Skip to content

Commit

Permalink
20240819002 (#941)
Browse files Browse the repository at this point in the history
* 20240819002

* Format markdown docs

* Update 20240819002

---------

Co-authored-by: DGOV-Bryce <[email protected]>
Co-authored-by: JadonWill <[email protected]>
  • Loading branch information
3 people committed Aug 19, 2024
1 parent c73495b commit fe4f1a4
Showing 1 changed file with 25 additions and 0 deletions.
25 changes: 25 additions & 0 deletions docs/advisories/20240819002-WPS-Office-Critical-Updates.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
# WPS Office Releases Critical Update - 20240819002

## Overview

The WA SOC has been made aware of vulnerabilities within versions of WPS Office that allow attackers to load and execute arbitrary Windows libraries.

## What is vulnerable?

| Product(s) Affected | Version(s) | CVE | CVSS | Severity |
| ------------------- | --------------- | ------------------------------------------------------------------------------------------------------------------------------------ | ---- | -------- |
| WPS Office | \< 12.2.0.17153 | [CVE-2024-7262](https://nvd.nist.gov/vuln/detail/CVE-2024-7262) <br> [CVE-2024-7263](https://nvd.nist.gov/vuln/detail/CVE-2024-7263) | 9.3 <br> 9.3 | Critical <br> Critical |

## What has been observed?

Active exploitation in the wild has been detected. There is currently no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

## Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *48 hours...* (refer [Patch Management](../guidelines/patch-management.md)):

- WPS Office release notes: <https://www.wps.com/whatsnew/pc/>

## Additional References

- CyberSecurity News article: <https://securityonline.info/wps-office-vulnerabilities-expose-200-million-users-cve-2024-7262-exploited-in-the-wild/>

0 comments on commit fe4f1a4

Please sign in to comment.