{"id":22228,"date":"2023-06-13T15:20:56","date_gmt":"2023-06-13T23:20:56","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/06\/13\/news-15958\/"},"modified":"2023-06-13T15:20:56","modified_gmt":"2023-06-13T23:20:56","slug":"news-15958","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2023\/06\/13\/news-15958\/","title":{"rendered":"A smorgasbord for June\u2019s Patch Tuesday"},"content":{"rendered":"<p><strong>Credit to Author: Angela Gunn| Date: Tue, 13 Jun 2023 21:05:13 +0000<\/strong><\/p>\n<div class=\"entry-content lg:prose-lg mx-auto prose max-w-4xl\">\n<p>Microsoft on Tuesday released patches for 69 vulnerabilities, including four critical-severity issues in Windows and one each in SharePoint and Visual Studio \/ .NET. As usual, the largest number of addressed vulnerabilities affect Windows, with 38 CVEs. Patches applicable to both .NET and Visual Studio account for nine of the remainder. Office takes six patches; SharePoint, five. Azure, Exchange, .NET (without Visual Studio), and Visual Studio (without .NET) each get two. Dynamics 365, PowerApps, and YARP (Yet Another Reverse Proxy, related to both .NET and NuGet) each get one.<\/p>\n<p>In a heavier-than-usual month for announcements concerning patches not directly handled by Microsoft, the company is also providing information on 25 patches from Chromium (Google), GitHub, Autodesk, and\u2026 Microsoft. The situation around those 25 information-only announcements is a bit tangled. Not only are there far more than usual (and this with no Adobe patches flagged, though Adobe did <a href=\"https:\/\/helpx.adobe.com\/security.html\">release<\/a> updates <a href=\"https:\/\/helpx.adobe.com\/security\/products\/magento\/apsb23-35.html\">on its own<\/a> today) but the 17 Chromium patches affecting the Edge browser hail from both Google and Microsoft itself. One of the 17, CVE-2023-3079, a V8 type-confusion issue patched by Google <a href=\"https:\/\/chromereleases.googleblog.com\/2023\/06\/stable-channel-update-for-desktop.html\">on June 5<\/a>, is known to be under exploit in the wild. (V8 is a JavaScript engine developed by the Chromium Project and used in a variety of applications, Edge among them.)<\/p>\n<p>At patch time, none of the issues this month have been publicly disclosed (aside from the information published about the info-only patches released prior to June 13). However, Microsoft cautions that eight of the issues addressed are more likely to be exploited in either the latest or earlier versions of the affected product soon (that is, within the next 30 days). Microsoft once again this month offered no guidance overview on exploitation likelihood in earlier versions versus latest versions for any of their patches.<\/p>\n<p>Elsewhere on the patching scene, Fortinet this week published a security advisory for a critical-class SSL-VPN vulnerability under active exploit in the wild. CVE-2023-27997 affects FortiOS and FortiProxy SSL-VPN. A remote-code execution issue, it affects multiple versions of the software and was <a href=\"https:\/\/www.fortinet.com\/blog\/psirt-blogs\/analysis-of-cve-2023-27997-and-clarifications-on-volt-typhoon-campaign\">discovered<\/a> by Fortinet\u2019s own researchers, along with external researchers engaged in responsible disclosure. during a code audit after a previous incident. Fortinet customers are urged to review the <a href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-23-097\">available information<\/a> and patch their devices soon; the Sophos MDR team is monitoring the situation as it unfolds.<\/p>\n<p>We are including at the end of this post three appendices listing all Microsoft\u2019s patches, sorted by severity, by predicted exploitability, and by product family. As per Microsoft\u2019s guidance we\u2019ll treat the three Edge patches (CVE-2023-29345, CVE-2023-33143, CVE-2023-33145) with Microsoft-assigned CVE numbers as information-only; they are not included in any of the totals or charts that follow.<\/p>\n<p><strong>By the Numbers<\/strong><\/p>\n<ul>\n<li>Total Microsoft CVEs: 69<\/li>\n<li>Total advisories shipping in update: 0<\/li>\n<li>Publicly disclosed: 0<\/li>\n<li>Known-exploited: 0<\/li>\n<li>Severity\n<ul>\n<li>Critical: 6<\/li>\n<li>Important: 62<\/li>\n<li>Moderate: 1<\/li>\n<\/ul>\n<\/li>\n<li>Impact\n<ul>\n<li>Remote Code Execution: 26<\/li>\n<li>Elevation of Privilege: 17<\/li>\n<li>Denial of Service: 10<\/li>\n<li>Spoofing: 9<\/li>\n<li>Information Disclosure: 4<\/li>\n<li>Security Feature Bypass: 3<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/06\/figure-01-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-92154\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/06\/figure-01-1.png\" alt=\"A bar chart showing June bulletin counts by impact and severity; information is covered in text.