

In the former, an attacker wielding CVE-2023-32049 could send to a target a specially crafted URL that, if clicked, could bypass the usual Open File – Security Warning prompt likewise, in the latter, a specially crafted URL could lead to bypass of the Outlook security-notice prompt. In addition to the issue detailed in ADV230001, Microsoft flags five patched CVEs, all Important-severity, as being under active exploitation in the wild. ADV230002, “Microsoft Guidance for Addressing Security Feature Bypass in Trend Micro EFI Modules,” is also included this month, as is ADV990001, covering the latest Servicing Stack updates. For an in-depth look at the situation, including Sophos X-Ops’ role in its discovery, please see the accompanying article Microsoft has also published a Knowledge Base article on the matter.
#Windows update trend micro 2007 drivers
ADV230001, “Guidance on Microsoft Signed Drivers Being Used Maliciously,” addresses an issue under sustained active exploit for multiple products. Microsoft is also publishing three advisories that bear a closer look. NET share a patch and each takes another one of their own.

Azure takes four, though two of those are shared with Windows as noted above. Office takes 10 patches, including three that it shares with Outlook, one that it shares with Windows as noted above, and one that it shares with Access. As usual, the largest number of addressed vulnerabilities affect Windows with 105 CVEs, including two that also affect Azure and one (CVE-2023-36884) that also affects Office. Microsoft on Tuesday released patches for 130 vulnerabilities, including eight critical-severity issues in Windows and two in SharePoint. Initially posted at 18:38 UTC on 11 July 2023] Version 2 published 18:25 UTC, 14 July 2023, adding information on CVE-2023-36884 and updating totals throughout.
