

Rewterz Threat Advisory – Multiple Apache Products Vulnerabilities
December 15, 2023
Rewterz Threat Alert – RedLine Stealer – Active IOCs
December 15, 2023
Rewterz Threat Advisory – Multiple Apache Products Vulnerabilities
December 15, 2023
Rewterz Threat Alert – RedLine Stealer – Active IOCs
December 15, 2023Severity
High
Analysis Summary
CVE-2023-35629 CVSS:6.8
Microsoft Windows could allow a physical attacker to execute arbitrary code on the system, caused by a flaw in USBHUB 3.0 Device Driver component. By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2023-35630 CVSS:8.8
Microsoft Windows could allow a remote attacker within the local network to execute arbitrary code on the system, caused by a flaw in Internet Connection Sharing (ICS) component. By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2023-35632 CVSS:7.8
Microsoft Windows could allow a local authenticated attacker to gain elevated privileges on the system, caused by a flaw in the Ancillary Function Driver for WinSock component. By executing a specially crafted program, an authenticated attacker could exploit this vulnerability to obtain SYSTEM privileges.
CVE-2023-35638 CVSS:7.5
Microsoft Windows is vulnerable to a denial of service, caused by a flaw in the DHCP Server Service compnent. By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause a denial of service.
CVE-2023-35631 CVSS:7.8
Microsoft Windows could allow a local authenticated attacker to gain elevated privileges on the system, caused by a flaw in the Win32k component. By executing a specially crafted program, an authenticated attacker could exploit this vulnerability to obtain SYSTEM privileges.
CVE-2023-36011 CVSS:7.8
Microsoft Windows could allow a local authenticated attacker to gain elevated privileges on the system, caused by a flaw in the Win32k component. By executing a specially crafted program, an authenticated attacker could exploit this vulnerability to obtain SYSTEM privileges.
CVE-2023-36005 CVSS:7.5
Microsoft Windows could allow a remote authenticated attacker to gain elevated privileges on the system, caused by a flaw in the Telephony Server component. By winning a race condition, an authenticated attacker could exploit this vulnerability to execute arbitrary code on the system in the context of the NT AUTHORITY\Network Service account.
CVE-2023-35642 CVSS:6.5
Microsoft Windows is vulnerable to a denial of service, caused by a flaw in the Internet Connection Sharing (ICS) compnent. By sending a specially crafted request, a remote attacker within the local network could exploit this vulnerability to cause a denial of service.
CVE-2023-36006 CVSS:8.8
Microsoft Windows could allow a remote attacker to execute arbitrary code on the system, caused by a flaw in the WDAC OLE DB provider for SQL Server component. By persuading a victim to connect to connect to a specially crafted SQL server via OLEDB, an attacker could exploit this vulnerability to execute arbitrary code on the client.
CVE-2023-36012 CVSS:5.3
Microsoft Windows could allow a remote attacker to obtain sensitive information, caused by a flaw in the DHCP Server Service component. By sending a specially crafted request, an attacker could exploit this vulnerability to obtain sensitive information from uninitialized memory and use this information to launch further attacks against the affected system.
CVE-2023-35643 CVSS:7.5
Microsoft Windows could allow a remote attacker to obtain sensitive information, caused by a flaw in the DHCP Server Service. By sending a specially crafted request, an attacker could exploit this vulnerability to obtain sensitive information from remote heap memory and use this information to launch further attacks against the affected system.
Impact
- Denial of Service
- Privileges Escalation
- Code Execution
- Gain Access
- Information Disclosure
Indicators Of Compromise
CVE
- CVE-2023-35629
- CVE-2023-35630
- CVE-2023-35632
- CVE-2023-35638
- CVE-2023-35631
- CVE-2023-36011
- CVE-2023-36005
- CVE-2023-35642
- CVE-2023-36006
- CVE-2023-36012
- CVE-2023-35643
Affected Vendors
Microsoft
Affected Products
- Microsoft Windows Server 2016
- Microsoft Windows Server 2019
- Microsoft Windows 10 x64
- Microsoft Windows 10 1809 for 32-bit Systems
- Microsoft Windows 10 1809 for x64-based Systems
- Microsoft Windows 10 1809 for ARM64-based Systems
- Microsoft Windows Server 2012
- Microsoft Windows Server 2012 R2
- Microsoft Windows 10 x32
- Microsoft Windows Server (Server Core installation) 2019
- Microsoft Windows Server (Server Core installation) 2016
- Microsoft Windows Server (Server Core installation) 2012 R2
- Microsoft Windows Server (Server Core installation) 2012
- Microsoft Windows Server for X64-based systems 2008 R2 SP1
- Microsoft Windows Server for X64-based systems (Server Core installation) 2008 SP2
- Microsoft Windows Server for 32-bit systems 2008 SP2
- Microsoft Windows Server (Server Core installation) 2022
- Microsoft Windows 10 1607 for 32-bit Systems
- Microsoft Windows 10 1607 for x64-based Systems
- Microsoft Windows Server 2022
- Microsoft Windows Server for X64-based systems 2008 SP2
- Microsoft Windows 10 21H2 for 32-bit Systems
- Microsoft Windows 10 21H2 for ARM64-based Systems
- Microsoft Windows 10 21H2 for x64-based Systems
- Microsoft Windows Server for X64-based systems 2008 R2 SP1 Microsoft Windows Server for 32-bit systems (Server Core installation) 2008 SP2
- Microsoft Windows 11 22H2 for ARM64-based Systems
- Microsoft Windows 11 22H2 for x64-based Systems
- Microsoft Windows Server for 32-bit systems 2008 SP2 Microsoft Windows Server for X64-based systems (Server Core installation) 2008 R2 SP1
- Microsoft Windows 10 22H2 for 32-bit Systems
- Microsoft Windows 10 22H2 for ARM64-based Systems
- Microsoft Windows 11 21H2 for ARM64-based Systems
- Microsoft Windows 11 21H2 for x64-based Systems
- Microsoft Windows Server (Server Core installation) 2022 23H2
- Microsoft Windows 11 23H2 for ARM64-based Systems
- Microsoft Windows 11 23H2 for x64-based Systems
Remediation
Use Microsoft Automatic Update to apply the appropriate patch for your system, or the Microsoft Security Update Guide to search for available patches.