Security 10809 Published by

Microsoft has announced the security updates for July 2023.





Security Update Guide

Updates this Month

This release consists of the following 130 CVEs and 2 Advisories:

TagCVEBase ScoreExploitability
Windows Certificates ADV230001Exploitation Detected
Windows EFI Partition ADV230002Exploitation Less Likely
Windows Netlogon CVE-2023-215267.4Exploitation More Likely
Microsoft Graphics Component CVE-2023-217567.8Exploitation Less Likely
Windows Admin Center CVE-2023-293478.7Exploitation Less Likely
Windows Cluster Server CVE-2023-320336.6Exploitation Less Likely
Windows Remote Procedure Call CVE-2023-320346.5Exploitation Less Likely
Windows Remote Procedure Call CVE-2023-320356.5Exploitation Less Likely
Windows Layer 2 Tunneling Protocol CVE-2023-320376.5Exploitation Less Likely
Windows ODBC Driver CVE-2023-320388.8Exploitation Less Likely
Microsoft Printer Drivers CVE-2023-320395.5Exploitation Less Likely
Microsoft Printer Drivers CVE-2023-320405.5Exploitation Less Likely
Windows Update Orchestrator Service CVE-2023-320415.5Exploitation Less Likely
Windows OLE CVE-2023-320426.5Exploitation Less Likely
Windows Remote Desktop CVE-2023-320436.8Exploitation Less Likely
Windows Message Queuing CVE-2023-320447.5Exploitation Less Likely
Windows Message Queuing CVE-2023-320457.5Exploitation Less Likely
Windows MSHTML Platform CVE-2023-320467.8Exploitation Detected
Paint 3D CVE-2023-320477.8Exploitation Unlikely
Windows SmartScreen CVE-2023-320498.8Exploitation Detected
Windows Installer CVE-2023-320507.0Exploitation Less Likely
Microsoft Windows Codecs Library CVE-2023-320517.8Exploitation Less Likely
Microsoft Power Apps CVE-2023-320526.3Exploitation Less Likely
Windows Installer CVE-2023-320537.8Exploitation Less Likely
Windows Volume Shadow Copy CVE-2023-320547.3Exploitation Less Likely
Windows Active Template Library CVE-2023-320556.7Exploitation Less Likely
Windows Server Update Service CVE-2023-320567.8Exploitation Less Likely
Windows Message Queuing CVE-2023-320579.8Exploitation Less Likely
Windows Failover Cluster CVE-2023-320836.5Exploitation Less Likely
Windows HTTP.sys CVE-2023-320847.5Exploitation Less Likely
Microsoft Printer Drivers CVE-2023-320855.5Exploitation Less Likely
.NET and Visual Studio CVE-2023-331278.1Exploitation Less Likely
Microsoft Office SharePoint CVE-2023-331348.8Exploitation More Likely
Microsoft Office CVE-2023-331487.8Exploitation Less Likely
Microsoft Graphics Component CVE-2023-331497.8Exploitation Less Likely
Microsoft Office CVE-2023-331509.6Exploitation Less Likely
Microsoft Office Outlook CVE-2023-331516.5Exploitation Less Likely
Microsoft Office Access CVE-2023-331527.0Exploitation Less Likely
Microsoft Office Outlook CVE-2023-331536.8Exploitation Less Likely
Windows Partition Management Driver CVE-2023-331547.8Exploitation Less Likely
Windows Cloud Files Mini Filter Driver CVE-2023-331557.8Exploitation Less Likely
Windows Defender CVE-2023-331566.3Exploitation Less Likely
Microsoft Office SharePoint CVE-2023-331578.8Exploitation More Likely
Microsoft Office Excel CVE-2023-331587.8Exploitation Less Likely
Microsoft Office SharePoint CVE-2023-331598.8Exploitation Less Likely
Microsoft Office SharePoint CVE-2023-331608.8Exploitation Less Likely
Microsoft Office Excel CVE-2023-331617.8Exploitation Less Likely
Microsoft Office Excel CVE-2023-331625.5Exploitation Less Likely
Windows Network Load Balancing CVE-2023-331637.5Exploitation Less Likely
Windows Remote Procedure Call CVE-2023-331646.5Exploitation Less Likely
Microsoft Office SharePoint CVE-2023-331654.3Exploitation Less Likely
Windows Remote Procedure Call CVE-2023-331666.5Exploitation Less Likely
Windows Remote Procedure Call CVE-2023-331676.5Exploitation Less Likely
Windows Remote Procedure Call CVE-2023-331686.5Exploitation Less Likely
Windows Remote Procedure Call CVE-2023-331696.5Exploitation Less Likely
ASP.NET and .NET CVE-2023-331708.1Exploitation Less Likely
Microsoft Dynamics CVE-2023-331716.1Exploitation Less Likely
Windows Remote Procedure Call CVE-2023-331726.5Exploitation Less Likely
Windows Remote Procedure Call CVE-2023-331736.5Exploitation Less Likely
Windows Cryptographic Services CVE-2023-331745.5Exploitation Less Likely
Microsoft Printer Drivers CVE-2023-352966.5Exploitation Less Likely
Windows PGM CVE-2023-352977.5Exploitation Less Likely
Windows HTTP.sys CVE-2023-352987.5Exploitation Less Likely
Windows Common Log File System Driver CVE-2023-352997.8Exploitation Less Likely
Windows Remote Procedure Call CVE-2023-353008.8Exploitation Less Likely
