{"id":30664,"date":"2023-06-13T23:08:49","date_gmt":"2023-06-13T23:08:49","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=30664"},"modified":"2023-06-13T23:08:51","modified_gmt":"2023-06-13T23:08:51","slug":"windows-pgm-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/windows-pgm-vulnerabilities\/","title":{"rendered":"Windows PGM Accounts for Half of Patch Tuesday&#8217;s Critical Flaws"},"content":{"rendered":"\n<p>Microsoft&#8217;s Patch Tuesday for June 2023 addresses 78 vulnerabilities, a significant increase from last month&#8217;s total of 37. While six of the flaws are critical, Microsoft says none are currently being exploited in the wild.<\/p>\n\n\n\n<p>The six critical vulnerabilities are as follows:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24897\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-24897<\/a>, a remote code execution vulnerability in .NET, .NET Framework, and Visual Studio, with a CVSS score of 7.8<\/li>\n\n\n\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29357\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-29357<\/a>, an elevation of privilege vulnerability in Microsoft SharePoint Server, with a CVSS score of 9.8<\/li>\n\n\n\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29363\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-29363<\/a>, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-32014\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-32014<\/a> and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-32015\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-32015<\/a>, three remote code execution vulnerabilities in Windows Pragmatic General Multicast (PGM), each with a CVSS score of 9.8<\/li>\n\n\n\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-32013\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-32013<\/a>, a denial of service vulnerability in Windows Hyper-V, with a CVSS score of 6.5<\/li>\n<\/ul>\n\n\n\n<p>Dustin Childs, head of threat awareness at Trend Micro&#8217;s Zero Day Initiative, noted in a <a href=\"https:\/\/www.zerodayinitiative.com\/blog\/2023\/6\/13\/the-june-2023-security-update-review\" target=\"_blank\" rel=\"noreferrer noopener\">blog post<\/a> that this is the third month in a row in which Windows Pragmatic General Multicast (PGM) has had a flaw addressed with a CVSS score of 9.8. &#8220;While not enabled by default, PGM isn&#8217;t an uncommon configuration,&#8221; he wrote. &#8220;Let&#8217;s hope these bugs get fixed before any active exploitation starts.&#8221;<\/p>\n\n\n\n<p>Action1 vice president of vulnerability and threat research Mike Walters separately <a href=\"https:\/\/www.action1.com\/patch-tuesday-june-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">observed<\/a> that the three PGM flaws can be exploited over the network without requiring privileges or user interaction.<\/p>\n\n\n\n<p>&#8220;To mitigate this vulnerability, consider checking if the Message Queuing service is running on TCP port 1801 and disable it if not needed,&#8221; Walters advised. &#8220;However, be cautious as this may impact system functionality. It is generally recommended to install the available patch instead of relying solely on mitigation strategies.&#8221;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Flaws in SharePoint, .NET, Visual Studio<\/h2>\n\n\n\n<p>Exploitation of the SharePoint Server flaw CVE-2023-29357, Walters noted, also requires no privileges or user interaction. &#8220;Customers using Microsoft Defender and the AMSI integration feature in their SharePoint Server farm(s) are protected against this vulnerability,&#8221; he wrote. &#8220;While there are no confirmed cases of exploitation yet, Microsoft warns that the likelihood of exploitation is high. It is essential for organizations using SharePoint 2019 to apply the patch to mitigate this serious vulnerability.&#8221;<\/p>\n\n\n\n<p>Rapid7 lead software engineer Adam Barnett pointed out by email that while the FAQ provided with Microsoft&#8217;s advisory for CVE-2023-29357 states that both SharePoint Enterprise Server 2016 and SharePoint Server 2019 are vulnerable, no related patches are listed for SharePoint 2016.<\/p>\n\n\n\n<p>&#8220;Defenders responsible for SharePoint 2016 will no doubt wish to follow up on this one as a matter of some urgency,&#8221; Barnett wrote. &#8220;Microsoft also explains that there may be more than one patch listed for a particular version of SharePoint, and that every patch must be installed to remediate this vulnerability (although order of patching doesn&#8217;t matter).&#8221;<\/p>\n\n\n\n<p>Regarding CVE-2023-24897, Barnett observed that exploitation of the flaw in .NET, .NET Framework and Visual Studio requires the attacker to trick a victim into opening a specially-crafted malicious file.<\/p>\n\n\n\n<p>&#8220;Although Microsoft has no knowledge of public disclosure or exploitation in the wild, and considers exploitation less likely, the long list of patches \u2013 going back as far as .NET Framework 3.5 on Windows 10 1607 \u2013 means that this vulnerability has been present for years,&#8221; he wrote.<\/p>\n\n\n\n<p><strong>See the <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\"><strong>Best Patch Management Software &amp; Tools<\/strong><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Other Noteworthy Flaws<\/h2>\n\n\n\n<p>Ivanti vice president of security products Chris Goettl noted by email that two lower-severity flaws were also patched in Microsoft Exchange Server.