IT Admins are advised to promptly apply the patches to the following products, which were released by Microsoft on August 8th:
- .NET Core.
- NET Framework
- ASP.NET
- Azure Arc
- Azure DevOps
- Azure HDInsights
- Dynamics Business Central Control
- Memory Integrity System Readiness Scan Tool
- Microsoft Dynamics
- Microsoft Edge (Chromium-based)
- Microsoft Exchange Server
- Microsoft Office
- Microsoft Office Excel
- Microsoft Office Outlook
- Microsoft Office SharePoint
- Microsoft Office Visio
- Microsoft Teams
- Microsoft WDAC OLE DB provider for SQL
- Microsoft Windows Codecs Library
- Reliability Analysis Metrics Calculation Engine
- Role: Windows Hyper-V
- SQL Server
- Tablet Windows User Interface
- Visual Studio
- Windows Bluetooth A2DP driver
- Windows Cloud Files Mini Filter Driver
- Windows Common Log File System Driver
- Windows Cryptographic Services
- Windows Defender
- Windows Fax and Scan Service
- Windows Group Policy
- Windows HTML Platform
- Windows Kernel
- Windows LDAP – Lightweight Directory Access Protocol
- Windows Message Queuing
- Windows Mobile Device Management
- Windows Projected File System
- Windows Reliability Analysis Metrics Calculation Engine
- Windows Smart Card
- Windows System Assessment Tool
- Windows Wireless Wide Area Network Service
A detailed list of the impacted Microsoft products, and the associated vulnerabilities, severity scores, and download links can be found on the following Microsoft web page. For more information on these vulnerabilities, see Microsoft’s August 2023 Security Updates. For government and large organizations, the risk level for exploitation is deemed high. Some vulnerabilities are known to be active exploits. For home users, the risk level for exploitation is deemed low.
Recommendations:
- Do not use your admin account to run software (applying the “Principle of Least Privilege”). This will help mitigate the impact of an attack.
- Do not click on any unsuspected links or attachments. Remember a simple click with no information entered is enough to trigger the installation of malware. When in doubt, confirm the legitimacy of the communication received with the sender, using a trusted means of communication.
- Visit websites via saved Bookmarks/Favorites or by typing known URLs into your browser’s address bar.