{"id":46250,"date":"2023-06-14T12:01:43","date_gmt":"2023-06-14T11:01:43","guid":{"rendered":"https:\/\/www.n-able.com\/?p=46250"},"modified":"2023-07-17T15:21:17","modified_gmt":"2023-07-17T14:21:17","slug":"patch-tuesday-june-2023-no-zero-days-or-actively-exploited-vulnerabilities-but-exchange-is-in-the-crosshairs","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-june-2023-no-zero-days-or-actively-exploited-vulnerabilities-but-exchange-is-in-the-crosshairs","title":{"rendered":"Patch Tuesday June 2023: No Zero-Days or Actively Exploited Vulnerabilities, But Exchange is in the Crosshairs"},"content":{"rendered":"<p class=\"p3\"><span class=\"s1\">Last month\u2019s <a href=\"https:\/\/www.n-able.com\/blog\/patch-tuesday-may-2023\" target=\"_blank\" rel=\"noopener\">Patch Tuesday (May 2023)<\/a> brought fixes for only 38 vulnerabilities. Such a small number gave some the sense that it was the \u2018calm before the storm\u2019 with June likely to bring some surprises. June\u2019s Patch Tuesday has indeed brought a surprise, no zero-days and no vulnerabilities under active exploitation. <\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">A total of 78 vulnerabilities were addressed this month and that number is more inline with the typical number of vulnerabilities that receive fixes from Microsoft. The lack of any zero-days or Actively Exploited Vulnerabilities might provide an initial feeling of relief, but there are some notable vulnerabilities waiting in the wings that are marked as Exploitation More Likely. With Exchange in the crosshairs of two vulnerabilities that could be as impactful as <a href=\"https:\/\/www.n-able.com\/blog\/patch-tuesday-october-2022\" target=\"_blank\" rel=\"noopener\">last year&#8217;s <span class=\"s2\">ProxyNotShell<\/span><\/a>, once attackers start leveraging them. <\/span><\/p>\n<h2 class=\"p4\"><span class=\"s1\">Microsoft Vulnerabilities <\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">Microsoft has released updates to address 78 vulnerabilities with six of those marked Critical and 11 as Exploitation More Likely. Without any headline vulnerabilities under active exploitation, this month\u2019s focus gets to shift to vulnerabilities that are considered more likely to be exploited\u2014and that\u2019s good because there are some that should be on everyone\u2019s priority list. <\/span><\/p>\n<h2 class=\"p1\">Microsoft Exchange Server vulnerabilities\u2014<span class=\"s3\">CVE-2023-32014 and CVE-2023-28310<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">Microsoft Exchange admins will want to be quick about getting fixes in place to contend with these two vulnerabilities. <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-32031\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2023-32031<\/span><\/a> and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-28310\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2023-28310<\/span><\/a> are both Microsoft Exchange Server Remote Code Execution vulnerabilities. While they require an authenticated user to exploit since they are exploitable by an attacker on the same network, just isolating an Exchange Server from the internet isn\u2019t going to be a sufficient mitigation. An attacker exploiting either of these vulnerabilities will be able to run code on the target Exchange Server. It\u2019s a good idea to start testing the security updates that address these vulnerabilities this week and get them in production ASAP.<\/span><\/p>\n<h2 class=\"p5\"><span class=\"s1\">CVE-2023-32015, CVE-2023-32014, and CVE2023-29363<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">If any of the vulnerabilities from this month were going to induce nightmare scenarios for defenders this trio may be it. <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-32015\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2023-32015<\/span><\/a>, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-32014\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2023-32014<\/span><\/a><\/span><span class=\"s4\">,<\/span><span class=\"s1\"> and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-29363\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2023-29363<\/span><\/a> all carry CVSS scores of 9.8, can be exploited remotely, and require no user interaction. They are prime candidates for being leveraged by threat actors to move laterally within an environment once proof of concept attacks are developed. These vulnerabilities apply to Windows Pragmatic General Multicast, which is a widely available component that might not be part of the usual rogues gallery of Windows services with vulnerabilities. However, their potential to be in almost any environment, just silently existing without anyone really paying much attention on the defender side, means they might fly under the radar of some defenders. If updates with fixes for these vulnerabilities can\u2019t be implemented in your environment, Microsoft\u2019s recommended mitigation is to disable the Windows Pragmatic General Multicast component. <\/span><\/p>\n<h2 