Important Notice: Security vulnerabilities of Microsoft
重要通知 : 關於 Microsoft 產品的安全漏洞通告

資訊安全警示 Information Security Alert
To: All Users
As informed by the Cybersecurity Incident Alert and Response Centre (CARIC), Microsoft Corporation have recently released the security update for February that includes 77 vulnerability updates, which 9 of them are serious. Therefore, it is recommended to update the affected products as soon as possible. The released update mainly covers the following components: Windows and Windows components, Office and Office components, 3D Builder, Windows iSCSI, Microsoft Exchange Server, SQL Server, .NET and Visual Studio, Azure, Windows Defender and other products.
Special Attention for the following Vulnerabilities:
- Windows Graphics Components Remote Code Execution Vulnerabilities (CVE-2023-21823)
Attackers who successfully exploited this vulnerability could get the system privileges. Microsoft Corporation has detected that this vulnerability has been exploited.
For more details: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21823
- Microsoft Publisher Security Feature Bypass Vulnerabilities (CVE-2023-21715)
Attackers tricked targeted users to download and execute a special file, and successfully exploit it to bypass Office macro policies that block untrusted or malicious files. Microsoft Corporation has detected that this vulnerability has been exploited.
For more details: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21715
- Windows Common Log File System Driver Privilege Escalation Vulnerability (CVE-2023-23376)
Attackers who successfully exploited this vulnerability could get the system privileges. Microsoft Corporation has detected that this vulnerability has been exploited.
For more details: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-23376
- Microsoft Exchange Server Remote Code Execution Vulnerabilities (CVE-2023-21529, CVE-2023-21706, CVE-2023-21707)
This vulnerability could allow remote attackers to execute arbitrary code on a vulnerable server through network calls.
For more details:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21529
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21706
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21707
- Microsoft Protected Extensible Authentication Protocol Remote Code Execution Vulnerabilities (CVE-2023-21689, CVE-2023-21690, CVE-2023-21692)
The vulnerability exists in the Protected Extensible Authentication Protocol (PEAP) server component, which is used to establish secure connections with wireless clients. Successful exploitation of the vulnerability could allow remote and unauthenticated attackers to execute arbitrary code. The target must be running Network Policy Server and configured with a network policy that allows PEAP to be vulnerable.
For more details:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21689
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21690
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21692
Microsoft February Security Updates
For more details: https://msrc.microsoft.com/update-guide/releaseNote/2023-Feb
Mitigation
If the above-mentioned affected products are being used, please install the secure updates released by Microsoft Corporation as soon as possible.
Reference
- How to download and install software in a secure manner?
- Basic Knowledge of Online Safety and Security
- Other Information Security Tips
Should you have any enquiries, please feel free to contact ICTO Help Desk.
ICTO Help Desk
Location : Room 2085, 2/F, Central Teaching Building (E5), eMap
Telephone : 8822 8600
email : icto.helpdesk@um.edu.mo
Information and Communication Technology Office
各位用戶:
資訊及通訊科技部接獲網絡安全事故預警及應急中心的通知,Microsoft官方 近日發布2月安全更新,此次包含了77個漏洞更新,其中包括9個嚴重漏洞,須盡快安排受影響產品進行更新修復。此次釋出的更新主要涵蓋了以下組件:Windows和Windows組件、Office和Office組件、3D Builder、Windows iSCSI、Microsoft Exchange Server、SQL Server、.NET和Visual Studio、 Azure、Windows Defender等產品的漏洞。
以下這些漏洞值得關注:
- Windows Graphics Component遠程代碼執行漏洞(CVE-2023-21823)
成功利用此漏洞的攻擊者可以獲得SYSTEM權限。微軟公司已檢測到此漏洞已被開發利用。
有關詳情可參考:https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21823
- Microsoft Publisher安全功能繞過漏洞(CVE-2023-21715)
攻擊者誘使目標用戶下載並執行特製的文件,成功利用可以繞過用於阻止不受信任或惡意文件的Office宏策略。微軟公司已檢測到此漏洞已被開發利用。
有關詳情可參考:https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21715
- Windows Common Log File System Driver權限提升漏洞(CVE-2023-23376)
成功利用此漏洞的攻擊者可以獲得SYSTEM權限。微軟公司已檢測到此漏洞已被開發利用。
有關詳情可參考:https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-23376
- Microsoft Exchange Server遠程代碼執行漏洞(CVE-2023-21529、CVE-2023-21706、CVE-2023-21707)
此漏洞允許遠程攻擊者通過網絡調用,於存在漏洞的伺服器上執行任意代碼。
有關詳情可參考:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21529
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21706
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21707
- Microsoft Protected Extensible Authentication Protocol遠程代碼執行漏洞(CVE-2023-21689、CVE-2023-21690、CVE-2023-21692)
此漏洞存在於受保護的可擴展認證協議(PEAP)伺服器組件中,該組件用於與無線客戶端建立安全連接。成功利用漏洞允許遠程且未經認證的攻擊者可以執行任意代碼。目標必須運行網絡策略伺服器並配置允許PEAP的網絡策略,才有可能存在漏洞。
有關詳情可參考:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21689
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21690
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21692
Microsoft 2月安全更新有關詳情可參考:
https://msrc.microsoft.com/update-guide/releaseNote/2023-Feb
處置要求
- 倘有使用上述受影響產品,須盡快安裝由微軟公司釋出的安全更新。
參考資料
如有任何疑問,請聯絡資訊及通訊科技部服務中心。
服 務 中 心
位置 : 中央教學樓東5座(E5)二樓2085室 (電子地圖)
電話 : 8822 8600
電郵 : icto.helpdesk@um.edu.mo
資訊及通訊科技部