Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 95 vulnerabilities that were fixed in 10 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 10 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
This security update contains the following KBs:
KB5002254
KB5002265
QID Detection Logic:
This authenticated QID checks the file versions from the Microsoft advisory with the versions on affected outlook applications.
Note: Office click-2-run and Office 365 installations need to be updated manually or need to be set to automatic update. There is no direct download for the patch.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Outlook Security Update March 2023
This security update contains the following KBs:
KB5002347
KB5002312
KB5002353
KB5002342
KB5002330
KB5002346
QID Detection Logic:
This authenticated QID checks the file versions from above Microsoft KB article with the versions on affected SharePoint system.
KB5002347
KB5002312
KB5002353
KB5002342
KB5002330
KB5002346
Patches:
The following are links for downloading patches to fix these vulnerabilities:
March 2023
This security update contains the following KBs:
KB5002362
KB5002198
KB5002348
KB5002197
KB5002351
KB5002356
QID Detection Logic:
This authenticated QID checks the file versions from the Microsoft advisory with the versions on the affected office system.
Note: Office click-2-run and Office 365 installations need to be updated manually or need to be set to automatic update. There is no direct download for the patch.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft office March 2023
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Edge (chromium based) 110.0.1587.69
CVE-2023-24930 Updated build 23.020.0125.0002
QID Detection Logic (Authenticated) :
This checks for vulnerable version of OneDrive
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2023-24930
Operating Systems: Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2016, Windows 10, Windows 11, Windows Server 2022, Windows Server 2019
The KB Articles associated with the update:
The patch version is 10.0.22621.1413 for KB5023706
The patch version is 10.0.10240.19805 for KB5023713
The patch version is 10.0.19041.2728 for KB5023696
The patch version is 6.3.9600.20876 for KB5023765
The patch version is 6.3.9600.20876 for KB5023764
The patch version is 6.2.9200.24164 for KB5023756
The patch version is 6.2.9200.24164 for KB5023752
The patch version is 10.0.14393.5786 for KB5023697
The patch version is 10.0.22000.1696 for KB5023698
The patch version is 10.0.20348.1607 for KB5023705
The patch version is 10.0.17763.4131 for KB5023702
The patch version is 6.0.6003.21964 for KB5023754
The patch version is 6.0.6003.21964 for KB5023755
The patch version is 6.1.7601.26413 for KB5023759
The patch version is 6.1.7601.26413 for KB5023769
QID Detection Logic (Authenticated):
This QID checks for the file version of ntoskrnl.exe.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB5023696
KB5023697
KB5023698
KB5023702
KB5023705
KB5023706
KB5023713
KB5023752
KB5023754
KB5023755
KB5023756
KB5023759
KB5023764
KB5023765
KB5023769
Affected Software:
Microsoft Dynamics 365 (on-premises) V9.0
Microsoft Dynamics 365 (on-premises) V9.1
QID Detection Logic(Authenticated):
This authenticated QID flags vulnerable systems by detecting Vulnerable versions for file Microsoft.Crm.Setup.Server.exe:
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2023-24879
CVE-2023-24891
CVE-2023-24919
CVE-2023-24920
CVE-2023-24921
CVE-2023-24922
Microsoft has released security Updates for Visual Studio which resolve Remote Code Execution, Denial of Service and Escalation of Priviledge Vulnerabilities.
Affected Software:
Microsoft Visual Studio 2022 version 17.5
Microsoft Visual Studio 2022 version 17.4
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
Microsoft Visual Studio 2022 version 17.0
Microsoft Visual Studio 2022 version 17.2
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
QID Detection Logic: Authenticated : Windows
This QID detects vulnerable versions of Microsoft Visual Studio by checking the registry key "HKLM\SOFTWARE\Microsoft" and file "evenv.exe" to check the version of the Visual Studio.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2023-22490
CVE-2023-22743
CVE-2023-23618
CVE-2023-23946
QID Detection Logic (Authenticated):
Windows 11 Version 22H2
Windows 11 version 21H2
Windows Server 2022
The KB Articles and the patched versions associated with the update:
The patch version is 10.0.22621.1413 (http.sys) for KB5023706
The patch version is 10.0.22000.1696 (http.sys) for KB5023698
The patch version is 10.0.20348.1607 (http.sys) for KB5023705
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB5023698
KB5023705
KB5023706
Operating Systems: Windows Server 2012, Windows Server 2016, Windows Server 2022, Windows Server 2019
The KB Articles associated with the update:
The patch version is 6.3.9600.20874 for KB5023765
The patch version is 6.3.9600.20874 for KB5023764
The patch version is 10.0.14393.5786 for KB5023697
The patch version is 10.0.20348.859 for KB5023705
The patch version is 10.0.17763.4131 for KB5023702
QID Detection Logic:
Authenticated: This QID checks for the file version of dns.exe
Unauthenticated: This QID checks for vulnerable version of Microsoft DNS by checking the DNS version exposed in the banner.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB5023697
KB5023702
KB5023705
KB5023764
KB5023765
These new vulnerability checks are included in Qualys vulnerability signature 2.5.721-3. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.