class=\"p5\"><span class=\"s1\">CVE-2023-29357<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">This vulnerability also carries a CVSS score of 9.8 and gives an attacker the ability to gain administrator privileges, allowing them attacker to execute follow-up actions that range such as data exfiltration, ransomware payload delivery, data destruction, or any other number of malicious actions. While <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-29357\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2023-29357<\/span><\/a> has the potential to be part of a devastating attack on a business since it is a Microsoft SharePoint Server vulnerability, the small deployment base will keep this from being exploited as widely as the other notable vulnerabilities from this month. <\/span><\/p>\n<h2 class=\"p4\"><span class=\"s1\">Microsoft 365 and Click to Run<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">As a reminder and review from previous months Microsoft Patch Tuesday coverage, modern Microsoft 365 apps leverage a different update mechanism than older versions of Microsoft Office. Make sure you review your patching tools and processes to ensure M365 Apps have a defined <a href=\"https:\/\/learn.microsoft.com\/en-us\/deployoffice\/updates\/overview-update-process-microsoft-365-apps\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">update process<\/span><\/a> in place. We have an automation item available in the <a href=\"https:\/\/me.n-able.com\/s\/global-search\/%40uri#t=All&#038;sort=relevancy#sort=relevancy\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Automation Cookbook<\/span><\/a> for <span class=\"s2\">N&#8209;sight<\/span> and <span class=\"s2\">N&#8209;central<\/span> partners to use to update and check Microsoft 365 versions that leverages Microsoft\u2019s Click to Run executable, included in all installs of M365 apps.<\/span><\/p>\n<ul>\n<li>Download Microsoft 365 Update with Version Check for<span>\u00a0<\/span><a href=\"https:\/\/me.n-able.com\/s\/article\/Microsoft-365-Update-With-Version-Check-N&#8209;sight\" class=\"line--added\"><span class=\"linkline\">N&#8209;sight<\/span><\/a><\/li>\n<li>Download Microsoft 365 Update with Version Check for<span>\u00a0<\/span><span><a href=\"https:\/\/me.n-able.com\/s\/article\/Microsoft-365-Update-With-Version-Check-NC\" class=\"line--added\"><span class=\"linkline\">N&#8209;central<\/span><\/a><\/span><\/li>\n<\/ul>\n<h2 class=\"p6\"><span class=\"s1\">Microsoft Patch Tuesday Vulnerability Prioritization<\/span><span class=\"s5\"> <\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">As always, prioritizing which vulnerabilities to address first is part following established best practices and a little bit of gut instinct. Critical severity, exploitation more likely and exploitation detected vulnerabilities as always should be ranking fairly high on priority list. If you only patch based on severity you are leaving a lot of unnecessary risk exposure lying around. <\/span><span class=\"s3\"><b>\u00a0<\/b><\/span><\/p>\n<p class=\"p7\"><em><span class=\"s3\"><b>Table Key:\u00a0<\/b>Severity:\u00a0C = Critical, I = Important, M = Moderate, R = Re-issue;\u00a0Status: EML = Exploitation More Likely, ELL = Exploitation Less Likely, ED = Exploitation Detected,\u00a0N\/A = Not Available<\/span><\/em><\/p>\n<table cellspacing=\"0\" cellpadding=\"0\" class=\"t1\">\n<tbody>\n<tr>\n<td valign=\"top\" class=\"td1\" width=\"20%\">\n<p class=\"p8\"><strong><span class=\"s1\">CVE Number<\/span><\/strong><\/p>\n<\/td>\n<td valign=\"top\" class=\"td2\" width=\"60%\">\n<p class=\"p8\"><strong><span class=\"s1\">CVE Title<\/span><\/strong><\/p>\n<\/td>\n<td valign=\"top\" class=\"td3\" width=\"10%\">\n<p class=\"p8\" style=\"text-align: center;\"><strong><span class=\"s1\">Severity<\/span><\/strong><\/p>\n<\/td>\n<td valign=\"top\" class=\"td4\" width=\"10%\">\n<p class=\"p8\" style=\"text-align: center;\"><strong><span class=\"s1\">Status<\/span><\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p9\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-32031\" target=\"_blank\" rel=\"noopener\">CVE-2023-32031<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p10\"><span class=\"s1\">Microsoft Exchange Server Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p10\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p10\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p9\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29371\" target=\"_blank\" rel=\"noopener\">CVE-2023-29371<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p10\"><span class=\"s1\">Windows GDI Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p10\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p10\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p9\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29361\" target=\"_blank\" rel=\"noopener\">CVE-2023-29361<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p10\"><span