{"id":1265,"date":"2023-07-24T11:04:34","date_gmt":"2023-07-24T11:04:34","guid":{"rendered":"https:\/\/cert-mu.govmu.org\/cert-mu\/?p=1265"},"modified":"2023-07-24T17:35:57","modified_gmt":"2023-07-24T17:35:57","slug":"multiple-microsoft-zero-day-vulnerabilities-exploited-in-the-wild","status":"publish","type":"post","link":"https:\/\/cert-mu.govmu.org\/cert-mu\/?p=1265","title":{"rendered":"Multiple Microsoft Zero-Day Vulnerabilities Exploited in the Wild"},"content":{"rendered":"\n<p><strong>CERT-MU Vulnerability Note VN-2023-07<\/strong><br><br><strong>Date of Issue: 12.07.2023<\/strong><br><br><strong>Severity Rating: High<\/strong><br><br><strong>Affected Products:<\/strong><br>\uf0b7 Microsoft Windows Server 2016<br>\uf0b7 Microsoft Windows Server 2019<br>\uf0b7 Microsoft Windows 10 1809 for x64-based Systems<br>\uf0b7 Microsoft Windows 10 1809 for 32-bit Systems<br>\uf0b7 Microsoft Windows 10 1809 for ARM64-based Systems<br>\uf0b7 Microsoft Windows 10 1607 for 32-bit Systems<br>\uf0b7 Microsoft Windows 10 1607 for x64-based Systems<br>\uf0b7 Microsoft Windows Server (Server Core installation) 2019<br>\uf0b7 Microsoft Windows Server (Server Core installation) 2016<br>\uf0b7 Microsoft Windows Server 2022<br>\uf0b7 Microsoft Windows Server (Server Core installation) 2022<br>\uf0b7 Microsoft Windows 10 21H2 for 32-bit Systems<br>\uf0b7 Microsoft Windows 10 21H2 for ARM64-based Systems<br>\uf0b7 Microsoft Windows 10 21H2 for x64-based Systems<br>\uf0b7 Microsoft Windows 11 22H2 for ARM64-based Systems<br>\uf0b7 Microsoft Windows 11 22H2 for x64-based Systems<br>\uf0b7 Microsoft Windows 10 22H2 for 32-bit Systems<br>\uf0b7 Microsoft Windows 10 22H2 for ARM64-based Systems<br>\uf0b7 Microsoft Windows 10 22H2 for x64-based Systems<br>\uf0b7 Microsoft Windows 11 21H2 for ARM64-based Systems<br>\uf0b7 Microsoft Windows 11 21H2 for x64-based Systems<br>\uf0b7 Microsoft Outlook 2016 x32<br>\uf0b7 Microsoft Outlook 2016 x64<br><br><strong>Description<\/strong><br>Microsoft Windows could allow a remote attacker to bypass security restrictions, caused by a<br>flaw in the SmartScreen component. By persuading a victim to click on a specially crafted URL,<br>an attacker could exploit this vulnerability to bypass the Open File &#8211; Security Warning prompt.<br><br>Microsoft Windows and Microsoft Office could allow a remote attacker to execute arbitrary code<br>on the system. By persuading a victim to open a specially crafted file, an attacker could exploit<br>this vulnerability to execute arbitrary code on the system.<br><br><strong>Solution<\/strong><br>Use Microsoft Automatic Update to apply the appropriate patch for your system, or the Microsoft<br>Security Update Guide to search for available patches.<br><br><strong>CVE Information<\/strong><br>\uf0b7 <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2023-32049\">CVE-2023-32049 CVSS:8.8<\/a><br>\uf0b7 <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2023-35311\">CVE-2023-35311 CVSS:8.8<\/a><br>\uf0b7 <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36884\">CVE-2023-36884 CVSS:8.3<\/a><br>\uf0b7 <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2023-36874\">CVE-2023-36874 CVSS:7.8<\/a><br>\uf0b7 <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2023-32046\">CVE-2023-32046 CVSS:7.8<\/a><br><br><strong>References<\/strong><br>\uf0b7 <a href=\"https:\/\/www.tenable.com\/cve\/CVE-2023-32049\">https:\/\/www.tenable.com\/cve\/CVE-2023-32049<\/a><br>\uf0b7 <a href=\"https:\/\/www.tenable.com\/cve\/CVE-2023-35311\">https:\/\/www.tenable.com\/cve\/CVE-2023-35311<\/a><br>\uf0b7 <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-36874\">https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-36874<\/a><br>\uf0b7 <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-32046\">https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-32046<\/a><br><br><strong>Report Cyber Incidents<\/strong><br>Report cyber security incident on the Mauritian Cybercrime Online Reporting System (MAUCORS &#8211;<br>http:\/\/maucors.govmu.org\/)<br><br><strong>Contact Information<\/strong><br>Computer Emergency Response Team of Mauritius (CERT-MU)<br>Ministry of Information Technology, Communication and Innovation<br>Tel: (+230) 4602600<br>Hotline No: (+230) 800 2378<br>Gen. Info. : contact@cert.govmu.org<br>Incident: incident@cert.govmu.org<br>Website: http:\/\/cert-mu.govmu.org<br>MAUCORS: http:\/\/maucors.govmu.org<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CERT-MU Vulnerability Note VN-2023-07 Date of Issue: 12.07.2023 Severity Rating: High Affected Products:\uf0b7 Microsoft Windows Server 2016\uf0b7 Microsoft Windows Server 2019\uf0b7 Microsoft Windows 10 1809 for x64-based Systems\uf0b7 Microsoft Windows 10 1809 for 32-bit Systems\uf0b7 Microsoft Windows 10 1809 for ARM64-based Systems\uf0b7 Microsoft Windows 10 1607 for 32-bit Systems\uf0b7 Microsoft Windows 10 1607 for x64-based Systems\uf0b7 Microsoft Windows Server (Server Core installation) 2019\uf0b7 Microsoft Windows Server (Server Core installation) 2016\uf0b7 Microsoft Windows Server 2022\uf0b7 Microsoft Windows Server (Server Core installation) 2022\uf0b7 Microsoft Windows 10 21H2 for 32-bit Systems\uf0b7 Microsoft Windows 10 21H2 for ARM64-based Systems\uf0b7 Microsoft Windows 10 21H2 for\u2026<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-1265","post","type-post","status-publish","format-standard","hentry","category-vulnerability-notes"],"blocksy_meta":"","_links":{"self":[{"href":"https:\/\/cert-mu.govmu.org\/cert-mu\/index.php?rest_route=\/wp\/v2\/posts\/1265","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert-mu.govmu.org\/cert-mu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert-mu.govmu.org\/cert-mu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert-mu.govmu.org\/cert-mu\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cert-mu.govmu.org\/cert-mu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1265"}],"version-history":[{"count":1,"href":"https:\/\/cert-mu.govmu.org\/cert-mu\/index.php?rest_route=\/wp\/v2\/posts\/1265\/revisions"}],"predecessor-version":[{"id":1266,"href":"https:\/\/cert-mu.govmu.org\/cert-mu\/index.php?rest_route=\/wp\/v2\/posts\/1265\/revisions\/1266"}],"wp:attachment":[{"href":"https:\/\/cert-mu.govmu.org\/cert-mu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1265"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert-mu.govmu.org\/cert-mu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1265"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert-mu.govmu.org\/cert-mu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}