{"id":2390,"date":"2020-10-16T09:14:54","date_gmt":"2020-10-16T14:14:54","guid":{"rendered":"https:\/\/cert.pa\/?p=2390"},"modified":"2020-10-16T09:14:54","modified_gmt":"2020-10-16T14:14:54","slug":"csirt-panama-aviso-2020-10-15-microsoft-parche-de-octubre-corrige-87-fallas","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=2390","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2020-10-15 Microsoft: Parche de Octubre corrige 87 fallas"},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2020-10-15 Microsoft: Parche de Octubre corrige 87 fallas<br>\nGravedad: Alta<br>\nFecha de publicaci\u00f3n: Octubre 16, 2020<br>\n\u00daltima revisi\u00f3n: Octubre 15, 2020<br>\nhttps:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/releasenotedetail\/2020-oct<\/p>\n\n\n\n<p>Sistemas Afectados:<br>\nMicrosoft Windows<br>\nMicrosoft Office and Microsoft Office Services and Web Apps<br>\nMicrosoft JET Database Engine<br>\nAzure Functions<br>\nOpen Source Software<br>\nMicrosoft Exchange Server<br>\nVisual Studio<br>\nPowerShellGet<br>\nMicrosoft .NET Framework<br>\nMicrosoft Dynamics<br>\nAdobe Flash Player<br>\nMicrosoft Windows Codecs Library<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>\nMicrosoft ha publicado un aviso de seguridad para abordar 87 fallas.<\/p>\n\n\n\n<p>II. Detalle<\/p>\n\n\n\n<table class=\"wp-block-table\"><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>.NET Framework<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16937\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16937<\/a><\/td><td>.NET Framework Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Adobe Flash Player<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV200012\" rel=\"noreferrer noopener\" target=\"_blank\">ADV200012<\/a><\/td><td>October 2020 Adobe Flash Security Update<\/td><td>Critical<\/td><\/tr><tr><td>Azure<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16995\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16995<\/a><\/td><td>Network Watcher Agent Virtual Machine Extension for Linux Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16904\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16904<\/a><\/td><td>Azure Functions Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Group Policy<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16939\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16939<\/a><\/td><td>Group Policy Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16978\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16978<\/a><\/td><td>Microsoft Dynamics 365 (On-Premise) Cross Site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16956\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16956<\/a><\/td><td>Microsoft Dynamics 365 (On-Premise) Cross Site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16943\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16943<\/a><\/td><td>Dynamics 365 Commerce Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16969\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16969<\/a><\/td><td>Microsoft Exchange Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16911\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16911<\/a><\/td><td>GDI+ Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16914\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16914<\/a><\/td><td>Windows GDI+ Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16923\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16923<\/a><\/td><td>Microsoft Graphics Components Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1167\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1167<\/a><\/td><td>Microsoft Graphics Components Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft NTFS<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16938\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16938<\/a><\/td><td>Windows Kernel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16933\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16933<\/a><\/td><td>Microsoft Word Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16929\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16929<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16934\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16934<\/a><\/td><td>Microsoft Office Click-to-Run Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16932\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16932<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16930\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16930<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16955\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16955<\/a><\/td><td>Microsoft Office Click-to-Run Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16928\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16928<\/a><\/td><td>Microsoft Office Click-to-Run Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16957\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16957<\/a><\/td><td>Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16918\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16918<\/a><\/td><td>Base3D Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16949\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16949<\/a><\/td><td>Microsoft Outlook Denial of Service Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16947\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16947<\/a><\/td><td>Microsoft Outlook Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16931\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16931<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16954\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16954<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17003\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-17003<\/a><\/td><td>Base3D Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16948\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16948<\/a><\/td><td>Microsoft SharePoint Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16953\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16953<\/a><\/td><td>Microsoft SharePoint Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16942\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16942<\/a><\/td><td>Microsoft SharePoint Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16951\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16951<\/a><\/td><td>Microsoft SharePoint Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16944\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16944<\/a><\/td><td>Microsoft SharePoint Reflective XSS Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16945\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16945<\/a><\/td><td>Microsoft Office SharePoint XSS Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16946\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16946<\/a><\/td><td>Microsoft Office SharePoint XSS Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16941\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16941<\/a><\/td><td>Microsoft SharePoint Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16950\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16950<\/a><\/td><td>Microsoft SharePoint Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16952\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16952<\/a><\/td><td>Microsoft SharePoint Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16900\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16900<\/a><\/td><td>Windows Event System Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16901\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16901<\/a><\/td><td>Windows Kernel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16899\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16899<\/a><\/td><td>Windows TCP\/IP Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16908\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16908<\/a><\/td><td>Windows Setup Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16909\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16909<\/a><\/td><td>Windows Error Reporting Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16912\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16912<\/a><\/td><td>Windows Backup Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16940\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16940<\/a><\/td><td>Windows &#8211; User Profile Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16907\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16907<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16936\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16936<\/a><\/td><td>Windows