# MS 8월 보안 위협에 따른 정기 보안 업데이트 권고\[2023-08]

## MS 8월 보안 위협에 따른 정기 보안 업데이트 권고

### □ 8 월 보안업데이트 개요 (총 15 종 )

o 등급 : 긴급 (Critical) 9 종 , 중요 (Important) 6 종 o 발표일 : 2023.08.08.(화) o 업데이트 내용

<table><thead><tr><th width="438">제품군</th><th width="113.33333333333331">중요도</th><th>영향</th></tr></thead><tbody><tr><td>Windows 11 v22H2, Windows 11 v21H2</td><td>긴급</td><td>권한 상승</td></tr><tr><td>Windows 10 22H2, Windows 10 21H2</td><td>긴급</td><td>권한 상승</td></tr><tr><td>Windows Server 2022</td><td>긴급</td><td>권한 상승</td></tr><tr><td>Windows Server 2019</td><td>긴급</td><td>권한 상승</td></tr><tr><td>Windows Server 2016</td><td>긴급</td><td>정보 유출</td></tr><tr><td>Windows Server 2012 R2</td><td>긴급</td><td>원격 코드 실행</td></tr><tr><td>Windows Server 2012</td><td>긴급</td><td>원격 코드 실행</td></tr><tr><td>Microsoft Office</td><td>긴급</td><td>원격 코드 실행</td></tr><tr><td>Microsoft SharePoint</td><td>긴급</td><td>정보 유출</td></tr><tr><td>Microsoft .NET</td><td>중요</td><td>서비스 거부</td></tr><tr><td>Microsoft Exchange Server</td><td>중요</td><td>원격 코드 실행</td></tr><tr><td>Microsoft Visual Studio</td><td>중요</td><td>서비스 거부</td></tr><tr><td>Microsoft Dynamics 365</td><td>중요</td><td>원격 코드 실행</td></tr><tr><td>Microsoft Azure 관련 소프트웨어</td><td>중요</td><td>스푸핑</td></tr><tr><td>Windows Defender 맬웨어 방지 플랫폼</td><td>중요</td><td>권한 상승</td></tr></tbody></table>

### \[참고 사이트 ]&#x20;

\[1] (한글) <https://portal.msrc.microsoft.com/ko-kr/security-guidance&#x20>;

\[2] (영문) <https://portal.msrc.microsoft.com/en-us/security-guidance&#x20>;

\[3] <https://msrc.microsoft.com/update-guide/releaseNote/2023-Aug&#x20>;

