# MS 2월 보안 위협에 따른 정기 보안 업데이트 권고\[2023-02]

## MS 2월 보안 위협에 따른 정기 보안 업데이트 권고

### □ 2월 보안업데이트 개요(총 18종)&#x20;

o 등급 : 긴급(Critical) 12종, 중요(Important) 6종&#x20;

o 발표일 : 2023.2.15.(수)&#x20;

o 업데이트 내용

<table><thead><tr><th width="294.3333333333333">제품군</th><th align="center">중요도</th><th>영향</th></tr></thead><tbody><tr><td>Windows 11 v22H2</td><td align="center">긴급</td><td>원격코드실행</td></tr><tr><td>Windows 11 v21H2</td><td align="center">긴급</td><td>원격코드실행</td></tr><tr><td>Windows 10 22H2, Windows 10 21H2, Windows 10 20H2</td><td align="center">긴급</td><td>원격코드실행</td></tr><tr><td>Windows Server 2022</td><td align="center">긴급</td><td>원격코드실행</td></tr><tr><td>Windows Server 2019</td><td align="center">긴급</td><td>원격코드실행</td></tr><tr><td>Windows Server 2016</td><td align="center">긴급</td><td>원격코드실행</td></tr><tr><td>Windows Server 2012 R2 및 Windows Server 2012</td><td align="center">긴급</td><td>원격코드실행</td></tr><tr><td>Microsoft Office</td><td align="center">긴급</td><td>원격코드실행</td></tr><tr><td>Microsoft SharePoint</td><td align="center">긴급</td><td>원격코드실행</td></tr><tr><td>Microsoft Exchange Server</td><td align="center">중요</td><td>원격코드실행</td></tr><tr><td>Microsoft .NET</td><td align="center">긴급</td><td>원격코드실행</td></tr><tr><td>Microsoft Visual Studio</td><td align="center">긴급</td><td>원격코드실행</td></tr><tr><td>Microsoft SQL Server</td><td align="center">긴급</td><td>원격코드실행</td></tr><tr><td>Microsoft Dynamics 365</td><td align="center">중요</td><td>스푸핑</td></tr><tr><td>Microsoft Azure 관련 소프트웨어</td><td align="center">중요</td><td>원격코드실행</td></tr><tr><td>Microsoft Defender for Endpoint</td><td align="center">중요</td><td>보안기능우회</td></tr><tr><td>IoT용 Microsoft Defender</td><td align="center">중요</td><td>권한상승</td></tr><tr><td>Power BI 보고 서버</td><td align="center">중요</td><td>스푸핑</td></tr></tbody></table>

### \[참고 사이트]&#x20;

\[1] (한글) <https://portal.msrc.microsoft.com/ko-kr/security-guidance&#x20>;

\[2] (영문) <https://portal.msrc.microsoft.com/en-us/security-guidance&#x20>;

\[3] <https://msrc.microsoft.com/update-guide/releaseNote/2023-Feb&#x20>;

