Overview
NSFOCUS CERT recently monitored that Microsoft had released a security update patch for April, which fixed 97 security issues, involving Microsoft Word, Layer2 Tunneling Protocol, Microsoft Publisher, Windows Kernel and other widely used products, including high-risk vulnerability types such as privilege escalation and remote code execution.
Among the vulnerabilities fixed in Microsoft’s monthly updates this month, there are 7 critical vulnerabilities and 90 important vulnerabilities, including 1 0-day vulnerability:
Windows Common Log File System Driver Privilege Elevation Vulnerability (CVE-2023-28252)
Please update the patch as soon as possible for protection. Please refer to the appendix for a complete list of vulnerabilities.
Reference link: https://msrc.microsoft.com/update-guide/releaseNote/2023-Apr
Key Vulnerabilities
Based on product popularity and vulnerability importance, we have identified vulnerabilities with significant impact in this update. Relevant users are advised to pay close attention to them:
Windows Common Log File System driver privilege escalation vulnerability (CVE-2023-28252):
There is a privilege escalation vulnerability in the Windows Common Log File System driver. Due to boundary errors in the Windows public log file system driver, local attackers can run malicious programs to trigger memory corruption, leading to the privilege escalation to SYSTEM on the target system. At present, it has been detected that the vulnerability is being exploited in the wild, with a CVSS score of 7.8.
Official announcement link:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28252
Microsoft Office Publisher Remote Code Execution Vulnerability (CVE-2023 28295/CVE-2023 28287):
There is a remote code execution vulnerability in Microsoft Office Publisher, which allows local attackers without authentication to execute arbitrary code with user privileges on the target system by inducing users to run malicious files on the affected system. The CVSS score is 7.8.
Official announcement link:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28295
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28287
Microsoft Word Remote Code Execution Vulnerability (CVS 2023-28311):
There is a remote code execution vulnerability in Microsoft Word, which allows attackers to create malicious files. After successfully inducing users to download and open specially crafted malicious files on the affected system, attackers without authentication can use this vulnerability to execute arbitrary code on the target system. The CVSS score is 7.8.
Official announcement link:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28311
Layer2 Tunneling Protocol Remote Code Execution Vulnerability (CVE-2023 28219/CVE-2023 28220):
There is a remote code execution vulnerability in Layer2 Tunneling Protocol, where in a specific configuration environment, a remote attacker without authentication sends a crafted request to the RAS server, ultimately resulting in arbitrary code execution on the target server without user interaction. The CVSS score is 8.1.
Official announcement link:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28219
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28220
Windows Point to Point Tunneling Protocol Remote Code Execution Vulnerability (CVS 2023-28232):
The Windows point-to-point tunneling protocol has a remote code execution vulnerability. In a specific target environment, an unauthenticated remote attacker successfully induces a user to connect a Windows client to a malicious server and triggers this vulnerability. Attackers who successfully exploit this vulnerability can ultimately achieve remote code execution on the server side without user interaction. The CVSS score is 7.5.
Official announcement link:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28232
Windows Kernel privilege escalation vulnerability (CVE-2023-28248/CVE-2023-28272/CVE-2023-28293):
There is a privilege escalation vulnerability in the Windows Kernel. Because of boundary errors in the Windows Kernel, buffer overflow can be caused. Local attackers can exploit this vulnerability to elevate SYSTEM privileges and execute arbitrary code on the target system.
Official announcement link:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28248
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28272
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28293
Microsoft Message Queuing Remote Code Execution Vulnerability (CVS 2023-21554):
The Windows Message Queuing service is a Windows component that needs to be enabled by the system to exploit this vulnerability, which can be added through the control panel. There is a remote code execution vulnerability in Microsoft Message Queuing, which can be triggered by an unauthenticated remote attacker sending a specially crafted malicious MSMQ packet to the MSMQ server, ultimately achieving remote code execution on the server side without user interaction. The CVSS score is 9.8.
Official announcement link:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21554
Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability (CVS 2023-28250):
A remote code execution vulnerability exists in Windows Pragmatic General Multicast (PGM). After enabling the Windows Message Queuing service, an unauthenticated attacker sends a crafted file over the network and attempts to trigger malicious code, ultimately achieving remote code execution. The CVSS score is 9.8.
Official announcement link:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28250
Scope of Impact
The following are some affected product versions that focus on vulnerabilities. For other product ranges affected by vulnerabilities, please refer to the official announcement link.
