First published: Tue Dec 12 2023(Updated: )
Microsoft Power Platform Connector Spoofing Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Power Platform | ||
Microsoft Azure Logic Apps | ||
Microsoft Azure Logic Apps | <3.23113 | |
Microsoft Power Platform | <3.23113 | |
Apple WebKit | ||
Microsoft Power Platform | ||
Microsoft Azure Logic Apps | ||
Microsoft Windows | ||
Adobe Prelude | ||
Adobe Illustrator CC | ||
Adobe InDesign | ||
Adobe Dimension | ||
Adobe Experience Manager | ||
Adobe Substance 3D Stager | ||
Adobe Substance 3D Sampler | ||
Adobe Substance 3D After Effects | ||
Adobe Substance 3D Designer | ||
Android | ||
SAP Business Technology Platform (SAP BTP) | ||
Atlassian Bamboo Server | ||
Atlassian Bitbucket | ||
Atlassian Jira Core | ||
Atlassian Confluence Server/Data Center | ||
Atlassian Confluence Server and Data Server | ||
Apache Struts | ||
VMware Workspace ONE Launcher | ||
FortiGuard FortiOS | ||
FortiGuard FortiPAM |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The severity of CVE-2023-36019 has not been explicitly stated, but it poses a spoofing risk in Microsoft Power Platform Connectors.
CVE-2023-36019 affects Microsoft Power Platform, Azure Logic Apps, and several versions of Microsoft Windows.
To fix CVE-2023-36019, ensure that your version of Microsoft Power Platform and Azure Logic Apps is updated to the latest available patch.
Yes, CVE-2023-36019 can significantly impact application security due to potential spoofing attacks.
While specific workarounds for CVE-2023-36019 are not detailed, updating to patched versions is the recommended action to mitigate risks.