{"id":2952,"date":"2021-11-12T10:47:51","date_gmt":"2021-11-12T15:47:51","guid":{"rendered":"https:\/\/cert.pa\/?p=2952"},"modified":"2021-11-12T10:47:51","modified_gmt":"2021-11-12T15:47:51","slug":"csirt-panama-aviso-2021-nov-12-microsoft-libera-actualizaciones-que-corrigen-6-dia-cero-y-55-fallas","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=2952","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2021-nov-12 Microsoft Libera actualizaciones que corrigen 6 dia cero y 55 fallas."},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2021-nov-12 Microsoft Libera actualizaciones que corrigen 6 dia cero y 55 fallas.<br>Gravedad: Alta<br>Fecha de publicaci\u00f3n: noviembre 12, 2021<br>\u00daltima revisi\u00f3n: noviembre 12, 2021<br>https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2021-Nov<\/p>\n\n\n\n<p>Sistemas Afectados:<br>3D Viewer<br>Azure<br>Azure RTOS<br>Azure Sphere<br>Microsoft Dynamics<br>Microsoft Edge (Chromium-based)<br>Microsoft Edge (Chromium-based) in IE Mode<br>Microsoft Exchange Server<br>Microsoft Office<br>Microsoft Office Access<br>Microsoft Office Excel<br>Microsoft Office SharePoint<br>Microsoft Office Word<br>Microsoft Windows<br>Microsoft Windows Codecs Library<br>Power BI<br>Role: Windows Hyper-V<br>Visual Studio<br>Visual Studio Code<br>Windows Active Directory<br>Windows COM<br>Windows Core Shell<br>Windows Cred SSProvider Protocol<br>Windows Defender<br>Windows Desktop Bridge<br>Windows Diagnostic Hub<br>Windows Fastfat Driver<br>Windows Feedback Hub<br>Windows Hello<br>Windows Installer<br>Windows Kernel<br>Windows NTFS<br>Windows RDP<br>Windows Scripting<br>Windows Virtual Machine Bus<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>Con el lanzamiento de las actualizaciones de seguridad de noviembre de 2021, Microsoft lanz\u00f3 correcciones para 55 vulnerabilidades en los productos de Microsoft y 6 vulnerabilidades de dia cero.<br>De estas vulnerabilidades, 10 se clasifican como cr\u00edticas, 73 como importantes.<\/p>\n\n\n\n<p>II. Problemas Conocidos<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>3D Viewer<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-43209\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-43209<\/a><\/td><td>3D Viewer Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>3D Viewer<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-43208\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-43208<\/a><\/td><td>3D Viewer Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-41373\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-41373<\/a><\/td><td>FSLogix Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure RTOS<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-42303\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-42303<\/a><\/td><td>Azure RTOS Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure RTOS<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-42302\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-42302<\/a><\/td><td>Azure RTOS Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure RTOS<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-42301\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-42301<\/a><\/td><td>Azure RTOS Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure RTOS<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-42323\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-42323<\/a><\/td><td>Azure RTOS Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure RTOS<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26444\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26444<\/a><\/td><td>Azure RTOS Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure RTOS<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-42304\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-42304<\/a><\/td><td>Azure RTOS Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Sphere<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-41374\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-41374<\/a><\/td><td>Azure Sphere Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Sphere<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-41376\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-41376<\/a><\/td><td>Azure Sphere Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Sphere<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-42300\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-42300<\/a><\/td><td>Azure Sphere Tampering Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Sphere<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-41375\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-41375<\/a><\/td><td>Azure Sphere Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-42316\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-42316<\/a><\/td><td>Microsoft Dynamics 365 (on-premises) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based) in IE Mode<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-41351\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-41351<\/a><\/td><td>Microsoft Edge (Chrome based) Spoofing on IE Mode<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-42305\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-42305<\/a><\/td><td>Microsoft Exchange Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-41349\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-41349<\/a><\/td><td>Microsoft Exchange Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-42321\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-42321<\/a><\/td><td>Microsoft Exchange Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Access<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-41368\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-41368<\/a><\/td><td>Microsoft Access Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-40442\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-40442<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-42292\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-42292<\/a><\/td><td>Microsoft Excel Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Word<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-42296\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-42296<\/a><\/td><td>Microsoft Word Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-41356\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-41356<\/a><\/td><td>Windows Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-42276\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-42276<\/a><\/td><td>Microsoft Windows Media Foundation Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Power BI<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-41372\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-41372<\/a><\/td><td>Power BI Report Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Windows Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-42284\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-42284<\/a><\/td><td>Windows Hyper-V Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Windows Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-42274\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-42274<\/a><\/td><td>Windows Hyper-V Discrete Device Assignment (DDA) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-3711\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-3711<\/a><\/td><td>OpenSSL: CVE-2021-3711 SM2 Decryption Buffer Overflow<\/td><td>Critical<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-42319\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-42319<\/a><\/td><td>Visual