\" width=\"640\" height=\"417\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/06\/figure-01-1.png 835w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/06\/figure-01-1.png?resize=300,195 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/06\/figure-01-1.png?resize=768,500 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 1: Remote code execution issues once again top the charts in June<\/em><\/p>\n<p><strong>Products<\/strong><\/p>\n<ul>\n<li>Windows: 38<\/li>\n<li>.NET and Visual Studio: 9<\/li>\n<li>Office: 6<\/li>\n<li>SharePoint: 5<\/li>\n<li>Azure: 2<\/li>\n<li>Exchange: 2<\/li>\n<li>.NET (no Visual Studio): 2<\/li>\n<li>Visual Studio (no .NET): 2<\/li>\n<li>Dynamics 365: 1<\/li>\n<li>Power Apps: 1<\/li>\n<li>YARP: 1<\/li>\n<\/ul>\n<p>In addition to the 17 Chromium \/ Edge patches discussed above, Microsoft also acknowledged three Autodesk-related CVEs and five GitHub-related CVEs in this month patch-release announcements. All eight of these issues were patched on Tuesday, and Microsoft mentions them in their own Patch Tuesday release to state that the latest version of Visual Stupid is hereby protected. It\u2019s less clear, though that older versions of Visual Studio are likewise protected; system administrators tending older systems should proceed with caution.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/06\/figure-02.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-92155\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/06\/figure-02.png\" alt=\"A bar chart showing product families affected by June patches; information is covered in the article text.\" width=\"640\" height=\"429\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/06\/figure-02.png 809w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/06\/figure-02.png?resize=300,201 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/06\/figure-02.png?resize=768,515 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 2: Windows accounts for more than half of June\u2019s patches, but there are plenty to go around<\/em><\/p>\n<p><strong>Notable June updates<\/strong><\/p>\n<p><strong>CVE-2023-29357 &#8212; Microsoft SharePoint Server Elevation of Privilege Vulnerability<\/strong><\/p>\n<p>The only update this month with the dubious distinction of being both critical-class and more likely to be exploited in the next 30 days, this issue also sports a 9.8 CVSS base score, making it the month\u2019s leading item of concern. According to the information available, an attacker who has gained access to spoofed JWT (JSON Web Token) authentication tokens can use them to execute a network attack which bypasses authentication and allows them to gain access to the privileges of an authenticated user &#8212; no privileges nor user action required. The bulletin takes pains to let sysadmins know they too must take pains: The fix includes multiple patches for SharePoint Foundation Server 2013, SharePoint Enterprise Server 2016, or SharePoint Server 2019, and all applicable patches have to be applied. There\u2019s a slight <a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/win32\/amsi\/antimalware-scan-interface-portal\">silver lining<\/a> for on-premises customers: If ASMI (the Advanced System Management Interface) is enabled, you\u2019re okay.<\/p>\n<p><strong>CVE-2023-29363 &#8212; Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability<br \/> CVE-2023-32014 &#8212; Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability<br \/> CVE-2023-32015 &#8212; Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability<\/strong><\/p>\n<p>Less likely to be exploited in the next 30 days but still concerning, these three critical-class RCEs share a name and a focus on Pragmatic General Multicast, and are described similarly by the company: <em>When Windows message queuing service is running in a PGM Server environment, an attacker could send a specially crafted file over the network to achieve remote code execution and attempt to trigger malicious code. <\/em>Exploitation of any of these requires that the target system have the Windows message queuing service enabled, which may prove a mitigation for some systems.<\/p>\n<p><strong>CVE-2023-29353 \u2013 Sysinternals Process Monitor for Windows Denial of Service Vulnerability<\/strong><\/p>\n<p>While not particularly exciting in itself, this Important-class denial of service issue is the only one delivering its patches via the Microsoft Store this month. According to Microsoft, successful exploitation of this vulnerability requires an attacker to create the ProcMon exploit file, which is complicated. In addition, there are several aspects left to pure luck regarding how memory within ProcMon is laid out.<\/p>\n<p><strong>CVE-2023-33146 &#8212; Microsoft Office Remote Code Execution Vulnerability<\/strong><\/p>\n<p>This important-class RCE involves SketchUp graphics, and Microsoft has <a href=\"https:\/\/insider.microsoft365.com\/en-us\/blog\/add-sketchup-files-to-office-creations\">published information<\/a> on how to disable the ability to insert those in Office files while things get sorted out. Admins of Mac systems should take that advice seriously, since although the vulnerability appears to affect that platform as well as Windows, there\u2019s not a patch yet for Microsoft Office 2019 for Mac or Microsoft Office LTSC for Mac 2021. Microsoft hasn\u2019t given a date yet for those fixes, but says they\u2019ll update the CVE information when it\u2019s ready.