Microsoft has announced the security updates for July 2023.
Security Update Guide
Updates this Month
This release consists of the following 130 CVEs and 2 Advisories:
Tag CVE Base Score Exploitability Windows Certificates ADV230001 Exploitation Detected Windows EFI Partition ADV230002 Exploitation Less Likely Windows Netlogon CVE-2023-21526 7.4 Exploitation More Likely Microsoft Graphics Component CVE-2023-21756 7.8 Exploitation Less Likely Windows Admin Center CVE-2023-29347 8.7 Exploitation Less Likely Windows Cluster Server CVE-2023-32033 6.6 Exploitation Less Likely Windows Remote Procedure Call CVE-2023-32034 6.5 Exploitation Less Likely Windows Remote Procedure Call CVE-2023-32035 6.5 Exploitation Less Likely Windows Layer 2 Tunneling Protocol CVE-2023-32037 6.5 Exploitation Less Likely Windows ODBC Driver CVE-2023-32038 8.8 Exploitation Less Likely Microsoft Printer Drivers CVE-2023-32039 5.5 Exploitation Less Likely Microsoft Printer Drivers CVE-2023-32040 5.5 Exploitation Less Likely Windows Update Orchestrator Service CVE-2023-32041 5.5 Exploitation Less Likely Windows OLE CVE-2023-32042 6.5 Exploitation Less Likely Windows Remote Desktop CVE-2023-32043 6.8 Exploitation Less Likely Windows Message Queuing CVE-2023-32044 7.5 Exploitation Less Likely Windows Message Queuing CVE-2023-32045 7.5 Exploitation Less Likely Windows MSHTML Platform CVE-2023-32046 7.8 Exploitation Detected Paint 3D CVE-2023-32047 7.8 Exploitation Unlikely Windows SmartScreen CVE-2023-32049 8.8 Exploitation Detected Windows Installer CVE-2023-32050 7.0 Exploitation Less Likely Microsoft Windows Codecs Library CVE-2023-32051 7.8 Exploitation Less Likely Microsoft Power Apps CVE-2023-32052 6.3 Exploitation Less Likely Windows Installer CVE-2023-32053 7.8 Exploitation Less Likely Windows Volume Shadow Copy CVE-2023-32054 7.3 Exploitation Less Likely Windows Active Template Library CVE-2023-32055 6.7 Exploitation Less Likely Windows Server Update Service CVE-2023-32056 7.8 Exploitation Less Likely Windows Message Queuing CVE-2023-32057 9.8 Exploitation Less Likely Windows Failover Cluster CVE-2023-32083 6.5 Exploitation Less Likely Windows HTTP.sys CVE-2023-32084 7.5 Exploitation Less Likely Microsoft Printer Drivers CVE-2023-32085 5.5 Exploitation Less Likely .NET and Visual Studio CVE-2023-33127 8.1 Exploitation Less Likely Microsoft Office SharePoint CVE-2023-33134 8.8 Exploitation More Likely Microsoft Office CVE-2023-33148 7.8 Exploitation Less Likely Microsoft Graphics Component CVE-2023-33149 7.8 Exploitation Less Likely Microsoft Office CVE-2023-33150 9.6 Exploitation Less Likely Microsoft Office Outlook CVE-2023-33151 6.5 Exploitation Less Likely Microsoft Office Access CVE-2023-33152 7.0 Exploitation Less Likely Microsoft Office Outlook CVE-2023-33153 6.8 Exploitation Less Likely Windows Partition Management Driver CVE-2023-33154 7.8 Exploitation Less Likely Windows Cloud Files Mini Filter Driver CVE-2023-33155 7.8 Exploitation Less Likely Windows Defender CVE-2023-33156 6.3 Exploitation Less Likely Microsoft Office SharePoint CVE-2023-33157 8.8 Exploitation More Likely Microsoft Office Excel CVE-2023-33158 7.8 Exploitation Less Likely Microsoft Office SharePoint CVE-2023-33159 8.8 Exploitation Less Likely Microsoft Office SharePoint CVE-2023-33160 8.8 Exploitation Less Likely Microsoft Office Excel CVE-2023-33161 7.8 Exploitation Less Likely Microsoft Office Excel CVE-2023-33162 5.5 Exploitation Less Likely Windows Network Load Balancing CVE-2023-33163 7.5 Exploitation Less Likely Windows Remote Procedure Call CVE-2023-33164 6.5 Exploitation Less Likely Microsoft Office SharePoint CVE-2023-33165 4.3 Exploitation Less Likely Windows Remote Procedure Call CVE-2023-33166 6.5 Exploitation Less Likely Windows Remote Procedure Call CVE-2023-33167 6.5 Exploitation Less Likely Windows Remote Procedure Call CVE-2023-33168 6.5 Exploitation Less Likely Windows Remote Procedure Call CVE-2023-33169 