Vulnerability number | Affected product version |
CVE-2023-28252 | Windows Server 2012 R2 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 (Server Core installation) Windows Server 2012 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2016 (Server Core installation) Windows Server 2016 Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems Windows 10 for x64-based Systems Windows 10 for 32-bit Systems Windows 10 Version 22H2 for 32-bit Systems Windows 10 Version 22H2 for ARM64-based Systems Windows 10 Version 22H2 for x64-based Systems Windows 11 Version 22H2 for x64-based Systems Windows 11 Version 22H2 for ARM64-based Systems Windows 10 Version 21H2 for x64-based Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for 32-bit Systems Windows 11 version 21H2 for ARM64-based Systems Windows 11 version 21H2 for x64-based Systems Windows 10 Version 20H2 for ARM64-based Systems Windows 10 Version 20H2 for 32-bit Systems Windows 10 Version 20H2 for x64-based Systems Windows Server 2022 (Server Core installation) Windows Server 2022 Windows Server 2019 (Server Core installation) Windows Server 2019 Windows 10 Version 1809 for ARM64-based Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems |
CVE-2023-28295 CVE-2023-28287 | Microsoft Office 2019 for 32-bit editions Microsoft Office 2019 for 64-bit editions Microsoft Publisher 2013 Service Pack 1 RT Microsoft 365 Apps for Enterprise for 32-bit Systems Microsoft 365 Apps for Enterprise for 64-bit Systems Microsoft Office LTSC 2021 for 32-bit editions Microsoft Office LTSC 2021 for 64-bit editions Microsoft Publisher 2013 Service Pack 1 (64-bit editions) Microsoft Publisher 2013 Service Pack 1 (32-bit editions) Microsoft Publisher 2016 (64-bit edition) Microsoft Publisher 2016 (32-bit edition) |
CVE-2023-28311 | Microsoft Office LTSC for Mac 2021 Microsoft 365 Apps for Enterprise for 64-bit Systems Microsoft 365 Apps for Enterprise for 32-bit Systems Microsoft Office 2019 for Mac |
CVE-2023-28219 CVE-2023-28220 CVE-2023-28232 CVE-2023-28272 CVE-2023-28293 CVE-2023-21554 CVE-2023-28250 | Windows Server 2012 R2 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 (Server Core installation) Windows Server 2012 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2016 (Server Core installation) Windows Server 2016 Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems Windows 10 for x64-based Systems Windows 10 for 32-bit Systems Windows 10 Version 22H2 for 32-bit Systems Windows 10 Version 22H2 for ARM64-based Systems Windows 10 Version 22H2 for x64-based Systems Windows 11 Version 22H2 for x64-based Systems Windows 11 Version 22H2 for ARM64-based Systems Windows 10 Version 21H2 for x64-based Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for 32-bit Systems Windows 11 version 21H2 for ARM64-based Systems Windows 11 version 21H2 for x64-based Systems Windows 10 Version 20H2 for ARM64-based Systems Windows 10 Version 20H2 for 32-bit Systems Windows 10 Version 20H2 for x64-based Systems Windows Server 2022 (Server Core installation) Windows Server 2022 Windows Server 2019 (Server Core installation) Windows Server 2019 Windows 10 Version 1809 for ARM64-based Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems |
CVE-2023-28248 | Windows Server 2016 (Server Core installation) Windows Server 2016 Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems Windows 10 Version 22H2 for 32-bit Systems Windows 10 Version 22H2 for ARM64-based Systems Windows 10 Version 22H2 for x64-based Systems Windows 11 Version 22H2 for x64-based Systems Windows 11 Version 22H2 for ARM64-based Systems Windows 10 Version 21H2 for x64-based Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for 32-bit Systems Windows 11 version 21H2 for ARM64-based Systems Windows 11 version 21H2 for x64-based Systems Windows 10 Version 20H2 for ARM64-based Systems Windows 10 Version 20H2 for 32-bit Systems Windows 10 Version 20H2 for x64-based Systems Windows Server 2022 (Server Core installation) Windows Server 2022 Windows Server 2019 (Server Core installation) Windows Server 2019 Windows 10 Version 1809 for ARM64-based Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems |
Mitigation
At present, Microsoft has officially released security patches to fix the above vulnerabilities for supported product versions. It is strongly recommended that affected users install the patch as soon as possible for protection. The official download link is:
https://msrc.microsoft.com/update-guide/releaseNote/2023-Apr
Note: Due to network issues, computer environment issues, and other reasons, patch updates for Windows Update may fail. After installing the patch, users should promptly check whether the patch has been successfully updated.