\[4] <https://msrc.microsoft.com/update-guide>

### o 취약점 요약 정보

<table><thead><tr><th>제품 카테고리</th><th width="179.33333333333331">CVE  번호</th><th>CVE  제목</th></tr></thead><tbody><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4078">CVE-2023-4078</a></td><td>Chromium: CVE-2023-4078 확장에서 부적절한 구현</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4077">CVE-2023-4077</a></td><td>Chromium: CVE-2023-4077 확장에서 불충분한 데이터 유효성 검사</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4076">CVE-2023-4076</a></td><td>Chromium: CVE-2023-4076 WebRTC에서 UaF(Use after free)</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4075">CVE-2023-4075</a></td><td>Chromium: CVE-2023-4075 캐스팅에서 UaF(Use after free)</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4074">CVE-2023-4074</a></td><td>Chromium: CVE-2023-4074 Blink Task Scheduling에서 UaF(Use after free)</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4073">CVE-2023-4073</a></td><td>Chromium: CVE-2023-4073 ANGLE에서 범위를 벗어난 메모리 액세스</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4072">CVE-2023-4072</a></td><td>Chromium: CVE-2023-4072 WebGL에서 범위를 벗어난 읽기와 쓰기</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4071">CVE-2023-4071</a></td><td>Chromium: CVE-2023-4071 Visuals에서 힙 버퍼 오버플로</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4070">CVE-2023-4070</a></td><td>Chromium: CVE-2023-4070 V8에서 유형 혼란</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4069">CVE-2023-4069</a></td><td>Chromium: CVE-2023-4069 V8에서 유형 혼란</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4068">CVE-2023-4068</a></td><td>Chromium: CVE-2023-4068 V8에서 유형 혼란</td></tr><tr><td>Windows Message Queuing</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38254">CVE-2023-38254</a></td><td>Microsoft 메시지 큐 서비스 거부 취약성</td></tr><tr><td>Azure HDInsights</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38188">CVE-2023-38188</a></td><td>Azure Apache Hadoop 스푸핑 취약성</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38187">CVE-2023-38187</a></td><td>Microsoft Edge(Chromium 기반) 권한 상승 취약성</td></tr><tr><td>Windows Mobile Device Management</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38186">CVE-2023-38186</a></td><td>Windows 모바일 장치 관리 권한 상승 취약성</td></tr><tr><td>Microsoft Exchange Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38185">CVE-2023-38185</a></td><td>Microsoft Exchange Server 원격 코드 실행 취약성</td></tr><tr><td>Windows LDAP - Lightweight Directory Access Protocol</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38184">CVE-2023-38184</a></td><td>Windows LDAP(Lightweight Directory Access Protocol) 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Exchange Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38182">CVE-2023-38182</a></td><td>Microsoft Exchange Server 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Exchange Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38181">CVE-2023-38181</a></td><td>Microsoft Exchange Server 스푸핑 취약성</td></tr><tr><td>ASP .NET</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38180">CVE-2023-38180</a></td><td>.NET and Visual Studio Denial of Service Vulnerability</td></tr><tr><td>.NET Core</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38178">CVE-2023-38178</a></td><td>.NET Core 및 Visual Studio 서비스 거부 취약성</td></tr><tr><td>Azure Arc</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38176">CVE-2023-38176</a></td><td>Azure Arc 지원 서버 권한 상승 취약성</td></tr><tr><td>Windows Defender</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38175">CVE-2023-38175</a></td><td>Microsoft Windows Defender 권한 상승 취약성</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38173">CVE-2023-38173</a></td><td>Android용 Microsoft Edge 스푸핑 취약성</td></tr><tr><td>Windows Message Queuing</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38172">CVE-2023-38172</a></td><td>Microsoft 메시지 큐 서비스 거부 취약성</td></tr><tr><td>Microsoft Windows Codecs Library</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38170">CVE-2023-38170</a></td><td>HEVC 비디오 확장 원격 코드 실행 취약성</td></tr><tr><td>SQL Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38169">CVE-2023-38169</a></td><td>Microsoft OLE DB 원격 코드 실행 취약성</td></tr><tr><td>Dynamics Business Central Control</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38167">CVE-2023-38167</a></td><td>Microsoft Dynamics Business Central 권한 상승 취약성</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38157">CVE-2023-38157</a></td><td>Microsoft Edge(Chromium 기반) 보안 기능 우회 취약성</td></tr><tr><td>Windows Kernel</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38154">CVE-2023-38154</a></td><td>Windows 커널 권한 상승 취약성</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3740">CVE-2023-3740</a></td><td>Chromium: CVE-2023-3740 테마에서 신뢰할 수 없는 입력에 대한 불충분한 유효성 검사</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3738">CVE-2023-3738</a></td><td>Chromium: CVE-2023-3738 자동 채우기에서 부적절한 