• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
microsoft releases patch for two new actively exploited zero days flaws

Microsoft Releases Patch for Two New Actively Exploited Zero-Days Flaws

You are here: Home / General Cyber Security News / Microsoft Releases Patch for Two New Actively Exploited Zero-Days Flaws
September 13, 2023

Microsoft has produced program fixes to remediate 59 bugs spanning its merchandise portfolio, together with two zero-working day flaws that have been actively exploited by destructive cyber actors.

Of the 59 vulnerabilities, five are rated Critical, 55 are rated Essential, and a single is rated Average in severity. The update is in addition to 35 flaws patched in the Chromium-based Edge browser because previous month’s Patch Tuesday version, which also encompasses a deal with for CVE-2023-4863, a critical heap buffer overflow flaw in the WebP image format.

The two Microsoft vulnerabilities that have appear below active exploitation in serious-earth attacks are shown under –

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


  • CVE-2023-36761 (CVSS score: 6.2) – Microsoft Word Information and facts Disclosure Vulnerability
  • CVE-2023-36802 (CVSS score: 7.8) – Microsoft Streaming Support Proxy Elevation of Privilege Vulnerability

“Exploiting this vulnerability could allow for the disclosure of NTLM hashes,” the Windows maker explained in an advisory about CVE-2023-36761, stating CVE-2023-36802 could be abused by an attacker to gain Procedure privileges.

Actual details surrounding the character of the exploitation or the identity of the menace actors powering the attacks are at the moment unfamiliar.

“Exploitation of [CVE-2023-36761] is not just confined to a possible goal opening a malicious Word doc, as merely previewing the file can trigger the exploit to induce,” Satnam Narang, senior workers study engineer at Tenable, stated. Exploitation would make it possible for for the disclosure of New Technology LAN Supervisor (NTLM) hashes.”

Cybersecurity

“The very first was CVE-2023-23397, an elevation of privilege vulnerability in Microsoft Outlook, that was disclosed in the March Patch Tuesday launch.”

Other vulnerabilities of note are many distant code execution flaws impacting Internet Relationship Sharing (ICS), Visible Studio, 3D Builder, Azure DevOps Server, Windows MSHTML, and Microsoft Exchange Server and elevation of privilege issues in Windows Kernel, Windows GDI, Windows Typical Log File Process Driver, and Workplace, among the other individuals.

Software package Patches from Other Sellers

Other than Microsoft, security updates have also been launched by other sellers around the previous few weeks to rectify numerous vulnerabilities, together with –

  • Adobe
  • Android
  • Apache Assignments
  • Apple
  • Aruba Networks
  • ASUS
  • Cisco
  • Citrix
  • Dell
  • Drupal
  • F5
  • GitLab
  • Google Chrome
  • Hitachi Power
  • HP
  • IBM
  • Jenkins
  • Juniper Networks
  • Lenovo
  • Linux distributions Debian, Oracle Linux, Crimson Hat, SUSE, and Ubuntu
  • MediaTek
  • Mitsubishi Electric
  • Mozilla Firefox, Firefox ESR, and Thunderbird
  • NETGEAR
  • Notepad++
  • NVIDIA
  • Qualcomm
  • Samsung
  • SAP
  • Schneider Electric
  • Siemens
  • SolarWinds
  • Splunk
  • Spring Framework
  • Synology
  • TP-Connection
  • Development Micro
  • Veeam
  • VMware
  • Zimbra, and
  • Zoom

Located this report interesting? Observe us on Twitter  and LinkedIn to read through extra exceptional material we publish.


Some components of this report are sourced from:
thehackernews.com

Previous Post: «update adobe acrobat and reader to patch actively exploited vulnerability Update Adobe Acrobat and Reader to Patch Actively Exploited Vulnerability
Next Post: Microsoft Warns of New Phishing Campaign Targeting Corporations via Teams Messages microsoft warns of new phishing campaign targeting corporations via teams»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.