{"id":3542,"date":"2023-09-14T09:22:24","date_gmt":"2023-09-14T14:22:24","guid":{"rendered":"https:\/\/cert.pa\/?p=3542"},"modified":"2023-09-14T09:22:24","modified_gmt":"2023-09-14T14:22:24","slug":"csirt-panama-aviso-2023-sep-14-microsoft-libera-actualizaciones-para-septiembre-y-corrige-2-zero-days-y-59-fallas","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=3542","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2023-sep-14 Microsoft libera actualizaciones para septiembre y corrige 2 zero-days y 59 fallas"},"content":{"rendered":"\n<p>Gravedad: Alta<br>Fecha de publicaci\u00f3n: Septiembre 14, 2023<br>\u00daltima revisi\u00f3n: Septiembre 13, 2023<br>https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2023-Sep<\/p>\n\n\n\n<p>Sistemas Afectados:<br>Microsoft Azure Kubernetes Service<br>Azure DevOps<br>Windows Cloud Files Mini Filter Driver<br>Microsoft Identity Linux Broker<br>3D Viewer<br>Visual Studio Code<br>Microsoft Exchange Server<br>Visual Studio<br>Microsoft Office Word<br>Microsoft Office Outlook<br>Microsoft Office SharePoint<br>Microsoft Office<br>Microsoft Office Excel<br>3D Builder<br>.NET Framework<br>.NET and Visual Studio<br>.NET Core &amp; Visual Studio<br>Microsoft Dynamics Finance &amp; Operations<br>Windows DHCP Server<br>Microsoft Streaming Service<br>Windows Kernel<br>Windows GDI<br>Windows Scripting<br>Microsoft Dynamics<br>Windows Common Log File System Driver<br>Windows Themes<br>Microsoft Windows Codecs Library<br>Windows Internet Connection Sharing (ICS)<br>Windows TCP\/IP<br>Azure HDInsights<br>Windows Defender<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>Microsoft ha liberado sus actualizaciones correspondientes al mes de Septiembre. En este caso corrige 59 fallas y 2 zero day.<\/p>\n\n\n\n<p>II. Detalles<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>.NET and Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36794\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36794<\/a><\/td><td>Visual Studio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>.NET and Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36796\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36796<\/a><\/td><td>Visual Studio Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>.NET and Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36792\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36792<\/a><\/td><td>Visual Studio Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>.NET and Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36793\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36793<\/a><\/td><td>Visual Studio Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>.NET Core &amp; Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36799\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36799<\/a><\/td><td>.NET Core and Visual Studio Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>.NET Framework<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36788\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36788<\/a><\/td><td>.NET Framework Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>3D Builder<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36772\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36772<\/a><\/td><td>3D Builder Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>3D Builder<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36771\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36771<\/a><\/td><td>3D Builder Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>3D Builder<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36770\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36770<\/a><\/td><td>3D Builder Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>3D Builder<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36773\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36773<\/a><\/td><td>3D Builder Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>3D Viewer<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-41303\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-41303<\/a><\/td><td>AutoDesk: CVE-2022-41303 use-after-free vulnerability in Autodesk\u00ae FBX\u00ae SDK 2020 or prior<\/td><td>Important<\/td><\/tr><tr><td>3D Viewer<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36760\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36760<\/a><\/td><td>3D Viewer Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>3D Viewer<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36740\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36740<\/a><\/td><td>3D Viewer Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>3D Viewer<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36739\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36739<\/a><\/td><td>3D Viewer Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure DevOps<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-33136\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-33136<\/a><\/td><td>Azure DevOps Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure DevOps<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-38155\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38155<\/a><\/td><td>Azure DevOps Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure HDInsights<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-38156\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38156<\/a><\/td><td>Azure HDInsight Apache Ambari Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Azure Kubernetes Service<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-29332\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29332<\/a><\/td><td>Microsoft Azure Kubernetes Service Elevation of Privilege Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-38164\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38164<\/a><\/td><td>Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36886\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36886<\/a><\/td><td>Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics Finance &amp; Operations<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36800\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36800<\/a><\/td><td>Dynamics Finance and Operations Cross-site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-4863\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-4863<\/a><\/td><td>Chromium: CVE-2023-4863 Heap buffer overflow in WebP<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-4763\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-4763<\/a><\/td><td>Chromium: CVE-2023-4763 Use after free in Networks<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-4761\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-4761<\/a><\/td><td>Chromium: CVE-2023-4761 Out of bounds memory access in FedCM<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-4764\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-4764<\/a><\/td><td>Chromium: CVE-2023-4764 Incorrect security UI in BFCache<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-4762\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-4762<\/a><\/td><td>Chromium: CVE-2023-4762 Type Confusion in V8<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36744\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36744<\/a><\/td><td>Microsoft Exchange Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36756\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36756<\/a><\/td><td>Microsoft Exchange Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36745\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36745<\/a><\/td><td>Microsoft Exchange Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36777\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36777<\/a><\/td><td>Microsoft Exchange Server Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36757\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36757<\/a><\/td><td>Microsoft Exchange Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Identity Linux Broker<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36736\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36736<\/a><\/td><td>Microsoft