cancel
Showing results for 
Search instead for 
Did you mean: 
Freddie_Jimenez
Content Contributor
Content Contributor

June update - May's testing of patches is deemed complete, and there have been no known issues reported by testing teams relating to any of the Hyland products.

 

The following is a summary of Microsoft's Security Bulletin Guide for May, 2023. Hyland has downloaded these patches and applied them to our R&D Infrastructure. We will be performing SCR, automated, and regression testing in environments containing these patches over the next month. If no issues have been found or reported, we will deem testing to be complete.

 

The testing is not all-inclusive; issues may still be found upon implementation. Follow best practices for testing and installing software updates/patches in a development environment before implementing the updates in a production environment. Where applicable, the updates are tested on all supported Windows platforms with the latest OnBase® version.

May 2023 Security Updates

Updates this Month

This release consists of the following 40 Microsoft CVEs:

TagCVEBase ScoreCVSS VectorExploitabilityFAQs?Workarounds?Mitigations?
Microsoft TeamsCVE-2023-248816.5CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:CExploitation Less LikelyYesNoNo
Windows SMBCVE-2023-248987.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:CExploitation Less LikelyYesNoNo
Microsoft Graphics ComponentCVE-2023-248997.0CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:CExploitation Less LikelyYesNoNo
Windows NTLMCVE-2023-249005.9CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:CExploitation Less LikelyYesNoNo
Windows NFS PortmapperCVE-2023-249017.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:CExploitation Less LikelyYesNoNo
Windows Win32KCVE-2023-249027.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:CExploitation More LikelyYesNoNo
Windows Secure Socket Tunneling Protocol (SSTP)CVE-2023-249038.1CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:CExploitation Less LikelyYesNoNo
Windows InstallerCVE-2023-249047.1CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:CExploitation Less LikelyYesNoNo
Remote Desktop ClientCVE-2023-249057.8CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:CExploitation Less LikelyYesNoNo
Windows Secure BootCVE-2023-249326.2CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:CExploitation Less LikelyYesNoNo
Windows NFS PortmapperCVE-2023-249397.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:CExploitation Less LikelyNoNoNo
Reliable Multicast Transport Driver (RMCAST)CVE-2023-249407.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:CExploitation Less LikelyNoNoNo
Windows Network File SystemCVE-2023-249419.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:CExploitation More LikelyYesNoYes
Windows Remote Procedure Call RuntimeCVE-2023-249427.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:CExploitation Less LikelyNoNoNo
Reliable Multicast Transport Driver (RMCAST)CVE-2023-249439.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:CExploitation Less LikelyYesNoYes
Microsoft Bluetooth DriverCVE-2023-249446.5CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:CExploitation Less LikelyYesNoNo
Windows iSCSI Target ServiceCVE-2023-249455.5CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:CExploitation Less LikelyYesNoNo
Windows Backup EngineCVE-2023-249467.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:CExploitation Less LikelyYesNoNo
Microsoft Bluetooth DriverCVE-2023-249478.8CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:CExploitation Less LikelyYesNoNo
Microsoft Bluetooth DriverCVE-2023-249487.4CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:CExploitation Less LikelyYesNoNo
Windows KernelCVE-2023-249497.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:CExploitation More LikelyYesNoNo
Microsoft Office SharePointCVE-2023-249508.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:CExploitation More LikelyYesNoNo
Microsoft Office ExcelCVE-2023-249537.8CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:CExploitation Less LikelyYesNoNo
Microsoft Office SharePointCVE-2023-249546.5CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:CExploitation More LikelyYesNoNo
Microsoft Office SharePointCVE-2023-249557.2CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:CExploitation More LikelyYesNoNo
Windows Secure BootCVE-2023-282515.5CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:CExploitation Less LikelyYesNoNo
Windows LDAP - Lightweight Directory Access ProtocolCVE-2023-282838.1CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:CExploitation Less LikelyYesNoNo
Windows RDP ClientCVE-2023-282905.5CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:CExploitation Less LikelyYesNoNo
Windows MSHTML PlatformCVE-2023-293247.5CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:CExploitation More LikelyYesNoNo
Windows OLECVE-2023-293258.1CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:CExploitation More LikelyYesYesNo
Microsoft Office AccessCVE-2023-293333.3CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:CExploitation Less LikelyYesNoNo
Microsoft Office WordCVE-2023-293357.5CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:CExploitation Less LikelyYesNoNo
Windows Win32KCVE-2023-293367.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:CExploitation DetectedYesNoNo
Visual Studio CodeCVE-2023-293385.0CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:CExploitation Less LikelyYesNoNo
Microsoft Windows Codecs LibraryCVE-2023-293407.8CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:CExploitation Less LikelyYesNoNo
Microsoft Windows Codecs LibraryCVE-2023-293417.8CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:CExploitation Less LikelyYesNoNo
SysInternalsCVE-2023-293437.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:CExploitation Less LikelyYesNoNo
Microsoft OfficeCVE-2023-293447.8CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:CExploitation Less LikelyYesNoNo
Microsoft Edge (Chromium-based)CVE-2023-293507.5CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:CExploitation Less LikelyYesNoNo
Microsoft Edge (Chromium-based)CVE-2023-293544.7CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N/E:U/RL:O/RC:CExploitation Less LikelyYesNoNo

