{"id":4050,"date":"2024-11-13T08:51:09","date_gmt":"2024-11-13T13:51:09","guid":{"rendered":"https:\/\/cert.pa\/?p=4050"},"modified":"2024-11-13T08:51:11","modified_gmt":"2024-11-13T13:51:11","slug":"csirt-panama-aviso-2024-nov-13-actualizaciones-de-seguridad-de-microsoft-para-noviembre-2024","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=4050","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2024-nov-13 Actualizaciones de seguridad de Microsoft para Noviembre 2024."},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2024-nov-13 Actualizaciones de seguridad de Microsoft para Noviembre 2024.<br>Gravedad: Alta<br>Fecha de publicaci\u00f3n: noviembre 13, 2024<br>\u00daltima revisi\u00f3n: septiembre 13, 2024<br>https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2024-Nov<\/p>\n\n\n\n<p>Sistemas Afectados:<br>Windows Package Library Manager<br>SQL Server<br>Microsoft Virtual Hard Drive<br>Windows SMBv3 Client\/Server<br>Windows USB Video Driver<br>Microsoft Windows DNS<br>Windows NTLM<br>Windows Registry<br>.NET and Visual Studio<br>Windows Update Stack<br>LightGBM<br>Azure CycleCloud<br>Azure Database for PostgreSQL<br>Windows Telephony Service<br>Windows NT OS Kernel<br>Role: Windows Hyper-V<br>Windows VMSwitch<br>Windows DWM Core Library<br>Windows Kernel<br>Windows Secure Kernel Mode<br>Windows Kerberos<br>Windows SMB<br>Windows CSC Service<br>Windows Defender Application Control (WDAC)<br>Windows Active Directory Certificate Services<br>Microsoft Office Excel<br>Microsoft Graphics Component<br>Microsoft Office Word<br>Windows Task Scheduler<br>Microsoft Exchange Server<br>Visual Studio<br>Windows Win32 Kernel Subsystem<br>TorchGeo<br>Visual Studio Code<br>Microsoft PC Manager<br>Airlift.microsoft.com<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>Microsoft ha liberado sus actualizaciones de seguridad correspondientes al mes de noviembre de 2024.<br>Este conjunto de actualizaciones remedia 91 fallas y 4 dia cero.<\/p>\n\n\n\n<p>II. Detalle<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>.NET and Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43499\">CVE-2024-43499<\/a><\/td><td>.NET and Visual Studio Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>.NET and Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43498\">CVE-2024-43498<\/a><\/td><td>.NET and Visual Studio Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Airlift.microsoft.com<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49056\">CVE-2024-49056<\/a><\/td><td>Airlift.microsoft.com Elevation of Privilege Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Azure CycleCloud<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43602\">CVE-2024-43602<\/a><\/td><td>Azure CycleCloud Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>LightGBM<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43598\">CVE-2024-43598<\/a><\/td><td>LightGBM Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Defender for Endpoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-5535\">CVE-2024-5535<\/a><\/td><td>OpenSSL: CVE-2024-5535 SSL_select_next_proto buffer overread<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-10826\">CVE-2024-10826<\/a><\/td><td>Chromium: CVE-2024-10826 Use after free in Family Experiences<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-10827\">CVE-2024-10827<\/a><\/td><td>Chromium: CVE-2024-10827 Use after free in Serial<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49040\">CVE-2024-49040<\/a><\/td><td>Microsoft Exchange Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49031\">CVE-2024-49031<\/a><\/td><td>Microsoft Office Graphics Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49032\">CVE-2024-49032<\/a><\/td><td>Microsoft Office Graphics Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49029\">CVE-2024-49029<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49026\">CVE-2024-49026<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49027\">CVE-2024-49027<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49028\">CVE-2024-49028<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49030\">CVE-2024-49030<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497ADV240001\">ADV240001<\/a><\/td><td>Microsoft SharePoint Server Defense in Depth Update<\/td><td>None<\/td><\/tr><tr><td>Microsoft Office Word<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49033\">CVE-2024-49033<\/a><\/td><td>Microsoft Word Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft PC Manager<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49051\">CVE-2024-49051<\/a><\/td><td>Microsoft PC Manager Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Virtual Hard Drive<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-38264\">CVE-2024-38264<\/a><\/td><td>Microsoft Virtual Hard Disk (VHDX) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows DNS<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43450\">CVE-2024-43450<\/a><\/td><td>Windows DNS Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Windows Active Directory Certificate Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49019\">CVE-2024-49019<\/a><\/td><td>Active Directory Certificate Services Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Windows Hyper-V<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43633\">CVE-2024-43633<\/a><\/td><td>Windows Hyper-V Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Windows Hyper-V<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43624\">CVE-2024-43624<\/a><\/td><td>Windows Hyper-V Shared Virtual Disk Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-48998\">CVE-2024-48998<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-48997\">CVE-2024-48997<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-48993\">CVE-2024-48993<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49001\">CVE-2024-49001<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49000\">CVE-2024-49000<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-48999\">CVE-2024-48999<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49043\">CVE-2024-49043<\/a><\/td><td>Microsoft.SqlServer.XEvent.Configuration.dll Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43462\">CVE-2024-43462<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-48995\">CVE-2024-48995<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-48994\">CVE-2024-48994<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-38255\">CVE-2024-38255<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-48996\">CVE-2024-48996<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43459\">CVE-2024-43459<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49002\">CVE-2024-49002<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49013\">CVE-2024-49013<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49014\">CVE-2024-49014<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49011\">CVE-2024-49011<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49012\">CVE-2024-49012<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49015\">CVE-2024-49015<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49018\">CVE-2024-49018<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49021\">CVE-2024-49021<\/a><\/td><td>Microsoft