<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel>
        <title>Security Advisories | Cloud Security Solutions | Zscaler</title>
        <link>https://www.zscaler.com/security-advisories/feeds</link>
        <description>Zscaler Security Advisories identify and provide security vulnerabilities along with their criticality ratings.</description>
        <lastBuildDate>Sun, 08 Mar 2026 13:39:40 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>RSS 2.0, JSON Feed 1.0, and Atom 1.0 generator for Node.js</generator>
        <language>en</language>
        <item>
            <title><![CDATA[Zscaler protects against 9 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-9-new-vulnerabilities-for-windows-february-2026</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-9-new-vulnerabilities-for-windows-february-2026</guid>
            <pubDate>Tue, 10 Feb 2026 20:50:09 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their&nbsp;MAPP program, has proactively deployed protection for the following 9 vulnerabilities included in the February 2026 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the February release and deploy additional protections, as necessary.CVE-2026-21231 – Windows Kernel Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows 11 version 26H1 for x64-based SystemsWindows 11 Version 26H1 for ARM64-based SystemsWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 11 Version 25H2 for x64-based SystemsWindows 11 Version 25H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2026-21238 – Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAdvanced Cloud SandboxAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 11 Version 25H2 for x64-based SystemsWindows 11 Version 25H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsWindows 11 version 26H1 for x64-based SystemsWindows 11 Version 26H1 for ARM64-based SystemsCVE-2026-21241 – Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 11 Version 25H2 for x64-based SystemsWindows 11 Version 25H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows Server 2022 (Server Core installation)Windows Server 2022Windows 11 version 26H1 for x64-based SystemsWindows 11 Version 26H1 for ARM64-based SystemsCVE-2026-21253 – Mailslot File System Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2016 (Server Core installation)Windows 10 Version 1607 for 32-bit SystemsWindows 10 Version 1607 for x64-based SystemsWindows Server 2016Windows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 11 Version 25H2 for x64-based SystemsWindows 11 Version 25H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2012 R2 (Server Core installation)Windows Server 2012Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows 10 Version 21H2 for 32-bit SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows Server 2022Windows 11 version 26H1 for x64-based SystemsWindows 11 Version 26H1 for ARM64-based SystemsCVE-2026-21510 – Windows Shell Security Feature Bypass VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAffected SoftwareWindows 11 version 26H1 for x64-based SystemsWindows 11 Version 26H1 for ARM64-based SystemsWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 11 Version 25H2 for x64-based SystemsWindows 11 Version 25H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2026-21511 – Microsoft Outlook Spoofing VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareMicrosoft Office LTSC for Mac 2021Microsoft 365 Apps for Enterprise for 64-bit SystemsMicrosoft 365 Apps for Enterprise for 32-bit SystemsMicrosoft Office 2019 for 64-bit editionsMicrosoft Office 2019 for 32-bit editionsMicrosoft SharePoint Server 2019Microsoft SharePoint Enterprise Server 2016Microsoft Word 2016 (64-bit edition)Microsoft Word 2016 (32-bit edition)Microsoft Office LTSC for Mac 2024Microsoft Office LTSC 2024 for 64-bit editionsMicrosoft Office LTSC 2024 for 32-bit editionsMicrosoft SharePoint Server Subscription EditionMicrosoft Office LTSC 2021 for 32-bit editionsMicrosoft Office LTSC 2021 for 64-bit editionsCVE-2026-21514 – Microsoft Word Security Feature Bypass VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareMicrosoft Office LTSC for Mac 2024Microsoft Office LTSC 2024 for 64-bit editionsMicrosoft Office LTSC 2024 for 32-bit editionsMicrosoft Office LTSC 2021 for 32-bit editionsMicrosoft Office LTSC 2021 for 64-bit editionsMicrosoft Office LTSC for Mac 2021Microsoft 365 Apps for Enterprise for 64-bit SystemsMicrosoft 365 Apps for Enterprise for 32-bit SystemsCVE-2026-21519 – Desktop Window Manager Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows 11 version 26H1 for x64-based SystemsWindows 11 Version 26H1 for ARM64-based SystemsWindows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 11 Version 25H2 for x64-based SystemsWindows 11 Version 25H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2026-21525 – Windows Remote Access Connection Manager Denial of Service VulnerabilitySeverity:&nbsp;ModerateSubscriptions RequiredAdvanced Threat ProtectionAdvanced Cloud SandboxAffected SoftwareWindows 11 version 26H1 for x64-based SystemsWindows 11 Version 26H1 for ARM64-based SystemsWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 11 Version 25H2 for x64-based SystemsWindows 11 Version 25H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit Systems]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 9 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-9-new-vulnerabilities-for-windows-january-2026</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-9-new-vulnerabilities-for-windows-january-2026</guid>
            <pubDate>Tue, 13 Jan 2026 21:40:03 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their&nbsp;MAPP program, has proactively deployed protection for the following 9 vulnerabilities included in the January 2026 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the January release and deploy additional protections, as necessary.CVE-2026-20805 – Desktop Window Manager Information Disclosure VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 11 Version 25H2 for x64-based SystemsWindows 11 Version 25H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019CVE-2026-20816 – Windows Installer Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAdvanced Cloud SandboxAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 11 Version 25H2 for x64-based SystemsWindows 11 Version 25H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2026-20817 – Windows Error Reporting Service Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 11 Version 25H2 for x64-based SystemsWindows 11 Version 25H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022CVE-2026-20820 – Windows Common Log File System Driver Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016Windows Server 2012 R2Windows 10 Version 1607 for 32-bit SystemsWindows Server 2012Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2016 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows 10 Version 1607 for x64-based SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows 11 Version 23H2 for x64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 25H2 for ARM64-based SystemsWindows 11 Version 25H2 for x64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 21H2 for x64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows Server 2019 (Server Core installation)Windows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022Windows Server 2019Windows 10 Version 1809 for 32-bit SystemsWindows Server 2022 (Server Core installation)CVE-2026-20840 – Windows NTFS Remote Code Execution VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAffected SoftwareWindows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 11 Version 25H2 for x64-based SystemsWindows 11 Version 25H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows Server 2025Windows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2026-20843 – Windows Routing and Remote Access Service (RRAS) Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 11 Version 25H2 for x64-based SystemsWindows 11 Version 25H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2026-20860 – Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 11 Version 25H2 for x64-based SystemsWindows 11 Version 25H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2026-20871 – Desktop Windows Manager Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 11 Version 25H2 for x64-based SystemsWindows 11 Version 25H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022CVE-2026-20922 – Windows NTFS Remote Code Execution VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2012Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016Windows Server 2012 (Server Core installation)Windows Server 2019Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows 10 Version 1809 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows Server 2016 (Server Core installation)Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows Server 2012 R2Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows 11 Version 24H2 for x64-based SystemsWindows Server 2025Windows 11 Version 24H2 for ARM64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 11 Version 23H2 for x64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 25H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 11 Version 25H2 for ARM64-based SystemsWindows Server 2022Windows 10 Version 22H2 for 32-bit SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 21H2 for x64-based SystemsWindows Server 2019 (Server Core installation)Windows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 4 new vulnerabilities for Adobe Acrobat and Reader]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-4-new-vulnerabilities-for-adobe-december-2025</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-4-new-vulnerabilities-for-adobe-december-2025</guid>
            <pubDate>Tue, 09 Dec 2025 19:49:49 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their&nbsp;MAPP program, has proactively deployed protection for the following 4 vulnerabilities included in the December 2025 Adobe security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the December release and deploy additional protections, as necessary.APSB25-119 – Security updates available for Adobe Acrobat and Reader.Adobe has released security updates for Adobe Acrobat and Reader for Windows and macOS. These updates address critical and moderate vulnerabilities. Successful exploitation could lead to arbitrary code execution and security feature bypass.Affected SoftwareAcrobat DC Continuous 25.001.20982 and earlier versions for Windows & macOSAcrobat Reader DC Continuous 25.001.20982 and earlier versions for Windows & macOSAcrobat 2024 Classic 2024 24.001.30264 and earlier versions for Windows & 24.001.30273 and earlier for macOSAcrobat 2020 Classic 20.005.30793 and earlier versions for Windows & 20.005.30803 and earlier for macOSAcrobat Reader 2020 Classic 2020 20.005.30793 and earlier versions for Windows & 20.005.30803 and earlier for macOSCVE-2025-64785 – Untrusted Search Path vulnerability leading to Arbitrary code execution.&nbsp;Severity: CriticalSubscription RequiredAdvanced Threat Protection&nbsp;CVE-2025-64786 – Improper Verification of Cryptographic Signature vulnerability leading to Security feature bypass.&nbsp;Severity: ModerateSubscription RequiredAdvanced Threat Protection&nbsp;CVE-2025-64787 – Improper Verification of Cryptographic Signature vulnerability leading to Security feature bypass.&nbsp;Severity: ModerateSubscription RequiredAdvanced Threat Protection&nbsp;CVE-2025-64899 – Out-of-bounds Read vulnerability leading to Arbitrary code execution.&nbsp;Severity: CriticalSubscription RequiredAdvanced Threat Protection&nbsp;]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 6 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-6-new-vulnerabilities-for-windows-december-2025</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-6-new-vulnerabilities-for-windows-december-2025</guid>
            <pubDate>Tue, 09 Dec 2025 19:43:15 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their&nbsp;MAPP program, has proactively deployed protection for the following 6 vulnerabilities included in the December 2025 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the December release and deploy additional protections, as necessary.CVE-2025-59516 – Windows Storage VSP Driver Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 11 Version 25H2 for x64-based SystemsWindows 11 Version 25H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2025-59517 – Windows Storage VSP Driver Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAdvanced Cloud SandboxAffected SoftwareWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 11 Version 25H2 for x64-based SystemsWindows 11 Version 25H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2025-62221 – Windows Cloud Files Mini Filter Driver Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2022 (Server Core installation)Windows 11 Version 25H2 for x64-based SystemsWindows 11 Version 25H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 10 Version 1809 for 32-bit SystemsWindows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsCVE-2025-62454 – Windows Cloud Files Mini Filter Driver Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsWindows 11 Version 25H2 for x64-based SystemsWindows 11 Version 25H2 for ARM64-based SystemsCVE-2025-62470 – Windows Common Log File System Driver Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows 11 Version 25H2 for x64-based SystemsWindows 11 Version 25H2 for ARM64-based SystemsWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2025-62472 – Windows Remote Access Connection Manager Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 11 Version 25H2 for x64-based SystemsWindows 11 Version 25H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit Systems]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 5 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-5-new-vulnerabilities-for-windows-november-2025</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-5-new-vulnerabilities-for-windows-november-2025</guid>
            <pubDate>Tue, 11 Nov 2025 23:01:24 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their&nbsp;MAPP program, has proactively deployed protection for the following 5 vulnerabilities included in the November 2025 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the November release and deploy additional protections, as necessary.CVE-2025-59512 – Customer Experience Improvement Program (CEIP) Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows 10 Version 1607 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 11 Version 25H2 for x64-based SystemsWindows 11 Version 25H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2025-60705 – Windows Client-Side Caching Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAdvanced Cloud SandboxAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 11 Version 25H2 for x64-based SystemsWindows 11 Version 25H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2025-60719 – Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows 11 Version 25H2 for x64-based SystemsWindows 11 Version 25H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2025-62213 – Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 11 Version 25H2 for x64-based SystemsWindows 11 Version 25H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2025-62215 – Windows Kernel Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 11 Version 25H2 for x64-based SystemsWindows 11 Version 25H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit Systems]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 5 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-5-new-vulnerabilities-for-windows-october-2025</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-5-new-vulnerabilities-for-windows-october-2025</guid>
