{"id":41051,"date":"2023-01-10T15:00:09","date_gmt":"2023-01-10T15:00:09","guid":{"rendered":"https:\/\/www.n-able.com\/?p=41051"},"modified":"2023-03-21T14:05:17","modified_gmt":"2023-03-21T14:05:17","slug":"patch-tuesday-january-2023","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-january-2023","title":{"rendered":"Patch Tuesday January 2023: End of Windows 7 Pro\/Enterprise ESU + M365 apps get final updates"},"content":{"rendered":"<p class=\"p2\"><span class=\"s1\">The first Microsoft Patch Tuesday of 2023 marks the end of an era; multiple eras actually. Windows 7 Professional and Enterprise will receive their final security updates as part of the Extended Security Update program, Windows 8.1 reaches end of support, and Microsoft 365 applications will no longer be receiving feature or security updates for Windows 7 or Windows 8 versions. This now firmly cements the idea of using Windows 7 or 8.1 in production environments as an unacceptable risk in any environment following basic cybersecurity best practices.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">According to <a href=\"https:\/\/support.microsoft.com\/en-us\/office\/windows-7-end-of-support-and-office-78f20fab-b57b-44d7-8368-06a8493f3cb9\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Microsoft<\/span><\/a><\/span><span class=\"s3\">,<\/span><span class=\"s1\"> the proper course of action is to upgrade systems with compatible hardware to Windows 10 or decommission those systems in favor of modern, supported operating systems. While there are always caveats and special use cases, budgets for 2023 should include appropriate funding to migrate all operations from any unsupported operating system. Going forward, that funding should be considered as part of the cost of doing business. <\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">MSPs should insist on seeking to remove these systems from production environments whenever and wherever they are found. If a multi-trillion-dollar company has stopped addressing the security of an operating system it would be folly to assume the risks introduced into an environment by the use of unsupported operating systems can somehow be removed. They can be mitigated against but not fully removed. If an MSP\u2019s customer insists on the use of these systems, a risk evaluation needs to be made and placed in the <a href=\"https:\/\/csrc.nist.gov\/glossary\/term\/risk_register\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">risk register<\/span><\/a> of the client. \u00a0<\/span><\/p>\n<h2 class=\"p3\"><span class=\"s1\">Microsoft Vulnerabilities <\/span><\/h2>\n<p class=\"p4\"><span class=\"s1\">There were 101 vulnerabilities addressed by Microsoft for the first Patch Tuesday of 2023. Of those, there are 3 vulnerabilities from November and December of 2022 receiving fixes, giving us 98 fresh vulnerabilities receiving fixes. <\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">There is only one zero vulnerability day reported, but it is also listed as under active exploitation making it a priority item for the month. <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21674\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2023-21674<\/span><\/a>, a Windows Advanced Local Procedure Call Elevation of Privilege vulnerability, allows an attacker to gain SYSTEM privileges by escaping browser sandboxing. With low attack complexity, requiring no user interaction, and functional exploit code already existing and publicly available this is a prime vulnerability for abuse and will likely become part of many malware authors toolsets. This should make addressing it in a timely manner a priority. As a <a href=\"https:\/\/www.rapid7.com\/blog\/post\/2022\/03\/28\/analyzing-the-attack-landscape-rapid7s-annual-vulnerability-intelligence-report\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">report<\/span><\/a> from last year highlighted, the time it takes for publicly announced vulnerabilities to be taken advantage of by malicious actors is down from a month to less than two weeks. If you have traditionally deferred updates until the end of the month this should be the encouragement you need to bring forward your scheduling.<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">The Cybersecurity and Infrastructure Security Agency (CISA) also added <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVEhttps:\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-41080-2022-41080\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2022-41080<\/span><\/a><\/span> <span class=\"s1\">(addressed by fixes in December 2022) and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-21674\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2023-21674<\/span><\/a> (addressed by fixes this month) to its <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Known Exploited Vulnerability Catalog<\/span><\/a> (KEV). If you are unfamiliar with the KEV it contains a list of all known vulnerabilities that the CISA <a href=\"https:\/\/www.cisa.gov\/binding-operational-directive-22-01\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">requires<\/span><\/a> all federal information systems to address in a timely