Right click on the Windows icon, select “Settings”, select “Updates and Security” – “Windows Update” to view the prompts on this page, or click “View Update History” to view the historical update status.
For updates that have not been successfully installed, you can click on the update name to go to the Microsoft official download page. It is recommended that users click on the link on this page and go to the “Microsoft Update Directory” website to download and install the independent package.
Appendix: Vulnerability List
Impact product | CVE number | Vulnerability Title | Severity |
Microsoft Message Queuing | CVE-2023-21554 | Microsoft Message Queuing Remote Code Execution Vulnerability | Critical |
Windows DHCP Server | CVE-2023-28231 | DHCP Server Service Remote Code Execution Vulnerability | Critical |
Windows Layer 2 Tunneling Protocol | CVE-2023-28219 | Layer 2 Tunneling Protocol Remote Code Execution Vulnerability | Critical |
Windows Layer 2 Tunneling Protocol | CVE-2023-28220 | Layer 2 Tunneling Protocol Remote Code Execution Vulnerability | Critical |
Windows PGM | CVE-2023-28250 | Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability | Critical |
Windows Point-to-Point Tunneling Protocol | CVE-2023-28232 | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | Critical |
Windows Raw Image Extension | CVE-2023-28291 | Raw Image Extension Remote Code Execution Vulnerability | Critical |
.NET Core | CVE-2023-28260 | . NET DLL hijacking remote code execution vulnerability | Important |
Azure Machine Learning | CVE-2023-28312 | Azure Machine Learning Information Disclosure Vulnerability | Important |
Azure Service Connector | CVE-2023-28300 | Azure Service Connector Security Feature Bypass Vulnerability | Important |
Microsoft Bluetooth Driver | CVE-2023-28227 | Windows Bluetooth Driver Remote Code Execution Vulnerability | Important |
Microsoft Defender for Endpoint | CVE-2023-24860 | Microsoft Defender Denial of Service Vulnerability | Important |
Microsoft Dynamics | CVE-2023-28314 | Microsoft Dynamics 365 (Local) Cross Site Scripting Vulnerability | Important |
Microsoft Dynamics | CVE-2023-28309 | Microsoft Dynamics 365 (Local) Cross Site Scripting Vulnerability | Important |
Microsoft Dynamics 365 Customer Voice | CVE-2023-28313 | Microsoft Dynamics 365 Customer Voice Cross Site Scripting Vulnerability | Important |
Microsoft Graphics Component | CVE-2023-24912 | Windows Graphics Component Privilege Escalation Vulnerability | Important |
Microsoft Message Queuing | CVE-2023-21769 | Microsoft Message Queuing Denial of Service Vulnerability | Important |
Microsoft Office | CVE-2023-28285 | Microsoft Office Graphics Remote Code Execution Vulnerability | Important |
Microsoft Office Publisher | CVE-2023-28295 | Microsoft Office Publisher Remote Code Execution Vulnerability | Important |
Microsoft Office Publisher | CVE-2023-28287 | Microsoft Office Publisher Remote Code Execution Vulnerability | Important |
Microsoft Office SharePoint | CVE-2023-28288 | Microsoft Office SharePoint Server Spoofing Vulnerability | Important |
Microsoft Office Word | CVE-2023-28311 | Microsoft Word Remote Code Execution Vulnerability | Important |
Microsoft PostScript Printer Driver | CVE-2023-28243 | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | Important |
Microsoft Printer Drivers | CVE-2023-24883 | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | Important |
Microsoft Printer Drivers | CVE-2023-24927 | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | Important |
Microsoft Printer Drivers | CVE-2023-24925 | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | Important |
Microsoft Printer Drivers | CVE-2023-24924 | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | Important |
Microsoft Printer Drivers | CVE-2023-24885 | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | Important |
Microsoft Printer Drivers | CVE-2023-24928 | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | Important |
Microsoft Printer Drivers | CVE-2023-24884 | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | Important |
Microsoft Printer Drivers | CVE-2023-24926 | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | Important |
Microsoft Printer Drivers | CVE-2023-24929 | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | Important |
