Published: Oct 11, 2023
Key takeaways:
- Microsoft has released the October 2023 Patch Tuesday updates to address a total of 103 security vulnerabilities on Windows PCs.
- The updates come with a range of critical and important patches, addressing various vulnerabilities across Windows, Office, Exchange Server, Azure, Skype for Business, and more.
- Microsoft has officially ended support for Windows Server 2012 and Windows Server 2012 R2, but enterprise customers can still receive security updates through the Extended Security Update (ESU) program until October 13, 2026.
Microsoft announced the release of the October 2023 Patch Tuesday updates for Windows 10 and Windows 11 yesterday. This month, the company has addressed 103 security vulnerabilities, including three actively exploited zero-day flaws affecting Microsoft WordPad, Skype for Business, and the HTTP/2 protocol.
In October, Microsoft released a total of 103 patches to address several vulnerabilities in Windows, Office, Exchange Server, Office, Azure, Skype for Business, and other components. 13 of them are rated critical, and there are also 90 security flaws rated “Important” in severity.
Here’s a list of the most important vulnerabilities that were fixed this month:
Product | Impact | Max Severity | Article | Download | Details |
Windows Server 2012 (Server Core installation) | Denial of Service | Important | 5031442 | Monthly Rollup | CVE-2023-36602 |
Windows Server 2012 (Server Core installation) | Denial of Service | Important | 5031427 | Security Only | CVE-2023-36602 |
Windows Server 2012 | Denial of Service | Important | 5031442 | Monthly Rollup | CVE-2023-36602 |
Windows Server 2012 | Denial of Service | Important | 5031427 | Security Only | CVE-2023-36602 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Denial of Service | Important | 5031408 | Monthly Rollup | CVE-2023-36602 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Denial of Service | Important | 5031441 | Security Only | CVE-2023-36602 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Denial of Service | Important | 5031408 | Monthly Rollup | CVE-2023-36602 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Denial of Service | Important | 5031441 | Security Only | CVE-2023-36602 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Denial of Service | Important | 5031416 | Monthly Rollup | CVE-2023-36602 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Denial of Service | Important | 5031411 | Security Only | CVE-2023-36602 |
Windows Server 2008 for x64-based Systems Service Pack 2 | Denial of Service | Important | 5031416 | Monthly Rollup | CVE-2023-36602 |
Windows Server 2008 for x64-based Systems Service Pack 2 | Denial of Service | Important | 5031411 | Security Only | CVE-2023-36602 |
Windows 10 Version 1607 for 32-bit Systems | Denial of Service | Important | 5031362 | Security Update | CVE-2023-36720 |
Windows 10 Version 22H2 for 32-bit Systems | Denial of Service | Important | 5031356 | Security Update | CVE-2023-36720 |
Windows 10 Version 22H2 for ARM64-based Systems | Denial of Service | Important | 5031356 | Security Update | CVE-2023-36720 |
Windows 10 Version 22H2 for x64-based Systems | Denial of Service | Important | 5031356 | Security Update | CVE-2023-36720 |
Windows 11 Version 22H2 for x64-based Systems | Denial of Service | Important | 5031354 | Security Update | CVE-2023-36720 |
Windows 11 Version 22H2 for ARM64-based Systems | Denial of Service | Important | 5031354 | Security Update | CVE-2023-36720 |
Windows 10 Version 21H2 for x64-based Systems | Denial of Service | Important | 5031356 | Security Update | CVE-2023-36720 |
Windows 10 Version 21H2 for ARM64-based Systems | Denial of Service | Important | 5031356 | Security Update | CVE-2023-36720 |
Windows 10 Version 21H2 for 32-bit Systems | Information Disclosure | Important | 5031356 | Security Update | CVE-2023-36724 |
Windows 11 version 21H2 for ARM64-based Systems | Information Disclosure | Important | 5031358 | Security Update | CVE-2023-36724 |
Windows 11 version 21H2 for x64-based Systems | Information Disclosure | Important | 5031358 | Security Update | CVE-2023-36724 |
Windows Server 2022 (Server Core installation) | Information Disclosure | Important | 5031364 | Security Update | CVE-2023-36724 |
Windows Server 2022 | Information Disclosure | Important | 5031364 | Security Update | CVE-2023-36724 |