<\/p>\n\n\n\n<p>&#8220;<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-32031\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-32031<\/a> could potentially trigger malicious code in the context of the server&#8217;s account through a network call,&#8221; Goettl wrote. &#8220;<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-28310\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-28310<\/a> could allow the attacker to execute code via a PowerShell remoting session. Neither have been disclosed or exploited, but given the sophistication of threat actors who specialize in targeting Exchange Server, it is recommended not to let these linger for long.&#8221;<\/p>\n\n\n\n<p>And Silverfort senior research tech lead Dor Segal said by email that <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29362\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-29362<\/a>, a remote code execution vulnerability in Remote Desktop Client with a CVSS score of 8.8 is also worth noting.<\/p>\n\n\n\n<p>&#8220;Using an RDP client can give admins a false sense of security: they can see what&#8217;s going on in a remote server or that client&#8217;s computer, but they believe themselves to be protected from malicious activity on the client&#8217;s end thanks to the RDP,&#8221; Segal said. &#8220;This vulnerability unfortunately proves that wrong.&#8221;<\/p>\n\n\n\n<p>&#8220;CVE-2023-29362 allows an attacker who has compromised a Windows machine to attack and spread to any RDP client connected to that same machine,&#8221; Segal added. &#8220;In the case of admins or other privileged machines, this could potentially lead to compromise of the entire domain. It&#8217;s worth noting that patching is needed on the client&#8217;s side \u2013 not the server&#8217;s \u2013 so we recommend first patching privileged clients before moving on to the rest of the clients in the organization.&#8221;<\/p>\n\n\n\n<p><strong>Read more:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><a href=\"https:\/\/www.esecurityplanet.com\/threats\/powershell-security\/\">Cybersecurity Agencies Release Guidance for PowerShell Security<\/a><\/strong><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/secure-access-for-remote-workers-rdp-vpn-vdi\/\">Secure Access for Remote Workers: RDP, VPN &amp; VDI<\/a><\/strong><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\">Top Vulnerability Management Tools<\/a><\/strong><\/li>\n<\/ul>\n\n\n<div id=\"ta-campaign-widget-66d7043ec0043-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d7043ec0043\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d7043ec0043\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d7043ec0043\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d7043ec0043\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d7043ec0043\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d7043ec0043\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft&#8217;s Patch Tuesday for June 2023 addresses 78 vulnerabilities, a significant increase from last month&#8217;s total of 37. While six of the flaws are critical, Microsoft says none are currently being exploited in the wild. The six critical vulnerabilities are as follows: Dustin Childs, head of threat awareness at Trend Micro&#8217;s Zero Day Initiative, noted [&hellip;]<\/p>\n","protected":false},"author":166,"featured_media":27354,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[3790,4945,3414,730,5277,31077],"b2b_audience":[35],"b2b_industry":[],"b2b_product":[382,394,378,31780,31775,392],"class_list":["post-30664","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-cybersecurity","tag-exchange","tag-network-security","tag-security","tag-web-security","tag-windows-security","b2b_audience-implementation-and-support","b2b_product-application-security-vulnerability-management","b2b_product-email-security","b2b_product-endpoint-security","b2b_product-patch-management","b2b_product-web-applications-security","b2b_product-web-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Windows PGM Accounts for Half of Patch Tuesday&#039;s Critical Flaws | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"PGM, SharePoint, Exchange Server, .NET and Visual Studio top the list of flaws on Microsoft Patch Tuesday.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/windows-pgm-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Windows PGM Accounts for Half of Patch Tuesday&#039;s Critical Flaws | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"PGM, SharePoint, Exchange Server, .NET and Visual Studio top the list of flaws on Microsoft Patch Tuesday.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/windows-pgm-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-13T23:08:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-13T23:08:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/Microsoft-Defender-logo.png\" \/>\n\t<meta property=\"og:image:width\" content=\"452\" \/>\n\t<meta property=\"og:image:height\" content=\"452\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jeff Goldman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Goldman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/windows-pgm-vulnerabilities\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/windows-pgm-vulnerabilities\/\"},\"author\":{\"name\":\"Jeff Goldman\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\"},\"headline\":\"Windows PGM Accounts for Half of Patch Tuesday&#8217;s Critical Flaws\",\"datePublished\":\"2023-06-13T23:08:49+00:00\",\"dateModified\":\"2023-06-13T23:08:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/windows-pgm-vulnerabilities\/\"},\"wordCount\":810,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/windows-pgm-vulnerabilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/Microsoft-Defender-logo.png\",\"keywords\":[\"cybersecurity\",\"Exchange\",\"network security\",\"security\",\"Web security\",\"Windows security\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/windows-pgm-vulnerabilities\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/windows-pgm-vulnerabilities\/\",\"name\":\"Windows PGM Accounts for Half of Patch Tuesday's Critical Flaws | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/windows-pgm-vulnerabilities\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/windows-pgm-vulnerabilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/Microsoft-Defender-logo.png\",\"datePublished\":\"2023-06-13T23:08:49+00:00\",\"dateModified\":\"2023-06-13T23:08:51+00:00\",\"description\":\"PGM, SharePoint, Exchange Server, .NET and Visual Studio top the list of flaws on Microsoft Patch Tuesday.