Microsoft Printer Drivers | CVE-2023-24887 | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | Important |
Microsoft Printer Drivers | CVE-2023-24886 | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | Important |
Microsoft WDAC OLE DB provider for SQL | CVE-2023-28275 | Microsoft WDAC OLE DB Provider for SQL Server Remote Code Execution Vulnerability | Important |
Microsoft Windows DNS | CVE-2023-28256 | Windows DNS Server Remote Code Execution Vulnerability | Important |
Microsoft Windows DNS | CVE-2023-28278 | Windows DNS Server Remote Code Execution Vulnerability | Important |
Microsoft Windows DNS | CVE-2023-28307 | Windows DNS Server Remote Code Execution Vulnerability | Important |
Microsoft Windows DNS | CVE-2023-28306 | Windows DNS Server Remote Code Execution Vulnerability | Important |
Microsoft Windows DNS | CVE-2023-28223 | Windows Domain Name Service Remote Code Execution Vulnerability | Important |
Microsoft Windows DNS | CVE-2023-28254 | Windows DNS Server Remote Code Execution Vulnerability | Important |
Microsoft Windows DNS | CVE-2023-28305 | Windows DNS Server Remote Code Execution Vulnerability | Important |
Microsoft Windows DNS | CVE-2023-28308 | Windows DNS Server Remote Code Execution Vulnerability | Important |
Microsoft Windows DNS | CVE-2023-28255 | Windows DNS Server Remote Code Execution Vulnerability | Important |
Microsoft Windows DNS | CVE-2023-28277 | Windows DNS Server Information Disclosure Vulnerability | Important |
SQL Server | CVE-2023-23384 | Microsoft SQL Server Remote Code Execution Vulnerability | Important |
SQL Server | CVE-2023-23375 | Microsoft ODBC and OLE DB Remote Code Execution Vulnerability | Important |
SQL Server | CVE-2023-28304 | Microsoft ODBC and OLE DB Remote Code Execution Vulnerability | Important |
Visual Studio | CVE-2023-28299 | Visual Studio Spoofing Vulnerability | Important |
Visual Studio | CVE-2023-28262 | Visual Studio Permission Elevation Vulnerability | Important |
Visual Studio | CVE-2023-28263 | Visual Studio Information Disclosure Vulnerability | Important |
Visual Studio | CVE-2023-28296 | Visual Studio Remote Code Execution Vulnerability | Important |
Visual Studio Code | CVE-2023-24893 | Visual Studio Code Remote Code Execution Vulnerability | Important |
Windows Active Directory | CVE-2023-28302 | Microsoft Message Queuing Denial of Service Vulnerability | Important |
Windows ALPC | CVE-2023-28236 | Windows Kernel privilege escalation vulnerability | Important |
Windows ALPC | CVE-2023-28216 | Windows Advanced Local Procedure Call (ALPC) Privilege Elevation Vulnerability | Important |
Windows Ancillary Function Driver for WinSock | CVE-2023-28218 | Windows Accessibility Driver for WinSock Privilege Escalation Vulnerability | Important |
Windows Boot Manager | CVE-2023-28269 | Windows Boot Manager Security Feature Bypass Vulnerability | Important |
Windows Boot Manager | CVE-2023-28249 | Windows Boot Manager Security Feature Bypass Vulnerability | Important |
Windows Clip Service | CVE-2023-28273 | Windows Clipping Service Privilege Escalation Vulnerability | Important |
Windows CNG Key Isolation Service | CVE-2023-28229 | Windows CNG Key Isolation Service Privilege Enhancement Vulnerability | Important |
Windows Common Log File System Driver | CVE-2023-28266 | Windows Common Log File System Driver Information Disclosure Vulnerability | Important |
Windows Common Log File System Driver | CVE-2023-28252 | Windows Common Log File System Driver Privilege Escalation Vulnerability | Important |
Windows Enroll Engine | CVE-2023-28226 | Windows Registration Engine Security Feature Bypass Vulnerability | Important |
Windows Error Reporting | CVE-2023-28221 | Windows Error Reporting Service Privilege Escalation Vulnerability | Important |
Windows Group Policy | CVE-2023-28276 | Windows Group Policy Security Feature Bypass Vulnerability | Important |
Windows Internet Key Exchange (IKE) Protocol | CVE-2023-28238 | Windows Internet Key Exchange (IKE) Protocol Extension Remote Code Execution Vulnerability | Important |
Windows Kerberos | CVE-2023-28244 | Windows Kerberos privilege escalation vulnerability | Important |
Windows Kernel | CVE-2023-28271 | Windows Kernel Memory Information Disclosure Vulnerability | Important |