6.5 Exploitation Less Likely ASP.NET and .NET CVE-2023-33170 8.1 Exploitation Less Likely Microsoft Dynamics CVE-2023-33171 6.1 Exploitation Less Likely Windows Remote Procedure Call CVE-2023-33172 6.5 Exploitation Less Likely Windows Remote Procedure Call CVE-2023-33173 6.5 Exploitation Less Likely Windows Cryptographic Services CVE-2023-33174 5.5 Exploitation Less Likely Microsoft Printer Drivers CVE-2023-35296 6.5 Exploitation Less Likely Windows PGM CVE-2023-35297 7.5 Exploitation Less Likely Windows HTTP.sys CVE-2023-35298 7.5 Exploitation Less Likely Windows Common Log File System Driver CVE-2023-35299 7.8 Exploitation Less Likely Windows Remote Procedure Call CVE-2023-35300 8.8 Exploitation Less Likely Microsoft Printer Drivers CVE-2023-35302 8.8 Exploitation Less Likely Microsoft Windows Codecs Library CVE-2023-35303 8.8 Exploitation Less Likely Windows Kernel CVE-2023-35304 7.8 Exploitation Less Likely Windows Kernel CVE-2023-35305 7.8 Exploitation Less Likely Microsoft Printer Drivers CVE-2023-35306 5.5 Exploitation Less Likely Windows MSHTML Platform CVE-2023-35308 4.4 Exploitation Less Likely Windows Message Queuing CVE-2023-35309 7.5 Exploitation Less Likely Role: DNS Server CVE-2023-35310 6.6 Exploitation Less Likely Microsoft Office Outlook CVE-2023-35311 8.8 Exploitation Detected Windows VOLSNAP.SYS CVE-2023-35312 7.3 Exploitation More Likely Windows Online Certificate Status Protocol (OCSP) SnapIn CVE-2023-35313 6.7 Exploitation Less Likely Windows Remote Procedure Call CVE-2023-35314 5.3 Exploitation Less Likely Windows Layer-2 Bridge Network Driver CVE-2023-35315 8.8 Exploitation Less Likely Windows Remote Procedure Call CVE-2023-35316 6.5 Exploitation Less Likely Windows Server Update Service CVE-2023-35317 7.8 Exploitation Less Likely Windows Remote Procedure Call CVE-2023-35318 6.5 Exploitation Less Likely Windows Remote Procedure Call CVE-2023-35319 6.5 Exploitation Less Likely Windows Connected User Experiences and Telemetry CVE-2023-35320 7.8 Exploitation Less Likely Windows Deployment Services CVE-2023-35321 6.5 Exploitation Less Likely Windows Deployment Services CVE-2023-35322 8.8 Exploitation Less Likely Windows Online Certificate Status Protocol (OCSP) SnapIn CVE-2023-35323 7.8 Exploitation Less Likely Microsoft Printer Drivers CVE-2023-35324 5.5 Exploitation Less Likely Windows Print Spooler Components CVE-2023-35325 7.5 Exploitation Less Likely Windows CDP User Components CVE-2023-35326 5.5 Exploitation Less Likely Windows Transaction Manager CVE-2023-35328 7.8 Exploitation Less Likely Windows Authentication Methods CVE-2023-35329 6.5 Exploitation Less Likely Windows SPNEGO Extended Negotiation CVE-2023-35330 6.2 Exploitation Less Likely Windows Local Security Authority (LSA) CVE-2023-35331 6.5 Exploitation Less Likely Windows Remote Desktop CVE-2023-35332 6.8 Exploitation Less Likely Microsoft Media-Wiki Extensions CVE-2023-35333 7.1 Exploitation Less Likely Microsoft Dynamics CVE-2023-35335 8.2 Exploitation Less Likely Windows MSHTML Platform CVE-2023-35336 6.5 Exploitation Less Likely Windows Win32K CVE-2023-35337 7.8 Exploitation Less Likely Windows Peer Name Resolution Protocol CVE-2023-35338 7.5 Exploitation Less Likely Windows CryptoAPI CVE-2023-35339 7.5 Exploitation Less Likely Windows CNG Key Isolation Service CVE-2023-35340 7.8 Exploitation Less Likely Windows Media CVE-2023-35341 6.2 Exploitation Less Likely Windows Image Acquisition CVE-2023-35342 7.8 Exploitation Less Likely Windows Geolocation Service CVE-2023-35343 7.8 Exploitation Less Likely Role: DNS Server CVE-2023-35344 6.6 Exploitation Less Likely Role: DNS Server CVE-2023-35345 6.6 Exploitation Less Likely Role: DNS Server CVE-2023-35346 6.6 Exploitation Less Likely Windows App Store CVE-2023-35347 7.1 Exploitation Less Likely Azure Active Directory CVE-2023-35348 7.5 Exploitation Less Likely Windows Active Directory Certificate Services CVE-2023-35350 7.2 