JPCERT-AT-2023-0023
JPCERT/CC
2023-10-11
Microsoft Corporation
October 2023 Security Updates
https://msrc.microsoft.com/update-guide/en-us/releaseNote/2023-Oct
Microsoft Corporation
Microsoft Security Updates for October 2023 (Monthly) (Japanese)
https://msrc.microsoft.com/blog/2023/10/202310-security-update/
According to Microsoft, among the vulnerabilities, the following vulnerabilities have been confirmed to be exploited in the wild. Please consider applying the security update programs by referring to the information provided by Microsoft.
CVE-2023-36563
Microsoft WordPad Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36563
CVE-2023-41763
Skype for Business Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41763
CVE-2023-44487
MITRE: CVE-2023-44487 HTTP/2 Rapid Reset Attack
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487
Regarding the Denial of Service (DoS) vulnerability in the HTTP/2 protocol (CVE-2023-44487), information has also been released by the discoverers of the vulnerability including Cloudflare.
Cloudflare
HTTP/2 Rapid Reset: deconstructing the record-breaking attack
https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/
Microsoft Update Catalog
https://www.catalog.update.microsoft.com/
Windows Update: FAQ
https://support.microsoft.com/en-us/help/12373/windows-update-faq
Microsoft Corporation
Release Notes
https://msrc.microsoft.com/update-guide/releaseNote
The Exchange Team
Released: October 2023 Exchange Server Security Updates
https://techcommunity.microsoft.com/t5/exchange-team-blog/released-october-2023-exchange-server-security-updates/ba-p/3950647
If you have any information regarding this alert, please contact JPCERT/CC.
JPCERT Coordination Center (Early Warning Group)
MAIL: ew-info@jpcert.or.jp
https://www.jpcert.or.jp/english/
JPCERT/CC
2023-10-11
I. Overview
Microsoft has released October 2023 Security Updates to address the vulnerabilities in their products. Remote attackers leveraging these vulnerabilities may be able to execute arbitrary code. It is recommended to check the information provided by Microsoft and apply the updates.Microsoft Corporation
October 2023 Security Updates
https://msrc.microsoft.com/update-guide/en-us/releaseNote/2023-Oct
Microsoft Corporation
Microsoft Security Updates for October 2023 (Monthly) (Japanese)
https://msrc.microsoft.com/blog/2023/10/202310-security-update/
According to Microsoft, among the vulnerabilities, the following vulnerabilities have been confirmed to be exploited in the wild. Please consider applying the security update programs by referring to the information provided by Microsoft.
CVE-2023-36563
Microsoft WordPad Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36563
CVE-2023-41763
Skype for Business Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41763
CVE-2023-44487
MITRE: CVE-2023-44487 HTTP/2 Rapid Reset Attack
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487
Regarding the Denial of Service (DoS) vulnerability in the HTTP/2 protocol (CVE-2023-44487), information has also been released by the discoverers of the vulnerability including Cloudflare.
Cloudflare
HTTP/2 Rapid Reset: deconstructing the record-breaking attack
https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/
II. Solution
Please apply the security update programs through Microsoft Update,Windows Update, etc. as soon as possible.Microsoft Update Catalog
https://www.catalog.update.microsoft.com/
Windows Update: FAQ
https://support.microsoft.com/en-us/help/12373/windows-update-faq
III. References
Microsoft Corporation
Release Notes
https://msrc.microsoft.com/update-guide/releaseNote
The Exchange Team
Released: October 2023 Exchange Server Security Updates
https://techcommunity.microsoft.com/t5/exchange-team-blog/released-october-2023-exchange-server-security-updates/ba-p/3950647
If you have any information regarding this alert, please contact JPCERT/CC.
JPCERT Coordination Center (Early Warning Group)
MAIL: ew-info@jpcert.or.jp
https://www.jpcert.or.jp/english/