manner. CVE-2023-21674 was just added to the list when fixes were released on January 10<\/span><span class=\"s4\"><sup>,<\/sup><\/span><span class=\"s1\"> 2023 and is required to be addressed by January 31, 2023. <\/span><\/p>\n<h2 class=\"p1\">Microsoft Patch Tuesday <span class=\"s1\">Vulnerability Prioritization<\/span><\/h2>\n<p class=\"p4\"><span class=\"s1\">As always, prioritizing which vulnerabilities to address first is part following established best practices and a little bit of gut instinct. Critical severity, exploitation more likely, and exploitation detected vulnerabilities as always should rank high on your priority list. If you only patch based on severity you are leaving a lot of unnecessary risk exposure lying around. <\/span><\/p>\n<p class=\"p5\"><span class=\"s5\"><b><i>Table Key:\u00a0<\/i><\/b><i>Severity:\u00a0C = Critical, I = Important, M = Moderate;\u00a0Status: EML = Exploitation More Likely, ELL = Exploitation Less Likely, ED = Exploitation Detected<\/i><\/span><\/p>\n<table class=\"t1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td class=\"td1\" valign=\"top\" width=\"20%\">\n<p class=\"p6\"><strong><span class=\"s1\">CVE<\/span><\/strong><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\" width=\"60%\">\n<p class=\"p6\"><strong><span class=\"s1\">Description<\/span><\/strong><\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\" width=\"10%\">\n<p class=\"p7\" style=\"text-align: center\"><strong><span class=\"s1\">Severity<\/span><\/strong><\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\" width=\"10%\">\n<p class=\"p7\" style=\"text-align: center\"><strong><span class=\"s1\">Status<\/span><\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p8\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21674\" target=\"_blank\" rel=\"noopener\">CVE-2023-21674<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p6\"><span class=\"s1\">Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">ED<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p8\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21768\" target=\"_blank\" rel=\"noopener\">CVE-2023-21768<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: left\"><span class=\"s1\">Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" style=\"text-align: center\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p8\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21745\" target=\"_blank\" rel=\"noopener\">CVE-2023-21745<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: left\"><span class=\"s1\">Microsoft Exchange Server Spoofing Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" style=\"text-align: center\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p8\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21743\" target=\"_blank\" rel=\"noopener\">CVE-2023-21743<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: left\"><span class=\"s1\">Microsoft SharePoint Server Security Feature Bypass Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" style=\"text-align: center\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p8\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21726\" target=\"_blank\" rel=\"noopener\">CVE-2023-21726<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: left\"><span class=\"s1\">Windows Credential Manager User Interface Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" style=\"text-align: center\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p8\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21725\" target=\"_blank\" rel=\"noopener\">CVE-2023-21725<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p6\"><span class=\"s1\">Windows Malicious Software Removal Tool Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"bottom\">\n<p class=\"p8\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21552\" target=\"_blank\" rel=\"noopener\">CVE-2023-21552<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"bottom\">\n<p class=\"p6\"><span class=\"s1\">Windows GDI Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p8\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21541\" target=\"_blank\" rel=\"noopener\">CVE-2023-21541<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p6\"><span class=\"s1\">Windows Task Scheduler Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p8\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21532\" target=\"_blank\" rel=\"noopener\">CVE-2023-21532<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p6\"><span class=\"s1\">Windows GDI Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p8\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-41113\" target=\"_blank\" rel=\"noopener\">CVE-2022-41113<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p6\"><span class=\"s1\">Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p9\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21551\" target=\"_blank\" rel=\"noopener\">CVE-2023-21551<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p6\"><span class=\"s1\">Microsoft Cryptographic Services Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p9\"><span class=\"s8\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21561\" target=\"_blank\" rel=\"noopener\">CVE-2023-21561<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p10\"><span