Exploitation Less Likely Windows Active Directory Certificate Services CVE-2023-35351 6.6 Exploitation Less Likely Windows Remote Desktop CVE-2023-35352 7.5 Exploitation More Likely Windows Connected User Experiences and Telemetry CVE-2023-35353 7.8 Exploitation Less Likely Windows Kernel CVE-2023-35356 7.8 Exploitation Less Likely Windows Kernel CVE-2023-35357 7.8 Exploitation Less Likely Windows Kernel CVE-2023-35358 7.8 Exploitation Less Likely Windows NT OS Kernel CVE-2023-35360 7.0 Exploitation Less Likely Windows NT OS Kernel CVE-2023-35361 7.0 Exploitation Less Likely Windows Clip Service CVE-2023-35362 7.8 Exploitation Less Likely Windows Kernel CVE-2023-35363 7.8 Exploitation Less Likely Windows NT OS Kernel CVE-2023-35364 8.8 Exploitation Less Likely Windows Routing and Remote Access Service (RRAS) CVE-2023-35365 9.8 Exploitation Less Likely Windows Routing and Remote Access Service (RRAS) CVE-2023-35366 9.8 Exploitation Less Likely Windows Routing and Remote Access Service (RRAS) CVE-2023-35367 9.8 Exploitation Less Likely Mono Authenticode CVE-2023-35373 5.3 Exploitation Less Likely Paint 3D CVE-2023-35374 7.8 Exploitation Less Likely Visual Studio Code CVE-2023-36867 7.8 Exploitation Less Likely Service Fabric CVE-2023-36868 6.5 Exploitation Less Likely Azure Active Directory CVE-2023-36871 6.5 Microsoft Windows Codecs Library CVE-2023-36872 5.5 Exploitation Less Likely Windows Error Reporting CVE-2023-36874 7.8 Exploitation Detected Microsoft Office CVE-2023-36884 8.3 Exploitation Detected Security Update Guide Blog Posts
Date Blog Post January 11, 2022 Coming Soon: New Security Update Guide Notification System February 9, 2021 Continuing to Listen: Good News about the Security Update Guide API January 13, 2021 Security Update Guide Supports CVEs Assigned by Industry Partners December 8, 2020 Security Update Guide: Let’s keep the conversation going November 9, 2020 Vulnerability Descriptions in the New Version of the Security Update Guide Relevant Resources
- The new Hotpatching feature is now generally available. Please see Hotpatching feature for Windows Server Azure Edition virtual machines (VMs) for more information.
- Windows 10 updates are cumulative. The monthly security release includes all security fixes for vulnerabilities that affect Windows 10, in addition to non-security updates. The updates are available via the Microsoft Update Catalog. For information on lifecycle and support dates for Windows 10 operating systems, please see Windows Lifecycle Facts Sheet.
- Microsoft is improving Windows Release Notes. For more information, please see What's next for Windows release notes.
- A list of the latest servicing stack updates for each operating system can be found in ADV990001. This list will be updated whenever a new servicing stack update is released. It is important to install the latest servicing stack update.
- In addition to security changes for the vulnerabilities, updates include defense-in-depth updates to help improve security-related features.
- Customers running Windows 7, Windows Server 2008 R2, or Windows Server 2008 need to purchase the Extended Security Update to continue receiving security updates. See 4522133 for more information.
Known Issues
You can see these in more detail from the Deployments tab by selecting Known Issues column in the Edit Columns panel.
For more information about Windows Known Issues, please see Windows message center (links to currently-supported versions of Windows are in the left pane).
KB Article Applies To 5028166 Windows 10, version 21H2 and Windows 10, version 22H2 5028168 Windows 10, version 1809, Windows Server 2019 5028171 Windows Server 2022 5028182 Windows 11, version 21H2 5028185 Windows 11, version 22H2 5028222 Windows Server 2008 (Monthly Rollup) 5028224 Windows Server 2008 R2 (Security-only update) 5028226 Windows Server 2008 (Security-only update) 5028240 Windows Server 2008 R2 (Monthly Rollup)