Published: Mar 14, 2023
Microsoft has just released the March 2023 Patch Tuesday updates for Windows 11 and Windows 10. For Windows 11 users, today marks the public rollout of the “Moment 2” feature update that brings a new search box to the taskbar and many other new features.
On the security front, this month’s Patch Tuesday updates include fixes for 74 vulnerabilities in Windows and other components. Two of them are currently being exploited by attackers, including an Outlook spoofing vulnerability.
Here are the most critical vulnerabilities fixed with this month’s Patch Tuesday updates:
You can find the full list of CVEs included in this month’s Patch Tuesday below:
Product | Impact | Max Severity | Article | Download | Details |
Windows 11 Version 22H2 for x64-based Systems | Remote Code Execution | Critical | 5023706 | Security Update | CVE-2023-23392 |
Windows 10 for x64-based Systems | Elevation of Privilege | Critical | 5023713 | Security Update | CVE-2023-1018 |
Windows 10 Version 22H2 for x64-based Systems | Elevation of Privilege | Critical | 5023696 | Security Update | CVE-2023-1018 |
Windows Server 2012 R2 | Information Disclosure | Important | 5023765 | Monthly Rollup | CVE-2023-24911 |
Windows Server 2012 R2 | Information Disclosure | Important | 5023764 | Security Only | CVE-2023-24911 |
Windows Server 2012 (Server Core installation) | Information Disclosure | Important | 5023756 | Monthly Rollup | CVE-2023-24911 |
Windows Server 2012 (Server Core installation) | Information Disclosure | Important | 5023752 | Security Only | CVE-2023-24911 |
Windows Server 2012 | Information Disclosure | Important | 5023756 | Monthly Rollup | CVE-2023-24911 |
Windows Server 2012 | Information Disclosure | Important | 5023752 | Security Only | CVE-2023-24911 |
Windows Server 2016 (Server Core installation) | Information Disclosure | Important | 5023697 | Security Update | CVE-2023-24911 |
Windows Server 2016 | Information Disclosure | Important | 5023697 | Security Update | CVE-2023-24911 |
Windows 10 Version 1607 for x64-based Systems | Information Disclosure | Important | 5023697 | Security Update | CVE-2023-24911 |
Windows 10 Version 1607 for 32-bit Systems | Information Disclosure | Important | 5023697 | Security Update | CVE-2023-24870 |
Windows 10 for 32-bit Systems | Information Disclosure | Important | 5023713 | Security Update | CVE-2023-24870 |
Windows 10 Version 22H2 for 32-bit Systems | Information Disclosure | Important | 5023696 | Security Update | CVE-2023-24870 |
Windows 10 Version 22H2 for ARM64-based Systems | Information Disclosure | Important | 5023696 | Security Update | CVE-2023-24870 |
Windows 11 Version 22H2 for ARM64-based Systems | Information Disclosure | Important | 5023706 | Security Update | CVE-2023-24870 |
Windows 10 Version 21H2 for x64-based Systems | Information Disclosure | Important | 5023696 | Security Update | CVE-2023-24870 |
Windows 10 Version 21H2 for ARM64-based Systems | Information Disclosure | Important | 5023696 | Security Update | CVE-2023-24870 |
Windows 10 Version 21H2 for 32-bit Systems | Information Disclosure | Important | 5023696 | Security Update | CVE-2023-24870 |
Windows 11 version 21H2 for ARM64-based Systems | Information Disclosure | Important | 5023698 | Security Update | CVE-2023-24870 |
Windows 11 version 21H2 for x64-based Systems | Information Disclosure | Important | 5023698 | Security Update | CVE-2023-24870 |
Windows 10 Version 20H2 for ARM64-based Systems | Information Disclosure | Important | 5023696 | Security Update | CVE-2023-24870 |
Windows 10 Version 20H2 for 32-bit Systems | Information Disclosure | Important | 5023696 | Security Update | CVE-2023-24870 |
Windows Server 2022 (Server Core installation) | Security Feature Bypass | Moderate | 5023705 | Security Update | CVE-2023-24880 |
Windows Server 2022 (Server Core installation) | Security Feature Bypass | Moderate | 5023786 | AzureHotpatch | CVE-2023-24880 |
Windows Server 2022 | Security Feature Bypass | Moderate | 5023705 | Security Update | CVE-2023-24880 |
Windows Server 2022 | Security Feature Bypass | Moderate | 5023786 | AzureHotpatch | CVE-2023-24880 |
Windows 10 Version 20H2 for x64-based Systems | Remote Code Execution | Important | 5023696 | Security Update | CVE-2023-24876 |
Windows Server 2019 (Server Core installation) | Remote Code Execution | Important | 5023702 | Security Update | CVE-2023-24876 |
Windows Server 2019 | Remote Code Execution | Important | 5023702 | Security Update | CVE-2023-24876 |
Windows 10 Version 1809 for ARM64-based Systems | Remote Code Execution | Important | 5023702 | Security Update | CVE-2023-24876 |
Windows 10 Version 1809 for x64-based Systems | Elevation of Privilege | Important | 5023702 | Security Update | CVE-2023-24910 |
Windows 10 Version 1809 for 32-bit Systems | Elevation of Privilege | Important | 5023702 | Security Update | CVE-2023-24910 |