class=\"s5\">Microsoft Cryptographic Services Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p9\"><span class=\"s8\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21730\" target=\"_blank\" rel=\"noopener\">CVE-2023-21730<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p10\"><span class=\"s5\">Microsoft Cryptographic Services Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p11\"><span class=\"s8\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21555\" target=\"_blank\" rel=\"noopener\">CVE-2023-21555<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p10\"><span class=\"s5\">Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p9\"><span class=\"s8\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21543\" target=\"_blank\" rel=\"noopener\">CVE-2023-21543<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p10\"><span class=\"s5\">Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p11\"><span class=\"s8\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21546\" target=\"_blank\" rel=\"noopener\">CVE-2023-21546<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p10\"><span class=\"s5\">Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p9\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21679\" target=\"_blank\" rel=\"noopener\">CVE-2023-21679<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p10\"><span class=\"s5\">Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p9\"><span class=\"s8\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21548\" target=\"_blank\" rel=\"noopener\">CVE-2023-21548<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p10\"><span class=\"s5\">Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p9\"><span class=\"s8\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21535\" target=\"_blank\" rel=\"noopener\">CVE-2023-21535<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p10\"><span class=\"s1\">Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 class=\"p3\"><span class=\"s1\">Summary<\/span><\/h2>\n<p class=\"p4\"><span class=\"s1\">As always make sure you have established patching processes for evaluation, testing and pushing into production. If you have traditionally only dealt with patches by applying them based on their severity consider including prioritization of patches for Zero-Days, Exploitation Detected and Exploitation More Likely vulnerabilities in your <a href=\"https:\/\/www.n-able.com\/features\/windows-patch-management\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Patch Management<\/span><\/a> routines. <\/span><\/p>\n<p class=\"p12\"><span class=\"s1\"><b>Looking for more blogs on patching, or looking for previous Microsoft Patch Tuesday Reviews, then check out <\/b><a href=\"https:\/\/www.n-able.com\/blog\/patch-management?filter_products=all#filtered\" target=\"_blank\" rel=\"noopener\"><span class=\"s10\"><b>this section of our blog<\/b><\/span><\/a><b>.<\/b><i>\u00a0<\/i><\/span><\/p>\n<p class=\"p12\"><span class=\"s1\"><i>Lewis Pope is the Head Security Nerd at N&#8209;able. You can follow him on Twitter:\u00a0<\/i><a href=\"https:\/\/twitter.com\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s10\"><i>@cybersec_nerd<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p13\"><span class=\"s11\"><i>LinkedIn:\u00a0<\/i><a href=\"https:\/\/www.linkedin.com\/in\/thesecuritypope\" target=\"_blank\" rel=\"noopener\"><span class=\"s12\"><i>thesecuritypope<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p13\"><span class=\"s11\"><i>Twitch:\u00a0<\/i><a href=\"https:\/\/www.twitch.tv\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s12\"><i>cybersec_nerd<\/i><\/span><\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The first Patch Tuesday of 2023 sees 98 fresh vulnerabilities getting fixes including one zero-day under active exploitation. Lewis Pope digs deeper.<\/p>\n","protected":false},"author":62,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-41051","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Patch Tuesday January 2023: End of Windows 7 Pro\/Enterprise ESU + M365 apps get final updates - N-able<\/title>\n<meta name=\"description\" content=\"\u00a0The first Patch Tuesday of 2023 sees 98 fresh vulnerabilities getting fixes including one zero-day under active exploitation. Find out more\u2026\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-january-2023\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Patch Tuesday January 2023: End of Windows 7 Pro\/Enterprise ESU + M365 apps get final updates - N-able\" \/>\n<meta property=\"og:description\" content=\"\u00a0The first Patch Tuesday of 2023 sees 98 fresh vulnerabilities getting fixes including one zero-day under active exploitation. Find out more\u2026\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-january-2023\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-10T15:00:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-21T14:05:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-03.