Windows Server 2019 (Server Core installation) | Information Disclosure | Important | 5031361 | Security Update | CVE-2023-36724 |
Windows Server 2019 | Information Disclosure | Important | 5031361 | Security Update | CVE-2023-36724 |
Windows 10 Version 1809 for ARM64-based Systems | Information Disclosure | Important | 5031361 | Security Update | CVE-2023-36724 |
Windows 10 Version 1809 for x64-based Systems | Information Disclosure | Important | 5031361 | Security Update | CVE-2023-36724 |
Windows 10 Version 1809 for 32-bit Systems | Information Disclosure | Important | 5031361 | Security Update | CVE-2023-36724 |
Windows 10 Version 1607 for x64-based Systems | Elevation of Privilege | Important | 5031362 | Security Update | CVE-2023-36434 |
Microsoft Dynamics 365 (on-premises) version 9.1 | Information Disclosure | Important | 5030608 | Security Update | CVE-2023-36433 |
Microsoft Dynamics 365 (on-premises) version 9.0 | Information Disclosure | Important | 5029396 | Security Update | CVE-2023-36433 |
Windows 10 for 32-bit Systems | Remote Code Execution | Important | 5031377 | Security Update | CVE-2023-36557 |
Windows Server 2016 (Server Core installation) | Remote Code Execution | Important | 5031362 | Security Update | CVE-2023-36557 |
Windows Server 2016 | Remote Code Execution | Important | 5031362 | Security Update | CVE-2023-36557 |
Windows 10 for x64-based Systems | Remote Code Execution | Important | 5031377 | Security Update | CVE-2023-36557 |
Microsoft Exchange Server 2019 Cumulative Update 12 | Remote Code Execution | Important | 5030877 | Security Update | CVE-2023-36778 |
Microsoft Exchange Server 2019 Cumulative Update 13 | Remote Code Execution | Important | 5030877 | Security Update | CVE-2023-36778 |
Windows Server 2012 R2 (Server Core installation) | Remote Code Execution | Important | 5031419 | Monthly Rollup | CVE-2023-36436 |
Windows Server 2012 R2 (Server Core installation) | Remote Code Execution | Important | 5031407 | Security Only | CVE-2023-36436 |
Windows Server 2012 R2 (Server Core installation) | Remote Code Execution | Important | 5031355 | IE Cumulative | CVE-2023-36436 |
Windows Server 2012 R2 | Remote Code Execution | Important | 5031419 | Monthly Rollup | CVE-2023-36436 |
Windows Server 2012 R2 | Remote Code Execution | Important | 5031407 | Security Only | CVE-2023-36436 |
Windows Server 2012 R2 | Remote Code Execution | Important | 5031355 | IE Cumulative | CVE-2023-36436 |
Windows Server 2012 (Server Core installation) | Remote Code Execution | Important | 5031355 | IE Cumulative | CVE-2023-36436 |
Windows Server 2012 | Remote Code Execution | Important | 5031355 | IE Cumulative | CVE-2023-36436 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Remote Code Execution | Important | 5031416 | Monthly Rollup | CVE-2023-36436 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Remote Code Execution | Important | 5031411 | Security Only | CVE-2023-36436 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | Remote Code Execution | Important | 5031416 | Monthly Rollup | CVE-2023-36436 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | Remote Code Execution | Important | 5031411 | Security Only | CVE-2023-36436 |
Microsoft Office LTSC 2021 for 64-bit editions | Elevation of Privilege | Important | Click to Run | Security Update | CVE-2023-36569 |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Elevation of Privilege | Important | Click to Run | Security Update | CVE-2023-36569 |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Elevation of Privilege | Important | Click to Run | Security Update | CVE-2023-36569 |
Microsoft Office 2019 for 64-bit editions | Elevation of Privilege | Important | Click to Run | Security Update | CVE-2023-36569 |
Microsoft Office 2019 for 32-bit editions | Elevation of Privilege | Important | Click to Run | Security Update | CVE-2023-36569 |
Microsoft Common Data Model SDK for C# | Denial of Service | Important | Release Notes | Security Update | CVE-2023-36566 |
Microsoft Common Data Model SDK for Python | Denial of Service | Important | Release Notes | Security Update | CVE-2023-36566 |
Microsoft Common Data Model SDK for TypeScript | Denial of Service | Important | Release Notes | Security Update | CVE-2023-36566 |
Microsoft Common Data Model SDK for Java | Denial of Service | Important | Release Notes | Security Update | CVE-2023-36566 |
