Microsoft Releases Software Updates as Part of its November Patch Tuesday

Microsoft has released software updates as part of its November Patch Tuesday. The updates fix 58 security vulnerabilities in total, including 5 zero-day vulnerabilities, three of those being exploited in the wild.

The breakdown of the vulnerabilities are as follows:

  • 16 privilege escalation

  • 6 security feature bypass

  • 15 remote code execution

  • 6 information disclosure

  • 5 denial of service

  • 11 spoofing

The three actively exploited zero-day vulnerabilities are as follows:

  • CVE-2023-36036 - vulnerability in Windows Cloud Files Mini Filter that can lead to elevation of privilege

  • CVE-2023-36761 - vulnerability in Windows DWM Core Library that can lead to elevation of privilege

  • CVE-2023-36025 - vulnerability in Windows SmartScreen Security that allows an attacker to bypass security checks and warnings

The other two zero-day vulnerabilities are:

  • CVE-2023-36413 - vulnerability in Office that allows an attacker to bypass security features

  • CVE-2023-36038 - vulnerability in ASP.NET Core that can cause denial of service condition

Why Should You Care?

Vulnerabilities already being exploited in the wild means attackers are already attacking victims using that vulnerability, and it is only a matter of time they start attacking YOUR organization and infrastructure. It is crucial to take action ASAP to mitigate the vulnerability or at the very least reduce impact.

What Should You Do?

  • Test the patches ASAP at your organization, and make sure it does not break any business applications

  • Prioritize patching against the three actively exploited zero-days

  • Next priority are the other two zero-days

  • Roll out the rest of the Patch Tuesday updates

References

  • https://www.bleepingcomputer.com/news/microsoft/microsoft-november-2023-patch-tuesday-fixes-5-zero-days-58-flaws/

Previous
Previous

Weekly Security Roundup - Nov 19, 2023

Next
Next

Weekly Security Roundup - Nov 12, 2023