75 CVEs addressed through the 2023 February Patch Tuesday

Reading time icon 8 min. read


Readers help support Windows Report. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help Windows Report sustain the editorial team Read more

Key notes

  • Microsoft has released the February 2023 batch of security updates.
  • This month, the tech giant addressed a total of 75 vulnerabilities.
  • Out of the 75, nine are rated Critical and 66 are rated Important.
Patch Tuesday February CVE report

Valentine’s Day is upon us, but not everything comes down to flowers and chocolates. There are those who eagerly await Microsoft’s Patch Tuesday rollout/

And, as you know, it’s the second Tuesday of the month, which means that Windows users are looking towards the tech giant in hopes that some of the flaws they’ve been struggling with will finally get fixed.

We have already taken the liberty of providing the direct download links for the cumulative updates released today for Windows 7, 8.1, 10, and 11, but now it’s time to talk CVEs again.

For February, Microsoft released 75 new patches, which is still more than some people were expecting for the second month of 2023.

These software updates address CVEs in:

  • Windows and Windows components
  • Office and Office Components
  • Exchange Server
  • .NET Core and Visual Studio Code
  • 3D Builder and Print 3D
  • Microsoft Azure and Dynamics 365
  • Defender for IoT and the Malware Protection Engine
  • Microsoft Edge (Chromium-based)

You probably want to know more on the matter, so let’s dive right into it and see what all the fuss is about this month.

Microsoft released 75 new important security patches

January 2023 was a pretty packed month in terms of security patches, so developers decided to take a breather and release fewer updates.

You might like to know that, out of the 75 new CVEs released, only nine are rated Critical and 66 are rated Important in severity by security experts.

Furthermore, keep in mind that this is one of the largest volumes we’ve seen from Microsoft for a February release in quite some time.

We have to say that it is a bit unusual to see half of the Patch Tuesday release address remote code execution (RCE) bugs.

Remember that none of the new CVEs released this month are listed as publicly known, but there are two bugs listed as being exploited in the wild at the time of release.

That being said, let’s take a closer look at some of the more interesting updates for this month, starting with the bugs under active attack.