Skype for Business Server 2019 CU7 | Elevation of Privilege | Important | 4470124 | Security Update | CVE-2023-41763 |
Skype for Business Server 2015 CU13 | Elevation of Privilege | Important | 3061064 | Security Update | CVE-2023-41763 |
Azure Identity SDK for .NET | Remote Code Execution | Important | More Information | Security Update | CVE-2023-36414 |
Azure DevOps Server 2020.1.2 | Elevation of Privilege | Important | Release Notes | Security Update | CVE-2023-36561 |
Azure DevOps Server 2020.0.2 | Elevation of Privilege | Important | Release Notes | Security Update | CVE-2023-36561 |
Microsoft Exchange Server 2016 Cumulative Update 23 | Remote Code Execution | Important | 5030877 | Security Update | CVE-2023-36778 |
Microsoft ODBC Driver 18 for SQL Server on MacOS | Remote Code Execution | Important | Release Notes | Security Update | CVE-2023-36420 |
Microsoft ODBC Driver 18 for SQL Server on Linux | Remote Code Execution | Important | Release Notes | Security Update | CVE-2023-36420 |
Microsoft ODBC Driver 18 for SQL Server on Windows | Remote Code Execution | Important | Release Notes | Security Update | CVE-2023-36420 |
Microsoft ODBC Driver 17 for SQL Server on MacOS | Remote Code Execution | Important | Release Notes | Security Update | CVE-2023-36420 |
Microsoft ODBC Driver 17 for SQL Server on Linux | Remote Code Execution | Important | Release Notes | Security Update | CVE-2023-36420 |
Microsoft ODBC Driver 17 for SQL Server on Windows | Remote Code Execution | Important | Release Notes | Security Update | CVE-2023-36420 |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | Remote Code Execution | Important | 5029379 | Security Update | CVE-2023-36420 |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | Remote Code Execution | Important | 5029377 | Security Update | CVE-2023-36420 |
Microsoft Office LTSC 2021 for 32-bit editions | Elevation of Privilege | Important | Click to Run | Security Update | CVE-2023-36568 |
Microsoft SQL Server 2019 for x64-based Systems (CU 22) | Remote Code Execution | Important | 5029378 | Security Update | CVE-2023-36417 |
Microsoft SQL Server 2022 for x64-based Systems (CU 8) | Remote Code Execution | Important | 5029503 | Security Update | CVE-2023-36417 |
.NET 7.0 | Denial of Service | Important | 5031901 | Security Update | CVE-2023-38171 |
Microsoft OLE DB Driver 18 for SQL Server | Remote Code Execution | Important | Release Notes | Security Update | CVE-2023-36417 |
Microsoft OLE DB Driver 19 for SQL Server | Remote Code Execution | Important | Release Notes | Security Update | CVE-2023-36417 |
Azure RTOS GUIX Studio | Remote Code Execution | Important | More Information | Security Update | CVE-2023-36418 |
Azure HDInsight | Elevation of Privilege | Important | Release Notes | Security Update | CVE-2023-36419 |
Microsoft Dynamics 365 (on-premises) version 9.1 | Information Disclosure | Important | 5031500 | Security Update | CVE-2023-36429 |
Microsoft Dynamics 365 (on-premises) version 9.0 | Information Disclosure | Important | 5031499 | Security Update | CVE-2023-36429 |
Azure Network Watcher VM Extension | Elevation of Privilege | Important | Release Notes | Security Update | CVE-2023-36737 |
Azure DevOps Server 2022.0.1 | Elevation of Privilege | Important | Release Notes | Security Update | CVE-2023-36561 |
Azure Identity SDK for JavaScript | Remote Code Execution | Important | More Information | Security Update | CVE-2023-36415 |
Azure Identity SDK for Python | Remote Code Execution | Important | More Information | Security Update | CVE-2023-36415 |
Azure Identity SDK for Java | Remote Code Execution | Important | More Information | Security Update | CVE-2023-36415 |
ASP.NET Core 7.0 | Denial of Service | Important | Release Notes | Security Update | CVE-2023-44487 |
Microsoft Dynamics 365 (on-premises) version 9.0 | Spoofing | Important | 5026500 | Security Update | CVE-2023-36416 |
Azure RTOS GUIX Studio Installer Application | Remote Code Execution | Important | More Information | Security Update | CVE-2023-36418 |
Microsoft SQL Server 2017 for x64-based Systems (CU 31) | Denial of Service | Important | 5029376 | Security Update | CVE-2023-36728 |
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature Pack | Denial of Service | Important | 5029187 | Security Update | CVE-2023-36728 |
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR) | Denial of Service | Important | 5029186 | Security Update | CVE-2023-36728 |
