{"id":50624,"date":"2023-11-20T10:58:46","date_gmt":"2023-11-20T10:58:46","guid":{"rendered":"https:\/\/www.n-able.com\/?p=50624"},"modified":"2023-11-20T11:02:35","modified_gmt":"2023-11-20T11:02:35","slug":"patch-tuesday-november-2023-three-zero-days-under-exploit-and-easy-exchange-vulnerability-fixes","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-november-2023-three-zero-days-under-exploit-and-easy-exchange-vulnerability-fixes","title":{"rendered":"Patch Tuesday November 2023: Three Zero-Days Under Exploit and Easy Fixes for Exchange Vulnerabilities"},"content":{"rendered":"<p class=\"p3\"><span class=\"s1\">November brings an uptick in online sales and digital marketing as the holiday season approaches. That means users clicking on more links and potentially being exposed to more phishing attacks than usual. Patch Tuesday for this November brings fixes for threats that leverage security bypass techniques and other vulnerabilities that will require user interaction to exploit. Getting a handle on these vulnerabilities by applying updates and improving end-user resiliency through cyber awareness training can help improve your chances of having happy holidays and not a case of the humbugs. <\/span><\/p>\n<h2 class=\"p4\"><span class=\"s1\">Microsoft Vulnerabilities <\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">Three of the five reported zero-day vulnerabilities this month have been detected being exploited in the wild. <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2023-36036\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2023-36036<\/span><\/a>, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2023-36033\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2023-36033<\/span><\/a>, and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2023-36025\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2023-36025<\/span><\/a> are all under active exploitation and should get priority placement in your patching queues. Don\u2019t leave out the other two as of yet unexploited zero-days from your priority list though simply because there are no reports yet of their use. Once a fix for a zero-day is released it doesn\u2019t take long for security researchers and threat actors to begin reverse engineering exploits. Given time those zero-days are likely to also see abuse. <\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Four of the Microsoft vulnerabilities addressed this month have also been added to the CISA\u2019s <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Known Exploited Vulnerabilities (KEV) Catalog<\/span><\/a>. <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-36584\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2023-36584<\/span><\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-36036\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2023-36036<\/span><\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-36025\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-023-36025<\/span><\/a>, and <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-36033\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2023-36033<\/span><\/a> have due dates assigned of December 5<\/span><span class=\"s3\"><sup>th<\/sup><\/span><span class=\"s1\"> and 7<\/span><span class=\"s3\"><sup>th<\/sup><\/span><span class=\"s1\"> for appropriate remediation and mitigations to be applied. If you ever feel like you need an example of real-world guidance to impress upon clients the importance of timely patching, the CISA\u2019s KEV catalog is a great resource as it clearly details when a vulnerability was first reported and what date it should be addressed by.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">For on-premise Exchange admins, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36439\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2023-36439<\/span><\/a>, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36050\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2023-36050<\/span><\/a>, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36039\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2023-36039<\/span><\/a><\/span><span class=\"s4\">,<\/span><span class=\"s1\"> and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36035\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2023-36035<\/span><\/a> should all receive your attention this month. They all carry CVSS 8.0 scores and are considered as Exploitation More Likely to occur. The good news is, it appears that these vulnerabilities can all be addressed by applying Microsoft Security Updates <a href=\"https:\/\/support.microsoft.com\/help\/5032146\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">KB5032146<\/span><\/a> and <a href=\"https:\/\/support.microsoft.com\/help\/5032147\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">KB5032147<\/span><\/a> for Exchange Server 2019 and 2016. <\/span><\/p>\n<h2 class=\"p5\"><span class=\"s1\"><b>Microsoft Patch Tuesday Vulnerability Prioritization<\/b><\/span><\/h2>\n<p class=\"p6\"><span class=\"s1\">Addressing vulnerabilities effectively requires a mix of adhering to established best practices and leveraging informed judgment. While it\u2019s a natural instinct to rank vulnerabilities with critical severity ratings higher on the list of things that need to be addressed, relying on severity ratings alone can be limiting. An often-overlooked component is temporal metrics, which provide a measure of the window of vulnerability\u2014the time from initial vulnerability discovery to the availability and application of the patch. This is essential as the longer a vulnerability exists without a fix, the greater the potential for exploitation. By integrating temporal metrics into the risk evaluation process, organizations can gain a more comprehensive understanding of the threat landscape and potential attack vectors, ensuring that they don\u2019t leave themselves open to unnecessary risks.