{"id":33239,"date":"2023-12-14T16:12:26","date_gmt":"2023-12-14T16:12:26","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=33239"},"modified":"2023-12-14T16:12:28","modified_gmt":"2023-12-14T16:12:28","slug":"patch-tuesday-december-2023","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/patch-tuesday-december-2023\/","title":{"rendered":"Microsoft&#8217;s December 2023 Patch Tuesday Includes Four Critical Flaws"},"content":{"rendered":"\n<p>Microsoft has announced a relatively light Patch Tuesday to end the year. The company&#8217;s announcement covers a total of 34 flaws, four of them critical.<\/p>\n\n\n\n<p>Still, Immersive Labs senior threat director Kev Breen told <em>eSecurity Planet<\/em> by email that the low number of vulnerabilities shouldn&#8217;t suggest any lack of urgency or importance. &#8220;A number of the patches released have been identified as &#8216;more likely to be exploited,&#8217; and as we have seen over the last several years, attackers are quick to exploit newly released patches, with the average time from patch to exploit being seven days,&#8221; he said.<\/p>\n\n\n\n<p>Microsoft announced only one zero-day flaw this month: <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2023-20588\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-20588<\/a>, which is found in AMD processors. &#8220;A division-by-zero error on certain processors can return speculative data resulting in loss of confidentiality,&#8221; <a href=\"https:\/\/www.amd.com\/en\/resources\/product-security\/bulletin\/amd-sb-7007.html\" target=\"_blank\" rel=\"noreferrer noopener\">according to AMD<\/a>. Microsoft has included the vulnerability in its announcement because the latest Windows updates protect against the flaw.<\/p>\n\n\n\n<p>The severity of the flaw, it seems, is open to debate. &#8220;AMD believes the potential impact of the vulnerability is low since local access is required; however, Microsoft ranks [its] severity as important under its own proprietary severity scale,&#8221; Rapid7&#8217;s Adam Barnett observed in a <a href=\"https:\/\/www.rapid7.com\/blog\/post\/2023\/12\/12\/patch-tuesday-december-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">blog post<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Four Critical Vulnerabilities Announced<\/h2>\n\n\n\n<p>The first of the four critical flaws announced, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2023-35628\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-35628<\/a>, is a remote code execution vulnerability in the Windows MSHTML platform with a CVSS score of 8.1. &#8220;Exploitation of this vulnerability requires that an attacker send a malicious link to the victim via email, or that they convince the user to click the link, typically by way of an enticement in an email or Instant Messenger message,&#8221; Microsoft stated in its advisory.<\/p>\n\n\n\n<p>Crucially, the flaw can be triggered without any user interaction. &#8220;In the worst-case email attack scenario, an attacker could send a specially crafted email to the user without a requirement that the victim open, read, or click on the link,&#8221; Microsoft warned. &#8220;This could result in the attacker executing remote code on the victim&#8217;s machine.&#8221;<\/p>\n\n\n\n<p>&#8220;These kinds of zero-click exploits are always appealing to threat actors, both nation states, and financially motivated groups like ransomware operators, as they are easy to weaponize threats at scale,&#8221; Immersive&#8217;s Breen observed.<\/p>\n\n\n\n<p>Two critical flaws in Internet Connection Sharing (ICS), <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2023-35630\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-35630<\/a> and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2023-35641\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-35641<\/a>, have a CVSS score of 8.8. &#8220;These vulnerabilities share similar characteristics, including an adjacent attack vector, low complexity, low privilege requirements, and no user interaction needed,&#8221; Action1 president and co-founder Mike Walters noted in a <a href=\"https:\/\/www.action1.com\/patch-tuesday-december-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">blog post<\/a>.<\/p>\n\n\n\n<p>&#8220;Care should be taken to determine if any hosts running ICS are present in networks that have grown over time and steps taken to either disable the service if not required or patch as soon as possible if ICS is required,&#8221; Immersive Labs principal cyber security engineer Rob Reeves advised by email.<\/p>\n\n\n\n<p>The fourth critical flaw, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2023-36019\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-36019<\/a>, is a spoofing vulnerability in the Microsoft Power Platform with a high CVSS score of 9.6. &#8220;The exploitation scenario involves an attacker crafting a malicious link, application, or file that appears legitimate to the victim,&#8221; Walters noted. &#8220;For instance, this vulnerability could be used in conjunction with malware that automatically downloads and installs itself once a user clicks on a deceptive link.