Skip to content

Commit

Permalink
Microsoft Releases October 2023 Security Updates - 20231115003
Browse files Browse the repository at this point in the history
  • Loading branch information
LSerki committed Nov 15, 2023
1 parent cf0101c commit 004cc71
Show file tree
Hide file tree
Showing 2 changed files with 44 additions and 0 deletions.
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
# Microsoft Releases October 2023 Security Updates - 20231115003

## Overview

Microsoft has released updates addressing multiple vulnerabilities in Microsoft software. A cyber threat actor can exploit some of these vulnerabilities to take control of an affected system.

## What is the vulnerability?

A list of vulnerabilities and products can be found [November 2023 Security Update Guide](https://msrc.microsoft.com/update-guide/releaseNote/2023-Nov)

## Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe (refer [Patch Management](../guidelines/patch-management.md)):

## Additional References

- [Microsoft Releases October 2023 Security Updates](https://www.cisa.gov/news-events/alerts/2023/11/14/microsoft-releases-october-2023-security-updates)
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
# CISA Adds Three Known Exploited Vulnerabilities to Catalog - 20231115004

## Overview

CISA has added three new vulnerabilities to its [Known Exploited Vulnerabilities Catalog](https://www.cisa.gov/known-exploited-vulnerabilities-catalog "Known Exploited Vulnerabilities Catalog"), based on evidence of active exploitation.

## What is the vulnerability?

[**CVE-2023-36033**](https://nvd.nist.gov/vuln/detail/CVE-2023-36033) Microsoft Windows Desktop Window Manager (DWM) Core Library Privilege Escalation Vulnerability - CVSS v3 Base Score: ***7.8***

[**CVE-2023-36025**](hhttps://nvd.nist.gov/vuln/detail/CVE-2023-36025) Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - CVSS v3 Base Score: ***8.8***

[**CVE-2023-36036**](https://nvd.nist.gov/vuln/detail/CVE-2023-36036) Microsoft Windows Cloud Files Mini Filter Driver Privilege Escalation Vulnerability - CVSS v3 Base Score: ***7.8***



## What has been observed?

CISA added this vulnerabilty in their [Known Exploited Vulnerabilties](https://www.cisa.gov/known-exploited-vulnerabilities-catalog) catalog on *2023-11-14*.

## Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe (refer [Patch Management](../guidelines/patch-management.md)):

### Additional Resources

- [Known Exploited Vulnerabilities Catalog](https://www.cisa.gov/news-events/alerts/2023/11/14/cisa-adds-three-known-exploited-vulnerabilities-catalog)

0 comments on commit 004cc71

Please sign in to comment.