overview
This week, Microsoft patched six vulnerabilities tracked as CVE-2023-36025, CVE-2023-36033, CVE-2023-36036, CVE-2023-36038, CVE-2023-36052, and CVE-2023-36413. Microsoft addressed a total of 63 security bugs but the previously mentioned are the most significant.
The Vulnerabilities:
Microsoft states that CVE-2023-36052, an information disclosure flaw in an Azure component, is critical and should be prioritized for patching. If the vulnerability is successfully exploited, an attacker can retrieve plain-text passwords and usernames from log files generated by the impacted CLI commands and disclosed through Azure DevOps and/or GitHub Actions. So far, the vulnerability has not been exploited in the wild. Please note that other vendors have also released security updates to address vulnerabilities. Ensure that your entire software ecosystem is up-to-date.
Vendors with Security Updates:
Adobe |
AMD (including CacheWarp) |
Android |
Apache Projects |
Apple |
Aruba Networks |
Arm |
ASUS |
Atlassian |
Cisco |
CODESYS |
Dell |
Drupal |
F5 |
Fortinet |
GitLab |
Google Chrome |
Hitachi Energy |
HP |
IBM |
Intel (including Reptar) |
Jenkins |
Juniper Networks |
Lenovo |
Linux distributions: Debian, Oracle Linux, Red Hat, SUSE, and Ubuntu |
MediaTek |
Mitsubishi Electric |
NETGEAR |
NVIDIA |
Palo Alto Networks |
Qualcomm |
Samsung |
SAP |
Schneider Electric |
Siemens |
SolarWinds |
SonicWall |
SysAid |
Trend Micro |
Veeam |
Veritas |
VMware |
WordPress |
Zimbra |
Zyxel |
INDICATORS OF COMPROMISE (IoCs)
Domain
Avertium remains vigilant in locating IoCs for our customers. Should any more be located, Avertium will disclose them as soon as possible. For more information on how Avertium can help protect your organization, please reach out to your Avertium Service Delivery Manager or Account Executive.
SUPPORTING DOCUMENTATION