class=\"s1\">Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p10\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p10\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p9\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29360\" target=\"_blank\" rel=\"noopener\">CVE-2023-29360<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p10\"><span class=\"s1\">Windows TPM Device Driver Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p10\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p10\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p9\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29359\" target=\"_blank\" rel=\"noopener\">CVE-2023-29359<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p10\"><span class=\"s1\">GDI Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p10\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p10\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p9\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29358\" target=\"_blank\" rel=\"noopener\">CVE-2023-29358<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p10\"><span class=\"s1\">Windows GDI Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p10\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p10\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p9\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29357\" target=\"_blank\" rel=\"noopener\">CVE-2023-29357<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p10\"><span class=\"s1\">Microsoft SharePoint Server Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p10\" style=\"text-align: center;\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p10\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p9\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-28310\" target=\"_blank\" rel=\"noopener\">CVE-2023-28310<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p10\"><span class=\"s1\">Microsoft Exchange Server Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p10\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p10\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p9\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23398\" target=\"_blank\" rel=\"noopener\">CVE-2023-23398<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p10\"><span class=\"s1\">Microsoft Excel Spoofing Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p10\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p10\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p9\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-38023\" target=\"_blank\" rel=\"noopener\">CVE-2022-38023<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p10\"><span class=\"s1\">Netlogon RPC Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p10\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p10\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p9\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-37967\" target=\"_blank\" rel=\"noopener\">CVE-2022-37967<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p10\"><span class=\"s1\">Windows Kerberos Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p10\" style=\"text-align: center;\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p10\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p9\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-32015\" target=\"_blank\" rel=\"noopener\">CVE-2023-32015<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p10\"><span class=\"s1\">Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p10\" style=\"text-align: center;\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p10\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p9\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-32014\" target=\"_blank\" rel=\"noopener\">CVE-2023-32014<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p10\"><span class=\"s1\">Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p10\" style=\"text-align: center;\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p10\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p9\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-32013\" target=\"_blank\" rel=\"noopener\">CVE-2023-32013<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p10\"><span class=\"s1\">Windows Hyper-V Denial of Service Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p10\" style=\"text-align: center;\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p10\" style=\"text-align: center;\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p9\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29363\" target=\"_blank\" rel=\"noopener\">CVE-2023-29363<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p10\"><span class=\"s1\">Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p10\" style=\"text-align: center;\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p10\" style=\"text-align: center;\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p9\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24897\" target=\"_blank\" rel=\"noopener\">CVE-2023-24897<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p10\"><span class=\"s1\">.