구현</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3737">CVE-2023-3737</a></td><td>Chromium: CVE-2023-3737 알림에서 부적절한 구현</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3736">CVE-2023-3736</a></td><td>Chromium: CVE-2023-3736 사용자 지정 탭에서 부적절한 구현</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3735">CVE-2023-3735</a></td><td>Chromium: CVE-2023-3735 Web API 권한 프롬프트에서 부적절한 구현</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3734">CVE-2023-3734</a></td><td>Chromium: CVE-2023-3734 화면 속 화면에서 부적절한 구현</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3733">CVE-2023-3733</a></td><td>Chromium: CVE-2023-3733 WebApp Installs에서 부적절한 구현</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3732">CVE-2023-3732</a></td><td>Chromium: CVE-2023-3732 Mojo에서 범위를 벗어난 메모리 액세스</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3730">CVE-2023-3730</a></td><td>Chromium: CVE-2023-3730 탭 그룹에서 UaF(Use after free)</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3728">CVE-2023-3728</a></td><td>Chromium: CVE-2023-3728 WebRTC에서 UaF(Use after free)</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3727">CVE-2023-3727</a></td><td>Chromium: CVE-2023-3727 WebRTC에서 UaF(Use after free)</td></tr><tr><td>Windows Smart Card</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36914">CVE-2023-36914</a></td><td>Windows 스마트 카드 리소스 관리 서버 보안 기능 바이패스 취약성</td></tr><tr><td>Windows Message Queuing</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36913">CVE-2023-36913</a></td><td>Microsoft 메시지 큐 정보 유출 취약성</td></tr><tr><td>Windows Message Queuing</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36912">CVE-2023-36912</a></td><td>Microsoft 메시지 큐 서비스 거부 취약성</td></tr><tr><td>Windows Message Queuing</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36911">CVE-2023-36911</a></td><td>Microsoft 메시지 큐 원격 코드 실행 취약성</td></tr><tr><td>Windows Message Queuing</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36910">CVE-2023-36910</a></td><td>Microsoft 메시지 큐 원격 코드 실행 취약성</td></tr><tr><td>Windows Message Queuing</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36909">CVE-2023-36909</a></td><td>Microsoft 메시지 큐 서비스 거부 취약성</td></tr><tr><td>Role: Windows Hyper-V</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36908">CVE-2023-36908</a></td><td>Windows Hyper-V 정보 유출 취약성</td></tr><tr><td>Windows Cryptographic Services</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36907">CVE-2023-36907</a></td><td>Windows 암호화 서비스 정보 공개 취약성</td></tr><tr><td>Windows Cryptographic Services</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36906">CVE-2023-36906</a></td><td>Windows 암호화 서비스 정보 공개 취약성</td></tr><tr><td>Windows Wireless Wide Area Network Service</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36905">CVE-2023-36905</a></td><td>Windows WwanSvc(Wireless Wide Area Network Service) 정보 공개 취약성</td></tr><tr><td>Windows Cloud Files Mini Filter Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36904">CVE-2023-36904</a></td><td>Windows 클라우드 파일 미니 필터 드라이버 권한 상승 취약성</td></tr><tr><td>Windows System Assessment Tool</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36903">CVE-2023-36903</a></td><td>Windows 시스템 평가 도구 권한 상승 취약성</td></tr><tr><td>Windows Common Log File System Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36900">CVE-2023-36900</a></td><td>Windows 공용 로그 파일 시스템 드라이버 권한 상승 취약성</td></tr><tr><td>ASP.NET</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36899">CVE-2023-36899</a></td><td>ASP.NET 권한 상승 취약성</td></tr><tr><td>Tablet Windows User Interface</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36898">CVE-2023-36898</a></td><td>Tablet Windows User Interface Application Core 권한 상승 취약성</td></tr><tr><td>Microsoft Office</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36897">CVE-2023-36897</a></td><td>Visual Studio Tools for Office 런타임 스푸핑 취약성</td></tr><tr><td>Microsoft Office Excel</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36896">CVE-2023-36896</a></td><td>Microsoft Excel 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Office Outlook</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36895">CVE-2023-36895</a></td><td>Microsoft Outlook 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Office SharePoint</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36894">CVE-2023-36894</a></td><td>Microsoft SharePoint Server 정보 유출 취약성</td></tr><tr><td>Microsoft Office Outlook</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36893">CVE-2023-36893</a></td><td>Microsoft Outlook 스푸핑 취약성</td></tr><tr><td>Microsoft Office SharePoint</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36892">CVE-2023-36892</a></td><td>Microsoft SharePoint Server 스푸핑 취약성</td></tr><tr><td>Microsoft Office SharePoint</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36891">CVE-2023-36891</a></td><td>Microsoft SharePoint Server 스푸핑 취약성</td></tr><tr><td>Microsoft Office