            <pubDate>Tue, 14 Oct 2025 21:07:44 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their&nbsp;MAPP program, has proactively deployed protection for the following 5 vulnerabilities included in the October 2025 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the October release and deploy additional protections, as necessary.CVE-2025-59194 – Windows Kernel Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows 11 Version 25H2 for ARM64-based SystemsWindows 11 Version 25H2 for x64-based SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsCVE-2025-58722 – Microsoft DWM Core Library Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAdvanced Cloud SandboxAffected SoftwareWindows 10 Version 1809 for 32-bit SystemsWindows 11 Version 25H2 for ARM64-based SystemsWindows 11 Version 25H2 for x64-based SystemsWindows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsCVE-2025-55693 – Windows Kernel Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows 11 Version 25H2 for x64-based SystemsWindows 11 Version 25H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)CVE-2025-55692 – Windows Error Reporting Service Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsWindows 11 Version 25H2 for ARM64-based SystemsWindows 11 Version 25H2 for x64-based SystemsCVE-2025-55680 – Windows Cloud Files Mini Filter Driver Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsWindows 11 Version 25H2 for ARM64-based SystemsWindows 11 Version 25H2 for x64-based Systems&nbsp;]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 2 new vulnerabilities for Adobe Acrobat and Reader]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-2-new-vulnerabilities-for-adobe-september-2025</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-2-new-vulnerabilities-for-adobe-september-2025</guid>
            <pubDate>Tue, 09 Sep 2025 22:29:32 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their&nbsp;MAPP program, has proactively deployed protection for the following 2 vulnerability included in the September 2025 Adobe security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the September release and deploy additional protections, as necessary.APSB25-85 – Security updates available for Adobe Acrobat and Reader.Adobe has released security updates for Adobe Acrobat and Reader for Windows and macOS. These updates address critical and moderate vulnerabilities. Successful exploitation could lead to arbitrary code execution and security feature bypass.Affected SoftwareAcrobat DC Continuous 25.001.20672 and earlier versions for Windows & 25.001.20668 and earlier versions for macOSAcrobat Reader DC Continuous 25.001.20672 and earlier versions for Windows & 25.001.20668 and earlier versions for macOSAcrobat 2024 Classic 2024 24.001.30254 and earlier versions for Windows & macOSAcrobat 2020 Classic 2020 20.005.30774 and earlier versions for Windows & macOSAcrobat Reader 2020 Classic 2020 20.005.30774 and earlier versions for Windows & macOSCVE-2025-54257 – Use After Free vulnerability leading to Arbitrary code execution.&nbsp;Severity: CriticalSubscription RequiredAdvanced Threat Protection&nbsp;CVE-2025-54255 – Use After Free vulnerability leading to Security feature bypass.&nbsp;Severity: ModerateSubscription RequiredAdvanced Threat Protection&nbsp;]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 3 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-3-new-vulnerabilities-for-windows-september-2025</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-3-new-vulnerabilities-for-windows-september-2025</guid>
            <pubDate>Tue, 09 Sep 2025 22:19:00 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their&nbsp;MAPP program, has proactively deployed protection for the following 3 vulnerabilities included in the September 2025 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the September release and deploy additional protections, as necessaryCVE-2025-54918 – Windows NTLM Elevation of Privilege VulnerabilitySeverity:&nbsp;CriticalSubscriptions RequiredAdvanced Cloud FirewallAdvanced Threat ProtectionAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsCVE-2025-54916 – Windows NTFS Remote Code Execution VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsCVE-2025-54110 – Windows Kernel Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit Systems]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 5 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-5-new-vulnerabilities-for-windows-august-2025</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-5-new-vulnerabilities-for-windows-august-2025</guid>
            <pubDate>Tue, 12 Aug 2025 23:11:52 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their&nbsp;MAPP program, has proactively deployed protection for the following 5 vulnerabilities included in the August 2025 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the August release and deploy additional protections, as necessary.CVE-2025-53778 – Windows NTLM Elevation of Privilege VulnerabilitySeverity:&nbsp;CriticalSubscriptions RequiredAdvanced Cloud FirewallAdvanced Threat ProtectionAffected SoftwareWindows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsCVE-2025-53147 – Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsCVE-2025-53132 – Win32k Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAdvanced Cloud SandboxAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2025-50167 – Windows Hyper-V Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAdvanced Cloud SandboxAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 for x64-based SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsCVE-2025-49743 – Windows Graphics Component Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAdvanced Cloud SandboxAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit Systems]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 6 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-6-new-vulnerabilities-for-windows-july-2025</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-6-new-vulnerabilities-for-windows-july-2025</guid>
