{"id":3484,"date":"2023-08-08T14:47:18","date_gmt":"2023-08-08T19:47:18","guid":{"rendered":"https:\/\/cert.pa\/?p=3484"},"modified":"2023-08-08T14:47:18","modified_gmt":"2023-08-08T19:47:18","slug":"csirt-panama-aviso-2023-ago-15-actualizaciones-de-seguridad-de-microsoft-para-agosto","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=3484","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2023-ago-15 Actualizaciones de seguridad de Microsoft para Agosto."},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2023-ago-15 Actualizaciones de seguridad de Microsoft para Agosto.<br>Gravedad: Alta<br>Fecha de publicaci\u00f3n: agosto 8, 2023<br>\u00daltima revisi\u00f3n: agosto 8, 2023<br>https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2023-Aug<\/p>\n\n\n\n<p>Sistemas Afectados:Microsoft Office<br>Memory Integrity System Readiness Scan Tool<br>Microsoft Exchange Server<br>Microsoft Teams<br>Windows Kernel<br>Microsoft Office Excel<br>Microsoft Office Visio<br>Windows Message Queuing<br>Windows Projected File System<br>Windows Reliability Analysis Metrics Calculation Engine<br>Windows Fax and Scan Service<br>Windows HTML Platform<br>Windows Bluetooth A2DP driver<br>Microsoft Dynamics<br>.NET Core<br>ASP.NET and Visual Studio<br>Azure HDInsights<br>Azure DevOps<br>.NET Framework<br>Reliability Analysis Metrics Calculation Engine<br>Microsoft WDAC OLE DB provider for SQL<br>Windows Group Policy<br>Microsoft Office SharePoint<br>Microsoft Office Outlook<br>Tablet Windows User Interface<br>ASP.NET<br>Windows Common Log File System Driver<br>Windows System Assessment Tool<br>Windows Cloud Files Mini Filter Driver<br>Windows Wireless Wide Area Network Service<br>Windows Cryptographic Services<br>Role: Windows Hyper-V<br>Windows Smart Card<br>Microsoft Edge (Chromium-based)<br>Dynamics Business Central Control<br>SQL Server<br>Microsoft Windows Codecs Library<br>Windows Defender<br>Azure Arc<br>ASP .NET<br>Windows LDAP &#8211; Lightweight Directory Access Protocol<br>Windows Mobile Device Management<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>Microsoft ha liberado sus actualizaciones de seguridad correspondientes al mes de agosto.<br>Este conjunto de actualizaciones remedia 87 fallas y se advierte de 2 dia cero.<\/p>\n\n\n\n<p>II. Detalle<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>.NET Core<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-38178\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38178<\/a><\/td><td>.NET Core and Visual Studio Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>.NET Core<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-35390\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35390<\/a><\/td><td>.NET and Visual Studio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>.NET Framework<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36873\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36873<\/a><\/td><td>.NET Framework Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>ASP .NET<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-38180\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38180<\/a><\/td><td>.NET and Visual Studio Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>ASP.NET<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36899\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36899<\/a><\/td><td>ASP.NET Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>ASP.NET and Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-35391\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35391<\/a><\/td><td>ASP.NET Core SignalR and Visual Studio Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Arc<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-38176\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38176<\/a><\/td><td>Azure Arc-Enabled Servers Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure DevOps<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36869\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36869<\/a><\/td><td>Azure DevOps Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure HDInsights<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-38188\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38188<\/a><\/td><td>Azure Apache Hadoop Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure HDInsights<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-35393\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35393<\/a><\/td><td>Azure Apache Hive Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure HDInsights<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-35394\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35394<\/a><\/td><td>Azure HDInsight Jupyter Notebook Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure HDInsights<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36881\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36881<\/a><\/td><td>Azure Apache Ambari Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure HDInsights<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36877\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36877<\/a><\/td><td>Azure Apache Oozie Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Dynamics Business Central Control<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-38167\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38167<\/a><\/td><td>Microsoft Dynamics Business Central Elevation Of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-35945\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35945<\/a><\/td><td>Unknown<\/td><td>Unknown<\/td><\/tr><tr><td>Memory Integrity System Readiness Scan Tool<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/ADV230004\" rel=\"noreferrer noopener\" target=\"_blank\">ADV230004<\/a><\/td><td>Memory Integrity System Readiness Scan Tool Defense in Depth Update<\/td><td>Moderate<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-35389\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35389<\/a><\/td><td>Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-38157\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38157<\/a><\/td><td>Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-4068\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-4068<\/a><\/td><td>Chromium: CVE-2023-4068 Type Confusion in V8<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-4072\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-4072<\/a><\/td><td>Chromium: CVE-2023-4072 Out of bounds read and write in WebGL<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-4071\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-4071<\/a><\/td><td>Chromium: CVE-2023-4071 Heap buffer overflow in Visuals<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-4073\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-4073<\/a><\/td><td>Chromium: CVE-2023-4073 Out of bounds memory access in ANGLE<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-4075\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-4075<\/a><\/td><td>Chromium: CVE-2023-4075 Use after free in Cast<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-4074\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-4074<\/a><\/td><td>Chromium: CVE-2023-4074 Use after free in Blink Task