{"id":3264,"date":"2023-03-16T15:01:07","date_gmt":"2023-03-16T20:01:07","guid":{"rendered":"https:\/\/cert.pa\/?p=3264"},"modified":"2023-03-16T15:01:07","modified_gmt":"2023-03-16T20:01:07","slug":"csirt-panama-aviso-2023-mar-16-microsoft-libera-actualizaciones-que-corrigen-2-dia-cero-y-83-fallas","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=3264","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2023-mar-16 Microsoft Libera actualizaciones que corrigen 2 dia cero y 83 fallas."},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2023-mar-16 Microsoft Libera actualizaciones que corrigen 2 dia cero y 83 fallas.<br>Gravedad: Alta<br>Fecha de publicaci\u00f3n: marzo 16, 2023<br>\u00daltima revisi\u00f3n: marzo023<br>https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2023-Mar<\/p>\n\n\n\n<p>Sistemas Afectados:<br>Azure<br>Client Server Run-time Subsystem (CSRSS)<br>Internet Control Message Protocol (ICMP)<br>Microsoft Bluetooth Driver<br>Microsoft Dynamics<br>Microsoft Edge (Chromium-based)<br>Microsoft Graphics Component<br>Microsoft Office Excel<br>Microsoft Office Outlook<br>Microsoft Office SharePoint<br>Microsoft OneDrive<br>Microsoft PostScript Printer Driver<br>Microsoft Printer Drivers<br>Microsoft Windows Codecs Library<br>Office for Android<br>Remote Access Service Point-to-Point Tunneling Protocol<br>Role: DNS Server<br>Role: Windows Hyper-V<br>Service Fabric<br>Visual Studio<br>Windows Accounts Control<br>Windows Bluetooth Service<br>Windows Central Resource Manager<br>Windows Cryptographic Services<br>Windows Defender<br>Windows HTTP Protocol Stack<br>Windows HTTP.sys<br>Windows Internet Key Exchange (IKE) Protocol<br>Windows Kernel<br>Windows Partition Management Driver<br>Windows Point-to-Point Protocol over Ethernet (PPPoE)<br>Windows Remote Procedure Call<br>Windows Remote Procedure Call Runtime<br>Windows Resilient File System (ReFS)<br>Windows Secure Channel<br>Windows SmartScreen<br>Windows TPM<br>Windows Win32K<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>Con el lanzamiento de las actualizaciones de seguridad de marzo 2023, Microsoft lanz\u00f3 correcciones para 83 vulnerabilidades en los productos de Microsoft y 2 vulnerabilidades de dia cero.<\/p>\n\n\n\n<p>II. Problemas Conocidos<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>Azure<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23408\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23408<\/a><\/td><td>Azure Apache Ambari Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Client Server Run-time Subsystem (CSRSS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23409\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23409<\/a><\/td><td>Client Server Run-Time Subsystem (CSRSS) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Client Server Run-time Subsystem (CSRSS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23394\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23394<\/a><\/td><td>Client Server Run-Time Subsystem (CSRSS) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Internet Control Message Protocol (ICMP)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23415\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23415<\/a><\/td><td>Internet Control Message Protocol (ICMP) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-0567\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-0567<\/a><\/td><td>Unknown<\/td><td>Unknown<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-20052\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-20052<\/a><\/td><td>Unknown<\/td><td>Unknown<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-20032\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-20032<\/a><\/td><td>Unknown<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Bluetooth Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23388\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23388<\/a><\/td><td>Windows Bluetooth Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24920\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24920<\/a><\/td><td>Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24879\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24879<\/a><\/td><td>Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24919\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24919<\/a><\/td><td>Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24891\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24891<\/a><\/td><td>Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24922\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24922<\/a><\/td><td>Microsoft Dynamics 365 Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24921\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24921<\/a><\/td><td>Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-1236\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-1236<\/a><\/td><td>Chromium: CVE-2023-1236 Inappropriate implementation in Internals<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-1235\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-1235<\/a><\/td><td>Chromium: CVE-2023-1235 Type Confusion in DevTools<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-1213\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-1213<\/a><\/td><td>Chromium: CVE-2023-1213 Use after free in Swiftshader<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24892\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24892<\/a><\/td><td>Microsoft Edge (Chromium-based) Webview2 Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-1234\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-1234<\/a><\/td><td>Chromium: CVE-2023-1234 Inappropriate implementation in Intents<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-1223\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-1223<\/a><\/td><td>Chromium: CVE-2023-1223 Insufficient policy enforcement in Autofill<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-1222\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-1222<\/a><\/td><td>Chromium: CVE-2023-1222 Heap buffer overflow in Web Audio API<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-1221\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-1221<\/a><\/td><td>Chromium: CVE-2023-1221 Insufficient policy enforcement in Extensions API<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-1229\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-1229<\/a><\/td><td>Chromium: CVE-2023-1229 Inappropriate implementation in Permission prompts<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-1228\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-1228<\/a><\/td><td>Chromium: CVE-2023-1228 Insufficient policy enforcement in Intents<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-1224\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-1224<\/a><\/td><td>Chromium: CVE-2023-1224 Insufficient policy enforcement in Web Payments API<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-1220\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-1220<\/a><\/td><td>Chromium: CVE-2023-1220 Heap buffer overflow in UMA<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-1216\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-1216<\/a><\/td><td>Chromium: CVE-2023-1216 Use after free in DevTools<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-1215\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-1215<\/a><\/td><td>Chromium: CVE-2023-1215 Type Confusion in CSS<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-1214\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-1214<\/a><\/td><td>Chromium: CVE-2023-1214 Type Confusion in V8<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-1219\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-1219<\/a><\/td><td>Chromium: CVE-2023-1219 Heap buffer overflow in Metrics<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-1218\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-1218<\/a><\/td><td>Chromium: CVE-2023-1218 Use after free in WebRTC<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-1217\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-1217<\/a><\/td><td>Chromium: CVE-2023-1217 Stack buffer overflow in Crash