            <pubDate>Tue, 08 Jul 2025 20:13:23 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their&nbsp;MAPP program, has proactively deployed protection for the following 6 vulnerabilities included in the July 2025 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the July release and deploy additional protections, as necessary.CVE-2025-47987 – Credential Security Support Provider Protocol (CredSSP) Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAdvanced Cloud SandboxAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2025-48799 – Microsoft Office Remote Code Execution VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAdvanced Cloud SandboxAffected SoftwareWindows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2025-49696 – Microsoft Office Remote Code Execution VulnerabilitySeverity:&nbsp;CriticalSubscriptions RequiredAdvanced Threat ProtectionAffected SoftwareMicrosoft Office LTSC 2021 for 32-bit editionsMicrosoft Office 2016 (64-bit edition)Microsoft Office 2016 (32-bit edition)Microsoft Office LTSC for Mac 2024Microsoft Office LTSC 2024 for 64-bit editionsMicrosoft Office LTSC 2024 for 32-bit editionsMicrosoft Office for AndroidMicrosoft Office LTSC 2021 for 64-bit editionsMicrosoft Office LTSC for Mac 2021Microsoft 365 Apps for Enterprise for 64-bit SystemsMicrosoft 365 Apps for Enterprise for 32-bit SystemsMicrosoft Office 2019 for 64-bit editionsMicrosoft Office 2019 for 32-bit editionsCVE-2025-49704 – Microsoft SharePoint Remote Code Execution VulnerabilitySeverity:&nbsp;CriticalSubscriptions RequiredAdvanced Threat ProtectionAffected SoftwareMicrosoft SharePoint Enterprise Server 2016Microsoft SharePoint Server 2019CVE-2025-49724 – Windows Connected Devices Platform Service Remote Code Execution VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAdvanced Cloud FirewallAffected SoftwareWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2025-49695 – Windows Netlogon Elevation of Privilege VulnerabilitySeverity:&nbsp;CriticalSubscriptions RequiredAdvanced Threat ProtectionAffected SoftwareMicrosoft Office LTSC 2021 for 64-bit editionsMicrosoft Office LTSC for Mac 2021Microsoft 365 Apps for Enterprise for 64-bit SystemsMicrosoft 365 Apps for Enterprise for 32-bit SystemsMicrosoft Office 2019 for 64-bit editionsMicrosoft Office 2019 for 32-bit editionsMicrosoft Office 2016 (64-bit edition)Microsoft Office 2016 (32-bit edition)Microsoft Office LTSC for Mac 2024Microsoft Office LTSC 2024 for 64-bit editionsMicrosoft Office LTSC 2024 for 32-bit editionsMicrosoft Office for AndroidMicrosoft Office LTSC 2021 for 32-bit editions]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 9 new vulnerabilities for Adobe Acrobat and Reader]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-9-new-vulnerabilities-for-adobe-june-2025</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-9-new-vulnerabilities-for-adobe-june-2025</guid>
            <pubDate>Tue, 10 Jun 2025 22:22:29 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their&nbsp;MAPP program, has proactively deployed protection for the following 9 vulnerability included in the June 2025 Adobe security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the June release and deploy additional protections, as necessary.APSB25-57 – Security updates available for Adobe Acrobat and Reader.Adobe has released security updates for Adobe Acrobat and Reader for Windows and macOS. These updates address critical and important vulnerabilities. Successful exploitation could lead to arbitrary code execution and memory leak, security feature bypass and application denial-of-service.&nbsp;Affected SoftwareAcrobat DC Continuous 25.001.20521 and earlier versions for Windows & macOSAcrobat Reader DC Continuous 25.001.20521 and earlier versions for Windows & macOSAcrobat 2024 Classic 2024 24.001.30235 and earlier versions for Windows & macOSAcrobat 2020 Classic 2020 20.005.30763 and earlier versions for Windows & macOSAcrobat Reader 2020 Classic 2020 20.005.30763 and earlier versions for Windows & macOSCVE-2025-43550 – Use After Free vulnerability leading to Arbitrary code execution.&nbsp;Severity: ImportantSubscription RequiredAdvanced Threat Protection&nbsp;&nbsp;CVE-2025-43573 – Use After Free vulnerability leading to Arbitrary code execution.&nbsp;Severity: CriticalSubscription RequiredAdvanced Threat Protection&nbsp;&nbsp;CVE-2025-43574 – Use After Free vulnerability leading to Arbitrary code execution.&nbsp;Severity: CriticalSubscription RequiredAdvanced Threat Protection&nbsp;&nbsp;CVE-2025-43575 – Out-of-bounds Write vulnerability leading to Arbitrary code execution.&nbsp;Severity: CriticalSubscription RequiredAdvanced Threat Protection&nbsp;&nbsp;CVE-2025-43576 – Use After Free vulnerability leading to Arbitrary code execution.&nbsp;Severity: CriticalSubscription RequiredAdvanced Threat Protection&nbsp;&nbsp;CVE-2025-43577 – Use After Free vulnerability leading to Arbitrary code execution.&nbsp;Severity: ImportantSubscription RequiredAdvanced Threat Protection&nbsp;&nbsp;CVE-2025-43578 – Out-of-bounds Read vulnerability leading to Memory Leak.&nbsp;Severity: ImportantSubscription RequiredAdvanced Threat Protection&nbsp;&nbsp;CVE-2025-47111 – NULL Pointer Dereference vulnerability leading to Application denial-of-service.Severity: ImportantSubscription RequiredAdvanced Threat Protection&nbsp;&nbsp;CVE-2025-47112 – Out-of-bounds Read vulnerability leading to Memory Leak.&nbsp;Severity: ImportantSubscription RequiredAdvanced Threat Protection]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 6 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-6-new-vulnerabilities-for-windows-june-2025</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-6-new-vulnerabilities-for-windows-june-2025</guid>
            <pubDate>Tue, 10 Jun 2025 22:16:32 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their&nbsp;MAPP program, has proactively deployed protection for the following 6 vulnerabilities included in the June 2025 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the June release and deploy additional protections, as necessary.CVE-2025-47162 – Microsoft Office Remote Code Execution VulnerabilitySeverity:&nbsp;CriticalSubscriptions RequiredAdvanced Threat ProtectionAffected SoftwareMicrosoft Office 2016 (64-bit edition)Microsoft Office 2016 (32-bit edition)Microsoft Office LTSC for Mac 2024Microsoft Office LTSC 2024 for 64-bit editionsMicrosoft Office LTSC 2024 for 32-bit editionsMicrosoft Office for AndroidMicrosoft Office LTSC 2021 for 32-bit editionsMicrosoft Office LTSC 2021 for 64-bit editionsMicrosoft Office LTSC for Mac 2021Microsoft 365 Apps for Enterprise for 64-bit SystemsMicrosoft 365 Apps for Enterprise for 32-bit SystemsMicrosoft Office 2019 for 64-bit editionsMicrosoft Office 2019 for 32-bit editionsCVE-2025-47164 – Microsoft Office Remote Code Execution VulnerabilitySeverity:&nbsp;CriticalSubscriptions RequiredAdvanced Threat ProtectionAffected SoftwareMicrosoft Office 2016 (64-bit edition)Microsoft Office 2016 (32-bit edition)Microsoft Office LTSC for Mac 2024Microsoft Office LTSC 2024 for 64-bit editionsMicrosoft Office LTSC 2024 for 32-bit editionsMicrosoft Office for AndroidMicrosoft Office LTSC 2021 for 32-bit editionsMicrosoft Office LTSC 2021 for 64-bit editionsMicrosoft Office LTSC for Mac 2021Microsoft 365 Apps for Enterprise for 64-bit SystemsMicrosoft 365 Apps for Enterprise for 32-bit SystemsMicrosoft Office 2019 for 64-bit editionsMicrosoft Office 2019 for 32-bit editionsCVE-2025-47167 – Microsoft Office Remote Code Execution VulnerabilitySeverity:&nbsp;CriticalSubscriptions RequiredAdvanced Threat ProtectionAffected SoftwareMicrosoft Office 2016 (64-bit edition)Microsoft Office 2016 (32-bit edition)Microsoft Office LTSC for Mac 2024Microsoft Office LTSC 2024 for 64-bit editionsMicrosoft Office LTSC 2024 for 32-bit editionsMicrosoft Office for AndroidMicrosoft Office LTSC 2021 for 32-bit editionsMicrosoft Office LTSC 2021 for 64-bit editionsMicrosoft Office LTSC for Mac 2021Microsoft 365 Apps for Enterprise for 64-bit SystemsMicrosoft 365 Apps for Enterprise for 32-bit SystemsMicrosoft Office 2019 for 64-bit editionsMicrosoft Office 2019 for 32-bit editionsCVE-2025-32714 – Windows Installer Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAdvanced Cloud SandboxAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2025-32713 – Windows Common Log File System Driver Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAdvanced Cloud SandboxAffected SoftwareWindows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2025-33070 – Windows Netlogon Elevation of Privilege VulnerabilitySeverity:&nbsp;CriticalSubscriptions RequiredAdvanced Threat ProtectionAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit Systems]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 3 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-3-new-vulnerabilities-for-windows-may-2025</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-3-new-vulnerabilities-for-windows-may-2025</guid>
