{
    "file_item": {
        "filepath": "security-advisories",
        "filename": "CERT-EU-SA2023-090.pdf"
    },
    "title": "Microsoft Software Critical Zero-Day Vulnerabilities",
    "serial_number": "2023-090",
    "publish_date": "20-11-2023 10:33:43",
    "description": "On November 15, 2023, Microsoft released patches for 63 security flaws in its software, including five new zero-day vulnerabilities, three of which are actively exploited. These vulnerabilities pose significant risks and require immediate attention.<br>\n",
    "url_title": "2023-090",
    "content_markdown": "---\ntitle: 'Microsoft Software Critical\u00a0Zero-Day\u00a0Vulnerabilities'\nnumber: '2023-090'\nversion: '1.0'\noriginal_date: 'November 15, 2023'\ndate: 'November 20, 2023'\n---\n\n_History:_\n\n* _20/11/2023 --- v1.0 -- Initial publication_\n\n# Summary\n\nOn November 15, 2023, Microsoft released patches for 63 security flaws in its software, including five new zero-day vulnerabilities, three of which are actively exploited. These vulnerabilities pose significant risks and require immediate attention [1].\n\n# Technical Details\n\nAmong the vulnerabilities, the five disclosed zero-day vulnerabilities are:\n\n- `CVE-2023-36025` - CVSS score **8.8**: A weakness that allows malicious content to bypass the Windows SmartScreen Security feature. SmartScreen is a built-in Windows component that tries to detect and block malicious websites and files. Microsoft\u2019s security advisory for this flaw says attackers could exploit it by getting a Windows user to click on a booby-trapped link to a shortcut file.\n- `CVE-2023-36033` - CVSS score **7.8** : Microsoft has fixed an actively exploited and publicly disclosed Windows DWM Core Library vulnerability that can be used to elevate privileges to `SYSTEM`.\n- `CVE-2023-36036` - CVSS score **7.8** : Microsoft has fixed an actively exploited and publicly disclosed Windows DWM Core Library vulnerability that can be used to elevate privileges to `SYSTEM`.\n- `CVE-2023-36038` - CVSS score **8.2** : ASP.NET Core Denial of Service. An attacker that could successfully exploit this vulnerability could trigger an `OutOfMemoryException`, resulting in a DoS condition.\n- `CVE-2023-36413` - CVSS score **6.5** : Microsoft Office Security Feature Bypass. An attacker could exploit this vulnerability using social engineering tactics to convince a target to open a malicious Microsoft Office file on a vulnerable system. Successful exploitation would result in a bypass of security features of Microsoft Office designed to protect users including Protected View and the file would be opened in editing mode instead of protected mode.\n\n# Affected Products\n\nFor the zero-day vulnerabilities, the affected products are:\n\n- Microsoft Windows;\n- ASP.NET;\n- Microsoft Office.\n\nSpecific product and version details are available on Microsoft's security update guide [2]. This is also valid for the other vulnerabilities.\n\n# Recommendations\n\nCERT-EU recommends immediate application of Microsoft's November patches [1].\n\n# References\n\n[1] <https://thehackernews.com/2023/11/alert-microsoft-releases-patch-updates.html>\n\n[2] <https://msrc.microsoft.com/update-guide/releaseNote/2023-Nov>\n\n",
    "content_html": "<p><em>History:</em></p><ul><li><em>20/11/2023 --- v1.0 -- Initial publication</em></li></ul><h2 id=\"summary\">Summary</h2><p>On November 15, 2023, Microsoft released patches for 63 security flaws in its software, including five new zero-day vulnerabilities, three of which are actively exploited. These vulnerabilities pose significant risks and require immediate attention [1].</p><h2 id=\"technical-details\">Technical Details</h2><p>Among the vulnerabilities, the five disclosed zero-day vulnerabilities are:</p><ul><li><code>CVE-2023-36025</code> - CVSS score <strong>8.8</strong>: A weakness that allows malicious content to bypass the Windows SmartScreen Security feature. SmartScreen is a built-in Windows component that tries to detect and block malicious websites and files. Microsoft\u2019s security advisory for this flaw says attackers could exploit it by getting a Windows user to click on a booby-trapped link to a shortcut file.</li><li><code>CVE-2023-36033</code> - CVSS score <strong>7.8</strong> : Microsoft has fixed an actively exploited and publicly disclosed Windows DWM Core Library vulnerability that can be used to elevate privileges to <code>SYSTEM</code>.</li><li><code>CVE-2023-36036</code> - CVSS score <strong>7.8</strong> : Microsoft has fixed an actively exploited and publicly disclosed Windows DWM Core Library vulnerability that can be used to elevate privileges to <code>SYSTEM</code>.</li><li><code>CVE-2023-36038</code> - CVSS score <strong>8.2</strong> : ASP.NET Core Denial of Service. An attacker that could successfully exploit this vulnerability could trigger an <code>OutOfMemoryException</code>, resulting in a DoS condition.</li><li><code>CVE-2023-36413</code> - CVSS score <strong>6.5</strong> : Microsoft Office Security Feature Bypass. An attacker could exploit this vulnerability using social engineering tactics to convince a target to open a malicious Microsoft Office file on a vulnerable system. Successful exploitation would result in a bypass of security features of Microsoft Office designed to protect users including Protected View and the file would be opened in editing mode instead of protected mode.</li></ul><h2 id=\"affected-products\">Affected Products</h2><p>For the zero-day vulnerabilities, the affected products are:</p><ul><li>Microsoft Windows;</li><li>ASP.NET;</li><li>Microsoft Office.</li></ul><p>Specific product and version details are available on Microsoft's security update guide [2]. This is also valid for the other vulnerabilities.</p><h2 id=\"recommendations\">Recommendations</h2><p>CERT-EU recommends immediate application of Microsoft's November patches [1].</p><h2 id=\"references\">References</h2><p>[1] <a rel=\"noopener\" target=\"_blank\" href=\"https://thehackernews.com/2023/11/alert-microsoft-releases-patch-updates.html\">https://thehackernews.com/2023/11/alert-microsoft-releases-patch-updates.html</a></p><p>[2] <a rel=\"noopener\" target=\"_blank\" href=\"https://msrc.microsoft.com/update-guide/releaseNote/2023-Nov\">https://msrc.microsoft.com/update-guide/releaseNote/2023-Nov</a></p>",
    "licence": {
        "title": "Creative Commons Attribution 4.0 International (CC-BY 4.0)",
        "link": "https://creativecommons.org/licenses/by/4.0/",
        "restrictions": "https://cert.europa.eu/legal-notice",
        "author": "The Cybersecurity Service for the Union institutions, bodies, offices and agencies"
    }
}