First published: 15 Jun 2023
Last updated: 15 Jun 2023

Content written for

Individuals & families
Small & medium business
Large organisations & infrastructure
Government

Background  / What has happened?

The Australian Signals Directorate’s Australian Cyber Security Centre (ASD's ACSC) has reviewed the Microsoft June 2023 Security Update.

  • The Security Update provided patches for 78 vulnerabilities.
  • 0 vulnerabilities are believed to have been exploited.
  • 6 vulnerabilities are rated ‘Critical’.

The following vulnerabilities are important based on their severity, widespread use of the related product and/or likelihood of exploitation.

SharePoint Elevation of Privilege (CVE-2023-29357 )

  • A Critical rated vulnerability which could allow an attacker to gain administrator privileges.
  • An attacker requires access to an authentication token (Known as a JSON Web Token).
  • The attacker can impersonate a user with this token, and use it to gain the same level of access.

Exchange Remote Code Execution (CVE-2023-32031 )

  • An attacker who is authenticated can attempt to trigger malicious code on the exchange server.
  • It is not clear what level of authentication is required. It is possible this may allow a non-administrator to trigger malicious code, which in turn may give them control of the server.
  •  This vulnerability is listed as ‘more likely’ to be exploited. Both Exchange Server 2016 & 2019 are vulnerable.

Multiple Microsoft Message Queing vulnerabilities (CVE-2023-29363 , CVE-2023-32014 , CVE-2023-32015 )

  • Multiple Critical Remote Code Execution vulnerabilities have been addressed in Microsoft Message Quering Service (MSMQ), when running in a Pragmatic General Multicast (PGM) Server.
  • MSMQ is not enabled by default. A user can check if MSMQ is running by looking for a service called ‘Message Queuing’.
  • A user can also check if TCP Port 1801 is listening on the machine.
  • This is the third month in a row that a critical vulnerability has been patched in MSMQ.

Mitigation / How do I stay secure?

Technical subject matter experts that use Microsoft products should read the associated security update guides available for their products.

Security Update Guide - Microsoft

General users should consider enabling automatic patching of Microsoft products if they have not already done so. Read further advice Advice is available on the ASD's ACSC website.

Assistance / Where can I go for help?

Organisations or individuals that have been impacted or require assistance can contact us via 1300 CYBER1 (1300 292 371).

Was this information helpful?

Thanks for your feedback!

Optional

Tell us why this information was helpful and we’ll work on making more pages like it