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/06\/figure-03.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-92156\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/06\/figure-03.png\" alt=\"A bar chart showing cumulative bulletin counts from January to June 2023, sorted by impact. RCE leads with just over 175 patches, followed by EoP hovering just above 110.\" width=\"640\" height=\"412\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/06\/figure-03.png 837w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/06\/figure-03.png?resize=300,193 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/06\/figure-03.png?resize=768,495 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 3: As we near the halfway point of the year, the overall patch count is below that of 2022 for every type of vulnerability <\/em><\/p>\n<p><strong>Sophos protections<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>As you can every month, if you don\u2019t want to wait for your system to pull down Microsoft\u2019s updates itself, you can download them manually from the Windows Update Catalog website. Run the winver.exe tool to determine which build of Windows 10 or 11 you\u2019re running, then download the Cumulative Update package for your specific system\u2019s architecture and build number.<\/p>\n<p><strong>Appendix A: Vulnerability Impact and Severity<\/strong><\/p>\n<p>This is a list of June\u2019s patches sorted by impact, then sub-sorted by severity. Each list is further arranged by CVE.<\/p>\n<p><strong>Remote Code Execution (26 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Critical severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-24897<\/td>\n<td width=\"469\">.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29363<\/td>\n<td width=\"469\">Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32014<\/td>\n<td width=\"469\">Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32015<\/td>\n<td width=\"469\">Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-24895<\/td>\n<td width=\"469\">.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-28310<\/td>\n<td width=\"469\">Microsoft Exchange Server Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29326<\/td>\n<td width=\"469\">.NET Framework Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29337<\/td>\n<td width=\"469\">NuGet Client Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29362<\/td>\n<td width=\"469\">Remote Desktop Client Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29365<\/td>\n<td width=\"469\">Windows Media Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29366<\/td>\n<td width=\"469\">Windows Geolocation Service Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29367<\/td>\n<td width=\"469\">iSCSI Target WMI Provider Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29370<\/td>\n<td width=\"469\">Windows Media Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29372<\/td>\n<td width=\"469\">Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29373<\/td>\n<td width=\"469\">Microsoft ODBC Driver Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32008<\/td>\n<td width=\"469\">Windows Resilient File System (ReFS) Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32017<\/td>\n<td width=\"469\">Microsoft PostScript Printer Driver Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32018<\/td>\n<td width=\"469\">Windows Hello Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32029<\/td>\n<td width=\"469\">Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32031<\/td>\n<td width=\"469\">Microsoft Exchange Server Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-33126<\/td>\n<td width=\"469\">.NET and Visual Studio Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-33128<\/td>\n<td width=\"469\">.NET and Visual Studio Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-33131<\/td>\n<td width=\"469\">Microsoft Outlook Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-33133<\/td>\n<td width=\"469\">Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-33137<\/td>\n<td width=\"469\">Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-33146<\/td>\n<td width=\"469\">Microsoft Office Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Elevation of Privilege (17 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Critical severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29357<\/td>\n<td width=\"469\">Microsoft SharePoint Server Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29346<\/td>\n<td width=\"469\">NTFS Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29351<\/td>\n<td width=\"469\">Windows Group Policy Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29358<\/td>\n<td width=\"469\">Windows GDI Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29359<\/td>\n<td width=\"469\">GDI Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29360<\/td>\n<td width=\"469\">Windows TPM Device Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29361<\/td>\n<td