\[4] <https://msrc.microsoft.com/update-guide>

o 취약점 요약 정보

<table><thead><tr><th width="177.33333333333331">제품 카테고리</th><th width="174">CVE 번호</th><th>CVE 제목</th></tr></thead><tbody><tr><td>Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41953">CVE-2023-41953</a></td><td>GitHub: CVE-2022-41953 Git GUI Clone 원격 코드 실행 취약점</td></tr><tr><td>3D Builder</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23390">CVE-2023-23390</a></td><td>3D Builder 원격 코드 실행 취약점</td></tr><tr><td>Azure Machine Learning</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23382">CVE-2023-23382</a></td><td>Azure 기계 학습 컴퓨팅 인스턴스 정보 공개 취약점</td></tr><tr><td>Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23381">CVE-2023-23381</a></td><td>Visual Studio 원격 코드 실행 취약점</td></tr><tr><td>Microsoft Defender for IoT</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23379">CVE-2023-23379</a></td><td>IoT용 Microsoft Defender에서 발생하는 권한 상승 취약점</td></tr><tr><td>3D Builder</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23378">CVE-2023-23378</a></td><td>Print 3D 원격 코드 실행 취약점</td></tr><tr><td>3D Builder</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23377">CVE-2023-23377</a></td><td>3D Builder 원격 코드 실행 취약점</td></tr><tr><td>Windows Common Log File System Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23376">CVE-2023-23376</a></td><td>Windows Common Log File System Driver 권한 상승 취약점</td></tr><tr><td>Microsoft Graphics Component</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21823">CVE-2023-21823</a></td><td>Windows 그래픽 구성 요소 원격 코드 실행 취약점</td></tr><tr><td>Windows Win32K</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21822">CVE-2023-21822</a></td><td>Windows 그래픽 구성 요소 권한 상승 취약점</td></tr><tr><td>Windows Distributed File System (DFS)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21820">CVE-2023-21820</a></td><td>Windows 분산 파일 시스템(DFS) 원격 코드 실행 취약점</td></tr><tr><td>Windows Cryptographic Services</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21819">CVE-2023-21819</a></td><td>Windows 보안 채널 서비스 거부 취약점</td></tr><tr><td>Windows SChannel</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21818">CVE-2023-21818</a></td><td>Windows 보안 채널 서비스 거부 취약점</td></tr><tr><td>Windows Kerberos</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21817">CVE-2023-21817</a></td><td>Windows Kerberos 권한 상승 취약점</td></tr><tr><td>Windows Active Directory</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21816">CVE-2023-21816</a></td><td>Windows Active Directory 도메인 서비스 API 서비스 거부 취약점</td></tr><tr><td>Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21815">CVE-2023-21815</a></td><td>Visual Studio 원격 코드 실행 취약점</td></tr><tr><td>Windows Cryptographic Services</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21813">CVE-2023-21813</a></td><td>Windows 보안 채널 서비스 거부 취약점</td></tr><tr><td>Windows Common Log File System Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21812">CVE-2023-21812</a></td><td>Windows Common Log File System Driver 권한 상승 취약점</td></tr><tr><td>Windows iSCSI</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21811">CVE-2023-21811</a></td><td>Windows iSCSI Service에서 발생하는 서비스 거부 취약점</td></tr><tr><td>Microsoft Defender for Endpoint</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21809">CVE-2023-21809</a></td><td>Microsoft Defender에서 발생하는 보안 우회 취약점</td></tr><tr><td>.NET and Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21808">CVE-2023-21808</a></td><td>.NET 및 Visual Studio 원격 코드 실행 취약점</td></tr><tr><td>Microsoft Dynamics</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21807">CVE-2023-21807</a></td><td>Microsoft Dynamics 365(온프레미스) 크로스 사이트 스크립팅 취약점</td></tr><tr><td>Power BI</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21806">CVE-2023-21806</a></td><td>Power BI Report Server 스푸핑 취약점</td></tr><tr><td>Windows MSHTML Platform</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21805">CVE-2023-21805</a></td><td>Windows MSHTML 플랫폼 원격 코드 실행 취약점</td></tr><tr><td>Microsoft Graphics Component</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21804">CVE-2023-21804</a></td><td>Windows 그래픽 구성 요소 권한 상승 취약점</td></tr><tr><td>Windows iSCSI</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21803">CVE-2023-21803</a></td><td>Windows iSCSI Discovery Service 원격 코드 실행 취약점</td></tr><tr><td>Microsoft Windows Codecs Library</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21802">CVE-2023-21802</a></td><td>Windows