SharePoint</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36890">CVE-2023-36890</a></td><td>Microsoft SharePoint Server 정보 유출 취약성</td></tr><tr><td>Windows Group Policy</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36889">CVE-2023-36889</a></td><td>Windows 그룹 정책 보안 기능 바이패스 취약성</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36888">CVE-2023-36888</a></td><td>Android용 Microsoft Edge(Chromium 기반) 변조 취약성</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36887">CVE-2023-36887</a></td><td>Microsoft Edge(Chromium 기반) 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Windows Search Component</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884">CVE-2023-36884</a></td><td>Windows Search Remote Code Execution Vulnerability</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36883">CVE-2023-36883</a></td><td>iOS용 Microsoft Edge 스푸핑 취약성</td></tr><tr><td>Microsoft WDAC OLE DB provider for SQL</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36882">CVE-2023-36882</a></td><td>SQL Server용 Microsoft WDAC OLE DB 공급자 원격 코드 실행 취약성</td></tr><tr><td>Azure HDInsights</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36881">CVE-2023-36881</a></td><td>Azure Apache Ambari 스푸핑 취약성</td></tr><tr><td>Azure HDInsights</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36877">CVE-2023-36877</a></td><td>Azure Apache Oozie 스푸핑 취약성</td></tr><tr><td>Reliability Analysis Metrics Calculation Engine</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36876">CVE-2023-36876</a></td><td>RacTask(Reliability Analysis Metrics Calculation) 권한 상승 취약성</td></tr><tr><td>.NET Framework</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36873">CVE-2023-36873</a></td><td>.NET Framework 스푸핑 취약성</td></tr><tr><td>Azure DevOps</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36869">CVE-2023-36869</a></td><td>Azure DevOps Server 스푸핑 취약성</td></tr><tr><td>Microsoft Office Visio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36866">CVE-2023-36866</a></td><td>Microsoft Office Visio 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Office Visio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36865">CVE-2023-36865</a></td><td>Microsoft Office Visio 원격 코드 실행 취약성</td></tr><tr><td>Azure HDInsights</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35394">CVE-2023-35394</a></td><td>Azure HDInsight Jupyter Notebook 스푸핑 취약성</td></tr><tr><td>Azure HDInsights</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35393">CVE-2023-35393</a></td><td>Azure Apache Hive 스푸핑 취약성</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35392">CVE-2023-35392</a></td><td>Microsoft Edge(Chromium 기반) 스푸핑 취약성</td></tr><tr><td>ASP.NET and Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35391">CVE-2023-35391</a></td><td>ASP.NET Core SignalR 및 Visual Studio 정보 공개 취약성</td></tr><tr><td>.NET Core</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35390">CVE-2023-35390</a></td><td>.NET 및 Visual Studio 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Dynamics</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35389">CVE-2023-35389</a></td><td>Microsoft Dynamics 365 온-프레미스 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Exchange Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35388">CVE-2023-35388</a></td><td>Microsoft Exchange Server 원격 코드 실행 취약성</td></tr><tr><td>Windows Bluetooth A2DP driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35387">CVE-2023-35387</a></td><td>Windows Bluetooth A2DP 드라이버 권한 상승 취약성</td></tr><tr><td>Windows Kernel</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35386">CVE-2023-35386</a></td><td>Windows 커널 권한 상승 취약성</td></tr><tr><td>Windows Message Queuing</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35385">CVE-2023-35385</a></td><td>Microsoft 메시지 큐 원격 코드 실행 취약성</td></tr><tr><td>Windows HTML Platform</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35384">CVE-2023-35384</a></td><td>Windows HTML 플랫폼 보안 기능 우회 취약성</td></tr><tr><td>Windows Message Queuing</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35383">CVE-2023-35383</a></td><td>Microsoft 메시지 큐 정보 유출 취약성</td></tr><tr><td>Windows Kernel</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35382">CVE-2023-35382</a></td><td>Windows 커널 권한 상승 취약성</td></tr><tr><td>Windows Fax and Scan Service</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35381">CVE-2023-35381</a></td><td>Windows Fax 서비스 원격 코드 실행 취약성</td></tr><tr><td>Windows Kernel</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35380">CVE-2023-35380</a></td><td>Windows 커널 권한 상승 취약성</td></tr><tr><td>Windows Reliability Analysis Metrics Calculation Engine</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35379">CVE-2023-35379</a></td><td>RACEng(Reliability Analysis Metrics Calculation Engine) 권한 상승 취약성</td></tr><tr><td>Windows Projected File System</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35378">CVE-2023-35378</a></td><td>Windows 