Backup Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16898\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16898<\/a><\/td><td>Windows TCP\/IP Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16897\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16897<\/a><\/td><td>NetBT Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16895\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16895<\/a><\/td><td>Windows Error Reporting Manager Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16919\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16919<\/a><\/td><td>Windows Enterprise App Management Service Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16921\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16921<\/a><\/td><td>Windows Text Services Framework Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16920\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16920<\/a><\/td><td>Windows Application Compatibility Client Library Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16972\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16972<\/a><\/td><td>Windows Backup Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16877\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16877<\/a><\/td><td>Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16876\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16876<\/a><\/td><td>Windows Application Compatibility Client Library Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16975\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16975<\/a><\/td><td>Windows Backup Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16973\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16973<\/a><\/td><td>Windows Backup Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16974\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16974<\/a><\/td><td>Windows Backup Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16922\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16922<\/a><\/td><td>Windows Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0764\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0764<\/a><\/td><td>Windows Storage Services Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16980\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16980<\/a><\/td><td>Windows iSCSI Target Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1080\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1080<\/a><\/td><td>Windows Hyper-V Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16887\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16887<\/a><\/td><td>Windows Network Connections Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16885\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16885<\/a><\/td><td>Windows Storage VSP Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16924\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16924<\/a><\/td><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16976\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16976<\/a><\/td><td>Windows Backup Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16935\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16935<\/a><\/td><td>Windows COM Server Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16967\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16967<\/a><\/td><td>Windows Camera Codec Pack Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16968\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16968<\/a><\/td><td>Windows Camera Codec Pack Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>PowerShellGet<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16886\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16886<\/a><\/td><td>PowerShellGet Module WDAC Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16977\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16977<\/a><\/td><td>Visual Studio Code Python Extension Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows COM<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16916\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16916<\/a><\/td><td>Windows COM Server Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Error Reporting<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16905\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16905<\/a><\/td><td>Windows Error Reporting Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16894\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16894<\/a><\/td><td>Windows NAT Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1243\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1243<\/a><\/td><td>Windows Hyper-V Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16891\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16891<\/a><\/td><td>Windows Hyper-V Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Installer<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16902\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16902<\/a><\/td><td>Windows Installer Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16889\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16889<\/a><\/td><td>Windows KernelStream Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16892\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16892<\/a><\/td><td>Windows Image Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16913\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16913<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1047\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1047<\/a><\/td><td>Windows Hyper-V Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16910\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16910<\/a><\/td><td>Windows Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Media Player<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16915\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16915<\/a><\/td><td>Media Foundation Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows RDP<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16863\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16863<\/a><\/td><td>Windows Remote Desktop Service Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows RDP<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16927\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16927<\/a><\/td><td>Windows Remote Desktop Protocol (RDP) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows RDP<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16896\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16896<\/a><\/td><td>Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Kernel Mode<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16890\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16890<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>\nSe recomienda actualizar en lo posible utilizando Windows Update o herramientas de gestion de actualizaciones.<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>\nCSIRT PANAMA<br>\nComputer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>\nE-Mail: info@cert.pa<br>\nPhone: +507 520-CERT (2378)<br>\nWeb: https:\/\/cert.pa<br>\nTwitter: @CSIRTPanama<br>\nFacebook: http:\/\/www.facebook.com\/CSIRTPanama<br>\nKey ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2020-10-15 Microsoft: Parche de Octubre corrige 87 fallas Gravedad: Alta Fecha de publicaci\u00f3n: Octubre 16, 2020 \u00daltima revisi\u00f3n: Octubre 15, 2020 https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/releasenotedetail\/2020-oct Sistemas Afectados: Microsoft Windows Microsoft Office and Microsoft Office Services&#8230;<\/p>\n","protected":false},"author":4,"featured_media":1847,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,8,9,98,68,45],"class_list":["post-2390","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-avisos","tag-microsoft","tag-patch-tuesday","tag-vulnerabilidades","tag-windows"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2390","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2390"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2390\/revisions"}],"predecessor-version":[{"id":2391,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2390\/revisions\/2391"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1847"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2390"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2390"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2390"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}