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p10\" style=\"text-align: center;\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p10\" style=\"text-align: center;\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 class=\"p4\"><span class=\"s1\">Summary<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">As always make sure you have established patching processes for evaluation, testing and pushing into production. If you have traditionally only dealt with patches by applying them based on their severity consider including prioritization of patches for Zero-Days, Exploitation Detected and Exploitation More Likely vulnerabilities in your <a href=\"https:\/\/www.n-able.com\/features\/windows-patch-management\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Patch Management<\/span><\/a> routines. <\/span><\/p>\n<p class=\"p11\"><span class=\"s1\"><b>Looking for more blogs on patching, or looking for previous Microsoft Patch Tuesday Reviews, then check out\u00a0<\/b><a href=\"https:\/\/www.n-able.com\/blog\/patch-management?filter_products=all#filtered\" target=\"_blank\" rel=\"noopener\"><span class=\"s7\"><b>this section of our blog<\/b><\/span><\/a><b>.<\/b>\u00a0<\/span><\/p>\n<p class=\"p11\"><em><span class=\"s1\">Lewis Pope is the Head Security Nerd at N&#8209;able. You can follow him on Twitter:\u00a0<a href=\"https:\/\/twitter.com\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s7\">@cybersec_nerd<\/span><\/a><\/span><\/em><\/p>\n<p class=\"p12\"><em><span class=\"s8\">LinkedIn:\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/thesecuritypope\" target=\"_blank\" rel=\"noopener\"><span class=\"s9\">thesecuritypope<\/span><\/a><\/span><\/em><\/p>\n<p class=\"p12\"><em><span class=\"s8\">Twitch:\u00a0<a href=\"https:\/\/www.twitch.tv\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s9\">cybersec_nerd<\/span><\/a><\/span><\/em><\/p>\n<p class=\"p3\"><span class=\"s1\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you were expecting a bumper month after May\u2019s small number of fixes, you can stand easy. With just 78 vulnerabilities addressed, Lewis Pope has the low down.<\/p>\n","protected":false},"author":62,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-46250","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Patch Tuesday June 2023: No Zero-Days or Actively Exploited Vulnerabilities, But Exchange is in the Crosshairs - N-able<\/title>\n<meta name=\"description\" content=\"With just June&#039;s Microsoft Patch Tuesday containing fixes for 78 vulnerabilities addressed, and no zero-days, Lewis Pope has the low down.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-june-2023-no-zero-days-or-actively-exploited-vulnerabilities-but-exchange-is-in-the-crosshairs\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Patch Tuesday June 2023: No Zero-Days or Actively Exploited Vulnerabilities, But Exchange is in the Crosshairs - N-able\" \/>\n<meta property=\"og:description\" content=\"With just June&#039;s Microsoft Patch Tuesday containing fixes for 78 vulnerabilities addressed, and no zero-days, Lewis Pope has the low down.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-june-2023-no-zero-days-or-actively-exploited-vulnerabilities-but-exchange-is-in-the-crosshairs\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-14T11:01:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-17T14:21:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-01.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1309\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Lewis Pope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lewis Pope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"5\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-june-2023-no-zero-days-or-actively-exploited-vulnerabilities-but-exchange-is-in-the-crosshairs#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-june-2023-no-zero-days-or-actively-exploited-vulnerabilities-but-exchange-is-in-the-crosshairs\"},\"author\":{\"name\":\"Lewis Pope\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\"},\"headline\":\"Patch Tuesday June 2023: No Zero-Days or Actively Exploited Vulnerabilities, But Exchange is in the Crosshairs\",\"datePublished\":\"2023-06-14T12:01:43+01:00\",\"dateModified\":\"2023-07-17T14:21:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-june-2023-no-zero-days-or-actively-exploited-vulnerabilities-but-exchange-is-in-the-crosshairs\"},\"wordCount\":1049,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"Head Nerds\",\"Patch Management\",\"Security\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-june-2023-no-zero-days-or-actively-exploited-vulnerabilities-but-exchange-is-in-the-crosshairs\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-june-2023-no-zero-days-or-actively-exploited-vulnerabilities-but-exchange-is-in-the-crosshairs\",\"name\":\"Patch Tuesday June 2023: No Zero-Days or Actively Exploited Vulnerabilities, But Exchange is in the Crosshairs - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2023-06-14T12:01:43+01:00\",\"dateModified\":\"2023-07-17T14:21:17+00:00\",\"description\":\"With just June's Microsoft Patch Tuesday containing fixes for 78 vulnerabilities addressed, and no zero-days, Lewis Pope has the low down.