Rewterz Threat Alert – APT Group Gamaredon aka Shuckworm – Active IOCs
June 14, 2023Rewterz Threat Advisory – CVE-2023-29373 – Microsoft Windows ODBC Driver Vulnerability
June 14, 2023Rewterz Threat Alert – APT Group Gamaredon aka Shuckworm – Active IOCs
June 14, 2023Rewterz Threat Advisory – CVE-2023-29373 – Microsoft Windows ODBC Driver Vulnerability
June 14, 2023Severity
High
Analysis Summary
CVE-2023-29362 CVSS:8.8
Microsoft Windows could allow a remote attacker to execute arbitrary code on the system, caused by a flaw in the Remote Desktop Client component. An attacker could exploit this vulnerability to execute arbitrary code on the RDP client machine.
CVE-2023-29352 CVSS:6.5
Microsoft Windows could allow a remote attacker to bypass security restrictions. By persuading a victim to open specially crafted file, an attacker could exploit this vulnerability to bypass certificate or private key authentication when establishing a remote desktop protocol session.
Impact
- Code Execution
- Security Bypass
Indicators Of Compromise
CVE
- CVE-2023-29362
- CVE-2023-29352
Affected Vendors
Microsoft
Affected Products
- Microsoft Windows Server 2012
- Microsoft Windows Server 2012 R2
- Microsoft Windows 10 x32
- Microsoft Windows 10 x64
- Microsoft Windows Server 2016
- Microsoft Windows Server 2019
- Microsoft Windows 10 1809 for x64-based Systems
- Microsoft Windows 10 1809 for 32-bit Systems
- Microsoft Windows 10 1809 for ARM64-based Systems
- Microsoft Windows 10 1607 for 32-bit Systems
- Microsoft Windows 10 1607 for x64-based Systems
- Microsoft Windows Server (Server Core installation) 2019
- Microsoft Windows Server (Server Core installation) 2016
- Microsoft Windows Server (Server Core installation) 2012 R2
- Microsoft Windows Server (Server Core installation) 2012
- Microsoft Windows Server for X64-based systems 2008 R2 SP1
- Microsoft Windows Server for X64-based systems (Server Core installation) 2008 R2 SP1
- Microsoft Windows Server 2022
- Microsoft Windows Server (Server Core installation) 2022
- Microsoft Windows 10 21H2 for 32-bit Systems
- Microsoft Windows 10 21H2 for ARM64-based Systems
- Microsoft Windows 10 21H2 for x64-based Systems
- Microsoft Windows 11 22H2 for ARM64-based Systems
- Microsoft Windows 11 22H2 for x64-based Systems
- Microsoft Windows 10 22H2 for 32-bit Systems
- Microsoft Windows 10 22H2 for ARM64-based Systems
- Microsoft Windows 10 22H2 for x64-based Systems
- Microsoft Windows 11 21H2 for ARM64-based Systems
- Microsoft Windows 11 21H2 for x64-based Systems
Remediation
Use Microsoft Automatic Update to apply the appropriate patch for your system, or the Microsoft Security Update Guide to search for available patches.