Media 원격 코드 실행 취약점</td></tr><tr><td>Microsoft PostScript Printer Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21801">CVE-2023-21801</a></td><td>Microsoft PostScript 프린터 드라이버 원격 코드 실행 취약점</td></tr><tr><td>Windows Installer</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21800">CVE-2023-21800</a></td><td>Windows Installer 권한 상승 취약점</td></tr><tr><td>Microsoft WDAC OLE DB provider for SQL</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21799">CVE-2023-21799</a></td><td>SQL Server 원격 코드 실행 취약점에 대한 Microsoft WDAC OLE DB 공급자</td></tr><tr><td>Windows ODBC Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21798">CVE-2023-21798</a></td><td>Microsoft ODBC 드라이버 원격 코드 실행 취약점</td></tr><tr><td>Windows ODBC Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21797">CVE-2023-21797</a></td><td>Microsoft ODBC 드라이버 원격 코드 실행 취약점</td></tr><tr><td>Microsoft Dynamics</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21778">CVE-2023-21778</a></td><td>Microsoft Dynamics Unified Service Desk 원격 코드 실행 취약점</td></tr><tr><td>Azure App Service</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21777">CVE-2023-21777</a></td><td>Azure Stack 허브의 Azure App Service 권한 상승 취약점</td></tr><tr><td>.NET Framework</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21722">CVE-2023-21722</a></td><td>.NET Framework 서비스 거부 취약점</td></tr><tr><td>Microsoft Office OneNote</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21721">CVE-2023-21721</a></td><td>Microsoft OneNote 스푸핑 취약점</td></tr><tr><td>SQL Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21718">CVE-2023-21718</a></td><td>Microsoft SQL ODBC 드라이버 원격 코드 실행 취약점</td></tr><tr><td>Microsoft Office SharePoint</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21717">CVE-2023-21717</a></td><td>Microsoft SharePoint Server 권한 상승 취약점</td></tr><tr><td>Microsoft Office Word</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21716">CVE-2023-21716</a></td><td>Microsoft Word 원격 코드 실행 취약점</td></tr><tr><td>Microsoft Office Publisher</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21715">CVE-2023-21715</a></td><td>Microsoft 게시자 보안 기능 우회 취약점</td></tr><tr><td>Microsoft Office</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21714">CVE-2023-21714</a></td><td>Microsoft Office 정보 공개 취약점</td></tr><tr><td>SQL Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21713">CVE-2023-21713</a></td><td>Microsoft SQL Server 원격 코드 실행 취약점</td></tr><tr><td>Microsoft Exchange Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21710">CVE-2023-21710</a></td><td>Microsoft Exchange Server 원격 코드 실행 취약점</td></tr><tr><td>Microsoft Exchange Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21707">CVE-2023-21707</a></td><td>Microsoft Exchange Server 원격 코드 실행 취약점</td></tr><tr><td>Microsoft Exchange Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21706">CVE-2023-21706</a></td><td>Microsoft Exchange Server 원격 코드 실행 취약점</td></tr><tr><td>SQL Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21705">CVE-2023-21705</a></td><td>Microsoft SQL Server 원격 코드 실행 취약점</td></tr><tr><td>SQL Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21704">CVE-2023-21704</a></td><td>SQL Server용 Microsoft ODBC 드라이버 원격 코드 실행 취약점</td></tr><tr><td>Azure Data Box Gateway</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21703">CVE-2023-21703</a></td><td>Azure Data Box Gateway 원격 코드 실행 취약점</td></tr><tr><td>Windows iSCSI</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21702">CVE-2023-21702</a></td><td>Windows iSCSI 서비스 서비스 거부 취약점</td></tr><tr><td>Windows Protected EAP (PEAP)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21701">CVE-2023-21701</a></td><td>Microsoft PEAP(Protected Extensible Authentication Protocol) 서비스 거부 취약점</td></tr><tr><td>Windows iSCSI</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21700">CVE-2023-21700</a></td><td>Windows iSCSI 검색 서비스 서비스 거부 취약점</td></tr><tr><td>Internet Storage Name Service</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21699">CVE-2023-21699</a></td><td>Windows iSNS(Internet Storage Name Service) 서버 정보 노출 취약점</td></tr><tr><td>Internet Storage Name Service</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21697">CVE-2023-21697</a></td><td>Windows iSNS(Internet Storage Name Service) 서버 정보 노출 취약점</td></tr><tr><td>Windows Protected EAP (PEAP)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21695">CVE-2023-21695</a></td><td>Microsoft PEAP(Protected