Microsoft Printer Drivers CVE-2023-353028.8Exploitation Less Likely
Microsoft Windows Codecs Library CVE-2023-353038.8Exploitation Less Likely
Windows Kernel CVE-2023-353047.8Exploitation Less Likely
Windows Kernel CVE-2023-353057.8Exploitation Less Likely
Microsoft Printer Drivers CVE-2023-353065.5Exploitation Less Likely
Windows MSHTML Platform CVE-2023-353084.4Exploitation Less Likely
Windows Message Queuing CVE-2023-353097.5Exploitation Less Likely
Role: DNS Server CVE-2023-353106.6Exploitation Less Likely
Microsoft Office Outlook CVE-2023-353118.8Exploitation Detected
Windows VOLSNAP.SYS CVE-2023-353127.3Exploitation More Likely
Windows Online Certificate Status Protocol (OCSP) SnapIn CVE-2023-353136.7Exploitation Less Likely
Windows Remote Procedure Call CVE-2023-353145.3Exploitation Less Likely
Windows Layer-2 Bridge Network Driver CVE-2023-353158.8Exploitation Less Likely
Windows Remote Procedure Call CVE-2023-353166.5Exploitation Less Likely
Windows Server Update Service CVE-2023-353177.8Exploitation Less Likely
Windows Remote Procedure Call CVE-2023-353186.5Exploitation Less Likely
Windows Remote Procedure Call CVE-2023-353196.5Exploitation Less Likely
Windows Connected User Experiences and Telemetry CVE-2023-353207.8Exploitation Less Likely
Windows Deployment Services CVE-2023-353216.5Exploitation Less Likely
Windows Deployment Services CVE-2023-353228.8Exploitation Less Likely
Windows Online Certificate Status Protocol (OCSP) SnapIn CVE-2023-353237.8Exploitation Less Likely
Microsoft Printer Drivers CVE-2023-353245.5Exploitation Less Likely
Windows Print Spooler Components CVE-2023-353257.5Exploitation Less Likely
Windows CDP User Components CVE-2023-353265.5Exploitation Less Likely
Windows Transaction Manager CVE-2023-353287.8Exploitation Less Likely
Windows Authentication Methods CVE-2023-353296.5Exploitation Less Likely
Windows SPNEGO Extended Negotiation CVE-2023-353306.2Exploitation Less Likely
Windows Local Security Authority (LSA) CVE-2023-353316.5Exploitation Less Likely
Windows Remote Desktop CVE-2023-353326.8Exploitation Less Likely
Microsoft Media-Wiki Extensions CVE-2023-353337.1Exploitation Less Likely
Microsoft Dynamics CVE-2023-353358.2Exploitation Less Likely
Windows MSHTML Platform CVE-2023-353366.5Exploitation Less Likely
Windows Win32K CVE-2023-353377.8Exploitation Less Likely
Windows Peer Name Resolution Protocol CVE-2023-353387.5Exploitation Less Likely
Windows CryptoAPI CVE-2023-353397.5Exploitation Less Likely
Windows CNG Key Isolation Service CVE-2023-353407.8Exploitation Less Likely
Windows Media CVE-2023-353416.2Exploitation Less Likely
Windows Image Acquisition CVE-2023-353427.8Exploitation Less Likely
Windows Geolocation Service CVE-2023-353437.8Exploitation Less Likely
Role: DNS Server CVE-2023-353446.6Exploitation Less Likely
Role: DNS Server CVE-2023-353456.6Exploitation Less Likely
Role: DNS Server CVE-2023-353466.6Exploitation Less Likely
Windows App Store CVE-2023-353477.1Exploitation Less Likely
Azure Active Directory CVE-2023-353487.5Exploitation Less Likely
Windows Active Directory Certificate Services CVE-2023-353507.2Exploitation Less Likely
Windows Active Directory Certificate Services CVE-2023-353516.6Exploitation Less Likely
Windows Remote Desktop CVE-2023-353527.5Exploitation More Likely
Windows Connected User Experiences and Telemetry CVE-2023-353537.8Exploitation Less Likely
Windows Kernel CVE-2023-353567.8Exploitation Less Likely
Windows Kernel CVE-2023-353577.8Exploitation Less Likely
Windows Kernel CVE-2023-353587.8Exploitation Less Likely
Windows NT OS Kernel CVE-2023-353607.0Exploitation Less Likely
Windows NT OS Kernel CVE-2023-353617.0Exploitation Less Likely
Windows Clip Service CVE-2023-353627.8Exploitation Less Likely
Windows Kernel CVE-2023-353637.8Exploitation Less Likely
Windows NT OS Kernel CVE-2023-353648.8Exploitation Less Likely
Windows Routing and Remote Access Service (RRAS) CVE-2023-353659.8Exploitation Less Likely
Windows Routing and Remote Access Service (RRAS) CVE-2023-353669.8Exploitation Less Likely
Windows Routing and Remote Access Service (RRAS) CVE-2023-353679.8Exploitation Less Likely
Mono Authenticode CVE-2023-353735.3Exploitation Less Likely
Paint 3D CVE-2023-353747.8Exploitation Less Likely
Visual Studio Code CVE-2023-368677.8Exploitation Less Likely
Service Fabric CVE-2023-368686.5Exploitation Less Likely
Azure Active Directory CVE-2023-368716.5
Microsoft Windows Codecs Library CVE-2023-368725.5Exploitation Less Likely
Windows Error Reporting CVE-2023-368747.8Exploitation Detected
Microsoft Office CVE-2023-368848.3Exploitation Detected

