029648
KB5029652
KB5029567
KB5029651
KB5029566
This security update is rated Important for supported versions of Microsoft .NET Framework.
.NET Framework 2.0, 3.0, 3.5, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8, and 4.8.1
QID Detection Logic (Authenticated):
Checks for vulnerable file version of ntoskrnl.exe or Mscorlib.dll or System.core.dll or System.web.dll for the respective .Net Framework KBs
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2023-36873
CVE-2023-36899
CVE-2023-38167:Microsoft Dynamics Business Central Elevation Of Privilege Vulnerability.
Affected Software:
Microsoft Dynamics 365 Business Central 2023 Release Wave 1 - Update
QID Detection Logic(Authenticated):
This authenticated QID flags vulnerable systems by detecting Vulnerable versions for file Microsoft.Dynamics.Nav.Server.exe
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB5029765
Azure DevOps Server is a Microsoft product that provides version control, reporting, requirements management, project management, automated builds, testing, and release management capabilities.
CVE-2023-36869: Azure DevOps Server Spoofing Vulnerability.
Affected Software:
Azure DevOps Server 2019.0.1
Azure DevOps Server 2019.1.2
Azure DevOps Server 2020.1.2
Azure DevOps Server 2022.0.1
QID Detection Logic(Authenticated):
This authenticated QID flags vulnerable systems by detecting Vulnerable versions for file Microsoft.TeamFoundation.Framework.Server.dll.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2023-36869
A complete Qualys vulnerability scan report for Microsoft Azure Stack Hub can be obtained at Azure Stack Vulnerability Scan Report.
QID Detection Logic (Authenticated):
This QID checks for the file version of ntoskrnl.exe, if this file version is less than 10.0.17763.11626, it is considered as vulnerable.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Azure Stack Hub
The patch version is 6.3.9600.21501 for 5029312
The patch version is 6.3.9600.21501 for 5029304
The patch version is 6.2.9200.24412 for 5029295
The patch version is 6.2.9200.24412 for 5029308
The patch version is 6.1.7601.26662 for 5029296
The patch version is 6.1.7601.26662 for 5029307
The patch version is 6.0.6003.22214 for 5029318
The patch version is 6.0.6003.22214 for 5029301
The patch version is 10.0.14393.6167 for 5029242
The patch version is 10.0.10240.20107 for 5029259
The patch version is 10.0.19041.3324 for 5029244
The patch version is 10.0.22621.2134 for 5029263
The patch version is 10.0.22000.2295 for 5029253
The patch version is 10.0.20348.1906 for 5029250
The patch version is 10.0.17763.4737 for 5029247
QID Detection Logic (Authenticated):
This QID checks for the file version of 'ntoskrnl.exe'.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB5029242
KB5029244
KB5029247
KB5029250
KB5029253
KB5029259
KB5029263
KB5029295
KB5029296
KB5029301
KB5029304
KB5029307
KB5029308
KB5029312
KB5029318
Affected versions:
.NET 6.0 before version 6.0.21
.NET 7.0 before version 7.0.10
QID Detection Logic: Authenticated
On Windows, this QID detects vulnerable versions of Microsoft .NET by checking the file version.
On Linux, this QID detects vulnerable versions of Microsoft .NET by checking the .NET version present in "/usr/share/dotnet/shared/Microsoft.NETCore.App/" and "/root/shared/Microsoft.NETCore.App" folders.
On Mac, this QID detects vulnerable versions of Microsoft .NET by checking the .NET version present in "/usr/share/dotnet/shared/Microsoft.NETCore.App/" folder.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2023-35390
CVE-2023-35391
CVE-2023-38178
CVE-2023-38180
Affected Product:
HEVC Video Extensions before 2.0.61931.0
HEVC Video Extensions before 2.0.61933.0
QID detection Logic:
The gets the version of HEVCVideoExtension and AV1VideoExtension by querying wmi class Win32_InstalledStoreProgram.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2023-38170
Microsoft has released security Updates for Visual Studio which resolve Security Feature Bypass and Escalation of Privileges Vulnerabilities.
Affected Software:
Microsoft Visual Studio 2022 version 17.6
Microsoft Visual Studio 2022 version 17.4
Microsoft Visual Studio 2022 version 17.2
QID Detection Logic: Authenticated : Windows
This QID detects vulnerable versions of Microsoft Visual Studio by checking the registry key "HKLM\SOFTWARE\Microsoft" and file "evenv.exe" to check the version of the Visual Studio.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2023-35390
CVE-2023-35391
CVE-2023-36897
CVE-2023-38178
CVE-2023-38180
Affected Software:
Windows Defende Antimalware Platform
Affected Version:
Windows Defender prior to build 1.1.23060.3001
QID Detection Logic (Authenticated):
The authenticated check looks for a vulnerable version of file under system32 directory MpSigStub.exe
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2023-38175
These new vulnerability checks are included in Qualys vulnerability signature 2.5.835-3. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.