Extensible Authentication Protocol) 원격 코드 실행 취약점</td></tr><tr><td>Windows Fax and Scan Service</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21694">CVE-2023-21694</a></td><td>Windows 팩스 서비스에서 발생하는 원격 코드 실행 취약점</td></tr><tr><td>Microsoft PostScript Printer Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21693">CVE-2023-21693</a></td><td>Microsoft PostScript 프린터 드라이버 정보 유출 취약점</td></tr><tr><td>Windows Protected EAP (PEAP)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21692">CVE-2023-21692</a></td><td>Microsoft PEAP(Protected Extensible Authentication Protocol) 원격 코드 실행 취약점</td></tr><tr><td>Windows Protected EAP (PEAP)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21691">CVE-2023-21691</a></td><td>Microsoft PEAP(Protected Extensible Authentication Protocol) 정보 노출 취약점</td></tr><tr><td>Windows Protected EAP (PEAP)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21690">CVE-2023-21690</a></td><td>Microsoft PEAP(Protected Extensible Authentication Protocol) 원격 코드 실행 취약점</td></tr><tr><td>Windows Protected EAP (PEAP)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21689">CVE-2023-21689</a></td><td>Microsoft PEAP(Protected Extensible Authentication Protocol) 원격 코드 실행 취약점</td></tr><tr><td>Windows ALPC</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21688">CVE-2023-21688</a></td><td>NT OS 커널 권한 상승 취약점</td></tr><tr><td>Windows HTTP.sys</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21687">CVE-2023-21687</a></td><td>HTTP.sys 정보 유출 취약점</td></tr><tr><td>Microsoft WDAC OLE DB provider for SQL</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21686">CVE-2023-21686</a></td><td>Microsoft WDAC OLE DB provider for SQL Server에서 발생하는 원격 코드 실행 취약점</td></tr><tr><td>Microsoft WDAC OLE DB provider for SQL</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21685">CVE-2023-21685</a></td><td>Microsoft WDAC OLE DB provider for SQL Server에서 발생하는 원격 코드 실행 취약점</td></tr><tr><td>Microsoft PostScript Printer Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21684">CVE-2023-21684</a></td><td>Microsoft PostScript 프린터 드라이버 원격 코드 실행 취약점</td></tr><tr><td>Microsoft Dynamics</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21573">CVE-2023-21573</a></td><td>Microsoft Dynamics 365(온프레미스) 크로스 사이트 스크립팅 취약점</td></tr><tr><td>Microsoft Dynamics</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21572">CVE-2023-21572</a></td><td>Microsoft Dynamics 365(온프레미스) 크로스 사이트 스크립팅 취약점</td></tr><tr><td>Microsoft Dynamics</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21571">CVE-2023-21571</a></td><td>Microsoft Dynamics 365(온프레미스) 크로스 사이트 스크립팅 취약점</td></tr><tr><td>Microsoft Dynamics</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21570">CVE-2023-21570</a></td><td>Microsoft Dynamics 365(온프레미스) 크로스 사이트 스크립팅 취약점</td></tr><tr><td>SQL Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21568">CVE-2023-21568</a></td><td>Microsoft SQL Server 통합 서비스(VS 확장) 원격 코드 실행 취약점</td></tr><tr><td>Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21567">CVE-2023-21567</a></td><td>Visual Studio 서비스 거부 취약점</td></tr><tr><td>Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21566">CVE-2023-21566</a></td><td>Visual Studio 권한 상승 취약점</td></tr><tr><td>Azure DevOps</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21564">CVE-2023-21564</a></td><td>Azure DevOps 서버 사이트 간 스크립팅 취약점</td></tr><tr><td>Azure DevOps</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21553">CVE-2023-21553</a></td><td>Azure DevOps 서버 원격 코드 실행 취약점</td></tr><tr><td>Microsoft Exchange Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21529">CVE-2023-21529</a></td><td>Microsoft Exchange Server 원격 코드 실행 취약점</td></tr><tr><td>SQL Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21528">CVE-2023-21528</a></td><td>Microsoft SQL Server 원격 코드 실행 취약점</td></tr><tr><td>Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23521">CVE-2022-23521</a></td><td>GitHub: CVE-2022-23521 gitattributes 구문 분석 정수 오버플로 취약점</td></tr><tr><td>HoloLens</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2019-15126">CVE-2019-15126</a></td><td>MITRE: CVE-2019-15126 </td></tr></tbody></table>

### □ 작성 : \[KISA] 취약점분석팀

## 출처 : [KISA 바로가기](https://www.krcert.or.kr/data/secNoticeView.do?bulletin_writing_sequence=67152)

{% embed url="<https://doc.skill.or.kr>" %}
NHN Cloud 정보 사이트&#x20;
{% endembed %}

{% embed url="<https://ssv.skill.or.kr>" %}
취약점 진단 분석 평가 방법 사이트&#x20;
{% endembed %}
