Google's Pixel devices have already received the November update, along with some additional fixes. The update fixes 59 vulnerabilities, two of which are already being exploited in real-life attacks. Tracked as CVE-2023-36033, the first is an elevation of privilege vulnerability in Windows DWM Core Library marked as important, with a CVSS score of 7.8. "An attacker who successfully exploited this vulnerability could gain SYSTEM privileges," Microsoft said. CVE-2023-36036 is an elevation of privilege vulnerability in Windows Cloud Files Mini Filter Driver with a CVSS score of 7.8. Also fixed in November's update cycle is the already exploited libWep flaw previously fixed in Chrome and other browsers, which also impacts Microsoft's Edge, tracked as CVE-2023-4863. Another notable flaw is CVE-2023-36397, a remote code execution vulnerability in Windows Pragmatic General Multicast marked as critical with a CVSS score of 9.8. "When Windows message queuing service is running in a PGM Server environment, an attacker could send a specially crafted file over the network to achieve remote code execution and attempt to trigger malicious code," Microsoft said. Enterprise software firm Cisco has issued fixes for 27 security flaws, including one rated as critical with a near maximum CVSS score of 9.9. Tracked as CVE-2023-20048, the vulnerability in the web services interface of Cisco Firepower Management Center Software could allow an authenticated, remote attacker to execute unauthorized configuration commands on a Firepower Threat Defense device managed by the FMC Software. To successfully exploit the vulnerability, an attacker would need valid credentials on the FMC Software, Cisco said. A further seven of the flaws fixed by Cisco are rated as having a high impact, including CVE-2023-20086-a denial-of-service flaw with a CVSS score of 8.6-and CVE-2023-20063, a code-injection vulnerability with a CVSS score of 8.2. Atlassian has released a patch to fix a serious flaw already being used in real-life attacks. Tracked as CVE-2023-22518, the improper-authorization vulnerability issue in Confluence Data Center and Server is being used in ransomware attacks. Security outfit Trend Micro reported the Cerber ransomware group is using the flaw in attacks. "This is not the first time that Cerber has targeted Atlassian-in 2021, the malware re-emerged after a period of inactivity and focused on exploiting remote code execution vulnerabilities in Atlassian's GitLab servers," Trend Micro said. All versions of Confluence Data Center and Server are affected by the flaw, which allows an unauthenticated attacker to reset Confluence and create an administrator account. "Using this account, an attacker can perform all administrative actions available to a Confluence instance administrator, leading to a full loss of confidentiality, integrity and availability," Atlassian said. SAP. Enterprise software giant SAP has released its November Security Patch Day, fixing three new flaws. Tracked as CVE-2023-31403 and with a CVSS score of 9.6, the most serious issue is an improper access control vulnerability flaw in SAP Business One.
This Cyber News was published on www.wired.com. Publication date: Thu, 30 Nov 2023 23:19:27 +0000