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1309\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Lewis Pope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-03.png\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lewis Pope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"5\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-january-2023#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-january-2023\"},\"author\":{\"name\":\"Lewis Pope\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\"},\"headline\":\"Patch Tuesday January 2023: End of Windows 7 Pro\/Enterprise ESU + M365 apps get final updates\",\"datePublished\":\"2023-01-10T15:00:09+00:00\",\"dateModified\":\"2023-03-21T14:05:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-january-2023\"},\"wordCount\":932,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"Head Nerds\",\"Patch Management\",\"Security\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-january-2023\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-january-2023\",\"name\":\"Patch Tuesday January 2023: End of Windows 7 Pro\/Enterprise ESU + M365 apps get final updates - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2023-01-10T15:00:09+00:00\",\"dateModified\":\"2023-03-21T14:05:17+00:00\",\"description\":\"\u00a0The first Patch Tuesday of 2023 sees 98 fresh vulnerabilities getting fixes including one zero-day under active exploitation. Find out more\u2026\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-january-2023#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-january-2023\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-january-2023#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Head Nerds\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/head-nerds-de\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Patch Tuesday January 2023: End of Windows 7 Pro\/Enterprise ESU + M365 apps get final updates\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\",\"name\":\"Lewis Pope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"caption\":\"Lewis Pope\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Patch Tuesday January 2023: End of Windows 7 Pro\/Enterprise ESU + M365 apps get final updates - N-able","description":"\u00a0The first Patch Tuesday of 2023 sees 98 fresh vulnerabilities getting fixes including one zero-day under active exploitation. Find out more\u2026","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-january-2023","og_locale":"de_DE","og_type":"article","og_title":"Patch Tuesday January 2023: End of Windows 7 Pro\/Enterprise ESU + M365 apps get final updates - N-able","og_description":"\u00a0The first Patch Tuesday of 2023 sees 98 fresh vulnerabilities getting fixes including one zero-day under active exploitation. Find out more\u2026","og_url":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-january-2023","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2023-01-10T15:00:09+00:00","article_modified_time":"2023-03-21T14:05:17+00:00","og_image":[{"width":2500,"height":1309,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-03.png","type":"image\/png"}],"author":"Lewis Pope","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-03.png","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"Lewis Pope","Gesch\u00e4tzte Lesezeit":"5\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-january-2023#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-january-2023"},"author":{"name":"Lewis Pope","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae"},"headline":"Patch Tuesday January 2023: End of Windows 7 Pro\/Enterprise ESU + M365 apps get final updates","datePublished":"2023-01-10T15:00:09+00:00","dateModified":"2023-03-21T14:05:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-january-2023"},"wordCount":932,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["Head Nerds","Patch Management","Security"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-january-2023","url":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-january-2023","name":"Patch Tuesday January 2023: End of Windows 7 Pro\/Enterprise ESU + M365 apps get final updates - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2023-01-10T15:00:09+00:00","dateModified":"2023-03-21T14:05:17+00:00","description":"\u00a0The first Patch Tuesday of 2023 sees 98 fresh vulnerabilities getting fixes including one zero-day under active exploitation. Find out more\u2026","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-january-2023#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-january-2023"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-january-2023#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Head Nerds","item":"https:\/\/www.n-able.com\/de\/blog\/category\/head-nerds-de"},{"@type":"ListItem","position":2,"name":"Patch Tuesday January 2023: End of Windows 7 Pro\/Enterprise ESU + M365 apps get final updates"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae","name":"Lewis Pope","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","caption":"Lewis Pope"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/41051","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=41051"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/41051\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=41051"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}