width=\"469\">Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29364<\/td>\n<td width=\"469\">Windows Authentication Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29368<\/td>\n<td width=\"469\">Windows Filtering Platform Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29371<\/td>\n<td width=\"469\">Windows GDI Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32009<\/td>\n<td width=\"469\">Windows Collaborative Translation Framework Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32010<\/td>\n<td width=\"469\">Windows Bus Filter Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32012<\/td>\n<td width=\"469\">Windows Container Manager Service Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32032<\/td>\n<td width=\"469\">.NET and Visual Studio Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-33135<\/td>\n<td width=\"469\">.NET and Visual Studio Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-33142<\/td>\n<td width=\"469\">Microsoft SharePoint Server Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Moderate severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-24936<\/td>\n<td width=\"469\">.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Denial of Service (10 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Critical severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32013<\/td>\n<td width=\"469\">Windows Hyper-V Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-24937<\/td>\n<td width=\"469\">Windows CryptoAPI\u00a0 Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-24938<\/td>\n<td width=\"469\">Windows CryptoAPI\u00a0 Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29331<\/td>\n<td width=\"469\">.NET, .NET Framework, and Visual Studio Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29353<\/td>\n<td width=\"469\">Sysinternals Process Monitor for Windows Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29369<\/td>\n<td width=\"469\">Remote Procedure Call Runtime Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32011<\/td>\n<td width=\"469\">Windows iSCSI Discovery Service Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32030<\/td>\n<td width=\"469\">.NET and Visual Studio Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-33129<\/td>\n<td width=\"469\">Microsoft SharePoint Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-33141<\/td>\n<td width=\"469\">Yet Another Reverse Proxy (YARP) Denial of Service Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Spoofing (9 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-21565<\/td>\n<td width=\"469\">Azure DevOps Server Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-21569<\/td>\n<td width=\"469\">Azure DevOps Server Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-24896<\/td>\n<td width=\"469\">Dynamics Finance and Operations Cross-site Scripting Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32020<\/td>\n<td width=\"469\">Windows DNS Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32024<\/td>\n<td width=\"469\">Microsoft Power Apps Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-33130<\/td>\n<td width=\"469\">Microsoft SharePoint Server Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-33132<\/td>\n<td width=\"469\">Microsoft SharePoint Server Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-33140<\/td>\n<td width=\"469\">Microsoft OneNote Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-33144<\/td>\n<td width=\"469\">Visual Studio Code Spoofing Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Information Disclosure (4 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29355<\/td>\n<td width=\"469\">DHCP Server Service Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32016<\/td>\n<td width=\"469\">Windows Installer Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32019<\/td>\n<td width=\"469\">Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-33139<\/td>\n<td width=\"469\">Visual Studio Information Disclosure Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Security Feature Bypass (3 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29352<\/td>\n<td width=\"469\">Windows Remote Desktop Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32021<\/td>\n<td width=\"469\">Windows SMB Witness Service Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32022<\/td>\n<td width=\"469\">Windows Server Service Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Appendix B: Exploitability<\/strong><\/p>\n<p>This is a list of the June CVEs judged by Microsoft to be more likely to be exploited in the wild within the first 30 days post-release, as well as those already known to be under exploit. Each list is further arranged by CVE.