Microsoft Patch Tuesday January 2023 fixes 54 security issues

Microsoft released January 2023 Patch Tuesday security updates to address 56 flaws, including two zero-day vulnerabilities, one of which is being actively exploited

- Advertisement -

Microsoft regularly releases an anticipated batch of security patches and updates for various products and services on every second Tuesday of the month. And This has become known as the Microsoft security Patch Tuesday update, keep this tradition today 10 January 2023 second Tuesday of the month, and Microsoft has released 98 security fixes including one zero-day vulnerabilities. Eleven of the vulnerabilities fixed today were classified as Critical as they enable attackers to achieve remote code execution, privilege elevation, or spoofing. Microsoft rates the rest of the 87 are rated important.

The January security update includes patches for:

  • 39 elevation of privilege (EoP) bugs, (36 Important and 3 Critical)
  • 33 remote code execution (RCE) vulnerabilities, (26 Important and 7 Critical)
  • 10 information disclosure bugs, (important)
  • 4 security Feature Bypass Vulnerabilities (1 Critical and 3 Important)
  • 10 denial of service bugs, (Important)
  • 2 spoofing Vulnerability (Important)

A total of 39 unique Microsoft products, features, and roles, including but not limited to Azure CLI, Microsoft Exchange Server Cumulative Update, Windows Endpoint, Windows Server, and Windows Server 2022 Datacenter: Azure Edition (Hotpatch) were included in this release.

Notable and Critical Microsoft Vulnerabilities Patched

- Advertisement -

The actively exploited zero-day vulnerabilities fixed in today’s updates are:

Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability (CVE-2023-21674) Microsoft states that this is a Sandbox escape vulnerability that can lead to the elevation of privileges.

“An attacker who successfully exploited this vulnerability could gain SYSTEM privileges,” explains Microsoft’s advisory.

Microsoft SharePoint Server Security Feature Bypass Vulnerability (CVE-2023-21743) This vulnerability has low complexity and can be easily triggered by an attacker. In a network-based attack, an unauthenticated user could make an anonymous connection to the targeted SharePoint server.

- Advertisement -

Microsoft Exchange Server Elevation of Privilege Vulnerability (CVE-2023-21763 – CVE-2023-21764)

Microsoft Cryptographic Services Elevation of Privilege Vulnerability (CVE-2023-21730, CVE-2023-21561, CVE-2023-21551) It is a Remote Code Execution Vulnerability in the Windows Cryptographic Services. Microsoft did not release many details about the vulnerability, except that it is triggered from the network and of low complexity.

- Advertisement -

Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability (CVE-2023-21535, CVE-2023-21548). These are remote code execution (RCE) vulnerability in the Windows Secure Socket Tunneling Protocol (SSTP) which allow an unauthenticated attacker to send a specially crafted connection request to a RAS server, which could lead to remote code execution (RCE) on the RAS server and run unauthorized commands on the compromised system.

Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability (CVE-2023-21679, CVE-2023-21546, CVE-2023-21555, CVE-2023-21556, CVE-2023-21543) There are also five “Critical“ Remote Code Execution Vulnerability which affects the Windows Layer 2 Tunneling Protocol (L2TP). Successful exploitation could allow an unauthenticated attacker to execute code on RAS servers.

The full list of CVEs released by Microsoft for January 2023 Patch Tuesday security updates is available here,

Recent updates from other companies

Third-party vendors such as Google, Apple, SAP, Cisco, Fortinet, and VMware have released updates after last month’s Patch Tuesday. Other vendors who released updates in January 2023 include:

Windows security updates

In addition to the security fixes, Microsoft has also published an update for the Windows Update service to improve its reliability and performance.

Windows 11

Microsoft fixes 64 vulnerabilities in Windows 11, 10 of which are considered critical and 54 important.

  • Microsoft Cryptographic Services Elevation of Privilege Vulnerability — CVE-2023-21730
  • Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability — CVE-2023-21679
  • Microsoft Cryptographic Services Elevation of Privilege Vulnerability — CVE-2023-21561
  • Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability — CVE-2023-21556
  • Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability — CVE-2023-21555
  • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability — CVE-2023-21548
  • Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability — CVE-2023-21543
  • Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability — CVE-2023-21546
  • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability — CVE-2023-21535
  • Microsoft Cryptographic Services Elevation of Privilege Vulnerability — CVE-2023-21551

Windows 11 (version 22H2) – KB5022303 (OS Build 22621.1105). Manual download from Microsoft Update Catalog.

Windows 11 (version 21H2) – KB5022287 (OS Build 22000.1455). Manual download from Microsoft Update Catalog.

windows 11 22H2

Windows 11 KB5022303 and KB5022287 updates include the following changes:

  • Fixes security issues for your Windows operating system.
  • Resolved the Microsoft Open Database Connectivity (ODBC) SQL Server Driver (sqlsrv32.dll) that could cause connections to fail.
  • Fixed a startup issue that could throw the error 0xc000021a and have a blue screen.
  • Fixed an issue in Local Session Manager that could allow users to perform actions that only administrators can.

Windows 10:

Windows 10 version 22H2 was affected by 63 vulnerabilities, 10 critical and 53 important.

