{"id":3722,"date":"2024-02-15T14:42:02","date_gmt":"2024-02-15T19:42:02","guid":{"rendered":"https:\/\/cert.pa\/?p=3722"},"modified":"2024-02-15T14:42:04","modified_gmt":"2024-02-15T19:42:04","slug":"csirt-panama-aviso-2024-feb-15-microsoft-publica-actualizaciones-que-corrigen-73-fallas-y-2-dia-cero","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=3722","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2024-feb-15 Microsoft publica actualizaciones que corrigen 73 fallas y 2 dia cero"},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2024-feb-15 Microsoft publica actualizaciones que corrigen 73 fallas y 2 dia cero<br>Gravedad: Alta<br>Fecha de publicaci\u00f3n: Febrero 15, 2024<br>\u00daltima revisi\u00f3n: Febrero 15, 2024<br>https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2024-Feb<\/p>\n\n\n\n<p>Sistemas Afectados:<br>Azure DevOps<br>Microsoft Office<br>Azure Stack<br>Windows Hyper-V<br>Skype for Business<br>Trusted Compute Base<br>Microsoft Defender for Endpoint<br>Microsoft Dynamics<br>Azure Connected Machine Agent<br>Windows Kernel<br>Windows USB Serial Driver<br>Role: DNS Server<br>Windows Internet Connection Sharing (ICS)<br>Windows Win32K &#8211; ICOMP<br>SQL Server<br>Microsoft ActiveX<br>Microsoft WDAC OLE DB provider for SQL<br>Windows SmartScreen<br>Microsoft WDAC ODBC Driver<br>Windows Message Queuing<br>Windows LDAP &#8211; Lightweight Directory Access Protocol<br>Azure Site Recovery<br>Windows OLE<br>Microsoft Teams for Android<br>Microsoft Azure Kubernetes Service<br>Microsoft Windows DNS<br>Microsoft Office Outlook<br>Microsoft Office Word<br>Azure Active Directory<br>Microsoft Office OneNote<br>.NET<br>Azure File Sync<br>Microsoft Edge (Chromium-based)<br>Microsoft Windows<br>Microsoft Exchange Server<br>Internet Shortcut Files<\/p>\n\n\n\n<p>I. Descripci\u00f3n<\/p>\n\n\n\n<p>El Patch Tuesday de Febrero consiste en actualizaciones de seguridad para los siguientes aplicativos:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>.NET<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21386\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21386<\/a><\/td><td>.NET Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>.NET<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21404\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21404<\/a><\/td><td>.NET Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Active Directory<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21401\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21401<\/a><\/td><td>Microsoft Entra Jira Single-Sign-On Plugin Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Active Directory<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21381\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21381<\/a><\/td><td>Microsoft Azure Active Directory B2C Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Connected Machine Agent<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21329\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21329<\/a><\/td><td>Azure Connected Machine Agent Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure DevOps<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-20667\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-20667<\/a><\/td><td>Azure DevOps Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure File Sync<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21397\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21397<\/a><\/td><td>Microsoft Azure File Sync Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21364\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21364<\/a><\/td><td>Microsoft Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Azure Stack<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-20679\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-20679<\/a><\/td><td>Azure Stack Hub Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Internet Shortcut Files<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21412\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21412<\/a><\/td><td>Internet Shortcut Files Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21626\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21626<\/a><\/td><td>Unknown<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft ActiveX<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21349\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21349<\/a><\/td><td>Microsoft ActiveX Data Objects Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Azure Kubernetes Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21403\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21403<\/a><\/td><td>Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Azure Kubernetes Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21376\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21376<\/a><\/td><td>Microsoft Azure Kubernetes Service Confidential Container Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Defender for Endpoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21315\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21315<\/a><\/td><td>Microsoft Defender for Endpoint Protection Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21393\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21393<\/a><\/td><td>Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21389\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21389<\/a><\/td><td>Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21395\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21395<\/a><\/td><td>Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21380\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21380<\/a><\/td><td>Microsoft Dynamics Business Central\/NAV Information Disclosure Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21328\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21328<\/a><\/td><td>Dynamics 365 Sales Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21394\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21394<\/a><\/td><td>Dynamics 365 Field Service Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21396\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21396<\/a><\/td><td>Dynamics 365 Sales Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21327\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21327<\/a><\/td><td>Microsoft Dynamics 365 Customer Engagement Cross-Site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-1284\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-1284<\/a><\/td><td>Chromium: CVE-2024-1284 Use after free in Mojo<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21399\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21399<\/a><\/td><td>Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-1060\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-1060<\/a><\/td><td>Chromium: CVE-2024-1060 Use after free in Canvas<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-1077\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-1077<\/a><\/td><td>Chromium: CVE-2024-1077 Use after free in Network<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-1283\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-1283<\/a><\/td><td>Chromium: CVE-2024-1283 Heap buffer overflow in Skia<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-1059\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-1059<\/a><\/td><td>Chromium: CVE-2024-1059 Use after free in WebRTC<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21410\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21410<\/a><\/td><td>Microsoft Exchange Server Elevation of Privilege Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21413\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21413<\/a><\/td><td>Microsoft Outlook Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-20673\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-20673<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office OneNote<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21384\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21384<\/a><\/td><td>Microsoft Office OneNote Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Outlook<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21378\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21378<\/a><\/td><td>Microsoft Outlook Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Outlook<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21402\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21402<\/a><\/td><td>Microsoft Outlook Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Word<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21379\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21379<\/a><\/td><td>Microsoft Word Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Teams for Android<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21374\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21374<\/a><\/td><td>Microsoft Teams for Android Information Disclosure<\/td><td>Important<\/td><\/tr><tr><td>Microsoft WDAC ODBC Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21353\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21353<\/a><\/td><td>Microsoft WDAC ODBC Driver Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft WDAC OLE DB provider for SQL<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21370\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21370<\/a><\/td><td>Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft WDAC OLE DB provider for SQL<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21350\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21350<\/a><\/td><td>Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft WDAC OLE DB provider for