<\/span><\/p>\n<p class=\"p6\"><em><span class=\"s1\"><b>Table Key:\u00a0<\/b>Severity:\u00a0C = Critical, I = Important, M = Moderate, R = Re-issue;\u00a0Status: EML = Exploitation More Likely, ELL = Exploitation Less Likely, ED = Exploitation Detected,\u00a0N\/A = Not Available<\/span><\/em><\/p>\n<table cellspacing=\"0\" cellpadding=\"0\" class=\"t1\">\n<tbody>\n<tr>\n<td valign=\"top\" class=\"td1\" width=\"20%\">\n<p class=\"p7\"><strong><span class=\"s1\">CVE Number<\/span><\/strong><\/p>\n<\/td>\n<td valign=\"top\" class=\"td2\" width=\"60%\">\n<p class=\"p7\"><strong><span class=\"s1\">CVE Title<\/span><\/strong><\/p>\n<\/td>\n<td valign=\"top\" class=\"td3\" width=\"10%\">\n<p class=\"p7\" style=\"text-align: center;\"><strong><span class=\"s1\">Severity<\/span><\/strong><\/p>\n<\/td>\n<td valign=\"top\" class=\"td4\" width=\"10%\">\n<p class=\"p7\" style=\"text-align: center;\"><strong><span class=\"s1\">Status<\/span><\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p8\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36036\" target=\"_blank\" rel=\"noopener\">CVE-2023-36036<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p9\"><span class=\"s1\">Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">ED<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p8\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36033\" target=\"_blank\" rel=\"noopener\">CVE-2023-36033<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p9\"><span class=\"s1\">Windows DWM Core Library Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">ED<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p8\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36025\" target=\"_blank\" rel=\"noopener\">CVE-2023-36025<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p9\"><span class=\"s1\">Windows SmartScreen Security Feature Bypass Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">ED<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p8\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36796\" target=\"_blank\" rel=\"noopener\">CVE-2023-36796<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p9\"><span class=\"s1\">Visual Studio Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p8\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36793\" target=\"_blank\" rel=\"noopener\">CVE-2023-36793<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p9\"><span class=\"s1\">Visual Studio Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p8\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36792\" target=\"_blank\" rel=\"noopener\">CVE-2023-36792<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p9\"><span class=\"s1\">Visual Studio Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p8\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36400\" target=\"_blank\" rel=\"noopener\">CVE-2023-36400<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p9\"><span class=\"s1\">Windows HMAC Key Derivation Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p8\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36397\" target=\"_blank\" rel=\"noopener\">CVE-2023-36397<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p9\"><span class=\"s1\">Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p8\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36052\" target=\"_blank\" rel=\"noopener\">CVE-2023-36052<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p9\"><span class=\"s1\">Azure CLI REST Command Information Disclosure Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p8\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36043\" target=\"_blank\" rel=\"noopener\">CVE-2023-36043<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p9\"><span class=\"s1\">Open Management Infrastructure Information Disclosure Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p8\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-38177\" target=\"_blank\" rel=\"noopener\">CVE-2023-38177<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p9\"><span class=\"s1\">Microsoft SharePoint Server Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p8\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36439\" target=\"_blank\" rel=\"noopener\">CVE-2023-36439<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p9\"><span class=\"s1\">Microsoft Exchange Server Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p8\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36424\" target=\"_blank\" rel=\"noopener\">CVE-2023-36424<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p9\"><span class=\"s1\">Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p8\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36413\" target=\"_blank\" rel=\"noopener\">CVE-2023-36413<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p9\"><span class=\"s1\">Microsoft Office Security Feature Bypass Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p8\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36399\" target=\"_blank\" rel=\"noopener\">CVE-2023-36399<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p9\"><span class=\"s1\">Windows Storage Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p8\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36394\" target=\"_blank\" rel=\"noopener\">CVE-2023-36394<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p9\"><span