            <pubDate>Tue, 13 May 2025 23:50:55 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their&nbsp;MAPP program, has proactively deployed protection for the following 3 vulnerabilities included in the May 2025 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the May release and deploy additional protections, as necessary.CVE-2025-30388 – Windows Graphics Component Remote Code Execution VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAdvanced Cloud SandboxAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsMicrosoft Office LTSC for Mac 2024Microsoft Office for UniversalMicrosoft Office for AndroidMicrosoft Office LTSC for Mac 2021CVE-2025-30377 – Microsoft Office Remote Code Execution VulnerabilitySeverity:&nbsp;CriticalSubscriptions RequiredAdvanced Threat ProtectionAffected SoftwareMicrosoft Office 2019 for 32-bit editionsMicrosoft Office 2016 (64-bit edition)Microsoft Office 2016 (32-bit edition)Microsoft Office LTSC for Mac 2024Microsoft Office LTSC 2024 for 64-bit editionsMicrosoft Office LTSC 2024 for 32-bit editionsMicrosoft Office for AndroidMicrosoft Office LTSC 2021 for 32-bit editionsMicrosoft Office LTSC 2021 for 64-bit editionsMicrosoft Office LTSC for Mac 2021Microsoft 365 Apps for Enterprise for 64-bit SystemsMicrosoft 365 Apps for Enterprise for 32-bit SystemsMicrosoft Office 2019 for 64-bit editionsCVE-2025-30386 – Microsoft Office Remote Code Execution VulnerabilitySeverity:&nbsp;CriticalSubscriptions RequiredAdvanced Threat ProtectionAffected SoftwareMicrosoft Office 2016 (64-bit edition)Microsoft Office 2016 (32-bit edition)Microsoft Office LTSC for Mac 2024Microsoft Office LTSC 2024 for 64-bit editionsMicrosoft Office LTSC 2024 for 32-bit editionsMicrosoft Office for AndroidMicrosoft Office LTSC 2021 for 32-bit editionsMicrosoft Office LTSC 2021 for 64-bit editionsMicrosoft Office LTSC for Mac 2021Microsoft 365 Apps for Enterprise for 64-bit SystemsMicrosoft 365 Apps for Enterprise for 32-bit SystemsMicrosoft Office 2019 for 64-bit editionsMicrosoft Office 2019 for 32-bit editions]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 4 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-4-new-vulnerabilities-for-windows-april-2025</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-4-new-vulnerabilities-for-windows-april-2025</guid>
            <pubDate>Tue, 08 Apr 2025 20:25:05 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their&nbsp;MAPP program, has proactively deployed protection for the following 4 vulnerabilities included in the April 2025 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the April release and deploy additional protections, as necessary.CVE-2025-27472 – Windows Mark of the Web Security Feature Bypass VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows 10 for x64-based SystemsWindows 10 for 32-bit SystemsCVE-2025-29812 – DirectX Graphics Kernel Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAdvanced Cloud SandboxAffected SoftwareWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022CVE-2025-29809 – Windows Kerberos Security Feature Bypass VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAffected SoftwareWindows 11 Version 23H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsWindows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2016 (Server Core installation)Windows Server 2016CVE-2025-27482 – Windows Remote Desktop Services Remote Code Execution VulnerabilitySeverity:&nbsp;CriticalSubscriptions RequiredAdvanced Threat ProtectionAffected SoftwareWindows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2025 (Server Core installation)Windows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows Server 2016 (Server Core installation)Windows Server 2016Windows Server 2025]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 9 new vulnerabilities for Adobe Acrobat and Reader]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-9-new-vulnerabilities-for-adobe-march-2025</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-9-new-vulnerabilities-for-adobe-march-2025</guid>
            <pubDate>Tue, 11 Mar 2025 22:17:09 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their&nbsp;MAPP program, has proactively deployed protection for the following 9 vulnerability included in the March 2025 Adobe security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the March release and deploy additional protections, as necessary.APSB25-14 – Security updates available for Adobe Acrobat and Reader.Adobe has released security updates for Adobe Acrobat and Reader for Windows and macOS. These updates address critical and important vulnerabilities. Successful exploitation could lead to arbitrary code execution and memory leak.&nbsp;Affected SoftwareAcrobat DC Continuous 25.001.20428 and earlier versions for Windows & macOSAcrobat Reader DC Continuous 25.001.20428 and earlier versions for Windows & macOSAcrobat 2024 Classic 2024 24.001.30225 and earlier versions for Windows & macOSAcrobat 2020 Classic 2020 20.005.30748 and earlier versions for Windows & macOSAcrobat Reader 2020 Classic 2020 20.005.30748 and earlier versions for Windows & macOSCVE-2025-27174 – Use After Free vulnerability leading to Arbitrary code execution.&nbsp;Severity: CriticalSubscription RequiredAdvanced Threat Protection&nbsp;CVE-2025-27158 – Access of Uninitialized Pointer vulnerability leading to Arbitrary code execution.&nbsp;Severity: CriticalSubscription RequiredAdvanced Threat Protection&nbsp;CVE-2025-27159 – Use After Free vulnerability leading to Arbitrary code execution.&nbsp;Severity: CriticalSubscription RequiredAdvanced Threat Protection&nbsp;CVE-2025-27160 – Use After Free vulnerability leading to Arbitrary code execution.&nbsp;Severity: CriticalSubscription RequiredAdvanced Threat Protection&nbsp;CVE-2025-27161 – Out-of-bounds Read vulnerability leading to Arbitrary code execution.&nbsp;Severity: CriticalSubscription RequiredAdvanced Threat Protection&nbsp;CVE-2025-27162 – Access of Uninitialized Pointer vulnerability leading to Arbitrary code execution.&nbsp;Severity: CriticalSubscription RequiredAdvanced Threat Protection&nbsp;CVE-2025-24431 – Out-of-bounds Read vulnerability leading to Arbitrary code execution.&nbsp;Severity: ImportantSubscription RequiredAdvanced Threat Protection&nbsp;CVE-2025-27163 – Out-of-bounds Read vulnerability leading to Memory Leak.&nbsp;Severity: ImportantSubscription RequiredAdvanced Threat Protection&nbsp;CVE-2025-27164 – Out-of-bounds Read vulnerability leading to Memory Leak.&nbsp;Severity: ImportantSubscription RequiredAdvanced Threat Protection]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 4 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-4-new-vulnerabilities-for-windows-march-2025</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-4-new-vulnerabilities-for-windows-march-2025</guid>
            <pubDate>Tue, 11 Mar 2025 22:10:35 GMT</pubDate>
