{"id":2491,"date":"2021-01-14T15:20:22","date_gmt":"2021-01-14T20:20:22","guid":{"rendered":"https:\/\/cert.pa\/?p=2491"},"modified":"2021-01-14T15:20:22","modified_gmt":"2021-01-14T20:20:22","slug":"csirt-panama-aviso-2021-ene-14-actualizaciones-de-microsoft-corriguen-83-fallas","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=2491","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2021-ene-14 Actualizaciones de Microsoft corriguen 83 fallas."},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2021-ene-14 Actualizaciones de Microsoft corriguen 83 fallas.<br>\nGravedad: Alta<br>\nFecha de publicaci\u00f3n: enero 14, 2021<br>\n\u00daltima revisi\u00f3n: enero 13, 2021<br>\nhttps:\/\/msrc.microsoft.com\/update-guide\/en-us\/releaseNote\/2021-Jan<\/p>\n\n\n\n<p>Sistemas Afectados:<br>\nMicrosoft Windows<br>\nMicrosoft Edge (EdgeHTML-based)<br>\nMicrosoft Office and Microsoft Office Services and Web Apps<br>\nMicrosoft Windows Codecs Library<br>\nVisual Studio<br>\nSQL Server<br>\nMicrosoft Malware Protection Engine<br>\n.NET Core<br>\n.NET Repository<br>\nASP .NET<br>\nAzure<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>\nCon el lanzamiento de las actualizaciones de seguridad de enero de 2021, Microsoft lanz\u00f3 correcciones para 83 vulnerabilidades en los productos de Microsoft. <br>\nDe estas vulnerabilidades, 10 se clasifican como cr\u00edticas, 73 como importantes.<\/p>\n\n\n\n<p>II. Problemas Conocidos<\/p>\n\n\n\n<table class=\"wp-block-table\"><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>.NET Repository<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1725\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1725<\/a><\/td><td>Bot Framework SDK Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>ASP.NET core &amp; .NET core<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1723\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1723<\/a><\/td><td>ASP.NET Core and Visual Studio Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Active Directory Pod Identity<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1677\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1677<\/a><\/td><td>Azure Active Directory Pod Identity Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Bluetooth Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1683\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1683<\/a><\/td><td>Windows Bluetooth Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Bluetooth Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1638\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1638<\/a><\/td><td>Windows Bluetooth Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Bluetooth Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1684\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1684<\/a><\/td><td>Windows Bluetooth Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft DTV-DVD Video Decoder<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1668\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1668<\/a><\/td><td>Microsoft DTV-DVD Video Decoder Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Edge (HTML-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1705\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1705<\/a><\/td><td>Microsoft Edge (HTML-based) Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1709\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1709<\/a><\/td><td>Windows Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1696\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1696<\/a><\/td><td>Windows Graphics Component Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1665\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1665<\/a><\/td><td>GDI+ Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1708\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1708<\/a><\/td><td>Windows GDI+ Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Malware Protection Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1647\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1647<\/a><\/td><td>Microsoft Defender Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1713\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1713<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1714\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1714<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1711\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1711<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1715\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1715<\/a><\/td><td>Microsoft Word Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1716\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1716<\/a><\/td><td>Microsoft Word Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1712\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1712<\/a><\/td><td>Microsoft SharePoint Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1707\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1707<\/a><\/td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1718\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1718<\/a><\/td><td>Microsoft SharePoint Server Tampering Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1717\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1717<\/a><\/td><td>Microsoft SharePoint Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1719\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1719<\/a><\/td><td>Microsoft SharePoint Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1641\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1641<\/a><\/td><td>Microsoft SharePoint Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft RPC<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1702\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1702<\/a><\/td><td>Windows Remote Procedure Call Runtime Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1649\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1649<\/a><\/td><td>Active Template Library Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1676\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1676<\/a><\/td><td>Windows NT Lan Manager Datagram Receiver Driver Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1689\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1689<\/a><\/td><td>Windows Multipoint Management Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1657\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1657<\/a><\/td><td>Windows Fax Compose Form Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1646\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1646<\/a><\/td><td>Windows WLAN Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1650\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1650<\/a><\/td><td>Windows Runtime C++ Template Library Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1706\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1706<\/a><\/td><td>Windows LUAFV Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1699\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1699<\/a><\/td><td>Windows (modem.sys) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1644\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1644<\/a><\/td><td>HEVC Video Extensions Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1643\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1643<\/a><\/td><td>HEVC Video Extensions Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows DNS<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1637\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1637<\/a><\/td><td>Windows DNS Query Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1636\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1636<\/a><\/td><td>Microsoft SQL Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-26870\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-26870<\/a><\/td><td>Visual Studio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows AppX Deployment Extensions<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1642\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1642<\/a><\/td><td>Windows AppX Deployment Extensions Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows AppX Deployment Extensions<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1685\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1685<\/a><\/td><td>Windows AppX Deployment Extensions Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows CryptoAPI<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1679\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1679<\/a><\/td><td>Windows CryptoAPI Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows CSC Service<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1652\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1652<\/a><\/td><td>Windows CSC Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows CSC Service<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1654\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1654<\/a><\/td><td>Windows CSC Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows CSC Service<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1659\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1659<\/a><\/td><td>Windows CSC Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows CSC Service<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1653\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1653<\/a><\/td><td>Windows CSC Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows CSC