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/windows-pgm-vulnerabilities\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/windows-pgm-vulnerabilities\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/windows-pgm-vulnerabilities\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/Microsoft-Defender-logo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/Microsoft-Defender-logo.png\",\"width\":452,\"height\":452,\"caption\":\"Microsoft Defender logo.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/windows-pgm-vulnerabilities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Windows PGM Accounts for Half of Patch Tuesday&#8217;s Critical Flaws\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\",\"name\":\"Jeff Goldman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"caption\":\"Jeff Goldman\"},\"description\":\"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Windows PGM Accounts for Half of Patch Tuesday's Critical Flaws | eSecurity Planet","description":"PGM, SharePoint, Exchange Server, .NET and Visual Studio top the list of flaws on Microsoft Patch Tuesday.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/windows-pgm-vulnerabilities\/","og_locale":"en_US","og_type":"article","og_title":"Windows PGM Accounts for Half of Patch Tuesday's Critical Flaws | eSecurity Planet","og_description":"PGM, SharePoint, Exchange Server, .NET and Visual Studio top the list of flaws on Microsoft Patch Tuesday.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/windows-pgm-vulnerabilities\/","og_site_name":"eSecurity Planet","article_published_time":"2023-06-13T23:08:49+00:00","article_modified_time":"2023-06-13T23:08:51+00:00","og_image":[{"width":452,"height":452,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/Microsoft-Defender-logo.png","type":"image\/png"}],"author":"Jeff Goldman","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Goldman","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/windows-pgm-vulnerabilities\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/windows-pgm-vulnerabilities\/"},"author":{"name":"Jeff Goldman","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795"},"headline":"Windows PGM Accounts for Half of Patch Tuesday&#8217;s Critical Flaws","datePublished":"2023-06-13T23:08:49+00:00","dateModified":"2023-06-13T23:08:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/windows-pgm-vulnerabilities\/"},"wordCount":810,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/windows-pgm-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/Microsoft-Defender-logo.png","keywords":["cybersecurity","Exchange","network security","security","Web security","Windows security"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/windows-pgm-vulnerabilities\/","url":"https:\/\/www.esecurityplanet.com\/threats\/windows-pgm-vulnerabilities\/","name":"Windows PGM Accounts for Half of Patch Tuesday's Critical Flaws | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/windows-pgm-vulnerabilities\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/windows-pgm-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/Microsoft-Defender-logo.png","datePublished":"2023-06-13T23:08:49+00:00","dateModified":"2023-06-13T23:08:51+00:00","description":"PGM, SharePoint, Exchange Server, .NET and Visual Studio top the list of flaws on Microsoft Patch Tuesday.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/windows-pgm-vulnerabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/windows-pgm-vulnerabilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/windows-pgm-vulnerabilities\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/Microsoft-Defender-logo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/Microsoft-Defender-logo.png","width":452,"height":452,"caption":"Microsoft Defender logo."},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/windows-pgm-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Windows PGM Accounts for Half of Patch Tuesday&#8217;s Critical Flaws"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795","name":"Jeff Goldman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","caption":"Jeff Goldman"},"description":"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.","url":"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/30664"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/166"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=30664"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/30664\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/27354"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=30664"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=30664"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=30664"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=30664"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=30664"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=30664"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}