            <description><![CDATA[CVE-2025-24067 – Kernel Streaming Service Driver Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAdvanced Cloud SandboxAffected SoftwareWindows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2025-24993 – Windows NTFS Remote Code Execution VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAffected SoftwareWindows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)CVE-2025-24066 – Kernel Streaming Service Driver Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAffected SoftwareWindows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2025-24985 – Windows Fast FAT File System Driver Remote Code Execution VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit Systems]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 4 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-4-new-vulnerabilities-for-windows-february-2025</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-4-new-vulnerabilities-for-windows-february-2025</guid>
            <pubDate>Tue, 11 Feb 2025 21:39:14 GMT</pubDate>
            <description><![CDATA[CVE-2025-21414 – Windows Core Messaging Elevation of Privileges VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAdvanced Cloud SandboxAffected SoftwareWindows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2025Windows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2025-21358 – Windows Core Messaging Elevation of Privileges VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAdvanced Cloud SandboxAffected SoftwareWindows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2025Windows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for x64-based SystemsWindows Server 2016 (Server Core installation)Windows 11 Version 24H2 for ARM64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2025-21400 – Microsoft SharePoint Server Remote Code Execution VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAffected SoftwareMicrosoft SharePoint Server Subscription EditionMicrosoft SharePoint Server 2019Microsoft SharePoint Enterprise Server 2016CVE-2025-21184 – Windows Core Messaging Elevation of Privileges VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAdvanced Cloud SandboxAffected SoftwareWindows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2025Windows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit Systems]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 2 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-2-new-vulnerabilities-for-windows-january-2025</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-2-new-vulnerabilities-for-windows-january-2025</guid>
            <pubDate>Tue, 14 Jan 2025 21:18:31 GMT</pubDate>
            <description><![CDATA[CVE-2025-21354 – Microsoft Excel Remote Code Execution VulnerabilitySeverity:&nbsp;CriticalSubscriptions RequiredAdvanced Threat ProtectionAdvanced Cloud SandboxAffected SoftwareMicrosoft Office LTSC for Mac 2024Microsoft Office LTSC 2024 for 64-bit editionsMicrosoft Office LTSC 2024 for 32-bit editionsMicrosoft Office LTSC 2021 for 32-bit editionsMicrosoft Office LTSC 2021 for 64-bit editionsMicrosoft Office LTSC for Mac 2021Microsoft 365 Apps for Enterprise for 64-bit SystemsMicrosoft 365 Apps for Enterprise for 32-bit SystemsMicrosoft Office 2019 for 64-bit editionsMicrosoft Office 2019 for 32-bit editionsOffice Online ServerCVE-2025-21315 – Microsoft Brokering File System Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAdvanced Cloud SandboxAffected SoftwareWindows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2025 (Server Core installation)Windows Server 2025]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 3 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-3-new-vulnerabilities-for-windows-december-2024</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-3-new-vulnerabilities-for-windows-december-2024</guid>
            <pubDate>Tue, 10 Dec 2024 21:54:21 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their&nbsp;MAPP program, has proactively deployed protection for the following 3 vulnerabilities included in the December 2024 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the December release and deploy additional protections, as necessary.CVE-2024-49138 – Windows Common Log File System Driver Elevation of Privilege VulnerabilitySeverity:&nbsp;ModerateSubscriptions RequiredAdvanced Threat ProtectionAdvanced Cloud SandboxAffected SoftwareWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2024-49114 – Windows Cloud Files Mini Filter Driver Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAdvanced Cloud SandboxAffected SoftwareWindows Server 2025 (Server Core installation)Windows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2024-49090 – Windows Common Log File System Driver Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAdvanced Cloud SandboxAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsWindows Server 2025 (Server Core installation)Windows Server 2025]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 6 new vulnerabilities for Adobe Acrobat and Reader]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-6-new-vulnerabilities-for-adobe-december-2024</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-6-new-vulnerabilities-for-adobe-december-2024</guid>
            <pubDate>Tue, 10 Dec 2024 21:48:41 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their&nbsp;MAPP program, has proactively deployed protection for the following 6 vulnerability included in the December 2024 Adobe security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the December release and deploy additional protections, as necessary.APSB24-92 – Security updates available for Adobe Acrobat and Reader.Adobe has released security updates for Adobe Acrobat and Reader for Windows and macOS. These updates address critical and important vulnerabilities. Successful exploitation could lead to arbitrary code execution, memory leak and application denial-of-service.&nbsp;Affected SoftwareAcrobat DC Continuous 24.005.20307 and earlier versions for Windows & macOSAcrobat Reader DC Continuous 24.005.20307 and earlier versions for Windows & macOSAcrobat 2024 Classic 2024 24.001.30213 and earlier versions for Windows & 24.001.30193 and earlier versions for macOSAcrobat 2020 Classic 2020 20.005.30730 and earlier versions for Windows & 20.005.30710 and earlier versions for macOSAcrobat Reader 2020 Classic 2020 20.005.30730 and earlier versions for Windows & 20.005.30710 and earlier versions for macOSCVE-2024-49530 – Use After Free vulnerability leading to Arbitrary code execution.&nbsp;Severity: CriticalSubscription RequiredAdvanced Threat ProtectionAdvanced Cloud Sandbox&nbsp;CVE-2024-49531 – NULL Pointer Dereference vulnerability leading to Application denial-of-service.&nbsp;Severity: ImportantSubscription RequiredAdvanced Threat ProtectionAdvanced Cloud Sandbox&nbsp;CVE-2024-49532 – Out-of-bounds Read vulnerability leading to Memory leak.&nbsp;Severity: ImportantSubscription RequiredAdvanced Threat ProtectionAdvanced Cloud Sandbox&nbsp;CVE-2024-49533 – Out-of-bounds Read vulnerability leading to Memory Leak.&nbsp;Severity: ImportantSubscription RequiredAdvanced Threat ProtectionAdvanced Cloud Sandbox&nbsp;CVE-2024-49534 – Out-of-bounds Read vulnerability leading to Memory Leak.&nbsp;Severity: ImportantSubscription RequiredAdvanced Threat ProtectionAdvanced Cloud Sandbox&nbsp;CVE-2024-49535 – Improper Restriction of XML External Entity Reference (‘XXE’) vulnerability leading to Arbitrary code execution.&nbsp;Severity: CriticalSubscription RequiredAdvanced Threat ProtectionAdvanced Cloud Sandbox&nbsp;]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 2 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-2-new-vulnerabilities-for-windows-november-2024</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-2-new-vulnerabilities-for-windows-november-2024</guid>