reporting<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-1230\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-1230<\/a><\/td><td>Chromium: CVE-2023-1230 Inappropriate implementation in WebApp Installs<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-1232\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-1232<\/a><\/td><td>Chromium: CVE-2023-1232 Insufficient policy enforcement in Resource Timing<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-1233\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-1233<\/a><\/td><td>Chromium: CVE-2023-1233 Insufficient policy enforcement in Resource Timing<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-1231\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-1231<\/a><\/td><td>Chromium: CVE-2023-1231 Inappropriate implementation in Autofill<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24910\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24910<\/a><\/td><td>Windows Graphics Component Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23398\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23398<\/a><\/td><td>Microsoft Excel Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23396\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23396<\/a><\/td><td>Microsoft Excel Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23399\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23399<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Outlook<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23397\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23397<\/a><\/td><td>Microsoft Outlook Elevation of Privilege Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23395\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23395<\/a><\/td><td>Microsoft SharePoint Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft OneDrive<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24890\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24890<\/a><\/td><td>Microsoft OneDrive for iOS Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft OneDrive<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24930\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24930<\/a><\/td><td>Microsoft OneDrive for MacOS Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft OneDrive<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24882\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24882<\/a><\/td><td>Microsoft OneDrive for Android Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft OneDrive<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24923\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24923<\/a><\/td><td>Microsoft OneDrive for Android Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft PostScript Printer Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24907\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24907<\/a><\/td><td>Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft PostScript Printer Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24857\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24857<\/a><\/td><td>Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft PostScript Printer Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24868\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24868<\/a><\/td><td>Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft PostScript Printer Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24872\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24872<\/a><\/td><td>Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft PostScript Printer Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24876\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24876<\/a><\/td><td>Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft PostScript Printer Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24913\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24913<\/a><\/td><td>Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft PostScript Printer Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24864\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24864<\/a><\/td><td>Microsoft PostScript and PCL6 Class Printer Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft PostScript Printer Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24866\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24866<\/a><\/td><td>Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft PostScript Printer Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24906\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24906<\/a><\/td><td>Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft PostScript Printer Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24867\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24867<\/a><\/td><td>Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft PostScript Printer Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24863\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24863<\/a><\/td><td>Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft PostScript Printer Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24858\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24858<\/a><\/td><td>Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft PostScript Printer Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24911\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24911<\/a><\/td><td>Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft PostScript Printer Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24870\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24870<\/a><\/td><td>Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft PostScript Printer Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24909\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24909<\/a><\/td><td>Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft PostScript Printer Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23406\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23406<\/a><\/td><td>Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft PostScript Printer Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23413\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23413<\/a><\/td><td>Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft PostScript Printer Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24856\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24856<\/a><\/td><td>Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Printer Drivers<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24865\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24865<\/a><\/td><td>Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Printer Drivers<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23403\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23403<\/a><\/td><td>Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23401\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23401<\/a><\/td><td>Windows Media Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23402\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23402<\/a><\/td><td>Windows Media Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Office for Android<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23391\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23391<\/a><\/td><td>Office for Android Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Remote Access Service Point-to-Point Tunneling Protocol<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23404\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23404<\/a><\/td><td>Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Role: DNS Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23400\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23400<\/a><\/td><td>Windows DNS Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Windows Hyper-V<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23411\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23411<\/a><\/td><td>Windows Hyper-V Denial of Service Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Service Fabric<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23383\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23383<\/a><\/td><td>Service Fabric Explorer Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23618\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23618<\/a><\/td><td>GitHub: CVE-2023-23618 Git for Windows Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-22743\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-22743<\/a><\/td><td>GitHub: CVE-2023-22743 Git for Windows Installer Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23946\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23946<\/a><\/td><td>GitHub: CVE-2023-23946 mingit Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-22490\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-22490<\/a><\/td><td>GitHub: CVE-2023-22490 mingit Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Accounts Control<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23412\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23412<\/a><\/td><td>Windows Accounts Picture Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Bluetooth Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24871\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24871<\/a><\/td><td>Windows Bluetooth Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Central Resource Manager<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23393\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23393<\/a><\/td><td>Windows BrokerInfrastructure Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Cryptographic Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23416\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23416<\/a><\/td><td>Windows Cryptographic Services Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Defender<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23389\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23389<\/a><\/td><td>Microsoft Defender Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows HTTP Protocol Stack<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23392\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23392<\/a><\/td><td>HTTP Protocol Stack Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows HTTP.sys<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23410\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23410<\/a><\/td><td>Windows HTTP.sys Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Internet Key Exchange (IKE) Protocol<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24859\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24859<\/a><\/td><td>Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23420\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23420<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23422\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23422<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23421\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23421<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23423\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23423<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Partition Management Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23417\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23417<\/a><\/td><td>Windows Partition Management Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Point-to-Point Protocol over Ethernet (PPPoE)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23407\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23407<\/a><\/td><td>Windows Point-to-Point Protocol over Ethernet (PPPoE) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Point-to-Point Protocol over Ethernet (PPPoE)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23385\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23385<\/a><\/td><td>Windows Point-to-Point Protocol over Ethernet (PPPoE) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Point-to-Point Protocol over Ethernet (PPPoE)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23414\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23414<\/a><\/td><td>Windows Point-to-Point Protocol over Ethernet (PPPoE) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Procedure Call<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21708\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-21708<\/a><\/td><td>Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Remote Procedure Call Runtime<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23405\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23405<\/a><\/td><td>Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Procedure Call Runtime<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24869\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24869<\/a><\/td><td>Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Procedure Call Runtime<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24908\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24908<\/a><\/td><td>Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Resilient File System (ReFS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23419\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23419<\/a><\/td><td>Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Resilient File System (ReFS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23418\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-23418<\/a><\/td><td>Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Channel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24862\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24862<\/a><\/td><td>Windows Secure Channel Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows SmartScreen<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24880\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24880<\/a><\/td><td>Windows SmartScreen Security Feature Bypass Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Windows TPM<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-1017\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-1017<\/a><\/td><td>CERT\/CC: CVE-2023-1017 TPM2.0 Module Library Elevation of Privilege Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows TPM<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-1018\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-1018<\/a><\/td><td>CERT\/CC: CVE-2023-1018 TPM2.0 Module Library Elevation of Privilege Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Win32K<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24861\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24861<\/a><\/td><td>Windows Graphics Component Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>Actualizar utilizando Microsoft Windows Update o herramientas de administracion de actualizaciones centralizadas.<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>CSIRT PANAMA<br>Computer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>E-Mail: info@cert.pa<br>Phone: +507 520-CERT (2378)<br>Web: https:\/\/cert.pa<br>Twitter: @CSIRTPanama<br>Facebook: http:\/\/www.facebook.com\/CSIRTPanama<br>Key ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2023-mar-16 Microsoft Libera actualizaciones que corrigen 2 dia cero y 83 fallas.Gravedad: AltaFecha de publicaci\u00f3n: marzo 16, 2023\u00daltima revisi\u00f3n: marzo023https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2023-Mar Sistemas Afectados:AzureClient Server Run-time Subsystem (CSRSS)Internet Control Message Protocol (ICMP)Microsoft Bluetooth DriverMicrosoft&#8230;<\/p>\n","protected":false},"author":4,"featured_media":1847,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,43,8,72,9,73,80,68,45,94],"class_list":["post-3264","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-alertas","tag-avisos","tag-avisos-de-seguridad","tag-microsoft","tag-parches","tag-vulnerabilidad","tag-vulnerabilidades","tag-windows","tag-windows-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3264","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3264"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3264\/revisions"}],"predecessor-version":[{"id":3265,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3264\/revisions\/3265"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1847"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3264"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3264"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3264"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}