diff --git a/docs/advisories/20250115004-Microsoft-January-Updates.md b/docs/advisories/20250115004-Microsoft-January-Updates.md index 1295d2f5..cf990c1e 100644 --- a/docs/advisories/20250115004-Microsoft-January-Updates.md +++ b/docs/advisories/20250115004-Microsoft-January-Updates.md @@ -8,11 +8,11 @@ Microsoft has released security updates to address 159 vulnerabilities in multip ### Critical Vulnerabilities -| Product(s) Affected | CVE | CVSS | Severity | -| ----------------------------- | ----------------------------------------------------------------- | ---- | -------- | -| Windows NTLM | [CVE-2025-21311](https://nvd.nist.gov/vuln/detail/CVE-2025-21311) | 9.8 | Critical | -| Windows OLE | [CVE-2025-21298](https://nvd.nist.gov/vuln/detail/CVE-2025-21298) | 9.8 | Critical | -| Reliable Multicast Transport Driver (RMCAST) | [CVE-2025-21307](https://nvd.nist.gov/vuln/detail/CVE-2025-21307) | 9.8 | Critical | +| Product(s) Affected | CVE | CVSS | Severity | +| -------------------------------------------- | ----------------------------------------------------------------- | ---- | -------- | +| Windows NTLM | [CVE-2025-21311](https://nvd.nist.gov/vuln/detail/CVE-2025-21311) | 9.8 | Critical | +| Windows OLE | [CVE-2025-21298](https://nvd.nist.gov/vuln/detail/CVE-2025-21298) | 9.8 | Critical | +| Reliable Multicast Transport Driver (RMCAST) | [CVE-2025-21307](https://nvd.nist.gov/vuln/detail/CVE-2025-21307) | 9.8 | Critical | ## What has been observed? @@ -22,4 +22,4 @@ There is no evidence of exploitation affecting Western Australian Government net The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *48 hours...* (refer [Patch Management](../guidelines/patch-management.md)): -- Microsoft January 2025 Security Updates: \ No newline at end of file +- Microsoft January 2025 Security Updates: