Multiple Microsoft Zero-Day Vulnerabilities Exploited in the Wild

CERT-MU Vulnerability Note VN-2023-07

Date of Issue: 12.07.2023

Severity Rating: High

Affected Products:
 Microsoft Windows Server 2016
 Microsoft Windows Server 2019
 Microsoft Windows 10 1809 for x64-based Systems
 Microsoft Windows 10 1809 for 32-bit Systems
 Microsoft Windows 10 1809 for ARM64-based Systems
 Microsoft Windows 10 1607 for 32-bit Systems
 Microsoft Windows 10 1607 for x64-based Systems
 Microsoft Windows Server (Server Core installation) 2019
 Microsoft Windows Server (Server Core installation) 2016
 Microsoft Windows Server 2022
 Microsoft Windows Server (Server Core installation) 2022
 Microsoft Windows 10 21H2 for 32-bit Systems
 Microsoft Windows 10 21H2 for ARM64-based Systems
 Microsoft Windows 10 21H2 for x64-based Systems
 Microsoft Windows 11 22H2 for ARM64-based Systems
 Microsoft Windows 11 22H2 for x64-based Systems
 Microsoft Windows 10 22H2 for 32-bit Systems
 Microsoft Windows 10 22H2 for ARM64-based Systems
 Microsoft Windows 10 22H2 for x64-based Systems
 Microsoft Windows 11 21H2 for ARM64-based Systems
 Microsoft Windows 11 21H2 for x64-based Systems
 Microsoft Outlook 2016 x32
 Microsoft Outlook 2016 x64

Description
Microsoft Windows could allow a remote attacker to bypass security restrictions, caused by a
flaw in the SmartScreen component. By persuading a victim to click on a specially crafted URL,
an attacker could exploit this vulnerability to bypass the Open File – Security Warning prompt.

Microsoft Windows and Microsoft Office could allow a remote attacker to execute arbitrary code
on the system. By persuading a victim to open a specially crafted file, an attacker could exploit
this vulnerability to execute arbitrary code on the system.

Solution
Use Microsoft Automatic Update to apply the appropriate patch for your system, or the Microsoft
Security Update Guide to search for available patches.

CVE Information
 CVE-2023-32049 CVSS:8.8
 CVE-2023-35311 CVSS:8.8
 CVE-2023-36884 CVSS:8.3
 CVE-2023-36874 CVSS:7.8
 CVE-2023-32046 CVSS:7.8

References
 https://www.tenable.com/cve/CVE-2023-32049
 https://www.tenable.com/cve/CVE-2023-35311
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36874
 https://nvd.nist.gov/vuln/detail/CVE-2023-32046

Report Cyber Incidents
Report cyber security incident on the Mauritian Cybercrime Online Reporting System (MAUCORS –
http://maucors.govmu.org/)

Contact Information
Computer Emergency Response Team of Mauritius (CERT-MU)
Ministry of Information Technology, Communication and Innovation
Tel: (+230) 4602600
Hotline No: (+230) 800 2378
Gen. Info. : contact@cert.govmu.org
Incident: incident@cert.govmu.org
Website: http://cert-mu.govmu.org
MAUCORS: http://maucors.govmu.org

Skip to content