CVETitleSeverityCVSSPublicExploitedType
CVE-2023-21715Microsoft Office Security Feature Bypass VulnerabilityImportant7.3NoYesSFB
CVE-2023-23376Windows Common Log File System Driver Elevation of Privilege VulnerabilityImportant7.8NoYesEoP
CVE-2023-21808.NET and Visual Studio Remote Code Execution VulnerabilityCritical8.4NoNoRCE
CVE-2023-21689Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution VulnerabilityCritical9.8NoNoRCE
CVE-2023-21690Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution VulnerabilityCritical9.8NoNoRCE
CVE-2023-21692Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution VulnerabilityCritical9.8NoNoRCE
CVE-2023-21718Microsoft SQL ODBC Driver Remote Code Execution VulnerabilityCritical7.8NoNoRCE
CVE-2023-21716Microsoft Word Remote Code Execution VulnerabilityCritical9.8NoNoRCE
CVE-2023-23381Visual Studio Code Remote Code Execution VulnerabilityCritical8.4NoNoRCE
CVE-2023-21815Visual Studio Remote Code Execution VulnerabilityCritical8.4NoNoRCE
CVE-2023-21803Windows iSCSI Discovery Service Remote Code Execution VulnerabilityCritical9.8NoNoRCE
CVE-2023-21722.NET Denial of Service VulnerabilityImportant4.7NoNoDoS
CVE-2023-233773D Builder Remote Code Execution VulnerabilityImportant7.8NoNoRCE
CVE-2023-233903D Builder Remote Code Execution VulnerabilityImportant7.8NoNoRCE
CVE-2023-21777Azure App Service on Azure Stack Hub Elevation of Privilege VulnerabilityImportant8.7NoNoEoP
CVE-2023-21703Azure Data Box Gateway Remote Code Execution vulnerabilityImportant6.5NoNoRCE
CVE-2023-21564Azure DevOps Server Cross-Site Scripting VulnerabilityImportant7.1NoNoXSS
CVE-2023-21553Azure DevOps Server Remote Code Execution VulnerabilityImportant7.5NoNoRCE
CVE-2023-23382Azure Machine Learning Compute Instance Information Disclosure VulnerabilityImportantUnknownNoNoInfo
CVE-2023-21687HTTP.sys Information Disclosure VulnerabilityImportant5.5NoNoInfo
CVE-2023-21809Microsoft Defender for Endpoint Security Feature Bypass VulnerabilityImportant7.8NoNoSFB
CVE-2023-23379Microsoft Defender for IoT Elevation of Privilege VulnerabilityImportant6.4NoNoEoP
CVE-2023-21807Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityImportant5.8NoNoXSS
CVE-2023-21570Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityImportant5.4NoNoXSS
CVE-2023-21571Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityImportant5.4NoNoXSS
CVE-2023-21572Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityImportant6.5NoNoXSS
CVE-2023-21573Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityImportant5.4NoNoXSS
CVE-2023-21778Microsoft Dynamics Unified Service Desk Remote Code ExecutionImportant8.3NoNoRCE
CVE-2023-21706Microsoft Exchange Server Remote Code Execution VulnerabilityImportant8.8NoNoRCE
CVE-2023-21710Microsoft Exchange Server Remote Code Execution VulnerabilityImportant7.2NoNoRCE
CVE-2023-21707Microsoft Exchange Server Remote Code Execution VulnerabilityImportant8.8NoNoRCE
CVE-2023-21529Microsoft Exchange Server Remote Code Execution VulnerabilityImportant8.8NoNoRCE
CVE-2023-21704Microsoft ODBC Driver for SQL Server Remote Code Execution VulnerabilityImportant7.8NoNoRCE
CVE-2023-21797Microsoft ODBC Driver Remote Code Execution VulnerabilityImportant8.8NoNoRCE
CVE-2023-21798Microsoft ODBC Driver Remote Code Execution VulnerabilityImportant8.8NoNoRCE
CVE-2023-21714Microsoft Office Information Disclosure VulnerabilityImportant5.5NoNoInfo
CVE-2023-21721Microsoft OneNote Spoofing VulnerabilityImportant6.5NoNoSpoofing
CVE-2023-21693Microsoft PostScript Printer Driver Information DisclosureImportant5.7NoNoInfo
CVE-2023-21684Microsoft PostScript Printer Driver Remote Code ExecutionImportant8.8NoNoRCE
CVE-2023-21801Microsoft PostScript Printer Driver Remote Code ExecutionImportant7.8NoNoRCE
CVE-2023-21701Microsoft Protected Extensible Authentication Protocol (PEAP) Denial of Service VulnerabilityImportant7.5NoNoDoS
CVE-2023-21691Microsoft Protected Extensible Authentication Protocol (PEAP) Information Disclosure VulnerabilityImportant7.5NoNoInfo
CVE-2023-21695Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution VulnerabilityImportant7.5NoNoRCE
CVE-2023-21717Microsoft SharePoint Server Elevation of Privilege VulnerabilityImportant8.8NoNoEoP
CVE-2023-21568Microsoft SQL Server Integration Service (VS extension) Remote Code Execution VulnerabilityImportant8NoNoRCE
CVE-2023-21705Microsoft SQL Server Remote Code Execution VulnerabilityImportant8.8NoNoRCE
CVE-2023-21713Microsoft SQL Server Remote Code Execution VulnerabilityImportant8.8NoNoRCE
CVE-2023-21528Microsoft SQL Server Remote Code Execution VulnerabilityImportant7.8NoNoRCE
CVE-2023-21799Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityImportant8.8NoNoRCE
CVE-2023-21685Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityImportant8.8NoNoRCE
CVE-2023-21686Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityImportant8.8NoNoRCE
CVE-2023-21688NT OS Kernel Elevation of Privilege VulnerabilityImportant7.8NoNoEoP
CVE-2023-21806Power BI Report Server Spoofing VulnerabilityImportant8.2NoNoSpoofing
CVE-2023-23378Print 3D Remote Code Execution VulnerabilityImportant7.8NoNoRCE
CVE-2023-21567Visual Studio Denial of Service VulnerabilityImportant5.6NoNoDoS
CVE-2023-21566Visual Studio Installer Elevation of Privilege VulnerabilityImportant7.8NoNoRCE
CVE-2023-21816Windows Active Directory Domain Services API Denial of Service VulnerabilityImportant7.5NoNoDoS
CVE-2023-21812Windows Common Log File System Driver Elevation of Privilege VulnerabilityImportant7.8NoNoEoP
CVE-2023-21820Windows Distributed File System (DFS) Remote Code Execution VulnerabilityImportant7.4NoNoRCE
CVE-2023-21694Windows Fax Service Remote Code Execution VulnerabilityImportant6.8NoNoRCE
CVE-2023-21823Windows Graphics Component Elevation of Privilege VulnerabilityImportant7.8NoNoEoP
CVE-2023-21804Windows Graphics Component Elevation of Privilege VulnerabilityImportant7.8NoNoEoP
CVE-2023-21822Windows Graphics Component Elevation of Privilege VulnerabilityImportant7.8NoNoEoP
CVE-2023-21800Windows Installer Elevation of Privilege VulnerabilityImportant7.8NoNoEoP
CVE-2023-21697Windows Internet Storage Name Service (iSNS) Server Information Disclosure VulnerabilityImportant6.2NoNoInfo
CVE-2023-21699Windows Internet Storage Name Service (iSNS) Server Information Disclosure VulnerabilityImportant5.3NoNoInfo
CVE-2023-21700Windows iSCSI Discovery Service Denial of Service VulnerabilityImportant7.5NoNoDoS
CVE-2023-21811Windows iSCSI Service Denial of Service VulnerabilityImportant7.5NoNoDoS
CVE-2023-21702Windows iSCSI Service Denial of Service VulnerabilityImportant7.5NoNoDoS
CVE-2023-21817Windows Kerberos Elevation of Privilege VulnerabilityImportant7.8NoNoEoP
CVE-2023-21802Windows Media Remote Code Execution VulnerabilityImportant7.8NoNoRCE
CVE-2023-21805Windows MSHTML Platform Remote Code Execution VulnerabilityImportant7.8NoNoRCE
CVE-2023-21813Windows Secure Channel Denial of Service VulnerabilityImportant7.5NoNoDoS
CVE-2023-21819Windows Secure Channel Denial of Service VulnerabilityImportant7.5NoNoDoS
CVE-2023-21818Windows Secure Channel Denial of Service VulnerabilityImportant7.5NoNoDoS
CVE-2019-15126 *MITRE: CVE-2019-15126 Specifically timed and handcrafted traffic can cause internal errors (related to state transitions) in a WLAN deviceMedium3.1NoNoInfo