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-june-2023-no-zero-days-or-actively-exploited-vulnerabilities-but-exchange-is-in-the-crosshairs#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-june-2023-no-zero-days-or-actively-exploited-vulnerabilities-but-exchange-is-in-the-crosshairs\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-june-2023-no-zero-days-or-actively-exploited-vulnerabilities-but-exchange-is-in-the-crosshairs#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Head Nerds\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/head-nerds-de\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Patch Tuesday June 2023: No Zero-Days or Actively Exploited Vulnerabilities, But Exchange is in the Crosshairs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\",\"name\":\"Lewis Pope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"caption\":\"Lewis Pope\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Patch Tuesday June 2023: No Zero-Days or Actively Exploited Vulnerabilities, But Exchange is in the Crosshairs - N-able","description":"With just June's Microsoft Patch Tuesday containing fixes for 78 vulnerabilities addressed, and no zero-days, Lewis Pope has the low down.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-june-2023-no-zero-days-or-actively-exploited-vulnerabilities-but-exchange-is-in-the-crosshairs","og_locale":"de_DE","og_type":"article","og_title":"Patch Tuesday June 2023: No Zero-Days or Actively Exploited Vulnerabilities, But Exchange is in the Crosshairs - N-able","og_description":"With just June's Microsoft Patch Tuesday containing fixes for 78 vulnerabilities addressed, and no zero-days, Lewis Pope has the low down.","og_url":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-june-2023-no-zero-days-or-actively-exploited-vulnerabilities-but-exchange-is-in-the-crosshairs","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2023-06-14T11:01:43+00:00","article_modified_time":"2023-07-17T14:21:17+00:00","og_image":[{"width":2500,"height":1309,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-01.png","type":"image\/png"}],"author":"Lewis Pope","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"Lewis Pope","Gesch\u00e4tzte Lesezeit":"5\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-june-2023-no-zero-days-or-actively-exploited-vulnerabilities-but-exchange-is-in-the-crosshairs#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-june-2023-no-zero-days-or-actively-exploited-vulnerabilities-but-exchange-is-in-the-crosshairs"},"author":{"name":"Lewis Pope","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae"},"headline":"Patch Tuesday June 2023: No Zero-Days or Actively Exploited Vulnerabilities, But Exchange is in the Crosshairs","datePublished":"2023-06-14T12:01:43+01:00","dateModified":"2023-07-17T14:21:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-june-2023-no-zero-days-or-actively-exploited-vulnerabilities-but-exchange-is-in-the-crosshairs"},"wordCount":1049,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["Head Nerds","Patch Management","Security"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-june-2023-no-zero-days-or-actively-exploited-vulnerabilities-but-exchange-is-in-the-crosshairs","url":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-june-2023-no-zero-days-or-actively-exploited-vulnerabilities-but-exchange-is-in-the-crosshairs","name":"Patch Tuesday June 2023: No Zero-Days or Actively Exploited Vulnerabilities, But Exchange is in the Crosshairs - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2023-06-14T12:01:43+01:00","dateModified":"2023-07-17T14:21:17+00:00","description":"With just June's Microsoft Patch Tuesday containing fixes for 78 vulnerabilities addressed, and no zero-days, Lewis Pope has the low down.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-june-2023-no-zero-days-or-actively-exploited-vulnerabilities-but-exchange-is-in-the-crosshairs#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-june-2023-no-zero-days-or-actively-exploited-vulnerabilities-but-exchange-is-in-the-crosshairs"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-june-2023-no-zero-days-or-actively-exploited-vulnerabilities-but-exchange-is-in-the-crosshairs#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Head Nerds","item":"https:\/\/www.n-able.com\/de\/blog\/category\/head-nerds-de"},{"@type":"ListItem","position":2,"name":"Patch Tuesday June 2023: No Zero-Days or Actively Exploited Vulnerabilities, But Exchange is in the Crosshairs"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae","name":"Lewis Pope","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","caption":"Lewis Pope"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/46250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=46250"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/46250\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=46250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}