예상 파일 시스템 권한 상승 취약성</td></tr><tr><td>Windows Message Queuing</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35377">CVE-2023-35377</a></td><td>Microsoft 메시지 큐 서비스 거부 취약성</td></tr><tr><td>Windows Message Queuing</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35376">CVE-2023-35376</a></td><td>Microsoft 메시지 큐 서비스 거부 취약성</td></tr><tr><td>Microsoft Office Visio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35372">CVE-2023-35372</a></td><td>Microsoft Office Visio 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Office Excel</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35371">CVE-2023-35371</a></td><td>Microsoft Office 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Exchange Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35368">CVE-2023-35368</a></td><td>Microsoft Exchange 원격 코드 실행 취약성</td></tr><tr><td>Windows Kernel</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35359">CVE-2023-35359</a></td><td>Windows 커널 권한 상승 취약성</td></tr><tr><td>Microsoft Office Outlook</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35311">CVE-2023-35311</a></td><td>Microsoft Outlook 보안 기능 바이패스 취약성</td></tr><tr><td>Microsoft Office Outlook</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33151">CVE-2023-33151</a></td><td>Microsoft Outlook 스푸핑 취약성</td></tr><tr><td>Microsoft Office OneNote</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33140">CVE-2023-33140</a></td><td>Microsoft OneNote 스푸핑 취약성</td></tr><tr><td>.NET and Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33127">CVE-2023-33127</a></td><td>.NET 및 Visual Studio 권한 상승 취약성</td></tr><tr><td>SQL Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32027">CVE-2023-32027</a></td><td>SQL Server용 Microsoft ODBC 드라이버 원격 코드 실행 취약성</td></tr><tr><td>SQL Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32026">CVE-2023-32026</a></td><td>SQL Server용 Microsoft ODBC 드라이버 원격 코드 실행 취약성</td></tr><tr><td>SQL Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32025">CVE-2023-32025</a></td><td>SQL Server용 Microsoft ODBC 드라이버 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Teams</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29330">CVE-2023-29330</a></td><td>Microsoft Teams 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Teams</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29328">CVE-2023-29328</a></td><td>Microsoft Teams 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28261">CVE-2023-28261</a></td><td>Microsoft Edge(Chromium 기반) 권한 상승 취약성</td></tr><tr><td>.NET and Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24936">CVE-2023-24936</a></td><td>.NET, .NET Framework, Visual Studio 권한 상승 취약성</td></tr><tr><td>Windows Secure Boot</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24932">CVE-2023-24932</a></td><td>보안 부팅 보안 기능 우회 취약성</td></tr><tr><td>Microsoft Teams</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24881">CVE-2023-24881</a></td><td>Microsoft Teams 정보 공개 취약성</td></tr><tr><td>Microsoft Exchange Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21709">CVE-2023-21709</a></td><td>Microsoft Exchange Server 권한 상승 취약성</td></tr><tr><td>Azure Service Fabric Container</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21531">CVE-2023-21531</a></td><td>Azure Service Fabric Container 권한 상승 취약성</td></tr><tr><td>Microsoft Windows</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-20569">CVE-2023-20569</a></td><td>AMD: CVE-2023-20569 리턴 주소 예측자</td></tr><tr><td>Windows Netlogon</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38023">CVE-2022-38023</a></td><td>Netlogon RPC 권한 상승 취약성</td></tr><tr><td>Windows Kerberos</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37967">CVE-2022-37967</a></td><td>Windows Kerberos 권한 상승 취약성</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29144">CVE-2022-29144</a></td><td>Microsoft Edge(Chromium 기반) 권한 상승 취약성</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42307">CVE-2021-42307</a></td><td>Microsoft Edge(Chromium 기반) 정보 공개 취약성</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34506">CVE-2021-34506</a></td><td>Microsoft Edge(Chromium 기반) 보안 기능 우회 취약성</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34475">CVE-2021-34475</a></td><td>Microsoft Edge(Chromium 기반) 권한 상승 취약성</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31982">CVE-2021-31982</a></td><td>Microsoft Edge(Chromium 기반) 보안 기능 우회 취약성</td></tr><tr><td>Azure</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-27075">CVE-2021-27075</a></td><td>Azure 가상 컴퓨터 정보 유출 취약성</td></tr></tbody></table>

### □ 작성 : \[KISA] 취약점분석팀

## 출처 : [KISA 바로가기](https://www.krcert.or.kr/kr/bbs/view.do?searchCnd=\&bbsId=B0000133\&searchWrd=\&menuNo=205020\&pageIndex=1\&categoryCode=\&nttId=71167)

{% embed url="<https://doc.skill.or.kr>" %}
NHN Cloud 정보 사이트&#x20;
{% endembed %}

{% embed url="<https://ssv.skill.or.kr>" %}
취약점 진단 분석 평가 방법 사이트&#x20;
{% endembed %}
