Need cloud computing? Get started now

Akamai’s Perspective on June’s Patch Tuesday 2023

This Patch Tuesday fixed three critical remote code execution vulnerabilities in this protocol, all of them with a CVSS score of 9.8.

As we do every month, the Akamai Security Intelligence Group set out to look at the more intriguing vulnerabilities that were patched. 

We’re especially PROUD to work on the Patch Tuesday this month. 

There are 69 CVEs this time, six of them critical. Four of the critical CVEs (in PGM and SharePoint) have a high CVSS score of 9.8.

In this report, we’ll assess how critical the vulnerabilities really are and how commonplace the affected applications and services are to provide a realistic perspective on the bugs that were fixed. You can also see a quick summary of the patch on our Twitter account. Be on the lookout for these insights in the days after every Patch Tuesday.

This is an updating report and we’ll add more information to it as our research progresses — stay tuned!

In this report, we’re focusing on the following areas in which bugs were patched:

Windows Pragmatic General Multicast (PGM)

Windows Pragmatic General Multicast (PGM) is a protocol designed to deliver packets among multiple network members in a reliable manner. On Windows, the implementation of this protocol is referred to as reliable multicast. This Patch Tuesday fixed three critical remote code execution vulnerabilities in this protocol, all of them with a CVSS score of 9.8.

Since Windows Server 2003, PGM has relied on Windows sockets. In user space, it is implemented in a library called wshrm.dll (Windows Sockets Helper DLL for PGM, where the “rm” stands for remote multicast). In kernel space, PGM is implemented through the driver rmcast.sys.

According to Microsoft’s mitigations on the CVEs, the Message Queuing service must be running for the vulnerability to be exploitable. The service is not installed by default and must be added via the Features screen in the control panel (Figure 1). 

The Windows Feature dialog box showing both the Microsoft Message Queue Server feature as well as Multicasting support Fig. 1: Enabling Message Queuing and multicasting through the Windows Features dialog box

In our observations, we noticed that approximately 50% of environments had servers with the Message Queuing service installed and running, and 25% with PGM installed. Although in most data centers only a few machines had this capability enabled, we noticed some environments in which multiple servers were running the service.

Since the attack complexity for all vulnerabilities is low, we recommend patching relevant servers as soon as possible. If patching is not possible, because of operational continuity or some other reason, then we recommend restricting access to the service, at the very least, by using network segmentation policies. 

Since the Message Queuing service is accessible over port 1801, but isn’t likely to be accessed by that many clients (as it’s mostly used by the enterprise application itself), we recommend restricting arbitrary network access to that port and service. Try to segment it using allowlist policies, allowing access only to the machines that actually need it.

CVE number

Effect

Required access

CVE-2023-29363


Remote code execution


Network

CVE-2023-32014

CVE-2023-32015

Microsoft SharePoint Server

Microsoft SharePoint is a web-based document management and storage system that integrates with other Microsoft Office products. There are four CVEs this month, but only one is for a critical elevation of privilege vulnerability with a 9.8 CVSS score (CVE-2023-29357). The vulnerability allows attackers to spoof JWT tokens to bypass authentication and gain the privileges of an authenticated user.

In our observations, we’ve seen that approximately 50% of environments had at least one machine with a SharePoint server installed on it.

CVE number

Effect

Required access

CVE-2023-29357


Elevation of privilege


Network

CVE-2023-33142

CVE-2023-33130

Spoofing

CVE-2023-29357

Since SharePoint servers are usually meant to be used for document sharing, it might be difficult to segment or limit user access to them without harming normal operations. Therefore, we recommend that you patch your server as soon as possible. 

However, for the elevation of privilege vulnerabilities, it might be possible to mitigate some of the risks by hardening user access, or by increasing alert sensitivity on suspicious user activity or log-ons.

Windows Remote Desktop

Windows Remote Desktop is used for remote desktop connection between Windows machines, over the Remote Desktop Protocol (RDP). There are two vulnerabilities this month — both affect the RDP client rather than the server.

CVE-2023-29352 allows attackers to bypass the server certificate validation during a remote desktop connection by using a specially crafted .RDP file. Attackers, however, will have to trick a user into using their .RDP file for the vulnerability to be impactful. This can work in tandem with the other vulnerability patched, CVE-2023-29362, which allows attackers to trigger remote code execution on the client, when they connect to attacker-controlled RDP servers.

Since RDP can be used for lateral movement, we recommend creating policy rules around it anyway. Restricting RDP access among user machines, or only to pre-authorized servers (like jump boxes), can greatly reduce the risk these vulnerabilities present. Nonetheless, we recommend you patch as soon as possible.

CVE number

Effect

Required access

CVE-2023-29352

Security feature bypass

Network

CVE-2023-29362

Remote code execution

Microsoft Exchange Server

Microsoft Exchange Server is the mail server developed by Microsoft. This month, there were only two CVEs, both allowing remote code execution on the remote server. In our observations, we’ve seen that approximately 35% of environments had on-premises Exchange Servers.

Since the two vulnerabilities require that the attacker be authenticated, it might be possible to reduce the risk of a potential exploit by having increased sensitivity over anomalous user log-ons. In addition, since CVE-2023-28310 works over a PowerShell remoting session, it might be possible to mitigate the risk by employing segmentation. 

A PowerShell remoting session is carried over Windows Remote Management (WinRM), which uses TCP ports 5985 and 5986. Since remote management capabilities aren’t required by most users, it should be possible to restrict traffic over WinRM to only authorized users or user machines, thus reducing the attack surface.

CVE number

Effect

Required access

CVE-2023-28310

Elevation of privilege


Adjacent network

CVE-2023-32031

Network

Previously covered services

Many CVEs in this month’s Patch Tuesday are for systems that we’ve already covered in the past. If you’re interested in our analysis of, or general recommendations for, those services, we encourage you to look at our previous perspectives on Patch Tuesday blog posts.

Service

CVE number

Effect

Required access

Microsoft Dynamics CRM

CVE-2023-24896

Spoofing

Network

Windows CryptoAPI

CVE-2023-24937

Denial of service

Network

CVE-2023-24938

Microsoft Office

CVE-2023-33146

Remote code execution

Local

DHCP Server Service

CVE-2023-29355

Information disclosure

Network

Remote Procedure Call Runtime

CVE-2023-29369

Denial of service

Network

OLE DB and ODBC

CVE-2023-29373

Remote code execution

Network

CVE-2023-29372

iSCSI

CVE-2023-32011

Denial of service

Network

CVE-2023-29367

Remote code execution

Local

This summary provides an overview of our current understanding and our recommendations given the information available. Our review is ongoing and any information herein is subject to change. You can also visit our Twitter account for real-time updates.