Description:
Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. The list of security updates can be found at:
https://msrc.microsoft.com/update-guide/releaseNote/2023-Nov
Reports indicated that the vulnerabilities (CVE-2023-36025, CVE-2023-36033 and CVE-2023-36036) in Microsoft Windows and Server are being exploited in the wild and the technical details of the vulnerabilities (CVE-2023-36033, CVE-2023-36038 and CVE-2023-36413) in Microsoft Windows and Server, as well as Microsoft Office, 365 Apps, Visual Studio, .NET and ASP.NET Core were publicly disclosed. System administrators and users are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
Affected Systems:
- Microsoft Windows 10, 11
- Microsoft Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016, 2019, 2022
- Microsoft Exchange Server 2016, 2019
- Microsoft Office 2016, 2019, LTSC 2021, LTSC for Mac 2021
- Microsoft Excel 2016
- Microsoft SharePoint Enterprise Server 2016
- Microsoft SharePoint Server 2019, Subscription Edition
- Microsoft 365 Apps for Enterprise
- Microsoft Dynamics 365 (on-premises) version 9.0, version 9.1
- Microsoft Visual Studio 2019, 2022
- Microsoft .NET Framework 2.0, 3.0, 3.5, 3.5.1, 4.6, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8, 4.8.1
- .NET 6.0, 7.0, 8.0
- ASP.NET Core 6.0, 7.0, 8.0
- Azure Function Apps, Logic Apps, Static Web Apps, Web Apps
- Azure Pipelines Agent
- Host Integration Server 2020
- Jupyter Extension for Visual Studio Code
- Microsoft OLE DB Provider for DB2 V7
- On-Prem Data Gateway
- Send Customer Voice survey from Dynamics 365 app
- System Center Operations Manager (SCOM) 2016, 2019, 2022
- Windows Defender Antimalware Platform
Impact:
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, denial of service, elevation of privilege, information disclosure, security feature bypass and spoofing.
Recommendation:
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. System administrators and users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
More Information:
- https://msrc.microsoft.com/update-guide/releaseNote/2023-Nov
- https://www.hkcert.org/security-bulletin/microsoft-monthly-security-update-november-2023
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24023
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36007
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36016 (to CVE-2023-36018)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36021
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36025
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36028
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36030 (to CVE-2023-36031)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36033
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36035 (to CVE-2023-36039)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36041 (to CVE-2023-36043)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36045 (to CVE-2023-36047)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36049 (to CVE-2023-36050)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36052
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36392 (to CVE-2023-36408)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36410
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36413
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36422 (to CVE-2023-36425)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36427 (to CVE-2023-36428)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36437
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36439
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36558
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36560
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36705
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36719
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38151
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38177