In November 2023    , Microsoft released its Patch Tuesday updates, addressing a total of 58 vulnerabilities in its Windows operating systems and related software . This update included both actively exploited vulnerabilities and publicly disclosed zero-day bugs.
Among the vulnerabilities addressed in the November 2023 update were five zero-day flaws, three of which were actively exploited in attacks . These actively exploited vulnerabilities involved elevation of privilege and security feature bypass.
The first flaw, CVE-202336025    , allowed attackers to bypass the Windows SmartScreen Security feature by tricking users into clicking on a malicious link.
The second flaw, CVE-202336033    , affected the “DWM Core Library” in Microsoft Windows and could be exploited locally without high-level privileges or user interaction , granting attackers SYSTEM-level privileges.
The third flaw, CVE-202336036    , affected the “Windows Cloud Files Mini Filter Driver” and also allowed attackers to gain SYSTEM privileges  .
In addition to the actively exploited vulnerabilities, Microsoft also addressed three other publicly disclosed zero-day bugs in the November 2023 update. These bugs include a Microsoft Office Security Feature Bypass Vulnerability and an ASPNET Core Denial of Service Vulnerability . However, two of the publicly disclosed bugs   , CVE-202336413 and CVE-202336038 , were not actively exploited in attacks  .
Furthermore, Microsoft patched several new Exchange vulnerabilities , including CVE-202336439  , which enabled attackers to install malicious software on an Exchange server . It is important to note that this particular vulnerability required the attacker to be authenticated to the target’s local network.
Overall, the November 2023 update from Microsoft addressed a range of vulnerabilities, including actively exploited flaws and publicly disclosed bugs. While the update was smaller in scale compared to the previous month, it highlights the ongoing need for vigilance in maintaining the security of Windows operating systems and related software. Users should ensure they apply the necessary patches and updates to mitigate the risks associated with these vulnerabilities.