class=\"s1\">Windows Search Service Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p8\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36050\" target=\"_blank\" rel=\"noopener\">CVE-2023-36050<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p9\"><span class=\"s1\">Microsoft Exchange Server Spoofing Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p8\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36039\" target=\"_blank\" rel=\"noopener\">CVE-2023-36039<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p9\"><span class=\"s1\">Microsoft Exchange Server Spoofing Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p8\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36035\" target=\"_blank\" rel=\"noopener\">CVE-2023-36035<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p9\"><span class=\"s1\">Microsoft Exchange Server Spoofing Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p8\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36017\" target=\"_blank\" rel=\"noopener\">CVE-2023-36017<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p9\"><span class=\"s1\">Windows Scripting Engine Memory Corruption Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p9\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p class=\"p6\"><span class=\"s1\">As always make sure you have established patching processes for evaluation, testing and pushing into production. If you have traditionally only dealt with patches by applying them based on their severity consider including prioritization of patches for Zero-Days, Exploitation Detected and Exploitation More Likely vulnerabilities in your\u00a0<a href=\"https:\/\/www.n-able.com\/features\/windows-patch-management\" target=\"_blank\" rel=\"noopener\"><span class=\"s6\">Patch Management<\/span><\/a>\u00a0routines.<\/span><\/p>\n<p class=\"p6\"><span class=\"s1\"><b>Looking for more blogs on patching, or looking for previous Microsoft Patch Tuesday Reviews, then check out\u00a0<\/b><a href=\"https:\/\/www.n-able.com\/blog\/patch-management?filter_products=all#filtered\" target=\"_blank\" rel=\"noopener\"><span class=\"s6\"><b>this section of our blog<\/b><\/span><\/a><b>.<\/b>\u00a0<\/span><\/p>\n<p class=\"p6\"><span class=\"s1\">Lewis Pope is the Head Security Nerd at N&#8209;able. You can follow him on Twitter:\u00a0<a href=\"https:\/\/twitter.com\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s6\">@cybersec_nerd<\/span><\/a><\/span><\/p>\n<p class=\"p10\"><span class=\"s7\">LinkedIn:\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/thesecuritypope\" target=\"_blank\" rel=\"noopener\"><span class=\"s8\">thesecuritypope<\/span><\/a><\/span><\/p>\n<p class=\"p10\"><span class=\"s7\">Twitch:\u00a0<a href=\"https:\/\/www.twitch.tv\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s8\">cybersec_nerd<\/span><\/a><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This month sees a total of five zero-day vulnerabilities reported, with three under active exploitation, plus there\u2019s work for Exchange admins. \u00a0Lewis Pope investigates.<\/p>\n","protected":false},"author":62,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-50624","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Patch Tuesday November 2023: Three Zero-Days Under Exploit and Easy Fixes for Exchange Vulnerabilities - N-able<\/title>\n<meta name=\"description\" content=\"November has five reported zero-day vulnerabilities, with three under active exploitation, plus there\u2019s work for Exchange admins. Find out more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-november-2023-three-zero-days-under-exploit-and-easy-exchange-vulnerability-fixes\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Patch Tuesday November 2023: Three Zero-Days Under Exploit and Easy Fixes for Exchange Vulnerabilities - N-able\" \/>\n<meta property=\"og:description\" content=\"November has five reported zero-day vulnerabilities, with three under active exploitation, plus there\u2019s work for Exchange admins. Find out more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-november-2023-three-zero-days-under-exploit-and-easy-exchange-vulnerability-fixes\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-20T10:58:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-20T11:02:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-01.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1309\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Lewis Pope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lewis Pope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-november-2023-three-zero-days-under-exploit-and-easy-exchange-vulnerability-fixes#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-november-2023-three-zero-days-under-exploit-and-easy-exchange-vulnerability-fixes\"},\"author\":{\"name\":\"Lewis Pope\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\"},\"headline\":\"Patch Tuesday November 2023: Three Zero-Days Under Exploit and Easy Fixes for Exchange Vulnerabilities\",\"datePublished\":\"2023-11-20T10:58:46+00:00\",\"dateModified\":\"2023-11-20T11:02:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-november-2023-three-zero-days-under-exploit-and-easy-exchange-vulnerability-fixes\"},\"wordCount\":835,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"articleSection\":[\"Head Nerds\",\"Patch Management\",\"Security\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-november-2023-three-zero-days-under-exploit-and-easy-exchange-vulnerability-fixes\",\"url\":\"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-november-2023-three-zero-days-under-exploit-and-easy-exchange-vulnerability-fixes\",\"name\":\"Patch Tuesday November 2023: Three Zero-Days Under Exploit and Easy Fixes for Exchange Vulnerabilities - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#website\"},\"datePublished\":\"2023-11-20T10:58:46+00:00\",\"dateModified\":\"2023-11-20T11:02:35+00:00\",\"description\":\"November has five reported zero-day vulnerabilities, with three under active exploitation, plus there\u2019s work for Exchange admins. Find out more.