Scheduling<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-4076\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-4076<\/a><\/td><td>Chromium: CVE-2023-4076 Use after free in WebRTC<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-4077\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-4077<\/a><\/td><td>Chromium: CVE-2023-4077 Insufficient data validation in Extensions<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-4078\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-4078<\/a><\/td><td>Chromium: CVE-2023-4078 Inappropriate implementation in Extensions<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-4070\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-4070<\/a><\/td><td>Chromium: CVE-2023-4070 Type Confusion in V8<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-4069\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-4069<\/a><\/td><td>Chromium: CVE-2023-4069 Type Confusion in V8<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-38185\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38185<\/a><\/td><td>Microsoft Exchange Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-35388\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35388<\/a><\/td><td>Microsoft Exchange Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-35368\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35368<\/a><\/td><td>Microsoft Exchange Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-38181\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38181<\/a><\/td><td>Microsoft Exchange Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-38182\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38182<\/a><\/td><td>Microsoft Exchange Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-21709\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-21709<\/a><\/td><td>Microsoft Exchange Server Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/ADV230003\" rel=\"noreferrer noopener\" target=\"_blank\">ADV230003<\/a><\/td><td>Microsoft Office Defense in Depth Update<\/td><td>Moderate<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36897\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36897<\/a><\/td><td>Visual Studio Tools for Office Runtime Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36896\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36896<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-35371\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35371<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Outlook<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36893\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36893<\/a><\/td><td>Microsoft Outlook Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Outlook<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36895\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36895<\/a><\/td><td>Microsoft Outlook Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36891\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36891<\/a><\/td><td>Microsoft SharePoint Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36894\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36894<\/a><\/td><td>Microsoft SharePoint Server Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36890\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36890<\/a><\/td><td>Microsoft SharePoint Server Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36892\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36892<\/a><\/td><td>Microsoft SharePoint Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Visio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-35372\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35372<\/a><\/td><td>Microsoft Office Visio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Visio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36865\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36865<\/a><\/td><td>Microsoft Office Visio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Visio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36866\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36866<\/a><\/td><td>Microsoft Office Visio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Teams<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-29328\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29328<\/a><\/td><td>Microsoft Teams Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Teams<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-29330\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29330<\/a><\/td><td>Microsoft Teams Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft WDAC OLE DB provider for SQL<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36882\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36882<\/a><\/td><td>Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-20569\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-20569<\/a><\/td><td>AMD: CVE-2023-20569 Return Address Predictor<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-38170\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38170<\/a><\/td><td>HEVC Video Extensions Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Reliability Analysis Metrics Calculation Engine<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36876\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36876<\/a><\/td><td>Reliability Analysis Metrics Calculation (RacTask) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Windows Hyper-V<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36908\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36908<\/a><\/td><td>Windows Hyper-V Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-38169\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38169<\/a><\/td><td>Microsoft OLE DB Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Tablet Windows User Interface<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36898\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36898<\/a><\/td><td>Tablet Windows User Interface Application Core Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Bluetooth A2DP driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-35387\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35387<\/a><\/td><td>Windows Bluetooth A2DP driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Cloud Files Mini Filter Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36904\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36904<\/a><\/td><td>Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Common Log File System Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36900\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36900<\/a><\/td><td>Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Cryptographic Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36907\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36907<\/a><\/td><td>Windows Cryptographic Services Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Cryptographic Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36906\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36906<\/a><\/td><td>Windows Cryptographic Services Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Defender<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-38175\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38175<\/a><\/td><td>Microsoft Windows