【安全公告】微软补丁日安全通告|12月份
2023-12-13 17:30:25 Author: mp.weixin.qq.com(查看原文) 阅读量:8 收藏

2023年12月13日(北京时间),微软发布了安全更新,共发布了42个CVE的补丁程序,同比上月减少了36个。

在漏洞安全等级方面,存在4个标记等级为“Critical”的漏洞,32个漏洞被标记为“Important/High”等级的漏洞;在漏洞类型方面,主要有11个远程代码执行漏洞,11个权限提升漏洞以及8个信息泄露漏洞。

漏洞分析

2023年漏洞数量趋势

图 1 2023年微软补丁漏洞修复情况 

总体上来看,微软本月发布的补丁数量为42个,有4个 Critical 漏洞补丁。

千里目安全技术中心在综合考虑往年微软公布漏洞数量的数据统计和今年的特殊情况,初步估计微软在明年一月份公布的漏洞数将比今年十二月份多。漏洞数量将会维持在100个左右。

历史微软补丁日12月漏洞对比

2020-2023年,12月份的漏洞数趋势如下图:

图 2 微软近年12月Windows补丁漏洞数量对比

2020-2023年,12月份的漏洞危险等级趋势和数量如下图:   

图 3 微软近年11月漏洞危险等级对比

2020-2023年,12月份的漏洞各个类型数量对比如下图:

图 4 微软近年12月漏洞类型对比

从漏洞数量来看,今年相较去年减少。微软在2023年12月份爆发的漏洞相较于去年减少。本月出现了42个漏洞补丁,并且有4个 Critical 类型的漏洞补丁。

从漏洞的危险等级来看,相较去年“Critical”等级的漏洞数量减少,“Important/High”等级的漏洞数量减少。本月出现了32个“Important/High”等级的漏洞,相较去年减少了约26%;4个“Critical”类型的漏洞,相较去年减少了约33%。

从漏洞类型来看,RCE类型的漏洞数量增多,DoS类型的漏洞数量增加,EoP类型的漏洞数量减少,仍然需要引起高度重视,尤其是RCE漏洞在配合社工手段的前提下,甚至可以直接接管整个局域网并进行进一步扩展攻击。

重要漏洞分析

漏洞分析

Internet 连接共享 (ICS) 远程执行代码漏洞 CVE-2023-35641、CVE-2023-35630

Internet连接共享(ICS)是一项使有Internet连接的计算机与本地局域网的其他计算机共享Internet连接的服务。共享Internet连接的计算机作为网关提供服务,意味着其他共享Internet连接的计算机的流量都经过这台计算机。ICS提供DHCP和NAT服务给本地局域网。

其中存在远程执行代码漏洞,攻击者可以利用该漏洞在目标系统执行任意代码。经过评估,危害比较大,我们建议用户及时更新微软安全补丁。

影响范围

漏洞名称、CVE编号
受影响版本
Internet 连接共享 (ICS) 远程执行代码漏洞 CVE-2023-35641
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows 11 version 21H2 for x64-based Systems
Windows Server 2022 (Server Core installation)
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows Server 2022
Windows Server 2019 (Server Core installation)
Windows Server 2019
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 for 32-bit Systems
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Internet 连接共享 (ICS) 远程执行代码漏洞 CVE-2023-35630
Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 for 32-bit Systems
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows 11 version 21H2 for x64-based Systems
Windows Server 2022 (Server Core installation)
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows Server 2022
Windows Server 2019 (Server Core installation)
Windows Server 2019
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems

解决方案

官方修复建议

官方修复建议

微软官方已更新受影响软件的安全补丁,用户可根据不同系统版本下载安装对应的安全补丁,安全更新链接如下:

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35641

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35630

参考链接

https://msrc.microsoft.com/update-guide/releaseNote/2023-Dec

时间轴

2023/12/13

微软例行补丁日,微软官网发布漏洞安全公告。

2023/12/13

深信服千里目安全技术中心发布安全公告。

点击阅读原文,及时关注并登录深信服智安全平台,可轻松查询漏洞相关解决方案。


文章来源: https://mp.weixin.qq.com/s?__biz=Mzg2NjgzNjA5NQ==&mid=2247521664&idx=3&sn=7a680fbdde893658e15e366d8960e4d1&chksm=ce461e90f9319786aabccc1c05d3ac6f6cebe33a3687a35dbde0e21d39b29ca7fca9e3f4cee1&scene=58&subscene=0#rd
如有侵权请联系:admin#unsafe.sh