{"vulnerability": "CVE-2023-21706", "sightings": [{"uuid": "fd5e3f46-1e6b-4d0a-8ad5-edceb5631d94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21706", "type": "seen", "source": "https://t.me/realvulnerabilities/6", "content": "February Microsoft Patch. I decided to change the format a bit. I will share the general impression right away, but the full blog post/video will be released with a delay.\n\n1. RCE - Windows Graphics Component (CVE-2023-21823) seems the most critical. Interestingly, ZDI marked this vulnerability as EoP and did not add it to their review. Apparently MS changed the type of vulnerability before the release. Let's hope that the EDRs will promptly start blocking the exploitation.\n2. EoP - Windows Common Log File System Driver (CVE-2023-23376) with a sign of active exploitation.\n3. Multiple RCEs for Exchange (CVE-2023-21529, CVE-2023-21706, CVE-2023-21707, CVE-2023-21710). But so far no signs of exploitation.\n4. A funny Inf. Disclosure in augmented reality devices HoloLens 1 (CVE-2019-15126), it's an old Broadcom vulnerability with a bunch of exploits. \n\nRaw Vulristics report. There are problems with software detections, I will fix them later.", "creation_timestamp": "2023-02-22T03:33:02.000000Z"}, {"uuid": "162648dc-c23b-4a32-bd1f-04f43d9327e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21706", "type": "seen", "source": "https://t.me/cibsecurity/58149", "content": "\u203c CVE-2023-21706 \u203c\n\nMicrosoft Exchange Server Remote Code Execution Vulnerability\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-14T22:35:56.000000Z"}]}