{"id":53133,"date":"2023-08-08T22:16:00","date_gmt":"2023-08-08T22:16:00","guid":{"rendered":"https:\/\/www.darkreading.com\/application-security\/microsoft-fixes-74-cves-in-august-update"},"modified":"2023-08-08T22:16:00","modified_gmt":"2023-08-08T22:16:00","slug":"microsoft-fixes-74-cves-in-august-update","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-74-cves-in-august-update\/","title":{"rendered":"Microsoft Fixes 74 CVEs in August Update"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1968a29aca64afcb\/64d2ae7648bce74568c9d693\/updating_Thapana_Studio_shutterstock.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Microsoft&#8217;s security update for August contains fixes for 74 vulnerabilities, including one that attackers are actively exploiting in the wild.<\/p>\n<p>The company assessed six of the vulnerabilities as critical in severity and 67 \u2014 including the zero-day bug \u2014 as important vulnerabilities that organizations need to address quickly.<\/p>\n<p>The <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2023-Aug\" target=\"_blank\" rel=\"noopener\">security update<\/a> contained the usual mix of remote code execution (RCE) bugs, privilege escalation issues, security bypass vulnerable, and those that enable information disclosure or denial-of service-conditions. The bugs affect Windows, Office, Azure Active Directory, and a wide range of other Microsoft technologies.<\/p>\n<p>From a workload standpoint for security administrators, Microsoft&#8217;s August update is significantly lighter than the one from July, which contained fixes for a voluminous 130 unique CVEs and included five zero-day bugs. As is usually the case, several security experts pointed to the zero-day bug in this month&#8217;s set of vulnerabilities as the one that organizations need to address on a priority basis.<\/p>\n<h2 class=\"regular-text\">Zero-Day Bug Amid August Patches<\/h2>\n<p>The bug tracked as <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-38180\" target=\"_blank\" rel=\"noopener\">CVE-2023-38180<\/a> is a denial-of-service issue that affects multiple versions of .Net and Visual Studio. Microsoft said it is aware of attackers exploiting the vulnerability in the wild and described the flaw as a vulnerability that attackers are more likely to exploit. &#8220;It utilizes a network attack vector, has a low complexity of attack, and doesn&#8217;t necessitate privileges or user interaction,&#8221; said M. Walters, VP of vulnerability and threat research at Action1, in emailed comments. &#8220;[The flaw&#8217;s] CVSS rating is 7.5, which isn&#8217;t categorized as high due to its sole ability to result in a denial of service,&#8221; Walters said. Attackers can trigger system crashes by exploiting the flaw, he said.<\/p>\n<p>An attacker would need to be on the same network as the target system in order to exploit the vulnerability, added Nikolas Cemerikic, cyber security engineer at Immersive Labs. &#8220;[But] this vulnerability specifically does not require the attacker to have acquired user privileges,&#8221; he said.<\/p>\n<h2 class=\"regular-text\">Defense-in-Depth Update<\/h2>\n<p>Microsoft&#8217;s August security update also included a <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/ADV230003\" target=\"_blank\" rel=\"noopener\">defense-in-depth update<\/a> for a remote code execution zero-day flaw that the company <a href=\"https:\/\/www.darkreading.com\/application-security\/microsoft-discloses--zero-days-in-voluminous-july-security-update\" target=\"_blank\" rel=\"noopener\">disclosed last month<\/a>. The flaw, tracked as <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/07\/11\/storm-0978-attacks-reveal-financial-and-espionage-motives\/\" target=\"_blank\" rel=\"noopener\">CVE-2023-36884<\/a>, gives attackers a way to compromise affected systems via malicious Word documents. Microsoft disclosed the vulnerability in its July 2023 update amid reports of Russian threat group, Storm-0978, using it to drop a <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/romcom-threat-actor-targets-ukrainian-politicians-us-healthcare\" target=\"_blank\" rel=\"noopener\">backdoor dubbed RomCom<\/a> on systems belonging to government and military organizations in Ukraine, Europe, and parts of North America. Installing the update can help organizations stop the attack chain that leads to exploitation of CVE-2023-36884, Microsoft said.<\/p>\n<h2 class=\"regular-text\">RCEs Galore<\/h2>\n<p>Though Microsoft assessed several of the RCE vulnerabilities in its August update as less than critical in severity, there were a few that it assessed as being critical and meriting high-priority attention. Among them are CVE-2023-36910, CVE-2023-36911, and CVE-2023-35385.<\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36910\" target=\"_blank\" rel=\"noopener\">CVE-2023-36910<\/a> affects Microsoft Message Queuing on Windows 10, 11, and Server 2008-2022 systems. A remote attacker, without any user privileges, can exploit the vulnerability over the network to run arbitrary code on affected systems. To be vulnerable, a system would need to have the Windows Message queuing service enabled said Jason Kikta, CISO at Automox. &#8220;By default, this service would be named &#8216;Message Queuing&#8217; and TCP port 1801 would be listening on the machine. Though MSMQ is no longer enabled by default, any device on which it is enabled is at risk,&#8221; Kikta said.<\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36911\" target=\"_blank\" rel=\"noopener\">CVE-2023-36911<\/a> and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-35385\" target=\"_blank\" rel=\"noopener\">CVE-2023-35385<\/a> are two other critical RCEs in Microsoft Message Queuing. Like CVE-2023-36910, these two vulnerabilities are also exploitable over the network, require no user interaction or privileges. On the positive side though, there are several mitigations that organizations can apply to mitigate risk from these vulnerabilities, Walters noted. &#8220;Mitigating factors are settings, common configurations, or general best practices that are inherent by default, capable of diminishing the severity of vulnerability exploitation,&#8221; he said.<\/p>\n<h2 class=\"regular-text\">Elevation of Privilege Bugs<\/h2>\n<p>There are several Windows kernel elevation-of-privilege vulnerabilities in the August update that allow attackers to escalate privileges on a compromised machine and to take complete control over it. The flaws are present in a range of Windows versions, including Windows Server 2008 to Windows Server 2022, and Windows 11, said Rob Reeve, principal cybersecurity engineer at Immersive Labs. &#8220;Attackers exploit these vulnerabilities to gain full control over a Windows system once access has been achieved, such as after a phishing attack or exploitation of a vulnerable service,&#8221; Reeves. The flaws in this category include <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-35359\" target=\"_blank\" rel=\"noopener\">CVE-2023-35359<\/a>, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-35380\" target=\"_blank\" rel=\"noopener\">CVE-2023-35380<\/a>, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-35382\" target=\"_blank\" rel=\"noopener\">CVE-2023-35382<\/a> and CVE-2023-35386, he said.