JPCERT-AT-2023-0007
JPCERT/CC
2023-04-12
Microsoft Corporation
April 2023 Security Updates
https://msrc.microsoft.com/update-guide/en-us/releaseNote/2023-Apr
Microsoft Corporation
Microsoft Security Updates for April 2023 (Monthly) (Japanese)
https://msrc.microsoft.com/blog/2023/04/202304-security-update/
According to Microsoft, among these vulnerabilities, the following vulnerability has been confirmed to be exploited in the wild. Please consider applying the security update programs by referring to the information provided by Microsoft.
CVE-2023-28252
Windows Common Log File System Driver Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-28252
CVE-2023-28252 is an elevation of privilege vulnerability in the Windows common log file system driver. On April 11, 2023 (Local time), Kaspersky,one of the companies had found and reported the vulnerability, published a blog detailing an attack exploiting the vulnerability.
An attacker with user privileges has exploited this vulnerability to elevate the privilege to deploy ransomware. Kaspersky also announced that they will release details of the vulnerability in April.
Kaspersky
Nokoyawa ransomware attacks with Windows zero-day
https://securelist.com/nokoyawa-ransomware-attacks-with-windows-zero-day/109483/
Microsoft Update Catalog
https://www.catalog.update.microsoft.com/
Windows Update: FAQ
https://support.microsoft.com/en-us/help/12373/windows-update-faq
Microsoft Corporation
Release Notes
https://msrc.microsoft.com/update-guide/releaseNote
If you have any information regarding this alert, please contact JPCERT/CC.
JPCERT Coordination Center (Early Warning Group)
MAIL: ew-info@jpcert.or.jp
https://www.jpcert.or.jp/english/
JPCERT/CC
2023-04-12
I. Overview
Microsoft has released April 2023 Security Updates to address the vulnerabilities in their products. Remote attackers leveraging these vulnerabilities may be able to execute arbitrary code. It is recommended to check the information provided by Microsoft and apply the updates.Microsoft Corporation
April 2023 Security Updates
https://msrc.microsoft.com/update-guide/en-us/releaseNote/2023-Apr
Microsoft Corporation
Microsoft Security Updates for April 2023 (Monthly) (Japanese)
https://msrc.microsoft.com/blog/2023/04/202304-security-update/
According to Microsoft, among these vulnerabilities, the following vulnerability has been confirmed to be exploited in the wild. Please consider applying the security update programs by referring to the information provided by Microsoft.
CVE-2023-28252
Windows Common Log File System Driver Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-28252
CVE-2023-28252 is an elevation of privilege vulnerability in the Windows common log file system driver. On April 11, 2023 (Local time), Kaspersky,one of the companies had found and reported the vulnerability, published a blog detailing an attack exploiting the vulnerability.
An attacker with user privileges has exploited this vulnerability to elevate the privilege to deploy ransomware. Kaspersky also announced that they will release details of the vulnerability in April.
Kaspersky
Nokoyawa ransomware attacks with Windows zero-day
https://securelist.com/nokoyawa-ransomware-attacks-with-windows-zero-day/109483/
II. Solution
Please apply the security update programs through Microsoft Update,Windows Update, etc. as soon as possible.Microsoft Update Catalog
https://www.catalog.update.microsoft.com/
Windows Update: FAQ
https://support.microsoft.com/en-us/help/12373/windows-update-faq
III. References
Microsoft Corporation
Release Notes
https://msrc.microsoft.com/update-guide/releaseNote
If you have any information regarding this alert, please contact JPCERT/CC.
JPCERT Coordination Center (Early Warning Group)
MAIL: ew-info@jpcert.or.jp
https://www.jpcert.or.jp/english/