SQL Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49016\">CVE-2024-49016<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49017\">CVE-2024-49017<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49010\">CVE-2024-49010<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49005\">CVE-2024-49005<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49007\">CVE-2024-49007<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49003\">CVE-2024-49003<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49004\">CVE-2024-49004<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49006\">CVE-2024-49006<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49009\">CVE-2024-49009<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49008\">CVE-2024-49008<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>TorchGeo<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49048\">CVE-2024-49048<\/a><\/td><td>TorchGeo Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49044\">CVE-2024-49044<\/a><\/td><td>Visual Studio Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio Code<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49050\">CVE-2024-49050<\/a><\/td><td>Visual Studio Code Python Extension Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio Code<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49049\">CVE-2024-49049<\/a><\/td><td>Visual Studio Code Remote Extension Elevation of Privilege Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Windows CSC Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43644\">CVE-2024-43644<\/a><\/td><td>Windows Client-Side Caching Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Defender Application Control (WDAC)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43645\">CVE-2024-43645<\/a><\/td><td>Windows Defender Application Control (WDAC) Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DWM Core Library<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43636\">CVE-2024-43636<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DWM Core Library<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43629\">CVE-2024-43629<\/a><\/td><td>Windows DWM Core Library Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kerberos<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43639\">CVE-2024-43639<\/a><\/td><td>Windows Kerberos Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43630\">CVE-2024-43630<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NT OS Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43623\">CVE-2024-43623<\/a><\/td><td>Windows NT OS Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NTLM<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43451\">CVE-2024-43451<\/a><\/td><td>NTLM Hash Disclosure Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Package Library Manager<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-38203\">CVE-2024-38203<\/a><\/td><td>Windows Package Library Manager Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Registry<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43641\">CVE-2024-43641<\/a><\/td><td>Windows Registry Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Registry<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43452\">CVE-2024-43452<\/a><\/td><td>Windows Registry Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Kernel Mode<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43631\">CVE-2024-43631<\/a><\/td><td>Windows Secure Kernel Mode Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Kernel Mode<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43646\">CVE-2024-43646<\/a><\/td><td>Windows Secure Kernel Mode Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Kernel Mode<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43640\">CVE-2024-43640<\/a><\/td><td>Windows Kernel-Mode Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows SMB<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43642\">CVE-2024-43642<\/a><\/td><td>Windows SMB Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows SMBv3 Client\/Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43447\">CVE-2024-43447<\/a><\/td><td>Windows SMBv3 Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Task Scheduler<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49039\">CVE-2024-49039<\/a><\/td><td>Windows Task Scheduler Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43628\">CVE-2024-43628<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43621\">CVE-2024-43621<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43620\">CVE-2024-43620<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43627\">CVE-2024-43627<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43635\">CVE-2024-43635<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43622\">CVE-2024-43622<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43626\">CVE-2024-43626<\/a><\/td><td>Windows Telephony Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Update Stack<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43530\">CVE-2024-43530<\/a><\/td><td>Windows Update Stack Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows USB Video Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43643\">CVE-2024-43643<\/a><\/td><td>Windows USB Video Class System Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows USB Video Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43449\">CVE-2024-43449<\/a><\/td><td>Windows USB Video Class System Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows USB Video Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43637\">CVE-2024-43637<\/a><\/td><td>Windows USB Video Class System Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows USB Video Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43634\">CVE-2024-43634<\/a><\/td><td>Windows USB Video Class System Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows USB Video Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43638\">CVE-2024-43638<\/a><\/td><td>Windows USB Video Class System Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows VMSwitch<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43625\">CVE-2024-43625<\/a><\/td><td>Microsoft Windows VMSwitch Elevation of Privilege Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Win32 Kernel Subsystem<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49046\">CVE-2024-49046<\/a><\/td><td>Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>Actualizar utilizando Microsoft Windows Update o herramientas de administracion de actualizaciones centralizadas.<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>CSIRT PANAMA<br>Computer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>E-Mail: info@cert.pa<br>Phone: +507 520-CERT (2378)<br>Web: https:\/\/cert.pa<br>Twitter: @CSIRTPanama<br>Key ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2024-nov-13 Actualizaciones de seguridad de Microsoft para Noviembre 2024.Gravedad: AltaFecha de publicaci\u00f3n: noviembre 13, 2024\u00daltima revisi\u00f3n: septiembre 13, 2024https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2024-Nov Sistemas Afectados:Windows Package Library ManagerSQL ServerMicrosoft Virtual Hard DriveWindows SMBv3 Client\/ServerWindows USB Video&#8230;<\/p>\n","protected":false},"author":5,"featured_media":1847,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,43,8,72,9,73,80,68,45,94],"class_list":["post-4050","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-alertas","tag-avisos","tag-avisos-de-seguridad","tag-microsoft","tag-parches","tag-vulnerabilidad","tag-vulnerabilidades","tag-windows","tag-windows-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/4050","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4050"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/4050\/revisions"}],"predecessor-version":[{"id":4051,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/4050\/revisions\/4051"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1847"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4050"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4050"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4050"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}