{"id":3146,"date":"2022-10-11T13:39:07","date_gmt":"2022-10-11T18:39:07","guid":{"rendered":"https:\/\/cert.pa\/?p=3146"},"modified":"2022-10-11T13:39:07","modified_gmt":"2022-10-11T18:39:07","slug":"csirt-panama-aviso-2022-oct-11-microsoft-libera-actualizaciones-que-corrigen-dias-cero-y-84-fallas","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=3146","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2022-oct-11 Microsoft Libera actualizaciones que corrigen dias cero y 84 fallas."},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2022-oct-11 Microsoft Libera actualizaciones que corrigen dias cero y 84 fallas.<br>Gravedad: Alta<br>Fecha de publicaci\u00f3n: octubre 11, 2022<br>\u00daltima revisi\u00f3n: octubre 11, 2022<br>https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2022-Oct<br>Sistemas Afectados:<br>Active Directory Domain Services<br>Azure<br>Azure Arc<br>Client Server Run-time Subsystem (CSRSS)<br>Microsoft Edge (Chromium-based)<br>Microsoft Graphics Component<br>Microsoft Office<br>Microsoft Office SharePoint<br>Microsoft Office Word<br>Microsoft WDAC OLE DB provider for SQL<br>NuGet Client<br>Remote Access Service Point-to-Point Tunneling Protocol<br>Role: Windows Hyper-V<br>Service Fabric<br>Visual Studio Code<br>Windows Active Directory Certificate Services<br>Windows ALPC<br>Windows CD-ROM Driver<br>Windows COM+ Event System Service<br>Windows Connected User Experiences and Telemetry<br>Windows CryptoAPI<br>Windows Defender<br>Windows DHCP Client<br>Windows Distributed File System (DFS)<br>Windows DWM Core Library<br>Windows Event Logging Service<br>Windows Group Policy<br>Windows Group Policy Preference Client<br>Windows Internet Key Exchange (IKE) Protocol<br>Windows Kernel<br>Windows Local Security Authority (LSA)<br>Windows Local Security Authority Subsystem Service (LSASS)<br>Windows Local Session Manager (LSM)<br>Windows NTFS<br>Windows NTLM<br>Windows ODBC Driver<br>Windows Perception Simulation Service<br>Windows Point-to-Point Tunneling Protocol<br>Windows Portable Device Enumerator Service<br>Windows Print Spooler Components<br>Windows Resilient File System (ReFS)<br>Windows Secure Channel<br>Windows Security Support Provider Interface<br>Windows Server Remotely Accessible Registry Keys<br>Windows Server Service<br>Windows Storage<br>Windows TCP\/IP<br>Windows USB Serial Driver<br>Windows Web Account Manager<br>Windows Win32K<br>Windows WLAN Service<br>Windows Workstation Service<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>Microsoft libera sus actualizaciones de seguridad para octubre de 2022; se hicieron correcciones para 84 vulnerabilidades.<\/p>\n\n\n\n<p>II. Problemas Conocidos<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>Active Directory Domain Services<\/td><td><a>CVE-2022-38042<\/a><\/td><td>Active Directory Domain Services Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure<\/td><td><a>CVE-2022-38017<\/a><\/td><td>StorSimple 8000 Series Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Arc<\/td><td><a>CVE-2022-37968<\/a><\/td><td>Azure Arc-enabled Kubernetes cluster Connect Elevation of Privilege Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Client Server Run-time Subsystem (CSRSS)<\/td><td><a>CVE-2022-37987<\/a><\/td><td>Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Client Server Run-time Subsystem (CSRSS)<\/td><td><a>CVE-2022-37989<\/a><\/td><td>Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a>CVE-2022-3311<\/a><\/td><td>Chromium: CVE-2022-3311 Use after free in Import<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a>CVE-2022-3313<\/a><\/td><td>Chromium: CVE-2022-3313 Incorrect security UI in Full Screen<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a>CVE-2022-3315<\/a><\/td><td>Chromium: CVE-2022-3315 Type confusion in Blink<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a>CVE-2022-3370<\/a><\/td><td>Chromium: CVE-2022-3370 Use after free in Custom Elements<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a>CVE-2022-3373<\/a><\/td><td>Chromium: CVE-2022-3373 Out of bounds write in V8<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a>CVE-2022-3316<\/a><\/td><td>Chromium: CVE-2022-3316 Insufficient validation of untrusted input in Safe Browsing<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a>CVE-2022-3317<\/a><\/td><td>Chromium: CVE-2022-3317 Insufficient validation of untrusted input in Intents<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a>CVE-2022-3310<\/a><\/td><td>Chromium: CVE-2022-3310 Insufficient policy enforcement in Custom Tabs<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a>CVE-2022-3304<\/a><\/td><td>Chromium: CVE-2022-3304 Use after free in CSS<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a>CVE-2022-41035<\/a><\/td><td>Microsoft Edge (Chromium-based) Spoofing Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a>CVE-2022-3308<\/a><\/td><td>Chromium: CVE-2022-3308 Insufficient policy enforcement in Developer Tools<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a>CVE-2022-3307<\/a><\/td><td>Chromium: CVE-2022-3307 Use after free in Media<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a>CVE-2022-37986<\/a><\/td><td>Windows Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a>CVE-2022-38051<\/a><\/td><td>Windows Graphics Component Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a>CVE-2022-37997<\/a><\/td><td>Windows Graphics Component Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a>CVE-2022-37985<\/a><\/td><td>Windows Graphics Component Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a>CVE-2022-33635<\/a><\/td><td>Windows