Studio Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio Code<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-42322\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-42322<\/a><\/td><td>Visual Studio Code Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Active Directory<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-42278\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-42278<\/a><\/td><td>Active Directory Domain Services Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Active Directory<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-42291\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-42291<\/a><\/td><td>Active Directory Domain Services Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Active Directory<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-42287\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-42287<\/a><\/td><td>Active Directory Domain Services Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Active Directory<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-42282\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-42282<\/a><\/td><td>Active Directory Domain Services Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows COM<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-42275\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-42275<\/a><\/td><td>Microsoft COM for Windows Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Core Shell<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-42286\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-42286<\/a><\/td><td>Windows Core Shell SI Host Extension Framework for Composable Shell Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Cred SSProvider Protocol<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-41366\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-41366<\/a><\/td><td>Credential Security Support Provider Protocol (CredSSP) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Defender<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-42298\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-42298<\/a><\/td><td>Microsoft Defender Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Desktop Bridge<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-36957\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-36957<\/a><\/td><td>Windows Desktop Bridge Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Diagnostic Hub<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-42277\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-42277<\/a><\/td><td>Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Fastfat Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-41377\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-41377<\/a><\/td><td>Windows Fast FAT File System Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Feedback Hub<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-42280\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-42280<\/a><\/td><td>Windows Feedback Hub Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Hello<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-42288\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-42288<\/a><\/td><td>Windows Hello Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Installer<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-41379\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-41379<\/a><\/td><td>Windows Installer Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-42285\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-42285<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NTFS<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-42283\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-42283<\/a><\/td><td>NTFS Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NTFS<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-41370\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-41370<\/a><\/td><td>NTFS Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NTFS<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-41378\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-41378<\/a><\/td><td>Windows NTFS Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NTFS<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-41367\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-41367<\/a><\/td><td>NTFS Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows RDP<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-38665\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-38665<\/a><\/td><td>Remote Desktop Protocol Client Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows RDP<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-38631\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-38631<\/a><\/td><td>Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows RDP<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-38666\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-38666<\/a><\/td><td>Remote Desktop Client Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows RDP<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-41371\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-41371<\/a><\/td><td>Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Scripting<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-42279\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-42279<\/a><\/td><td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Virtual Machine Bus<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26443\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26443<\/a><\/td><td>Microsoft Virtual Machine Bus (VMBus) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>Actualizar utilizando Microsoft Windows Update o herramientas de administracion de actualizaciones centralizadas.<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>CSIRT PANAMA<br>Computer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>E-Mail: info@cert.pa<br>Phone: +507 520-CERT (2378)<br>Web: https:\/\/cert.pa<br>Twitter: @CSIRTPanama<br>Facebook: http:\/\/www.facebook.com\/CSIRTPanama<br>Key ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2021-nov-12 Microsoft Libera actualizaciones que corrigen 6 dia cero y 55 fallas.Gravedad: AltaFecha de publicaci\u00f3n: noviembre 12, 2021\u00daltima revisi\u00f3n: noviembre 12, 2021https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2021-Nov Sistemas Afectados:3D ViewerAzureAzure RTOSAzure SphereMicrosoft DynamicsMicrosoft Edge (Chromium-based)Microsoft Edge (Chromium-based)&#8230;<\/p>\n","protected":false},"author":4,"featured_media":1847,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[72,9,98,45,94],"class_list":["post-2952","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-avisos-de-seguridad","tag-microsoft","tag-patch-tuesday","tag-windows","tag-windows-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2952","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2952"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2952\/revisions"}],"predecessor-version":[{"id":2953,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2952\/revisions\/2953"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1847"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2952"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2952"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2952"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}