<\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Exploitation more likely <\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-28310<\/td>\n<td width=\"469\">Microsoft Exchange Server Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29357<\/td>\n<td width=\"469\">Microsoft SharePoint Server Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29358<\/td>\n<td width=\"469\">Windows GDI Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29359<\/td>\n<td width=\"469\">GDI Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29360<\/td>\n<td width=\"469\">Windows TPM Device Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29361<\/td>\n<td width=\"469\">Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29371<\/td>\n<td width=\"469\">Windows GDI Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32031<\/td>\n<td width=\"469\">Microsoft Exchange Server Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Appendix C: Products Affected<\/strong><\/p>\n<p>This is a list of June\u2019s patches sorted by product family, then sub-sorted by severity. Each list is further arranged by CVE.<\/p>\n<p><strong>Windows (38 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Critical severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29363<\/td>\n<td width=\"469\">Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32013<\/td>\n<td width=\"469\">Windows Hyper-V Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32014<\/td>\n<td width=\"469\">Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32015<\/td>\n<td width=\"469\">Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-24937<\/td>\n<td width=\"469\">Windows CryptoAPI\u00a0 Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-24938<\/td>\n<td width=\"469\">Windows CryptoAPI\u00a0 Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29346<\/td>\n<td width=\"469\">NTFS Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29351<\/td>\n<td width=\"469\">Windows Group Policy Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29352<\/td>\n<td width=\"469\">Windows Remote Desktop Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29353<\/td>\n<td width=\"469\">Sysinternals Process Monitor for Windows Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29355<\/td>\n<td width=\"469\">DHCP Server Service Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29358<\/td>\n<td width=\"469\">Windows GDI Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29359<\/td>\n<td width=\"469\">GDI Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29360<\/td>\n<td width=\"469\">Windows TPM Device Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29361<\/td>\n<td width=\"469\">Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29362<\/td>\n<td width=\"469\">Remote Desktop Client Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29364<\/td>\n<td width=\"469\">Windows Authentication Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29365<\/td>\n<td width=\"469\">Windows Media Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29366<\/td>\n<td width=\"469\">Windows Geolocation Service Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29367<\/td>\n<td width=\"469\">iSCSI Target WMI Provider Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29368<\/td>\n<td width=\"469\">Windows Filtering Platform Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29369<\/td>\n<td width=\"469\">Remote Procedure Call Runtime Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29370<\/td>\n<td width=\"469\">Windows Media Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29371<\/td>\n<td width=\"469\">Windows GDI Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29372<\/td>\n<td width=\"469\">Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29373<\/td>\n<td width=\"469\">Microsoft ODBC Driver Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32008<\/td>\n<td width=\"469\">Windows Resilient File System (ReFS) Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32009<\/td>\n<td width=\"469\">Windows Collaborative Translation Framework Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32010<\/td>\n<td width=\"469\">Windows Bus Filter Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32011<\/td>\n<td width=\"469\">Windows iSCSI Discovery Service Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32012<\/td>\n<td width=\"469\">Windows Container Manager Service Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32016<\/td>\n<td width=\"469\">Windows Installer Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32017<\/td>\n<td width=\"469\">Microsoft PostScript Printer Driver Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32018<\/td>\n<td width=\"469\">Windows Hello Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32019<\/td>\n<td width=\"469\">Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32020<\/td>\n<td width=\"469\">Windows DNS Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32021<\/td>\n<td width=\"469\">Windows SMB Witness Service Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32022<\/td>\n<td width=\"469\">Windows Server Service Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>NET and Visual Studio (9 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Critical severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-24897<\/td>\n<td width=\"469\">.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-24895<\/td>\n<td width=\"469\">.