<\/p>\n<h2 class=\"regular-text\">Exchange Server Threats<\/h2>\n<p>Six of the vulnerabilities for which Microsoft issued a patch in August are present in Microsoft Exchange Server. One of them (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-21709\" target=\"_blank\" rel=\"noopener\">CVE-2023-21709<\/a>) has an assigned CVSS score of 9.8 but is likely less of a threat than it would appear in environments with strong password requirements. An attacker can only exploit the vulnerability via brute-force attacks against valid user accounts. Brute-force attacks won&#8217;t be successful against accounts with strong passwords, said Satnam Narang, senior staff research engineer at Tenable. &#8220;However, if weak passwords are in use, this would make brute-force attempts more successful,&#8221; he said. The remaining five vulnerabilities in Exchange Server include a spoofing flaw and remote code execution bugs, though the most severe of the bunch also require credentials for a valid account, Narang said.<\/p>\n<p>Microsoft assessed two of the RCEs in Exchange Server \u2014 CVE-2023-35388 and CVE-2023-38182 \u2014 as vulnerabilities that attackers are more likely to exploit. But an attacker would need to already be connected to the victim&#8217;s internal network with valid Exchange use credentials to exploit the vulnerability.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/application-security\/microsoft-fixes-74-cves-in-august-update\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Attackers are already exploiting one of Microsoft&#8217;s latest fixes in the wild.Read More <a href=\"https:\/\/www.darkreading.com\/application-security\/microsoft-fixes-74-cves-in-august-update\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-53133","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft Fixes 74 CVEs in August Update 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-74-cves-in-august-update\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Fixes 74 CVEs in August Update 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-74-cves-in-august-update\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-08T22:16:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1968a29aca64afcb\/64d2ae7648bce74568c9d693\/updating_Thapana_Studio_shutterstock.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-74-cves-in-august-update\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-74-cves-in-august-update\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Microsoft Fixes 74 CVEs in August Update\",\"datePublished\":\"2023-08-08T22:16:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-74-cves-in-august-update\/\"},\"wordCount\":928,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-74-cves-in-august-update\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1968a29aca64afcb\/64d2ae7648bce74568c9d693\/updating_Thapana_Studio_shutterstock.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-74-cves-in-august-update\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-74-cves-in-august-update\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-74-cves-in-august-update\/\",\"name\":\"Microsoft Fixes 74 CVEs in August Update 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-74-cves-in-august-update\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-74-cves-in-august-update\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1968a29aca64afcb\/64d2ae7648bce74568c9d693\/updating_Thapana_Studio_shutterstock.jpg\",\"datePublished\":\"2023-08-08T22:16:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-74-cves-in-august-update\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-74-cves-in-august-update\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-74-cves-in-august-update\/#primaryimage\",\"url\":\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1968a29aca64afcb\/64d2ae7648bce74568c9d693\/updating_Thapana_Studio_shutterstock.jpg\",\"contentUrl\":\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1968a29aca64afcb\/64d2ae7648bce74568c9d693\/updating_Thapana_Studio_shutterstock.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-74-cves-in-august-update\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft Fixes 74 CVEs in August Update\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Fixes 74 CVEs in August Update 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-74-cves-in-august-update\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Fixes 74 CVEs in August Update 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-74-cves-in-august-update\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-08-08T22:16:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1968a29aca64afcb\/64d2ae7648bce74568c9d693\/updating_Thapana_Studio_shutterstock.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-74-cves-in-august-update\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-74-cves-in-august-update\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Microsoft Fixes 74 CVEs in August Update","datePublished":"2023-08-08T22:16:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-74-cves-in-august-update\/"},"wordCount":928,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-74-cves-in-august-update\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1968a29aca64afcb\/64d2ae7648bce74568c9d693\/updating_Thapana_Studio_shutterstock.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/microsoft-fixes-74-cves-in-august-update\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-74-cves-in-august-update\/","url":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-74-cves-in-august-update\/","name":"Microsoft Fixes 74 CVEs in August Update 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-74-cves-in-august-update\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-74-cves-in-august-update\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1968a29aca64afcb\/64d2ae7648bce74568c9d693\/updating_Thapana_Studio_shutterstock.jpg","datePublished":"2023-08-08T22:16:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-74-cves-in-august-update\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/microsoft-fixes-74-cves-in-august-update\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-74-cves-in-august-update\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1968a29aca64afcb\/64d2ae7648bce74568c9d693\/updating_Thapana_Studio_shutterstock.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1968a29aca64afcb\/64d2ae7648bce74568c9d693\/updating_Thapana_Studio_shutterstock.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-74-cves-in-august-update\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft Fixes 74 CVEs in August Update"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53133","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=53133"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53133\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=53133"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=53133"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=53133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}