Service<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1655\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1655<\/a><\/td><td>Windows CSC Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows CSC Service<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1693\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1693<\/a><\/td><td>Windows CSC Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows CSC Service<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1688\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1688<\/a><\/td><td>Windows CSC Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Diagnostic Hub<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1680\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1680<\/a><\/td><td>Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Diagnostic Hub<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1651\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1651<\/a><\/td><td>Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DP API<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1645\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1645<\/a><\/td><td>Windows Docker Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Event Logging Service<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1703\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1703<\/a><\/td><td>Windows Event Logging Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Event Tracing<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1662\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1662<\/a><\/td><td>Windows Event Tracing Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1691\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1691<\/a><\/td><td>Hyper-V Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1704\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1704<\/a><\/td><td>Windows Hyper-V Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1692\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1692<\/a><\/td><td>Hyper-V Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Installer<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1661\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1661<\/a><\/td><td>Windows Installer Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Installer<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1697\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1697<\/a><\/td><td>Windows InstallService Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1682\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1682<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Media<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1710\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1710<\/a><\/td><td>Microsoft Windows Media Foundation Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NTLM<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1678\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1678<\/a><\/td><td>NTLM Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Print Spooler Components<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1695\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1695<\/a><\/td><td>Windows Print Spooler Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Projected File System Filter Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1663\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1663<\/a><\/td><td>Windows Projected File System FS Filter Driver Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Projected File System Filter Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1672\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1672<\/a><\/td><td>Windows Projected File System FS Filter Driver Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Projected File System Filter Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1670\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1670<\/a><\/td><td>Windows Projected File System FS Filter Driver Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Desktop<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1674\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1674<\/a><\/td><td>Windows Remote Desktop Protocol Core Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Desktop<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1669\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1669<\/a><\/td><td>Windows Remote Desktop Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Procedure Call Runtime<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1701\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1701<\/a><\/td><td>Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Procedure Call Runtime<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1700\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1700<\/a><\/td><td>Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Procedure Call Runtime<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1666\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1666<\/a><\/td><td>Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Remote Procedure Call Runtime<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1664\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1664<\/a><\/td><td>Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Procedure Call Runtime<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1671\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1671<\/a><\/td><td>Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Procedure Call Runtime<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1673\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1673<\/a><\/td><td>Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Remote Procedure Call Runtime<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1658\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1658<\/a><\/td><td>Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Remote Procedure Call Runtime<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1667\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1667<\/a><\/td><td>Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Remote Procedure Call Runtime<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1660\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1660<\/a><\/td><td>Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows splwow64<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1648\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1648<\/a><\/td><td>Microsoft splwow64 Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows TPM Device Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1656\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1656<\/a><\/td><td>TPM Device Driver Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Update Stack<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1694\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1694<\/a><\/td><td>Windows Update Stack Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows WalletService<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1686\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1686<\/a><\/td><td>Windows WalletService Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows WalletService<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1681\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1681<\/a><\/td><td>Windows WalletService Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows WalletService<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1690\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1690<\/a><\/td><td>Windows WalletService Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows WalletService<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1687\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1687<\/a><\/td><td>Windows WalletService Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>\nActualizar utilizando Microsoft Windows Update o herramientas de administracion de actualizaciones centralizadas.<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>\nCSIRT PANAMA<br>\nComputer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>\nE-Mail: info@cert.pa<br>\nPhone: +507 520-CERT (2378)<br>\nWeb: https:\/\/cert.pa<br>\nTwitter: @CSIRTPanama<br>\nFacebook: http:\/\/www.facebook.com\/CSIRTPanama<br>\nKey ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2021-ene-14 Actualizaciones de Microsoft corriguen 83 fallas. Gravedad: Alta Fecha de publicaci\u00f3n: enero 14, 2021 \u00daltima revisi\u00f3n: enero 13, 2021 https:\/\/msrc.microsoft.com\/update-guide\/en-us\/releaseNote\/2021-Jan Sistemas Afectados: Microsoft Windows Microsoft Edge (EdgeHTML-based) Microsoft Office and Microsoft&#8230;<\/p>\n","protected":false},"author":4,"featured_media":1847,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,72,98,94],"class_list":["post-2491","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-avisos-de-seguridad","tag-patch-tuesday","tag-windows-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2491","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2491"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2491\/revisions"}],"predecessor-version":[{"id":2492,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2491\/revisions\/2492"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1847"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2491"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2491"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2491"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}