Skip to content
OnMSFT.com
  • Home
  • About
  • Contact
  • Windows
  • Surface
  • Xbox
  • How-To
  • OnPodcast
  • Edge
  • Teams
  • Gaming
Menu
  • Home
  • About
  • Contact
  • Windows
  • Surface
  • Xbox
  • How-To
  • OnPodcast
  • Edge
  • Teams
  • Gaming
  1. Home
  2. News
  3. CISA directs government agencies to address Windows and Office zero-days

CISA directs government agencies to address Windows and Office zero-days

OnMSFT Staff OnMSFT Staff
July 18, 2023
2 min read

As reported by BleepingComputer, the Cybersecurity and Infrastructure Security Agency (CISA) has directed federal agencies to address remote code execution zero-day vulnerabilities exploited by the Russian-based RomCom cybercriminal group in NATO phishing attacks. The flaws, CVE-2023-36884, are now included in CISA’s list of Known Exploited Vulnerabilities.

Under directive BOD 22-01 issued in November 2021, U.S. Federal Civilian Executive Branch Agencies (FCEB) must secure Windows devices against attacks using CVE-2023-36884. Agencies have until August 8th to implement mitigation measures provided by Microsoft a week ago.

Microsoft has committed to delivering patches for the vulnerabilities through the regular monthly release process or an out-of-band security update. In the meantime, customers using specific Microsoft products and enabled security rules are protected against phishing attacks targeting CVE-2023-36884.

Customers without these protections can add specific process names to the registry key to block CVE-2023-36884 attacks. However, this may affect the functionality of particular Microsoft Office apps.

While the directive primarily focuses on U.S. federal agencies, CISA advises private companies to prioritize patching all vulnerabilities in their catalog. CISA warns that malicious cyber actors frequently exploit these vulnerabilities and pose significant risks to government and private entities.

Microsoft has confirmed that the CVE-2023-36884 zero-day vulnerabilities were exploited in targeted attacks against North America and Europe government entities.

These findings emphasize the severity of the CVE-2023-36884 zero-day exploitation and the need for enhanced cybersecurity measures. Microsoft’s confirmation sheds light on RomCom’s tactics. It highlights the importance of timely patching and robust defense strategies to mitigate vulnerability risks.

Related

Share this article:
Previous Article Microsoft’s Activision Blizzard buyout expected to clear soon – here’s where it stands now Next Article Here’s everything coming to, and leaving, Game Pass soon

Related Articles

Red Magic 11 runs PC games like GTA 5 and Cyberpunk 2077 on Android at 60 FPS

April 4, 2026

New Ryzen 9 9950X3D2 loses performance on air cooling

April 4, 2026

Legion Go 2 now costs $1,999 at Best Buy, pricing no longer makes sense

April 4, 2026

Leave a Comment Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Red Magic 11 runs PC games like GTA 5 and Cyberpunk 2077 on Android at 60 FPS
  • New Ryzen 9 9950X3D2 loses performance on air cooling
  • Legion Go 2 now costs $1,999 at Best Buy, pricing no longer makes sense
  • ELSA Launches GigaIO Gryf Portable AI System with Modular Design
  • NASA Artemis II astronauts face Outlook issues in space as mission hits unexpected software glitch

Recent Comments

  1. XxRIVTYxX on Intel Says It Tried to Help Before Crimson Desert Dropped Arc Support
  2. Gaurav Kumar on Chrome Prepares Nudge to ‘Move Tabs to the Side’ as Vertical Tabs Near Release
OnMSFT.com

The Tech News Site

Categories

  • Windows
  • Surface
  • Xbox
  • How-To
  • OnPodcast
  • Gaming
  • Edge
  • Teams

Recent Posts

  • Red Magic 11 runs PC games like GTA 5 and Cyberpunk 2077 on Android at 60 FPS
  • New Ryzen 9 9950X3D2 loses performance on air cooling
  • Legion Go 2 now costs $1,999 at Best Buy, pricing no longer makes sense
  • ELSA Launches GigaIO Gryf Portable AI System with Modular Design
  • NASA Artemis II astronauts face Outlook issues in space as mission hits unexpected software glitch

Quick Links

  • About OnMSFT.com
  • Contact OnMSFT
  • Join Our Team
  • Privacy Policy
© 2010–2026 OnMSFT.com LLC. All rights reserved.
About OnMSFT.comContact OnMSFTPrivacy Policy