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29331<\/td>\n<td width=\"469\">.NET, .NET Framework, and Visual Studio Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32030<\/td>\n<td width=\"469\">.NET and Visual Studio Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32032<\/td>\n<td width=\"469\">.NET and Visual Studio Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-33126<\/td>\n<td width=\"469\">.NET and Visual Studio Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-33128<\/td>\n<td width=\"469\">.NET and Visual Studio Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-33135<\/td>\n<td width=\"469\">.NET and Visual Studio Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Moderate severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-24936<\/td>\n<td width=\"469\">.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Office (6 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32029<\/td>\n<td width=\"469\">Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-33131<\/td>\n<td width=\"469\">Microsoft Outlook Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-33133<\/td>\n<td width=\"469\">Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-33137<\/td>\n<td width=\"469\">Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-33140<\/td>\n<td width=\"469\">Microsoft OneNote Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-33146<\/td>\n<td width=\"469\">Microsoft Office Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>SharePoint (5 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Critical severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29357<\/td>\n<td width=\"469\">Microsoft SharePoint Server Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-33129<\/td>\n<td width=\"469\">Microsoft SharePoint Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-33130<\/td>\n<td width=\"469\">Microsoft SharePoint Server Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-33132<\/td>\n<td width=\"469\">Microsoft SharePoint Server Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-33142<\/td>\n<td width=\"469\">Microsoft SharePoint Server Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Azure (2 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-21565<\/td>\n<td width=\"469\">Azure DevOps Server Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-21569<\/td>\n<td width=\"469\">Azure DevOps Server Spoofing Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Exchange (2 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-28310<\/td>\n<td width=\"469\">Microsoft Exchange Server Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32031<\/td>\n<td width=\"469\">Microsoft Exchange Server Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>.NET (no Visual Studio) (2 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29326<\/td>\n<td width=\"469\">.NET Framework Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29337<\/td>\n<td width=\"469\">NuGet Client Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Visual Studio (no .NET) (2 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-33139<\/td>\n<td width=\"469\">Visual Studio Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-33144<\/td>\n<td width=\"469\">Visual Studio Code Spoofing Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Dynamics 365 (1 CVE)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-24896<\/td>\n<td width=\"469\">Dynamics Finance and Operations Cross-site Scripting Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Power Apps (1 CVE)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-32024<\/td>\n<td width=\"469\">Microsoft Power Apps Spoofing Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>YARP (1 CVE)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-33141<\/td>\n<td width=\"469\">Yet Another Reverse Proxy (YARP) Denial of Service Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2023\/06\/13\/a-smorgasbord-for-junes-patch-tuesday\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/06\/shutterstock_728569018.jpg\"\/><\/p>\n<p><strong>Credit to Author: Angela Gunn| Date: Tue, 13 Jun 2023 21:05:13 +0000<\/strong><\/p>\n<p>Between its own fixes and a slew of FYI alerts covering Edge, GitHub, and Autodesk, Microsoft piles 94 CVEs onto sysadmins\u2019 plates; Fortinet and Adobe also at the table<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[11414,21530,29558,29559,29560,29561,29564,129,24812,11863,10516,19245,16771,10525],"class_list":["post-22228","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-adobe","tag-autodesk","tag-cve-2023-29357","tag-cve-2023-29363","tag-cve-2023-32014","tag-cve-2023-32015","tag-cve-2023-33146","tag-featured","tag-fortinet","tag-github","tag-microsoft","tag-patch-tuesday","tag-threat-research","tag-windows"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22228","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=22228"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22228\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=22228"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=22228"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=22228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}