&#8221;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Flaws Impacting Bluetooth &amp; Antivirus&nbsp;<\/h2>\n\n\n\n<p>Immersive Labs cyber security engineer Nikolas Cemerikic also highlighted <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2023-35634\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-35634<\/a>, a remote code execution vulnerability in the Windows Bluetooth Driver with a CVSS score of 8.0. &#8220;Should a victim be deceived into connecting to a malicious device, and the attack proves successful, the ensuing remote code execution vulnerability would result in an immediate compromise of the integrity, confidentiality, and availability of information on the targeted system,&#8221; Cemerikic observed.\u00a0<\/p>\n\n\n\n<p>Finally, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2023-36010\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-36010<\/a> is a notable denial of service (DoS) vulnerability in Microsoft&#8217;s antivirus solution, Microsoft Defender, with a CVSS score of 7.5. &#8220;Interestingly, the attack vector for this vulnerability is listed as network-based, suggesting that an attacker could initiate the condition remotely from a device on the same network,&#8221; Immersive&#8217;s Reeves noted.<\/p>\n\n\n\n<p>&#8220;DoS conditions in antivirus software are of interest to attackers as they can impede efforts to detect adversaries,&#8221; Reeves added. &#8220;In this instance, an attacker may be able to effectively disable the antivirus service before initiating lateral movement to a target, or include the DoS method as part of an initial access payload. If your enterprise network is using Windows Defender as its default antivirus product, it is important to patch this vulnerability to maintain this security functionality.&#8221;<\/p>\n\n\n<div id=\"ta-campaign-widget-66d70386ddb4b-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d70386ddb4b\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d70386ddb4b\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d70386ddb4b\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d70386ddb4b\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d70386ddb4b\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d70386ddb4b\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft\u2019s December 2023 Patch Tuesday was relatively light to end the year. Four out of the 34 flaws announced were critical. Learn how that affects you.<\/p>\n","protected":false},"author":166,"featured_media":33240,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[],"b2b_audience":[],"b2b_industry":[],"b2b_product":[],"class_list":["post-33239","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Microsoft&#039;s December 2023 Patch Tuesday Includes Four Critical Flaws<\/title>\n<meta name=\"description\" content=\"Microsoft\u2019s December 2023 Patch Tuesday was relatively light to end the year. Four out of the 34 flaws announced were critical. Learn how that affects you.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/patch-tuesday-december-2023\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft&#039;s December 2023 Patch Tuesday Includes Four Critical Flaws\" \/>\n<meta property=\"og:description\" content=\"Microsoft\u2019s December 2023 Patch Tuesday was relatively light to end the year. Four out of the 34 flaws announced were critical. Learn how that affects you.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/patch-tuesday-december-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-14T16:12:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-14T16:12:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231214-patch-tuesday-december-2023.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jeff Goldman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Goldman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/patch-tuesday-december-2023\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/patch-tuesday-december-2023\/\"},\"author\":{\"name\":\"Jeff Goldman\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\"},\"headline\":\"Microsoft&#8217;s December 2023 Patch Tuesday Includes Four Critical Flaws\",\"datePublished\":\"2023-12-14T16:12:26+00:00\",\"dateModified\":\"2023-12-14T16:12:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/patch-tuesday-december-2023\/\"},\"wordCount\":746,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/patch-tuesday-december-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231214-patch-tuesday-december-2023.png\",\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/patch-tuesday-december-2023\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/patch-tuesday-december-2023\/\",\"name\":\"Microsoft's December 2023 Patch Tuesday Includes Four Critical Flaws\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/patch-tuesday-december-2023\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/patch-tuesday-december-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231214-patch-tuesday-december-2023.png\",\"datePublished\":\"2023-12-14T16:12:26+00:00\",\"dateModified\":\"2023-12-14T16:12:28+00:00\",\"description\":\"Microsoft\u2019s December 2023 Patch Tuesday was relatively light to end the year. Four out of the 34 flaws announced were critical. Learn how that affects you.