We are republising 9 non-Microsoft CVEs:

CNATagCVEFAQs?Workarounds?Mitigations?
ChromeMicrosoft Edge (Chromium-based)CVE-2023-2459YesNoNo
ChromeMicrosoft Edge (Chromium-based)CVE-2023-2460YesNoNo
ChromeMicrosoft Edge (Chromium-based)CVE-2023-2462YesNoNo
ChromeMicrosoft Edge (Chromium-based)CVE-2023-2463YesNoNo
ChromeMicrosoft Edge (Chromium-based)CVE-2023-2464YesNoNo
ChromeMicrosoft Edge (Chromium-based)CVE-2023-2465YesNoNo
ChromeMicrosoft Edge (Chromium-based)CVE-2023-2466YesNoNo
ChromeMicrosoft Edge (Chromium-based)CVE-2023-2467YesNoNo
ChromeMicrosoft Edge (Chromium-based)CVE-2023-2468YesNoNo

Security Update Guide Blog Posts

DateBlog Post
January 11, 2022Coming Soon: New Security Update Guide Notification System
February 9, 2021Continuing to Listen: Good News about the Security Update Guide API
January 13, 2021Security Update Guide Supports CVEs Assigned by Industry Partners
December 8, 2020Security Update Guide: Let’s keep the conversation going
November 9, 2020Vulnerability Descriptions in the New Version of the Security Update Guide

Relevant Resources

  • The new Hotpatching feature is now generally available. Please see Hotpatching feature for Windows Server Azure Edition virtual machines (VMs) for more information.
  • Windows 10 and Windows 11 updates are cumulative. The monthly security release includes all security fixes for vulnerabilities that affect Windows 10, in addition to non-security updates. The updates are available via the Microsoft Update Catalog. For information on lifecycle and support dates for Windows 10 operating systems, please see Windows Lifecycle Facts Sheet.
  • Microsoft is improving Windows Release Notes. For more information, please see What's next for Windows release notes.
  • A list of the latest servicing stack updates for each operating system can be found in ADV990001. This list will be updated whenever a new servicing stack update is released. It is important to install the latest servicing stack update.
  • In addition to security changes for the vulnerabilities, updates include defense-in-depth updates to help improve security-related features.
  • Customers running Windows 7, Windows Server 2008 R2, or Windows Server 2008 need to purchase the Extended Security Update to continue receiving security updates. See 4522133 for more information.

Known Issues reported by Microsoft

You can see these in more detail from the Deployments tab by selecting Known Issues column in the Edit Columns panel.

For more information about Windows Known Issues, please see Windows message center (links to currently-supported versions of Windows are in the left pane).

KB ArticleApplies To
5026361Windows 10, version 20H2, Windows 10, version 21H2, Windows 10, version 22H2
5026362Windows 10, Version 1809, Windows Server 2019
5026368Windows 11 version 21H2
5026370Windows Server 2022
5026372Windows 11 version 22H2
5026408Windows Server 2008 (Monthly Rollup)
5026413Windows Server 2008 R2 (Monthly Rollup)
5026426Windows Server 2008 R2 (Security-only update)
5026427Windows Server 2008 (Security-only update)

Hyland Software - Microsoft Updates Statement

Hyland Software is dedicated to ensuring the monthly cumulative updates released by Microsoft® are compatible with OnBase®. On the second Tuesday of each month, the Quality Assurance Department of Hyland Software evaluates the cumulative fixes released and labeled as Critical or Important by Microsoft®. The details of the update provided by Microsoft are reviewed for interaction with OnBase® and installed when appropriate for testing its compatibility with OnBase®.

2 Comments