  • Same as Windows 11

Windows 10 version 22H2 – KB5022282 (OS Build 19045.2486). Manual download from Microsoft Update Catalog. The same applies to windows 10 version 21H2.

Windows 10 version 1809 – KB5022286 (OS Build 17763.3887). Manual download from Microsoft Update Catalog.

Note. Versions 1903 and 1909, as well as 2004, 20H2, 21H1, and 21H2 share a common base operating system version and have an identical set of system files. That is why they receive the same cumulative updates.

windows 10

Windows 10 KB5022282 and KB5022286 updates include the following changes:

  • Addresses security issues for your Windows operating system.
  • This update addresses issues that affect the Local Session Manager (LSM). These issues might allow users who do not have admin rights to perform actions that only an admin can.
  • This update addresses a known issue that affects apps that use Microsoft Open Database Connectivity (ODBC) SQL Server Driver (sqlsrv32.dll) to connect to databases. The connection might fail. You might also receive an error in the app, or you might receive an error from the SQL Server.
  • This update addresses a known issue that might affect startup on some Windows devices. They might receive an error (0xc000021a) and have a blue screen.
  • This update provides the Quick Assist application for your client device
  • This update addresses an issue that might affect authentication. It might fail after you set the higher 16 bits of the MSDS-SupportedEncryptionTypes attribute. This issue might occur if you do not set the encryption types or you disable the RC4 encryption type on the domain.
  • This update addresses an issue that affects cluster name objects (CNO) or virtual computer objects (VCO). Password reset fails. The error message is, “There was an error resetting the AD password… // 0x80070005”.
  • This update addresses an issue that affects Microsoft Defender for Endpoint. Automated investigation blocks live response investigations.

You can read the complete changelog on the Microsoft support site here.

Windows 7 and windows 8.1 reached the End of support from Microsoft, which means the company no longer provides frequent updates or security patches for these operating systems. For more information please visit the Microsoft lifecycle page at https://learn.microsoft.com/en-us/lifecycle/end-of-support/end-of-support-2023

Windows 8.1 and Windows Server 2012 R2

On the side of Windows 8.1, 48 vulnerabilities have been resolved. We have 9 critical and 39 important flaws.

windows 8.1

Windows 8.1 KB5022352 and KB5022346 updates include the following changes:

  • This update contains miscellaneous security improvements to internal OS functionality. No specific issues are documented for this release.
  • Authentication may fail if the “higher 16 bits of the MSDS-SupportedEncryptionTypes attribute” are set.
  • Resolved the Microsoft Open Database Connectivity (ODBC) SQL Server Driver (sqlsrv32.dll) that could cause connections to fail.

Windows 7 SP1 and Windows Server 2008 R2

This Patch Tuesday fixes 39 security vulnerabilities in Windows 7, 8 of which are considered critical, and 31 important.

windows 7

Windows 7 KB5022338 and KB5022339 updates include the following changes:

  • Includes unspecified “miscellaneous security improvements to internal OS functionality”.
  •  Microsoft displays a modal dialog that informs Home users about the end of support. The message does not appear on managed devices that run Windows 8.1 Pro or Enterprise.
  • Authentication may fail if the “higher 16 bits of the MSDS-SupportedEncryptionTypes attribute” are set.
  • Resolved the Microsoft Open Database Connectivity (ODBC) SQL Server Driver (sqlsrv32.dll) that could cause connections to fail.

Download the windows 10 update

All these security updates are automatically downloaded and installed via windows update. Or you force Windows update from settings, update & security check for updates to install January 2023 patch updates immediately on your device.

Checking for windows updates

If you are Looking for Windows 10 22H2 Update ISO image click here. Or check How to Upgrade to Windows 10 version 22H2 Using the media creation tool.

If you face any difficulty while installing these updates, Check Windows 10 Update troubleshooting guide to fix the windows 10 Cumulative update stuck downloading, failed to install with different errors, etc.

  • What time do Patch Tuesday patches come out?

Microsoft schedules the release of security updates on “Patch Tuesday,” the second Tuesday of each month at 10:00 AM PST.

Is Patch Tuesday weekly or monthly?

Patch Tuesday falls on the second Tuesday of each month. The upcoming Patch Tuesday is on February 14, 2023.

  • Why did the second Tuesday of every month called patch Tuesday?

The second Tuesday of the month is referred to as “Patch Tuesday” because Microsoft attempts to combine the largest updates into this maintenance window.

  • What is the latest update for Windows 10 January 2023?

The latest windows 10 KB5022282 for version 22H2 and 21H2 and KB5022286 for windows 10 version 1809

  • What is the zero-day patch?

The term “Zero-Day” is used when security teams are unaware of their software vulnerability, and they’ve had “0” days to work on a security patch or an update to fix the issue.

Also read:

- Advertisement -

Advertisment

Proxy vs VPN – What’s the difference? Lets take a look

Both VPN and proxy work great if you intend to hide your original IP address or Bypass Geo-restricted content....
- Advertisement -

ALSO READ:-

- Advertisement -

LEAVE A REPLY

Please enter your comment!
Please enter your name here
Captcha verification failed!
CAPTCHA user score failed. Please contact us!