SQL<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21368\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21368<\/a><\/td><td>Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft WDAC OLE DB provider for SQL<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21359\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21359<\/a><\/td><td>Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft WDAC OLE DB provider for SQL<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21365\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21365<\/a><\/td><td>Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft WDAC OLE DB provider for SQL<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21367\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21367<\/a><\/td><td>Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft WDAC OLE DB provider for SQL<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21420\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21420<\/a><\/td><td>Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft WDAC OLE DB provider for SQL<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21366\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21366<\/a><\/td><td>Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft WDAC OLE DB provider for SQL<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21369\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21369<\/a><\/td><td>Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft WDAC OLE DB provider for SQL<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21375\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21375<\/a><\/td><td>Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft WDAC OLE DB provider for SQL<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21361\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21361<\/a><\/td><td>Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft WDAC OLE DB provider for SQL<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21358\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21358<\/a><\/td><td>Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft WDAC OLE DB provider for SQL<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21391\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21391<\/a><\/td><td>Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft WDAC OLE DB provider for SQL<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21360\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21360<\/a><\/td><td>Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft WDAC OLE DB provider for SQL<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21352\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21352<\/a><\/td><td>Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21406\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21406<\/a><\/td><td>Windows Printing Service Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows DNS<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21377\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21377<\/a><\/td><td>Windows DNS Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: DNS Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2023-50387\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-50387<\/a><\/td><td>MITRE: CVE-2023-50387 DNSSEC verification complexity can be exploited to exhaust CPU resources and stall DNS resolvers<\/td><td>Important<\/td><\/tr><tr><td>Role: DNS Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21342\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21342<\/a><\/td><td>Windows DNS Client Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Skype for Business<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-20695\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-20695<\/a><\/td><td>Skype for Business Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21347\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21347<\/a><\/td><td>Microsoft ODBC Driver Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Trusted Compute Base<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21304\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21304<\/a><\/td><td>Trusted Compute Base Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-20684\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-20684<\/a><\/td><td>Windows Hyper-V Denial of Service Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Internet Connection Sharing (ICS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21343\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21343<\/a><\/td><td>Windows Network Address Translation (NAT) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Internet Connection Sharing (ICS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21348\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21348<\/a><\/td><td>Internet Connection Sharing (ICS) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Internet Connection Sharing (ICS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21357\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21357<\/a><\/td><td>Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Internet Connection Sharing (ICS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21344\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21344<\/a><\/td><td>Windows Network Address Translation (NAT) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21371\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21371<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21338\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21338<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21341\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21341<\/a><\/td><td>Windows Kernel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21345\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21345<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21362\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21362<\/a><\/td><td>Windows Kernel Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21340\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21340<\/a><\/td><td>Windows Kernel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows LDAP &#8211; Lightweight Directory Access Protocol<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21356\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21356<\/a><\/td><td>Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Message Queuing<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21363\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21363<\/a><\/td><td>Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Message Queuing<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21355\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21355<\/a><\/td><td>Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Message Queuing<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21405\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21405<\/a><\/td><td>Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Message Queuing<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21354\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21354<\/a><\/td><td>Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows OLE<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21372\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21372<\/a><\/td><td>Windows OLE Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows SmartScreen<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21351\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21351<\/a><\/td><td>Windows SmartScreen Security Feature Bypass Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Windows USB Serial Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21339\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21339<\/a><\/td><td>Windows USB Generic Parent Driver Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Win32K &#8211; ICOMP<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21346\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21346<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>II. Referencia a soluciones, herramientas e informaci\u00f3n<\/p>\n\n\n\n<p>Se recomienda actualizar los equipos utilizando windows update.<\/p>\n\n\n\n<p>III. Informaci\u00f3n de contacto<br>CSIRT PANAMA<br>Computer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>E-Mail: info@cert.pa<br>Phone: +507 520-CERT (2378)<br>Web: https:\/\/cert.pa<br>Twitter: @CSIRTPanama<br>Facebook: http:\/\/www.facebook.com\/CSIRTPanama<br>Key ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2024-feb-15 Microsoft publica actualizaciones que corrigen 73 fallas y 2 dia ceroGravedad: AltaFecha de publicaci\u00f3n: Febrero 15, 2024\u00daltima revisi\u00f3n: Febrero 15, 2024https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2024-Feb Sistemas Afectados:Azure DevOpsMicrosoft OfficeAzure StackWindows Hyper-VSkype for BusinessTrusted Compute BaseMicrosoft&#8230;<\/p>\n","protected":false},"author":4,"featured_media":1847,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,72,9,73,80,68,45,94],"class_list":["post-3722","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-avisos-de-seguridad","tag-microsoft","tag-parches","tag-vulnerabilidad","tag-vulnerabilidades","tag-windows","tag-windows-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3722","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3722"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3722\/revisions"}],"predecessor-version":[{"id":3723,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3722\/revisions\/3723"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1847"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3722"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3722"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}