Microsoft SQL Server 2014 Service Pack 3 for x64-based Systems (CU 4) | Denial of Service | Important | 5029185 | Security Update | CVE-2023-36728 |
Microsoft SQL Server 2014 Service Pack 3 for 32-bit Systems (CU 4) | Denial of Service | Important | 5029185 | Security Update | CVE-2023-36728 |
Microsoft SQL Server 2014 Service Pack 3 for 32-bit Systems (GDR) | Denial of Service | Important | 5029184 | Security Update | CVE-2023-36728 |
Microsoft SQL Server 2014 Service Pack 3 for x64-based Systems (GDR) | Denial of Service | Important | 5029184 | Security Update | CVE-2023-36728 |
Microsoft SQL Server 2017 for x64-based Systems (GDR) | Denial of Service | Important | 5029375 | Security Update | CVE-2023-36728 |
Microsoft Dynamics 365 (on-premises) version 9.1 | Spoofing | Important | 5026501 | Security Update | CVE-2023-36416 |
Microsoft Visual Studio 2022 version 17.7 | Denial of Service | Important | Release Notes | Security Update | CVE-2023-44487 |
Microsoft Visual Studio 2022 version 17.6 | Denial of Service | Important | Release Notes | Security Update | CVE-2023-44487 |
Microsoft Visual Studio 2022 version 17.4 | Denial of Service | Important | Release Notes | Security Update | CVE-2023-44487 |
Microsoft Visual Studio 2022 version 17.2 | Denial of Service | Important | Release Notes | Security Update | CVE-2023-44487 |
ASP.NET Core 6.0 | Denial of Service | Important | Release Notes | Security Update | CVE-2023-44487 |
.NET 6.0 | Denial of Service | Important | 5031900 | Security Update | CVE-2023-44487 |
Microsoft Office for Universal | Elevation of Privilege | Important | Release Notes | Security Update | CVE-2023-36565 |
Microsoft Office for Android | Elevation of Privilege | Important | Release Notes | Security Update | CVE-2023-36565 |
Microsoft Office LTSC for Mac 2021 | Elevation of Privilege | Important | Release Notes | Security Update | CVE-2023-36565 |
Microsoft Office 2019 for Mac | Elevation of Privilege | Important | Release Notes | Security Update | CVE-2023-36565 |
Microsoft Edge (Chromium-based) | Release Notes | Security Update | CVE-2023-5346 |
The October 2023 Patch Tuesday Updates bring some minor improvements for users running Windows 11 version 22H2. There is a new feature that lets users view the recommended websites in the Start Menu’s Recommended section. However, IT Pros can configure a policy to disable this feature on managed Windows 11 devices.
Microsoft has released the KB5030310 update to address a couple of bugs that previously caused the taskbar’s search button to disappear while interacting with the search box flyout menu. The company also fixed a Microsoft Defender bug that prevented users from connecting to USB printers on Windows 11 versions 22H2 and 21H2.
Microsoft has officially dropped support for Windows Server 2012 and Windows Server 2012 R2. However, enterprise customers can continue receiving critical and important updates via the Extended Security Update (ESU) program until October 13, 2026.
Microsoft notes that the ESU program requires annual renewals for organizations that purchase through volume licensing. However, it doesn’t require organizations to pay any additional costs to host Windows Server workloads in Azure virtual machines. If you’re interested, you can find more details about the eligibility criteria of the ESU program in this FAQ document.
Organizations looking to deploy this month’s patches should conduct thorough testing before deploying them widely on production systems. That said, applying the patches widely shouldn’t be delayed longer than necessary as hackers start to work out how to weaponize newly reported vulnerabilities.
A best practice is to make sure you have backed up systems before applying updates. Every month, users experience issues with Windows updates that lead to systems not booting, application and hardware compatibility issues, or even data loss in extreme cases.
There are backup tools built into Windows and Windows Server that you can use to restore systems in the event a patch causes a problem. The backup features in Windows can be used to restore an entire system, or files and folders on a granular basis.
If you have any problems with this month’s patches, please let us know in the comments below. Other readers might be able to share their experiences in how to roll back problematic updates or mitigate issues caused by patches that are important to have in place.