Windows Server 2012 R2 (Server Core installation) | Remote Code Execution | Important | 5023765 | Monthly Rollup | CVE-2023-24909 |
Windows Server 2012 R2 (Server Core installation) | Remote Code Execution | Important | 5023764 | Security Only | CVE-2023-24909 |
Microsoft Visual Studio 2022 version 17.5 | Remote Code Execution | Important | Release Notes | Security Update | CVE-2023-23946 |
Microsoft Visual Studio 2022 version 17.4 | Remote Code Execution | Important | Release Notes | Security Update | CVE-2023-23618 |
Microsoft Visual Studio 2022 version 17.0 | Remote Code Execution | Important | Release Notes | Security Update | CVE-2023-23618 |
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 – 16.10) | Remote Code Execution | Important | Release Notes | Security Update | CVE-2023-23618 |
Microsoft Visual Studio 2022 version 17.2 | Remote Code Execution | Important | Release Notes | Security Update | CVE-2023-23618 |
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 – 15.8) | Remote Code Execution | Important | Release Notes | Security Update | CVE-2023-23618 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Remote Code Execution | Important | 5023769 | Monthly Rollup | CVE-2023-24869 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Remote Code Execution | Important | 5023759 | Security Only | CVE-2023-24869 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Remote Code Execution | Important | 5023769 | Monthly Rollup | CVE-2023-24869 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Remote Code Execution | Important | 5023759 | Security Only | CVE-2023-24869 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Remote Code Execution | Important | 5023755 | Monthly Rollup | CVE-2023-24869 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Remote Code Execution | Important | 5023754 | Security Only | CVE-2023-24869 |
Azure Service Fabric 9.1 for Ubuntu | Spoofing | Important | Release Notes | Security Update | CVE-2023-23383 |
Azure Service Fabric 9.1 for Windows | Spoofing | Important | Release Notes | Security Update | CVE-2023-23383 |
Microsoft Dynamics 365 (on-premises) version 9.0 | Spoofing | Important | 5023506 | Security Update | CVE-2023-24891 |
Microsoft Dynamics 365 (on-premises) version 9.1 | Spoofing | Important | 5023505 | Security Update | CVE-2023-24891 |
OneDrive for iOS | Security Feature Bypass | Important | App Store | Security Update | CVE-2023-24890 |
Windows Server 2008 for x64-based Systems Service Pack 2 | Remote Code Execution | Important | 5023755 | Monthly Rollup | CVE-2023-24869 |
Windows Server 2008 for x64-based Systems Service Pack 2 | Remote Code Execution | Important | 5023754 | Security Only | CVE-2023-24869 |
OneDrive for MacOS Installer | Elevation of Privilege | Important | App Store | Security Update | CVE-2023-24930 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Remote Code Execution | Important | 5023755 | Monthly Rollup | CVE-2023-24869 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Remote Code Execution | Important | 5023754 | Security Only | CVE-2023-24869 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | Remote Code Execution | Important | 5023755 | Monthly Rollup | CVE-2023-24869 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | Remote Code Execution | Important | 5023754 | Security Only | CVE-2023-24869 |
Microsoft Edge (Chromium-based) | Spoofing | Important | Release Notes | Security Update | CVE-2023-24892 |
OneDrive for Android | Information Disclosure | Important | App Store | Security Update | CVE-2023-24882 |
Microsoft Office for Universal | Elevation of Privilege | Important | Release Notes | Security Update | CVE-2023-24910 |
Microsoft Office for Android | Elevation of Privilege | Important | Release Notes | Security Update | CVE-2023-24910 |
Microsoft Office LTSC for Mac 2021 | Elevation of Privilege | Important | Release Notes | Security Update | CVE-2023-24910 |
Microsoft Office 2019 for Mac | Elevation of Privilege | Important | Release Notes | Security Update | CVE-2023-24910 |
Azure HDInsights | Spoofing | Important | Release Notes | Security Update | CVE-2023-23408 |
Microsoft Outlook 2016 (64-bit edition) | Elevation of Privilege | Critical | 5002254 | Security Update | CVE-2023-23397 |
Microsoft Outlook 2013 Service Pack 1 (32-bit editions) | Elevation of Privilege | Critical | 5002265 | Security Update | CVE-2023-23397 |
Microsoft Outlook 2013 RT Service Pack 1 | Elevation of Privilege | Critical | 5002265 | Security Update | CVE-2023-23397 |
Microsoft Outlook 2013 Service Pack 1 (64-bit editions) | Elevation of Privilege | Critical | 5002265 | Security Update | CVE-2023-23397 |
Microsoft Office 2019 for 32-bit editions | Elevation of Privilege | Critical | Click to Run | Security Update | CVE-2023-23397 |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Elevation of Privilege | Critical | Click to Run | Security Update | CVE-2023-23397 |