Identity Linux Broker Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36767\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36767<\/a><\/td><td>Microsoft Office Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36765\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36765<\/a><\/td><td>Microsoft Office Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-41764\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-41764<\/a><\/td><td>Microsoft Office Spoofing Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36766\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36766<\/a><\/td><td>Microsoft Excel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Outlook<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36763\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36763<\/a><\/td><td>Microsoft Outlook Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36764\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36764<\/a><\/td><td>Microsoft SharePoint Server Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Word<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36761\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36761<\/a><\/td><td>Microsoft Word Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Word<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36762\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36762<\/a><\/td><td>Microsoft Word Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Streaming Service<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36802\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36802<\/a><\/td><td>Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-38147\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38147<\/a><\/td><td>Windows Miracast Wireless Display Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36758\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36758<\/a><\/td><td>Visual Studio Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36759\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36759<\/a><\/td><td>Visual Studio Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio Code<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36742\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36742<\/a><\/td><td>Visual Studio Code Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio Code<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-39956\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-39956<\/a><\/td><td>Electron: CVE-2023-39956 -Visual Studio Code Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Cloud Files Mini Filter Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-35355\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35355<\/a><\/td><td>Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Common Log File System Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-38143\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38143<\/a><\/td><td>Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Common Log File System Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-38144\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38144<\/a><\/td><td>Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Defender<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-38163\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38163<\/a><\/td><td>Windows Defender Attack Surface Reduction Security Feature Bypass<\/td><td>Important<\/td><\/tr><tr><td>Windows DHCP Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-38152\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38152<\/a><\/td><td>DHCP Server Service Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DHCP Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-38162\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38162<\/a><\/td><td>DHCP Server Service Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DHCP Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36801\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36801<\/a><\/td><td>DHCP Server Service Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows GDI<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36804\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36804<\/a><\/td><td>Windows GDI Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows GDI<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-38161\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38161<\/a><\/td><td>Windows GDI Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Internet Connection Sharing (ICS)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-38148\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38148<\/a><\/td><td>Internet Connection Sharing (ICS) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-38141\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38141<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-38142\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38142<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-38139\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38139<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-38140\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38140<\/a><\/td><td>Windows Kernel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-38150\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38150<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36803\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36803<\/a><\/td><td>Windows Kernel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Scripting<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36805\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36805<\/a><\/td><td>Windows MSHTML Platform Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows TCP\/IP<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-38160\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38160<\/a><\/td><td>Windows TCP\/IP Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows TCP\/IP<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-38149\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38149<\/a><\/td><td>Windows TCP\/IP Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Themes<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-38146\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38146<\/a><\/td><td>Windows Themes Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>Actualizar su sistema operativo windows utilizando windows update o herramientas para gestionar la automatizacion.<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>CSIRT PANAMA<br>Computer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>E-Mail: info@cert.pa<br>Phone: +507 520-CERT (2378)<br>Web: https:\/\/cert.pa<br>Twitter: @CSIRTPanama<br>Facebook: http:\/\/www.facebook.com\/CSIRTPanama<br>Key ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Gravedad: AltaFecha de publicaci\u00f3n: Septiembre 14, 2023\u00daltima revisi\u00f3n: Septiembre 13, 2023https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2023-Sep Sistemas Afectados:Microsoft Azure Kubernetes ServiceAzure DevOpsWindows Cloud Files Mini Filter DriverMicrosoft Identity Linux Broker3D ViewerVisual Studio CodeMicrosoft Exchange ServerVisual StudioMicrosoft Office WordMicrosoft Office OutlookMicrosoft&#8230;<\/p>\n","protected":false},"author":4,"featured_media":1847,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,43,8,72,9,73,68,45,94],"class_list":["post-3542","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-alertas","tag-avisos","tag-avisos-de-seguridad","tag-microsoft","tag-parches","tag-vulnerabilidades","tag-windows","tag-windows-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3542","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3542"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3542\/revisions"}],"predecessor-version":[{"id":3543,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3542\/revisions\/3543"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1847"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3542"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3542"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}