bao mat.jpg

AIS has issued a warning to IT and information security units of ministries, branches and localities, state-owned economic groups and general corporations, commercial banks and financial institutions.

Microsoft has released the November list of patches for 63 security vulnerabilities found in its products. AIS, after considering the list, has requested agencies, organizations and state owned enterprises to pay special attention to 10 security flaws which are threats at a high level.

Three vulnerabilities are currently being exploited in practice and noted by AIS, including CVE-2023-36033 in Windows Desktop Manager, CVE-2023-36036 in Windows Cloud Files Mini Filter Driver and CVE-2023-36025.

Of these, CVE-2023-36025 allows hackers to bypass the Windows' SmartScreen security feature, while the other two CVE-2023-36033 and CVE-2023-36036 allow privilege escalation attacks.

Three vulnerabilities, CVE-2023-36439 in Microsoft Exchange Server, CVE-2023-36041 in Microsoft Excel, and CVE-2023-38177 in Microsoft SharePoint Server, allow remote code execution.

Meanwhile, CVE-2023-36397 in Windows Pragmatic General Multicast allows unauthenticated attackers to execute remote code.

The other three vulnerabilities include CVE-2023-36400 in Windows HMAC Key Derivation which allows to conduct escalate privileges attacks; CVE-2023-36038 in ASP.NET Core allows attackers to conduct denial of service (DoS) attacks; and vulnerability CVE-2023-36413 that allows attackers to bypass Microsoft Office security features.

AIS said to ensure the information security for information systems of agencies, organizations and businesses, as well as ensure security for Vietnam’s cybersecurity, the units need to regularly check to find if the operating system Windows is likely to be affected by these vulnerabilities.

If they discover problems, they need to update patching versions to avoid the risk of being attacked.

Security vulnerabilities are major causes that lead to cyberattacks targeting agencies, organizations and businesses.

Viettel Threat Intelligence report has found that vulnerabilities used by hackers in reality in the third quarter 2023 were all flaws on popular products, and vulnerabilities allowed hackers to execute remote codes remotely after exploitation without authentication.

Cybercriminals exploited the holes as a springboard to access information systems, from which they took subsequent malicious actions.

The National Cyber Security Center (NCSC), in its October report, showed that the technical system of the center found 59,935 vulnerabilities at information systems of state agencies and organizations. Some of the flaws have been exploited by hackers to carry out APT (Advanced Persistent Threat) attacks.

AIS requested NCSC to assess and define serious flaws which may exist on a large scale and instruct agencies to fix them.

Le My