• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
microsoft releases october 2023 patches for 103 flaws, including 2

Microsoft Releases October 2023 Patches for 103 Flaws, Including 2 Active Exploits

You are here: Home / General Cyber Security News / Microsoft Releases October 2023 Patches for 103 Flaws, Including 2 Active Exploits
October 11, 2023

Microsoft has introduced its Patch Tuesday updates for Oct 2023, addressing a complete of 103 flaws in its software, two of which have appear beneath energetic exploitation in the wild.

Of the 103 flaws, 13 are rated Critical and 90 are rated Crucial in severity. This is aside from 18 security vulnerabilities addressed in its Chromium-dependent Edge browser due to the fact the second Tuesday of September.

The two vulnerabilities that been weaponized as zero-days are as follows –

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


  • CVE-2023-36563 (CVSS score: 6.5) – An info disclosure vulnerability in Microsoft WordPad that could result in the leak of NTLM hashes
  • CVE-2023-41763 (CVSS rating: 5.3) – A privilege escalation vulnerability in Skype for Organization that could guide to exposure of sensitive information and facts this sort of as IP addresses or port figures (or equally), enabling threat actors to attain entry to interior networks

“To exploit this vulnerability, an attacker would 1st have to log on to the system. An attacker could then operate a specifically crafted application that could exploit the vulnerability and choose control of an influenced process,” Microsoft reported in an advisory for CVE-2023-36563.

Cybersecurity

“Also, an attacker could persuade a community person to open a destructive file. The attacker would have to influence the person to click on a website link, generally by way of an enticement in an email or instant information, and then influence them to open up the specially crafted file.”

Also set by Redmond are dozens of flaws impacting Microsoft Information Queuing (MSMQ) and Layer 2 Tunneling Protocol that could lead to remote code execution and denial-of-company (DoS).

The security update even further resolves a critical privilege escalation bug in Windows IIS Server (CVE-2023-36434, CVSS score: 9.8) that could permit an attacker to impersonate and login as a different consumer by using a brute-force attack.

The tech giant has also launched an update for CVE-2023-44487, also referred to as the HTTP/2 Speedy Reset attack, which has been exploited by mysterious actors as a zero-day to phase hyper-volumetric dispersed denial-of-services (DDoS) attacks.

“When this DDoS has the prospective to affect provider availability, it alone does not lead to the compromise of client information, and at this time we have observed no evidence of consumer facts being compromised,” it stated.

Eventually, Microsoft has announced that Visible Fundamental Script (aka VBScript), which is normally exploited for malware distribution, is getting deprecated, including, “in long run releases of Windows, VBScript will be available as a attribute on need right before its removing from the operating method.”

Cybersecurity

Software program Patches from Other Suppliers

In addition to Microsoft, security updates have also been produced by other distributors given that the begin of the month to rectify quite a few vulnerabilities, like —

  • Adobe
  • AMD
  • Android
  • Apache Jobs
  • Apple
  • Aruba Networks
  • Arm
  • Atlassian
  • Atos
  • Cisco
  • Citrix
  • CODESYS
  • Dell
  • Drupal
  • F5
  • Fortinet
  • GitLab
  • Google Chrome
  • Hitachi Strength
  • HP
  • IBM
  • Juniper Networks
  • Lenovo
  • Linux distributions Debian, Oracle Linux, Red Hat, SUSE, and Ubuntu
  • MediaTek
  • Mitsubishi Electric powered
  • Mozilla Firefox, Firefox ESR, and Thunderbird
  • Qualcomm
  • Samba
  • Samsung
  • SAP
  • Schneider Electrical
  • Siemens
  • Sophos, and
  • VMware

Found this posting intriguing? Comply with us on Twitter  and LinkedIn to browse more exclusive information we post.


Some areas of this post are sourced from:
thehackernews.com

Previous Post: «microsoft warns of nation state hackers exploiting critical atlassian confluence vulnerability Microsoft Warns of Nation-State Hackers Exploiting Critical Atlassian Confluence Vulnerability
Next Post: Take an Offensive Approach to Password Security by Continuously Monitoring for Breached Passwords take an offensive approach to password security by continuously monitoring»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.