Microsoft Office 2019 for 64-bit editions | Elevation of Privilege | Critical | Click to Run | Security Update | CVE-2023-23397 |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Elevation of Privilege | Critical | Click to Run | Security Update | CVE-2023-23397 |
Microsoft Office LTSC 2021 for 64-bit editions | Elevation of Privilege | Critical | Click to Run | Security Update | CVE-2023-23397 |
Microsoft Outlook 2016 (32-bit edition) | Elevation of Privilege | Critical | 5002254 | Security Update | CVE-2023-23397 |
Microsoft Office LTSC 2021 for 32-bit editions | Elevation of Privilege | Critical | Click to Run | Security Update | CVE-2023-23397 |
Microsoft Office Web Apps Server 2013 Service Pack 1 | Remote Code Execution | Important | 5002362 | Security Update | CVE-2023-23399 |
Microsoft Office 2013 Service Pack 1 (64-bit editions) | Remote Code Execution | Important | 5002198 | Security Update | CVE-2023-23399 |
Microsoft Office 2013 Service Pack 1 (32-bit editions) | Remote Code Execution | Important | 5002198 | Security Update | CVE-2023-23399 |
Microsoft Office 2013 RT Service Pack 1 | Remote Code Execution | Important | 5002198 | Security Update | CVE-2023-23399 |
Microsoft Excel 2013 Service Pack 1 (64-bit editions) | Remote Code Execution | Important | 5002348 | Security Update | CVE-2023-23399 |
Microsoft Excel 2013 Service Pack 1 (32-bit editions) | Remote Code Execution | Important | 5002348 | Security Update | CVE-2023-23399 |
Microsoft Excel 2013 RT Service Pack 1 | Remote Code Execution | Important | 5002348 | Security Update | CVE-2023-23399 |
Microsoft Office 2016 (64-bit edition) | Remote Code Execution | Important | 5002197 | Security Update | CVE-2023-23399 |
Microsoft Office 2016 (32-bit edition) | Remote Code Execution | Important | 5002197 | Security Update | CVE-2023-23399 |
Microsoft Excel 2016 (64-bit edition) | Remote Code Execution | Important | 5002351 | Security Update | CVE-2023-23399 |
Microsoft Excel 2016 (32-bit edition) | Remote Code Execution | Important | 5002351 | Security Update | CVE-2023-23399 |
Microsoft Office Online Server | Remote Code Execution | Important | 5002356 | Security Update | CVE-2023-23399 |
Microsoft SharePoint Foundation 2013 Service Pack 1 | Spoofing | Important | 5002367 | Security Update | CVE-2023-23395 |
Microsoft SharePoint Foundation 2013 Service Pack 1 | Spoofing | Important | 5002168 | Security Update | CVE-2023-23395 |
Microsoft SharePoint Server Subscription Edition | Spoofing | Important | 5002355 | Security Update | CVE-2023-23395 |
Microsoft SharePoint Server 2019 | Spoofing | Important | 5002358 | Security Update | CVE-2023-23395 |
Microsoft SharePoint Enterprise Server 2013 Service Pack 1 | Spoofing | Important | 5002366 | Cumulative Update | CVE-2023-23395 |
Microsoft SharePoint Enterprise Server 2013 Service Pack 1 | Spoofing | Important | 5002367 | Security Update | CVE-2023-23395 |
Microsoft SharePoint Enterprise Server 2013 Service Pack 1 | Spoofing | Important | 5002168 | Security Update | CVE-2023-23395 |
Microsoft SharePoint Enterprise Server 2016 | Spoofing | Important | 5002368 | Security Update | CVE-2023-23395 |
Microsoft Malware Protection Engine | Elevation of Privilege | Important | Release Notes | Security Update | CVE-2023-23389 |
I’ve previously detailed all the new features included in the “Moment 2” update for Windows 11 version 22H2 last month, but here’s a summary of all the new features in this update:
For IT pros managing Windows Updates via Windows Update or WSUS, a new client policy now allows them to control the availability of new features introduced via servicing. Moreover, Microsoft said that new features that may be disruptive such as the new touch-optimized taskbar are disabled by default on managed devices.
Organizations looking to deploy this month’s patches should conduct thorough testing before deploying them widely on production systems. That said, applying the patches widely shouldn’t be delayed longer than necessary as hackers start to work out how to weaponize newly reported vulnerabilities.
A best practice is to make sure you have backed up systems before applying updates. Every month, users experience issues with Windows updates that lead to systems not booting, application and hardware compatibility issues, or even data loss in extreme cases.
There are backup tools built into Windows and Windows Server that you can use to restore systems in the event a patch causes a problem. The backup features in Windows can be used to restore an entire system, or files and folders on a granular basis.
If you have any problems with this month’s patches, please let us know in the comments below. Other readers might be able to share their experiences in how to roll back problematic updates or mitigate issues caused by patches that are important to have in place.