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/patch-tuesday-december-2023\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/patch-tuesday-december-2023\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/patch-tuesday-december-2023\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231214-patch-tuesday-december-2023.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231214-patch-tuesday-december-2023.png\",\"width\":1400,\"height\":900,\"caption\":\"Image: Sikov\/Adobe Stock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/patch-tuesday-december-2023\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft&#8217;s December 2023 Patch Tuesday Includes Four Critical Flaws\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\",\"name\":\"Jeff Goldman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"caption\":\"Jeff Goldman\"},\"description\":\"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft's December 2023 Patch Tuesday Includes Four Critical Flaws","description":"Microsoft\u2019s December 2023 Patch Tuesday was relatively light to end the year. Four out of the 34 flaws announced were critical. Learn how that affects you.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/patch-tuesday-december-2023\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft's December 2023 Patch Tuesday Includes Four Critical Flaws","og_description":"Microsoft\u2019s December 2023 Patch Tuesday was relatively light to end the year. Four out of the 34 flaws announced were critical. Learn how that affects you.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/patch-tuesday-december-2023\/","og_site_name":"eSecurity Planet","article_published_time":"2023-12-14T16:12:26+00:00","article_modified_time":"2023-12-14T16:12:28+00:00","og_image":[{"width":1400,"height":900,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231214-patch-tuesday-december-2023.png","type":"image\/png"}],"author":"Jeff Goldman","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Goldman","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/patch-tuesday-december-2023\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/patch-tuesday-december-2023\/"},"author":{"name":"Jeff Goldman","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795"},"headline":"Microsoft&#8217;s December 2023 Patch Tuesday Includes Four Critical Flaws","datePublished":"2023-12-14T16:12:26+00:00","dateModified":"2023-12-14T16:12:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/patch-tuesday-december-2023\/"},"wordCount":746,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/patch-tuesday-december-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231214-patch-tuesday-december-2023.png","articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/patch-tuesday-december-2023\/","url":"https:\/\/www.esecurityplanet.com\/threats\/patch-tuesday-december-2023\/","name":"Microsoft's December 2023 Patch Tuesday Includes Four Critical Flaws","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/patch-tuesday-december-2023\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/patch-tuesday-december-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231214-patch-tuesday-december-2023.png","datePublished":"2023-12-14T16:12:26+00:00","dateModified":"2023-12-14T16:12:28+00:00","description":"Microsoft\u2019s December 2023 Patch Tuesday was relatively light to end the year. Four out of the 34 flaws announced were critical. Learn how that affects you.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/patch-tuesday-december-2023\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/patch-tuesday-december-2023\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/patch-tuesday-december-2023\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231214-patch-tuesday-december-2023.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231214-patch-tuesday-december-2023.png","width":1400,"height":900,"caption":"Image: Sikov\/Adobe Stock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/patch-tuesday-december-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Microsoft&#8217;s December 2023 Patch Tuesday Includes Four Critical Flaws"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795","name":"Jeff Goldman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","caption":"Jeff Goldman"},"description":"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.","url":"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/33239"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/166"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=33239"}],"version-history":[{"count":1,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/33239\/revisions"}],"predecessor-version":[{"id":33241,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/33239\/revisions\/33241"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/33240"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=33239"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=33239"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=33239"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=33239"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=33239"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=33239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}