CVE-2023-21743: Microsoft SharePoint Server Security Feature Bypass Vulnerability

Overview

Severity
Medium (CVSS 5.3)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
Category
Security Feature Bypass
Exploit Status
Not Exploited
Exploitation Likelihood
More Likely
Patch Tuesday
2023-Jan
Released
2023-01-10
EPSS Score
11.60% (percentile: 93.6%)

FAQ

Are any additional steps required to protect my SharePoint farm after installing the January 10, 2023 security update for SharePoint Server? Yes. Customers must also trigger a SharePoint upgrade action included in this update to protect their SharePoint farm. The upgrade action can be triggered by running the SharePoint Products Configuration Wizard, the Upgrade-SPFarm PowerShell cmdlet, or the "psconfig.exe -cmd upgrade -inplace b2b" command on each SharePoint server after installing the update. How could an attacker exploit this vulnerability? In a network-based attack, an unauthenticated attacker could bypass authentication and make an anonymous connection. What kind of security feature could be bypassed by successfully exploiting this vulnerability? An unauthenticated attacker is able to bypass the expected user access.

Affected Products (3)

Microsoft Office

  • Microsoft SharePoint Enterprise Server 2016
  • Microsoft SharePoint Server 2019
  • Microsoft SharePoint Server Subscription Edition

Security Updates (3)

Revision History

  • 2023-01-10: Information published.