Multiple Microsoft Zero-Day Vulnerabilities Exploited in the Wild
CERT-MU Vulnerability Note VN-2023-07
Date of Issue: 12.07.2023
Severity Rating: High
Affected Products:
Microsoft Windows Server 2016
Microsoft Windows Server 2019
Microsoft Windows 10 1809 for x64-based Systems
Microsoft Windows 10 1809 for 32-bit Systems
Microsoft Windows 10 1809 for ARM64-based Systems
Microsoft Windows 10 1607 for 32-bit Systems
Microsoft Windows 10 1607 for x64-based Systems
Microsoft Windows Server (Server Core installation) 2019
Microsoft Windows Server (Server Core installation) 2016
Microsoft Windows Server 2022
Microsoft Windows Server (Server Core installation) 2022
Microsoft Windows 10 21H2 for 32-bit Systems
Microsoft Windows 10 21H2 for ARM64-based Systems
Microsoft Windows 10 21H2 for x64-based Systems
Microsoft Windows 11 22H2 for ARM64-based Systems
Microsoft Windows 11 22H2 for x64-based Systems
Microsoft Windows 10 22H2 for 32-bit Systems
Microsoft Windows 10 22H2 for ARM64-based Systems
Microsoft Windows 10 22H2 for x64-based Systems
Microsoft Windows 11 21H2 for ARM64-based Systems
Microsoft Windows 11 21H2 for x64-based Systems
Microsoft Outlook 2016 x32
Microsoft Outlook 2016 x64
Description
Microsoft Windows could allow a remote attacker to bypass security restrictions, caused by a
flaw in the SmartScreen component. By persuading a victim to click on a specially crafted URL,
an attacker could exploit this vulnerability to bypass the Open File – Security Warning prompt.
Microsoft Windows and Microsoft Office could allow a remote attacker to execute arbitrary code
on the system. By persuading a victim to open a specially crafted file, an attacker could exploit
this vulnerability to execute arbitrary code on the system.
Solution
Use Microsoft Automatic Update to apply the appropriate patch for your system, or the Microsoft
Security Update Guide to search for available patches.
CVE Information
CVE-2023-32049 CVSS:8.8
CVE-2023-35311 CVSS:8.8
CVE-2023-36884 CVSS:8.3
CVE-2023-36874 CVSS:7.8
CVE-2023-32046 CVSS:7.8
References
https://www.tenable.com/cve/CVE-2023-32049
https://www.tenable.com/cve/CVE-2023-35311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36874
https://nvd.nist.gov/vuln/detail/CVE-2023-32046
Report Cyber Incidents
Report cyber security incident on the Mauritian Cybercrime Online Reporting System (MAUCORS –
http://maucors.govmu.org/)
Contact Information
Computer Emergency Response Team of Mauritius (CERT-MU)
Ministry of Information Technology, Communication and Innovation
Tel: (+230) 4602600
Hotline No: (+230) 800 2378
Gen. Info. : contact@cert.govmu.org
Incident: incident@cert.govmu.org
Website: http://cert-mu.govmu.org
MAUCORS: http://maucors.govmu.org