Security Update Guide Blog Posts

DateBlog Post
January 11, 2022 Coming Soon: New Security Update Guide Notification System
February 9, 2021 Continuing to Listen: Good News about the Security Update Guide API
January 13, 2021 Security Update Guide Supports CVEs Assigned by Industry Partners
December 8, 2020 Security Update Guide: Let’s keep the conversation going
November 9, 2020 Vulnerability Descriptions in the New Version of the Security Update Guide

Relevant Resources

  • The new Hotpatching feature is now generally available. Please see  Hotpatching feature for Windows Server Azure Edition virtual machines (VMs) for more information.
  • Windows 10 updates are cumulative. The monthly security release includes all security fixes for vulnerabilities that affect Windows 10, in addition to non-security updates. The updates are available via the  Microsoft Update Catalog. For information on lifecycle and support dates for Windows 10 operating systems, please see  Windows Lifecycle Facts Sheet.
  • Microsoft is improving Windows Release Notes. For more information, please see  What's next for Windows release notes.
  • A list of the latest servicing stack updates for each operating system can be found in  ADV990001. This list will be updated whenever a new servicing stack update is released. It is important to install the latest servicing stack update.
  • In addition to security changes for the vulnerabilities, updates include defense-in-depth updates to help improve security-related features.
  • Customers running Windows 7, Windows Server 2008 R2, or Windows Server 2008 need to purchase the Extended Security Update to continue receiving security updates. See  4522133 for more information.

Known Issues

You can see these in more detail from the Deployments tab by selecting Known Issues column in the Edit Columns panel.

For more information about Windows Known Issues, please see  Windows message center (links to currently-supported versions of Windows are in the left pane).

KB ArticleApplies To
5028166Windows 10, version 21H2 and Windows 10, version 22H2
5028168Windows 10, version 1809, Windows Server 2019
5028171Windows Server 2022
5028182Windows 11, version 21H2
5028185Windows 11, version 22H2
5028222Windows Server 2008 (Monthly Rollup)
5028224Windows Server 2008 R2 (Security-only update)
5028226Windows Server 2008 (Security-only update)
5028240Windows Server 2008 R2 (Monthly Rollup)

Win10

Security Update Guide - Microsoft Security Response Center