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-november-2023-three-zero-days-under-exploit-and-easy-exchange-vulnerability-fixes#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-november-2023-three-zero-days-under-exploit-and-easy-exchange-vulnerability-fixes\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-november-2023-three-zero-days-under-exploit-and-easy-exchange-vulnerability-fixes#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Head Nerds\",\"item\":\"https:\/\/www.n-able.com\/it\/blog\/category\/head-nerds-it\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Patch Tuesday November 2023: Three Zero-Days Under Exploit and Easy Fixes for Exchange Vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/it\/#website\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\",\"name\":\"Lewis Pope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"caption\":\"Lewis Pope\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Patch Tuesday November 2023: Three Zero-Days Under Exploit and Easy Fixes for Exchange Vulnerabilities - N-able","description":"November has five reported zero-day vulnerabilities, with three under active exploitation, plus there\u2019s work for Exchange admins. Find out more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-november-2023-three-zero-days-under-exploit-and-easy-exchange-vulnerability-fixes","og_locale":"it_IT","og_type":"article","og_title":"Patch Tuesday November 2023: Three Zero-Days Under Exploit and Easy Fixes for Exchange Vulnerabilities - N-able","og_description":"November has five reported zero-day vulnerabilities, with three under active exploitation, plus there\u2019s work for Exchange admins. Find out more.","og_url":"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-november-2023-three-zero-days-under-exploit-and-easy-exchange-vulnerability-fixes","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2023-11-20T10:58:46+00:00","article_modified_time":"2023-11-20T11:02:35+00:00","og_image":[{"width":2500,"height":1309,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-01.png","type":"image\/png"}],"author":"Lewis Pope","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Scritto da":"Lewis Pope","Tempo di lettura stimato":"4 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-november-2023-three-zero-days-under-exploit-and-easy-exchange-vulnerability-fixes#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-november-2023-three-zero-days-under-exploit-and-easy-exchange-vulnerability-fixes"},"author":{"name":"Lewis Pope","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae"},"headline":"Patch Tuesday November 2023: Three Zero-Days Under Exploit and Easy Fixes for Exchange Vulnerabilities","datePublished":"2023-11-20T10:58:46+00:00","dateModified":"2023-11-20T11:02:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-november-2023-three-zero-days-under-exploit-and-easy-exchange-vulnerability-fixes"},"wordCount":835,"publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"articleSection":["Head Nerds","Patch Management","Security"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-november-2023-three-zero-days-under-exploit-and-easy-exchange-vulnerability-fixes","url":"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-november-2023-three-zero-days-under-exploit-and-easy-exchange-vulnerability-fixes","name":"Patch Tuesday November 2023: Three Zero-Days Under Exploit and Easy Fixes for Exchange Vulnerabilities - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/#website"},"datePublished":"2023-11-20T10:58:46+00:00","dateModified":"2023-11-20T11:02:35+00:00","description":"November has five reported zero-day vulnerabilities, with three under active exploitation, plus there\u2019s work for Exchange admins. Find out more.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-november-2023-three-zero-days-under-exploit-and-easy-exchange-vulnerability-fixes#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-november-2023-three-zero-days-under-exploit-and-easy-exchange-vulnerability-fixes"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-november-2023-three-zero-days-under-exploit-and-easy-exchange-vulnerability-fixes#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Head Nerds","item":"https:\/\/www.n-able.com\/it\/blog\/category\/head-nerds-it"},{"@type":"ListItem","position":2,"name":"Patch Tuesday November 2023: Three Zero-Days Under Exploit and Easy Fixes for Exchange Vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/it\/#website","url":"https:\/\/www.n-able.com\/it\/","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/it\/#organization","name":"N-able","url":"https:\/\/www.n-able.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae","name":"Lewis Pope","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","caption":"Lewis Pope"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/50624","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/comments?post=50624"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/50624\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/media?parent=50624"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}