            <pubDate>Tue, 12 Nov 2024 22:17:51 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their&nbsp;MAPP program, has proactively deployed protection for the following 2 vulnerabilities included in the November 2024 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the November release and deploy additional protections, as necessary.CVE-2024-49033 – Microsoft Edge (Chromium-based) Remote Code Execution VulnerabilitySeverity:&nbsp;ModerateSubscriptions RequiredAdvanced Threat ProtectionAffected SoftwareMicrosoft Edge (Chromium-based)CVE-2024-43630 – Windows Kernel Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2025Windows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2025 (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 10 Version 21H2 for x64-based Systems]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 4 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-4-new-vulnerabilities-for-windows-october-2024</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-4-new-vulnerabilities-for-windows-october-2024</guid>
            <pubDate>Tue, 08 Oct 2024 20:44:27 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their&nbsp;MAPP program, has proactively deployed protection for the following 4 vulnerabilities included in the October 2024 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the October release and deploy additional protections, as necessary.CVE-2024-43573 – Windows MSHTML Platform Spoofing VulnerabilitySeverity:&nbsp;ModerateSubscriptions RequiredAdvanced Threat ProtectionAffected SoftwareWindows 11 Version 23H2 for x64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 10 Version 22H2 for 32-bit SystemsWindows Server 2022Windows 10 Version 22H2 for ARM64-based SystemsWindows Server 2012 R2Windows Server 2016 (Server Core installation)Windows 10 Version 1607 for 32-bit SystemsWindows Server 2012 R2 (Server Core installation)Windows 10 for x64-based SystemsWindows 10 Version 1607 for x64-based SystemsWindows Server 2016Windows 10 for 32-bit SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows 11 Version 24H2 for x64-based SystemsWindows Server 2019 (Server Core installation)Windows 10 Version 1809 for 32-bit SystemsWindows 10 Version 1809 for x64-based SystemsWindows Server 2019Windows 10 Version 21H2 for ARM64-based SystemsWindows Server 2022 (Server Core installation)Windows 10 Version 21H2 for x64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 11 version 21H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsCVE-2024-43572 – Microsoft Management Console Remote Code Execution VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 11 version 21H2 for ARM64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2024-43560 – Microsoft Windows Storage Port Driver Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 11 version 21H2 for ARM64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2024-43502– Windows Kernel Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAdvanced Cloud SandboxAffected SoftwareWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit Systems]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 6 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-6-new-vulnerabilities-for-windows-september-2024</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-6-new-vulnerabilities-for-windows-september-2024</guid>
            <pubDate>Tue, 10 Sep 2024 21:49:28 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their&nbsp;MAPP program, has proactively deployed protection for the following 6 vulnerabilities included in the September 2024 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the September release and deploy additional protections, as necessary.CVE-2024-38242 – Kernel Streaming Service Driver Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAdvanced Cloud SandboxAffected SoftwareWindows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 11 version 21H2 for ARM64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2024-38243 – Kernel Streaming Service Driver Elevation of Privilege Vulnerability&nbsp;Severity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows 11 version 21H2 for ARM64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for ARM64-based SystemsWindows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2024-38244 – Kernel Streaming Service Driver Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 11 version 21H2 for ARM64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2024-38245– Kernel Streaming Service Driver Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAdvanced Cloud SandboxAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 11 version 21H2 for ARM64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2024-38237 – Kernel Streaming WOW Thunk Service Driver Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAdvanced Cloud SandboxAffected SoftwareWindows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsWindows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 11 version 21H2 for ARM64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019CVE-2024-38238 – Kernel Streaming Service Driver Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAdvanced Cloud SandboxAffected SoftwareWindows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 11 version 21H2 for ARM64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit Systems]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 1 new vulnerability for Adobe Acrobat and Reader]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-1-new-vulnerabilities-for-adobe-september-2024</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-1-new-vulnerabilities-for-adobe-september-2024</guid>
            <pubDate>Tue, 10 Sep 2024 21:38:25 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their&nbsp;MAPP program, has proactively deployed protection for the following 1 vulnerability included in the September 2024 Adobe security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the September release and deploy additional protections, as necessary.APSB24-70 – Security updates available for Adobe Acrobat and Reader.Adobe has released security updates for Adobe Acrobat and Reader for Windows and macOS. These updates address critical vulnerabilities. Successful exploitation could lead to arbitrary code execution.&nbsp;Affected SoftwareAcrobat DC Continuous 24.003.20054 and earlier versions for Windows & 24.002.21005 and earlier for macOSAcrobat Reader DC Continuous 24.003.20054 and earlier versions for Windows & 24.002.21005 and earlier for macOSAcrobat 2024 Classic 2024 24.001.30159 and earlier versions for Windows & macOSAcrobat 2020 Classic 2020 20.005.30655 and earlier versions for Windows & 20.005.30655 and earlier versions for macOSAcrobat Reader 2020 Classic 2020 20.005.30655 and earlier versions for Windows & 20.005.30655 and earlier versions for macOSCVE-2024-41869 – Use After Free vulnerability leading to Arbitrary code execution.&nbsp;Severity: CriticalSubscription RequiredAdvanced Threat ProtectionAdvanced Cloud Sandbox&nbsp;]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 11 new vulnerabilities for Adobe Acrobat and Reader]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-11-new-vulnerabilities-for-adobe-august-2024</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-11-new-vulnerabilities-for-adobe-august-2024</guid>