Note that there are three CVSS 9.8 bugs in Microsoft’s Protected Extensible Authentication Protocol (PEAP), but it doesn’t seem that this protocol is used much anymore.

Frankly, we find CVSS 9.8 bug in the iSCSI Discovery Service a lot more alarming, as data centers with storage area networks (SANs) should definitely check with their vendors to see if their SAN is impacted by the RCE vulnerability.

Please take into consideration the fact that the bug in SQL would require someone to connect to a malicious SQL server via ODBC.

There are no Print Spooler bugs getting fixed this month, but there are two bugs in the PostScript Printer Driver that could allow an authenticated attacker to take over a system sharing a printer.

Actually, there are quite a few fixes for SQL Server, and exploiting these would require an affected system to connect to a malicious SQL Server, typically through ODBC.

Experts say that, while that seems unlikely, they are worried about the various servicing scenarios between all the available versions of SQL Server.

We also have to mention the bug in Azure Data Box Gateway, which requires high privileges to exploit, but that’s not the case for Azure DevOps Server vulnerability.

To get access, an attacker only needs to have only Run access to the pipeline, but not every pipeline is vulnerable.

Unfortunately, the tech giant doesn’t provide information on how to distinguish the affected and non-affected pipelines.

The Dynamics bug does require authentication, an attacker might be able to call the target’s local files in the Resources directory and execute Windows commands that are outside of the Dynamics application.

There are also a couple of RCE bugs, but they do allow us to remind you the Fax Service is still a thing, so the final RCE bug is the lone Moderate-rated bug this month for Edge (Chromium-based).

Feel free to check each individual CVE and find out more about what it means, how it manifests, and what scenarios can malicious third parties use to exploit them.

Have you found any other issues after installing this month’s security updates? Share your experience with us in the comments section below.

More about the topics: patch tuesday, windows 10 updates