Windows Kernel | CVE-2023-28248 | Windows Kernel privilege escalation vulnerability | Important |
Windows Kernel | CVE-2023-28222 | Windows Kernel privilege escalation vulnerability | Important |
Windows Kernel | CVE-2023-28272 | Windows Kernel privilege escalation vulnerability | Important |
Windows Kernel | CVE-2023-28293 | Windows Kernel privilege escalation vulnerability | Important |
Windows Kernel | CVE-2023-28253 | Windows Kernel Information Disclosure Vulnerability | Important |
Windows Kernel | CVE-2023-28237 | Windows Kernel Remote Code Execution Vulnerability | Important |
Windows Kernel | CVE-2023-28298 | Windows Kernel Denial of Service Vulnerability | Important |
Windows Lock Screen | CVE-2023-28270 | Windows Lock Screen Security Feature Bypass Vulnerability | Important |
Windows Lock Screen | CVE-2023-28235 | Windows Lock Screen Security Feature Bypass Vulnerability | Important |
Windows Netlogon | CVE-2023-28268 | Netlogin RPC privilege escalation vulnerability | Important |
Windows Network Address Translation (NAT) | CVE-2023-28217 | Windows Network Address Translation (NAT) Denial of Service Vulnerability | Important |
Windows Network File System | CVE-2023-28247 | Windows Network File System Information Disclosure Vulnerability | Important |
Windows Network Load Balancing | CVE-2023-28240 | Windows Network Load Balancing Remote Code Execution Vulnerability | Important |
Windows NTLM | CVE-2023-28225 | Windows NTLM privilege escalation vulnerability | Important |
Windows Point-to-Point Protocol over Ethernet (PPPoE) | CVE-2023-28224 | Windows Ethernet Point-to-point Protocol (PPPoE) Remote Code Execution Vulnerability | Important |
Windows Raw Image Extension | CVE-2023-28292 | Raw Image Extension Remote Code Execution Vulnerability | Important |
Windows RDP Client | CVE-2023-28228 | Windows Spoofing Vulnerability | Important |
Windows RDP Client | CVE-2023-28267 | Remote Desktop Protocol Client Information Disclosure Vulnerability | Important |
Windows Registry | CVE-2023-28246 | Windows Registry Privilege Escalation Vulnerability | Important |
Windows RPC API | CVE-2023-21729 | Remote Procedure Call Runtime Information Disclosure Vulnerability | Important |
Windows RPC API | CVE-2023-21727 | Remote Procedure Call Runtime Remote Code Execution Vulnerability | Important |
Windows RPC API | CVE-2023-28297 | Windows Remote Procedure Call Service (RPCSS) privilege escalation vulnerability | Important |
Windows Secure Channel | CVE-2023-24931 | Windows Secure Channel Denial of Service Vulnerability | Important |
Windows Secure Channel | CVE-2023-28233 | Windows Secure Channel Denial of Service Vulnerability | Important |
Windows Secure Socket Tunneling Protocol (SSTP) | CVE-2023-28241 | Windows Secure Socket Tunneling Protocol (SSTP) Denial of Service Vulnerability | Important |
Windows Transport Security Layer (TLS) | CVE-2023-28234 | Windows Secure Channel Denial of Service Vulnerability | Important |
Windows Win32K | CVE-2023-28274 | Windows Win32k Privilege Escalation Vulnerability | Important |
Windows Win32K | CVE-2023-24914 | Win32k privilege escalation vulnerability | Important |
Statement
This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and/or indirect consequences and losses caused by transmitting and/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add/delete any information to/from it, or use this advisory for commercial purposes without permission from NSFOCUS.
About NSFOCUS
NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. The company’s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide multi-layered, unified and dynamic protection against advanced cyber attacks.
NSFOCUS works with Fortune Global 500 companies, including four of the world’s five largest financial institutions, organizations in insurance, retail, healthcare, critical infrastructure industries as well as government agencies. NSFOCUS has technology and channel partners in more than 60 countries, is a member of both the Microsoft Active Protections Program (MAPP), and the Cloud Security Alliance (CSA).
A wholly owned subsidiary of NSFOCUS Technologies Group Co., Ltd., the company has operations in the Americas, Europe, the Middle East and Asia Pacific.