Skip to content

Commit a3d046c

Browse files
authored
Adobe Windows KEV
1 parent 7d27343 commit a3d046c

File tree

1 file changed

+23
-0
lines changed

1 file changed

+23
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
# Microsoft and Adobe Known Exploited Vulnerabilities - 20241217001
2+
3+
## Overview
4+
5+
Microsoft and Adobe have released critical security advisories relating to vulnerabilities impacting Windows and ColdFusion.
6+
7+
## What is vulnerable?
8+
9+
| Product(s) Affected | Version(s) | CVE | CVSS | Severity |
10+
| ------------------- | ---------- | ----------------------------------------------------------------------------------------------------------------------------------------- | ------------- | --------------------------------------------------------------- |
11+
| Windows | [Vendor Supplied Version List](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35250) | [CVE-2024-35250](https://nvd.nist.gov/vuln/detail/CVE-2024-35250) | 7.8 | High |
12+
| ColdFusion | ColdFusion 2023 <= Update 6 </br> ColdFusion <= Update 12 | [CVE-2024-20767](https://nvd.nist.gov/vuln/detail/CVE-2024-20767) | 7.4 | High|
13+
14+
## What has been observed?
15+
16+
CISA added this vulnerability in their [Known Exploited Vulnerabilities](https://www.cisa.gov/known-exploited-vulnerabilities-catalog) catalog. There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.
17+
18+
## Recommendation
19+
20+
The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe recommended in [Patch Management](../guidelines/patch-management.md):
21+
22+
- Microsoft: <https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35250>
23+
- Adobe: <https://helpx.adobe.com/security/products/coldfusion/apsb24-14.html>

0 commit comments

Comments
 (0)