GDI+ Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a>CVE-2022-38001<\/a><\/td><td>Microsoft Office Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a>CVE-2022-38048<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a>CVE-2022-41043<\/a><\/td><td>Microsoft Office Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a>CVE-2022-38053<\/a><\/td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a>CVE-2022-41036<\/a><\/td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a>CVE-2022-41038<\/a><\/td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a>CVE-2022-41037<\/a><\/td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Word<\/td><td><a>CVE-2022-41031<\/a><\/td><td>Microsoft Word Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Word<\/td><td><a>CVE-2022-38049<\/a><\/td><td>Microsoft Office Graphics Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft WDAC OLE DB provider for SQL<\/td><td><a>CVE-2022-37982<\/a><\/td><td>Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft WDAC OLE DB provider for SQL<\/td><td><a>CVE-2022-38031<\/a><\/td><td>Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>NuGet Client<\/td><td><a>CVE-2022-41032<\/a><\/td><td>NuGet Client Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Remote Access Service Point-to-Point Tunneling Protocol<\/td><td><a>CVE-2022-37965<\/a><\/td><td>Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Windows Hyper-V<\/td><td><a>CVE-2022-37979<\/a><\/td><td>Windows Hyper-V Elevation of Privilege Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Service Fabric<\/td><td><a>CVE-2022-35829<\/a><\/td><td>Service Fabric Explorer Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio Code<\/td><td><a>CVE-2022-41042<\/a><\/td><td>Visual Studio Code Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio Code<\/td><td><a>CVE-2022-41034<\/a><\/td><td>Visual Studio Code Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio Code<\/td><td><a>CVE-2022-41083<\/a><\/td><td>Visual Studio Code Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Active Directory Certificate Services<\/td><td><a>CVE-2022-37978<\/a><\/td><td>Windows Active Directory Certificate Services Security Feature Bypass<\/td><td>Important<\/td><\/tr><tr><td>Windows Active Directory Certificate Services<\/td><td><a>CVE-2022-37976<\/a><\/td><td>Active Directory Certificate Services Elevation of Privilege Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows ALPC<\/td><td><a>CVE-2022-38029<\/a><\/td><td>Windows ALPC Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows CD-ROM Driver<\/td><td><a>CVE-2022-38044<\/a><\/td><td>Windows CD-ROM File System Driver Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows COM+ Event System Service<\/td><td><a>CVE-2022-41033<\/a><\/td><td>Windows COM+ Event System Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Connected User Experiences and Telemetry<\/td><td><a>CVE-2022-38021<\/a><\/td><td>Connected User Experiences and Telemetry Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows CryptoAPI<\/td><td><a>CVE-2022-34689<\/a><\/td><td>Windows CryptoAPI Spoofing Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Defender<\/td><td><a>CVE-2022-37971<\/a><\/td><td>Microsoft Windows Defender Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DHCP Client<\/td><td><a>CVE-2022-38026<\/a><\/td><td>Windows DHCP Client Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DHCP Client<\/td><td><a>CVE-2022-37980<\/a><\/td><td>Windows DHCP Client Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Distributed File System (DFS)<\/td><td><a>CVE-2022-38025<\/a><\/td><td>Windows Distributed File System (DFS) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DWM Core Library<\/td><td><a>CVE-2022-37970<\/a><\/td><td>Windows DWM Core Library Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DWM Core Library<\/td><td><a>CVE-2022-37983<\/a><\/td><td>Microsoft DWM Core Library Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Event Logging Service<\/td><td><a>CVE-2022-37981<\/a><\/td><td>Windows Event Logging Service Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Group Policy<\/td><td><a>CVE-2022-37975<\/a><\/td><td>Windows Group Policy Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Group Policy Preference Client<\/td><td><a>CVE-2022-37994<\/a><\/td><td>Windows Group Policy Preference Client Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Group Policy Preference Client<\/td><td><a>CVE-2022-37993<\/a><\/td><td>Windows Group Policy Preference Client Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Group Policy Preference Client<\/td><td><a>CVE-2022-37999<\/a><\/td><td>Windows Group Policy Preference Client Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Internet Key Exchange (IKE) Protocol<\/td><td><a>CVE-2022-38036<\/a><\/td><td>Internet Key Exchange (IKE) Protocol Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a>CVE-2022-37988<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a>CVE-2022-38037<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a>CVE-2022-37990<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a>CVE-2022-38038<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a>CVE-2022-38039<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a>CVE-2022-37995<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a>CVE-2022-37991<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a>CVE-2022-38022<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Local Security Authority (LSA)<\/td><td><a>CVE-2022-38016<\/a><\/td><td>Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Local Security Authority Subsystem Service (LSASS)<\/td><td><a>CVE-2022-37977<\/a><\/td><td>Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Local Session Manager (LSM)<\/td><td><a>CVE-2022-37973<\/a><\/td><td>Windows Local Session Manager (LSM) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Local Session Manager (LSM)<\/td><td><a>CVE-2022-37998<\/a><\/td><td>Windows Local Session Manager (LSM) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NTFS<\/td><td><a>CVE-2022-37996<\/a><\/td><td>Windows Kernel Memory Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NTLM<\/td><td><a>CVE-2022-35770<\/a><\/td><td>Windows NTLM Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows ODBC Driver<\/td><td><a>CVE-2022-38040<\/a><\/td><td>Microsoft ODBC Driver Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Perception Simulation Service<\/td><td><a>CVE-2022-37974<\/a><\/td><td>Windows Mixed Reality Developer Tools Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Point-to-Point Tunneling Protocol<\/td><td><a>CVE-2022-33634<\/a><\/td><td>Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Point-to-Point Tunneling Protocol<\/td><td><a>CVE-2022-22035<\/a><\/td><td>Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Point-to-Point Tunneling Protocol<\/td><td><a>CVE-2022-24504<\/a><\/td><td>Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Point-to-Point Tunneling Protocol<\/td><td><a>CVE-2022-38047<\/a><\/td><td>Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Point-to-Point Tunneling Protocol<\/td><td><a>CVE-2022-41081<\/a><\/td><td>Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Point-to-Point Tunneling Protocol<\/td><td><a>CVE-2022-30198<\/a><\/td><td>Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Point-to-Point Tunneling Protocol<\/td><td><a>CVE-2022-38000<\/a><\/td><td>Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Portable Device Enumerator Service<\/td><td><a>CVE-2022-38032<\/a><\/td><td>Windows Portable Device Enumerator Service Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Print Spooler Components<\/td><td><a>CVE-2022-38028<\/a><\/td><td>Windows Print Spooler Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Resilient File System (ReFS)<\/td><td><a>CVE-2022-38003<\/a><\/td><td>Windows Resilient File System Elevation of Privilege<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Channel<\/td><td><a>CVE-2022-38041<\/a><\/td><td>Windows Secure Channel Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Security Support Provider Interface<\/td><td><a>CVE-2022-38043<\/a><\/td><td>Windows Security Support Provider Interface Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Server Remotely Accessible Registry Keys<\/td><td><a>CVE-2022-38033<\/a><\/td><td>Windows Server Remotely Accessible Registry Keys Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Server Service<\/td><td><a>CVE-2022-38045<\/a><\/td><td>Server Service Remote Protocol Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Storage<\/td><td><a>CVE-2022-38027<\/a><\/td><td>Windows Storage Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows TCP\/IP<\/td><td><a>CVE-2022-33645<\/a><\/td><td>Windows TCP\/IP Driver Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows USB Serial Driver<\/td><td><a>CVE-2022-38030<\/a><\/td><td>Windows USB Serial Driver Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Web Account Manager<\/td><td><a>CVE-2022-38046<\/a><\/td><td>Web Account Manager Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Win32K<\/td><td><a>CVE-2022-38050<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows WLAN Service<\/td><td><a>CVE-2022-37984<\/a><\/td><td>Windows WLAN Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Workstation Service<\/td><td><a>CVE-2022-38034<\/a><\/td><td>Windows Workstation Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>Actualizar utilizando Microsoft Windows Update o herramientas de administracion de actualizaciones centralizadas.<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>CSIRT PANAMA<br>Computer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>E-Mail: info@cert.pa<br>Phone: +507 520-CERT (2378)<br>Web: https:\/\/cert.pa<br>Twitter: @CSIRTPanama<br>Facebook: http:\/\/www.facebook.com\/CSIRTPanama<br>Key ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2022-oct-11 Microsoft Libera actualizaciones que corrigen dias cero y 84 fallas.Gravedad: AltaFecha de publicaci\u00f3n: octubre 11, 2022\u00daltima revisi\u00f3n: octubre 11, 2022https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2022-OctSistemas Afectados:Active Directory Domain ServicesAzureAzure ArcClient Server Run-time Subsystem (CSRSS)Microsoft Edge (Chromium-based)Microsoft&#8230;<\/p>\n","protected":false},"author":4,"featured_media":1843,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,43,8,72,9,73,80,68,45,94],"class_list":["post-3146","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-alertas","tag-avisos","tag-avisos-de-seguridad","tag-microsoft","tag-parches","tag-vulnerabilidad","tag-vulnerabilidades","tag-windows","tag-windows-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3146","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3146"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3146\/revisions"}],"predecessor-version":[{"id":3147,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3146\/revisions\/3147"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1843"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3146"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3146"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3146"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}