Defender Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Fax and Scan Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-35381\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35381<\/a><\/td><td>Windows Fax Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Group Policy<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36889\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36889<\/a><\/td><td>Windows Group Policy Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows HTML Platform<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-35384\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35384<\/a><\/td><td>Windows HTML Platforms Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-35359\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35359<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-38154\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38154<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-35382\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35382<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-35386\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35386<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-35380\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35380<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows LDAP &#8211; Lightweight Directory Access Protocol<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-38184\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38184<\/a><\/td><td>Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Message Queuing<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36909\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36909<\/a><\/td><td>Microsoft Message Queuing Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Message Queuing<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-35376\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35376<\/a><\/td><td>Microsoft Message Queuing Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Message Queuing<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-38172\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38172<\/a><\/td><td>Microsoft Message Queuing Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Message Queuing<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-35385\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35385<\/a><\/td><td>Microsoft Message Queuing Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Message Queuing<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-35383\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35383<\/a><\/td><td>Microsoft Message Queuing Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Message Queuing<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36913\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36913<\/a><\/td><td>Microsoft Message Queuing Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Message Queuing<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-35377\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35377<\/a><\/td><td>Microsoft Message Queuing Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Message Queuing<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-38254\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38254<\/a><\/td><td>Microsoft Message Queuing Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Message Queuing<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36911\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36911<\/a><\/td><td>Microsoft Message Queuing Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Message Queuing<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36910\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36910<\/a><\/td><td>Microsoft Message Queuing Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Message Queuing<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36912\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36912<\/a><\/td><td>Microsoft Message Queuing Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Mobile Device Management<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-38186\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38186<\/a><\/td><td>Windows Mobile Device Management Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Projected File System<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-35378\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35378<\/a><\/td><td>Windows Projected File System Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Reliability Analysis Metrics Calculation Engine<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-35379\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35379<\/a><\/td><td>Reliability Analysis Metrics Calculation Engine (RACEng) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Smart Card<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36914\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36914<\/a><\/td><td>Windows Smart Card Resource Management Server Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows System Assessment Tool<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36903\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36903<\/a><\/td><td>Windows System Assessment Tool Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Wireless Wide Area Network Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36905\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36905<\/a><\/td><td>Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>Actualizar utilizando Microsoft Windows Update o herramientas de administracion de actualizaciones centralizadas.<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>CSIRT PANAMA<br>Computer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>E-Mail: info@cert.pa<br>Phone: +507 520-CERT (2378)<br>Web: https:\/\/cert.pa<br>Twitter: @CSIRTPanama<br>Key ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2023-ago-15 Actualizaciones de seguridad de Microsoft para Agosto.Gravedad: AltaFecha de publicaci\u00f3n: agosto 8, 2023\u00daltima revisi\u00f3n: agosto 8, 2023https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2023-Aug Sistemas Afectados:Microsoft OfficeMemory Integrity System Readiness Scan ToolMicrosoft Exchange ServerMicrosoft TeamsWindows KernelMicrosoft Office ExcelMicrosoft&#8230;<\/p>\n","protected":false},"author":4,"featured_media":1847,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[66],"tags":[76,43,8,72,9,73,80,68,45,94],"class_list":["post-3484","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-csirt-panama","tag-actualizaciones","tag-alertas","tag-avisos","tag-avisos-de-seguridad","tag-microsoft","tag-parches","tag-vulnerabilidad","tag-vulnerabilidades","tag-windows","tag-windows-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3484","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3484"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3484\/revisions"}],"predecessor-version":[{"id":3485,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3484\/revisions\/3485"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1847"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3484"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3484"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3484"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}