top of page
  • Writer's pictureJohn Cook

Google Fixes a Seventh Zero-Day Flaw in Chrome—November Security Roundup

Additional: Important security updates from Cisco, Mozilla, Microsoft, Atlassian, and other sources.

Even though the holidays are approaching, the tech industry is not slowing down. Important security updates have been released recently by key firms like Google, Microsoft, Mozilla, Cisco, and Atlassian, addressing vulnerabilities that were already being exploited. Let's examine the specifics of the November security patches and discover why it's so important to maintain awareness in the digital world.

Google Chrome Takes Center Stage

One of the most popular browsers in the world, Google Chrome, made news when it fixed seven security holes, one of which was being actively exploited. The focus is on an integer overflow vulnerability in Google's open-source 2D graphics package, Skia, identified as CVE-2023-6345. Real-world ramifications result from this vulnerability, which Google has fixed with an urgent patch. Interestingly, the source of the exploit raises the possibility of spyware participation, which is much more concerning.

Other High-Impact Fixes

Google didn't stop there; the company fixed six other serious bugs, such as a use-after-free problem in libavif and a type-confusion bug in Spellcheck (CVE-2023-6348) (CVE-2023-6351). Following a November release that addressed 15 security concerns, three of which were classified as high severity, these changes arrived quickly.

Mozilla Firefox in the Spotlight

Mozilla Firefox also fixed ten vulnerabilities, six of which were deemed to have a high impact. Among these, CVE-2023-6204—a weakness in WebGL2 blitFramebuffer that allows for out-of-bound memory access—and CVE-2023-6205—a use-after-free problem in MessagePort—are noteworthy. The thorough description of CVE-2023-6206 highlights the significance of user awareness in avoiding possible attacks by demonstrating how clickjacking permission prompts could be managed.

Google Android Security Bulletin

Eight elevation of privilege issues in the Framework were discovered by Google's November Android Security Bulletin, including a major flaw (CVE-2023-40113) that might expose local information. Users of Pixel devices have already received the update, while the updates are being rolled out progressively across Samsung's Galaxy device line. Due to the potential for severe consequences, attacks targeting these vulnerabilities continue to be a top focus for mobile security.

Microsoft's Patch Tuesday Highlights

Microsoft patched 59 vulnerabilities on its November Patch Tuesday. Two of these have actually been used in actual assaults, which presents a significant risk. The potential for both CVE-2023-36033 and CVE-2023-36036, two elevations of privilege vulnerabilities, to provide SYSTEM privileges makes them both worthy of attention. The update also addressed the libWep issue that affected Microsoft's Edge and was previously repaired in Chrome (CVE-2023-4863).

Cisco's Vigilance

The corporate software behemoth Cisco addressed 27 security vulnerabilities, including one major vulnerability (CVE-2023-20048) in the web services interface of the software that runs the Cisco Firepower Management Center. This vulnerability, which has a near-maximum CVSS score of 9.9, highlights the significance of maintaining business software security by enabling unapproved configuration instructions.

Atlassian's Ransomware Challenge

With CVE-2023-22518, an inappropriate authorization vulnerability in Confluence Data Center and Server that is actively used in ransomware attacks, Atlassian was presented with a significant hurdle. Trend Micro's analysis demonstrates the continuous risks that commonly used enterprise software faces by connecting this vulnerability to the Cerber ransomware organization.

SAP's November Security Patch Day

On its November Security Patch Day, SAP, a significant player in the enterprise software market, fixed three new vulnerabilities. The most serious of them all (CVE-2023-31403) is a SAP Business One inappropriate access control vulnerability that might provide unauthorized users access to shared SMB folders.

These security patches are an essential first line of defense in a world where cyberthreats are constantly evolving. It is not only a smart practice to stay up to speed and apply these updates promptly, but it is also essential to protect yourself from ever-evolving cyber dangers.




bottom of page