{"id":3670,"date":"2023-12-13T15:16:41","date_gmt":"2023-12-13T20:16:41","guid":{"rendered":"https:\/\/cert.pa\/?p=3670"},"modified":"2023-12-13T15:16:42","modified_gmt":"2023-12-13T20:16:42","slug":"csirt-panama-aviso-2023-dic-13-actualizaciones-de-seguridad-de-microsoft-para-diciembre","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=3670","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2023-dic-13 Actualizaciones de seguridad de Microsoft para Diciembre."},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2023-dic-13 Actualizaciones de seguridad de Microsoft para Diciembre.<br>Gravedad: Alta<br>Fecha de publicaci\u00f3n: diciembre 13, 2023<br>\u00daltima revisi\u00f3n: diciembre 13, 2023<br>https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2023-Dec<\/p>\n\n\n\n<p>Sistemas Afectados:<br>Windows Media<br>Microsoft Edge (Chromium-based)<br>Microsoft Office Outlook<br>Microsoft Dynamics<br>Microsoft Windows DNS<br>Azure Connected Machine Agent<br>Azure Machine Learning<br>Windows MSHTML Platform<br>Windows USB Mass Storage Class Driver<br>Windows Internet Connection Sharing (ICS)<br>Windows Win32K<br>Windows Kernel<br>Microsoft Bluetooth Driver<br>Windows DHCP Server<br>Windows ODBC Driver<br>Windows Kernel-Mode Drivers<br>XAML Diagnostics<br>Windows DPAPI (Data Protection Application Programming Interface)<br>Windows Telephony Server<br>Microsoft WDAC OLE DB provider for SQL<br>Microsoft Office Word<br>Windows Defender<br>Microsoft Power Platform Connector<br>Windows Local Security Authority Subsystem Service (LSASS)<br>Windows Cloud Files Mini Filter Driver<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>Microsoft ha liberado sus actualizaciones de seguridad correspondientes al mes de diciembre.<br>Este conjunto de actualizaciones remedia 34 fallas y 1 dia cero.<\/p>\n\n\n\n<p>II. Detalle<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>Azure Connected Machine Agent<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-35624\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35624<\/a><\/td><td>Azure Connected Machine Agent Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Machine Learning<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-35625\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35625<\/a><\/td><td>Azure Machine Learning Compute Instance for SDK Users Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Chipsets<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-20588\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-20588<\/a><\/td><td>AMD: CVE-2023-20588 AMD Speculative Leaks Security Notice<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Bluetooth Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-35634\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35634<\/a><\/td><td>Windows Bluetooth Driver Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-35621\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35621<\/a><\/td><td>Microsoft Dynamics 365 Finance and Operations Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36020\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36020<\/a><\/td><td>Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-35618\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35618<\/a><\/td><td>Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36880\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36880<\/a><\/td><td>Microsoft Edge (Chromium-based) Information Disclosure Vulnerability<\/td><td>Low<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-38174\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-38174<\/a><\/td><td>Microsoft Edge (Chromium-based) Information Disclosure Vulnerability<\/td><td>Low<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-6509\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-6509<\/a><\/td><td>Chromium: CVE-2023-6509 Use after free in Side Panel Search<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-6512\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-6512<\/a><\/td><td>Chromium: CVE-2023-6512 Inappropriate implementation in Web Browser UI<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-6508\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-6508<\/a><\/td><td>Chromium: CVE-2023-6508 Use after free in Media Stream<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-6511\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-6511<\/a><\/td><td>Chromium: CVE-2023-6511 Inappropriate implementation in Autofill<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-6510\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-6510<\/a><\/td><td>Chromium: CVE-2023-6510 Use after free in Media Capture<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Office Outlook<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-35636\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35636<\/a><\/td><td>Microsoft Outlook Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Outlook<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-35619\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35619<\/a><\/td><td>Microsoft Outlook for Mac Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Word<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36009\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36009<\/a><\/td><td>Microsoft Word Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Power Platform Connector<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36019\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36019<\/a><\/td><td>Microsoft Power Platform Connector Spoofing Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft WDAC OLE DB provider for SQL<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36006\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36006<\/a><\/td><td>Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows DNS<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-35622\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35622<\/a><\/td><td>Windows DNS Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Cloud Files Mini Filter Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36696\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36696<\/a><\/td><td>Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Defender<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36010\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36010<\/a><\/td><td>Microsoft Defender Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DHCP Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-35643\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35643<\/a><\/td><td>DHCP Server Service Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DHCP Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-35638\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35638<\/a><\/td><td>DHCP Server Service Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DHCP Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36012\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36012<\/a><\/td><td>DHCP Server Service Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DPAPI (Data Protection Application Programming Interface)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36004\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36004<\/a><\/td><td>Windows DPAPI (Data Protection Application Programming Interface) Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Internet Connection Sharing (ICS)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-35642\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35642<\/a><\/td><td>Internet Connection Sharing (ICS) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Internet Connection Sharing (ICS)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-35630\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35630<\/a><\/td><td>Internet Connection Sharing (ICS) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Internet Connection Sharing (ICS)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-35632\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35632<\/a><\/td><td>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Internet Connection Sharing (ICS)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-35641\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35641<\/a><\/td><td>Internet Connection Sharing (ICS) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-35633\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35633<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-35635\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35635<\/a><\/td><td>Windows Kernel Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel-Mode Drivers<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-35644\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35644<\/a><\/td><td>Windows Sysmain Service Elevation of Privilege<\/td><td>Important<\/td><\/tr><tr><td>Windows Local Security Authority Subsystem Service (LSASS)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36391\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36391<\/a><\/td><td>Local Security Authority Subsystem Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Media<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-21740\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-21740<\/a><\/td><td>Windows Media Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows MSHTML Platform<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-35628\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35628<\/a><\/td><td>Windows MSHTML Platform Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows ODBC Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-35639\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35639<\/a><\/td><td>Microsoft ODBC Driver Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36005\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36005<\/a><\/td><td>Windows Telephony Server Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows USB Mass Storage Class Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-35629\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35629<\/a><\/td><td>Microsoft USBHUB 3.0 Device Driver Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Win32K<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36011\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36011<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Win32K<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-35631\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-35631<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>XAML Diagnostics<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2023-36003\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-36003<\/a><\/td><td>XAML Diagnostics Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>Actualizar utilizando Microsoft Windows Update o herramientas de administracion de actualizaciones centralizadas.<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>CSIRT PANAMA<br>Computer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>E-Mail: info@cert.pa<br>Phone: +507 520-CERT (2378)<br>Web: https:\/\/cert.pa<br>Twitter: @CSIRTPanama<br>Key ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2023-dic-13 Actualizaciones de seguridad de Microsoft para Diciembre.Gravedad: AltaFecha de publicaci\u00f3n: diciembre 13, 2023\u00daltima revisi\u00f3n: diciembre 13, 2023https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2023-Dec Sistemas Afectados:Windows MediaMicrosoft Edge (Chromium-based)Microsoft Office OutlookMicrosoft DynamicsMicrosoft Windows DNSAzure Connected Machine AgentAzure Machine&#8230;<\/p>\n","protected":false},"author":4,"featured_media":1847,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,43,8,72,9,73,80,68,45,94],"class_list":["post-3670","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-alertas","tag-avisos","tag-avisos-de-seguridad","tag-microsoft","tag-parches","tag-vulnerabilidad","tag-vulnerabilidades","tag-windows","tag-windows-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3670","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3670"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3670\/revisions"}],"predecessor-version":[{"id":3671,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3670\/revisions\/3671"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1847"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3670"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3670"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3670"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}