            <pubDate>Tue, 13 Aug 2024 21:15:58 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their&nbsp;MAPP program, has proactively deployed protection for the following 11 vulnerabilities included in the August 2024 Adobe security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the August release and deploy additional protections, as necessary.APSB24-57 – Security updates available for Adobe Acrobat and Reader.Adobe has released security updates for Adobe Acrobat and Reader for Windows and macOS. These updates address critical and important vulnerabilities. Successful exploitation could lead to arbitrary code execution, privilege escalation and memory leak.&nbsp;Affected SoftwareAcrobat DC Continuous 24.002.20991 and earlier versions for Windows & 24.002.20964 and earlier for macOSAcrobat Reader DC Continuous 24.002.20991 and earlier versions for Windows & 24.002.20964 and earlier for macOSAcrobat 2024 Classic 2024 24.001.30123 and earlier versions for Windows & macOSAcrobat 2020 Classic 2020 20.005.30636 and earlier versions for Windows & 20.005.30635 and earlier versions for macOSAcrobat Reader 2020 Classic 2020 20.005.30636 and earlier versions for Windows & 20.005.30635 and earlier versions for macOSCVE-2024-39383 – Use After Free vulnerability leading to Arbitrary code execution.&nbsp;Severity: CriticalSubscription RequiredAdvanced Threat ProtectionAdvanced Cloud Sandbox&nbsp;CVE-2024-39422 – Use After Free vulnerability leading to Arbitrary code execution.&nbsp;Severity: CriticalSubscription RequiredAdvanced Threat ProtectionAdvanced Cloud Sandbox&nbsp;CVE-2024-39423 – Out-of-bounds Write vulnerability leading to Arbitrary code execution.Severity: CriticalSubscription RequiredAdvanced Threat ProtectionAdvanced Cloud Sandbox&nbsp;CVE-2024-39424 – Use After Free vulnerability leading to Arbitrary code execution.Severity: CriticalSubscription RequiredAdvanced Threat ProtectionAdvanced Cloud Sandbox&nbsp;CVE-2024-39426 – Access of Memory Location After End of Buffer vulnerability leading to Arbitrary code Execution.Severity: CriticalSubscription RequiredAdvanced Threat Protection&nbsp;Advanced Cloud Sandbox&nbsp;CVE-2024-41830 – Use After Free vulnerability leading to Arbitrary code execution.Severity: CriticalSubscription RequiredAdvanced Threat Protection&nbsp;Advanced Cloud Sandbox&nbsp;CVE-2024-41831 – Use After Free vulnerability leading to Arbitrary Code Execution.Severity: CriticalSubscription RequiredAdvanced Threat Protection&nbsp;Advanced Cloud Sandbox&nbsp;CVE-2024-41832 – Out-of-bounds Read vulnerability leading to Memory leak.Severity: ImportantSubscription RequiredAdvanced Threat ProtectionAdvanced Cloud Sandbox&nbsp;&nbsp;CVE-2024-41833 – Out-of-bounds Read vulnerability leading to Memory leak.Severity: ImportantSubscription RequiredAdvanced Threat ProtectionAdvanced Cloud Sandbox&nbsp;&nbsp;CVE-2024-41834 – Out-of-bounds Read vulnerability leading to Memory leak.Severity: ImportantSubscription RequiredAdvanced Threat ProtectionAdvanced Cloud Sandbox&nbsp;&nbsp;CVE-2024-41835 – Out-of-bounds Read vulnerability leading to Memory leak.Severity: ImportantSubscription RequiredAdvanced Threat ProtectionAdvanced Cloud Sandbox]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 8 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-8-new-vulnerabilities-for-windows-august-2024</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-8-new-vulnerabilities-for-windows-august-2024</guid>
            <pubDate>Tue, 13 Aug 2024 21:10:27 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their&nbsp;MAPP program, has proactively deployed protection for the following 8 vulnerabilities included in the August 2024 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the August release and deploy additional protections, as necessary.CVE-2024-38141 – Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAdvanced Cloud SandboxZscaler Threatname : Win64.Exploit.CVE-2024-38141Affected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 11 version 21H2 for ARM64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsWindows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsCVE-2024-38144 – Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability&nbsp;Severity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionZscaler Threatname : Win64.Exploit.CVE-2024-38144Affected SoftwareWindows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 11 version 21H2 for ARM64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2024-38147 – Microsoft DWM Core Library Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionZscaler Threatname : Win64.Exploit.CVE-2024-38147Affected SoftwareWindows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 11 version 21H2 for ARM64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022CVE-2024-38150– Windows DWM Core Library Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAdvanced Cloud SandboxZscaler Threatname : Win64.Exploit.CVE-2024-38150Affected SoftwareWindows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 11 version 21H2 for ARM64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022CVE-2024-38178 – Scripting Engine Memory Corruption VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionZscaler Threatname : HTML.Exploit.CVE-2024-38178Affected SoftwareWindows 10 for 32-bit SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 11 version 21H2 for ARM64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsWindows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsCVE-2024-38193 – Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAdvanced Cloud SandboxZscaler Threatname : Win64.Exploit.CVE-2024-38193Affected SoftwareWindows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 11 version 21H2 for ARM64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsWindows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsCVE-2024-38196 – Windows Common Log File System Driver Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAdvanced Cloud SandboxZscaler Threatname : Win64.Exploit.CVE-2024-38196Affected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 11 version 21H2 for ARM64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsWindows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsCVE-2024-38106 – Windows Kernel Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAdvanced Cloud SandboxZscaler Threatname : Win64.Exploit.CVE-2024-38106Affected SoftwareWindows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows 11 Version 24H2 for x64-based SystemsWindows 11 Version 24H2 for ARM64-based SystemsWindows Server 2016 (Server Core installation)Windows Server 2016Windows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 11 version 21H2 for ARM64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit Systems]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 5 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-5-new-vulnerabilities-for-windows-july-2024</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-5-new-vulnerabilities-for-windows-july-2024</guid>
            <pubDate>Tue, 09 Jul 2024 19:56:48 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their&nbsp;MAPP program, has proactively deployed protection for the following 5 vulnerabilities included in the July 2024 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the July release and deploy additional protections, as necessary.CVE-2024-38021 – Microsoft Office Remote Code Execution VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAffected SoftwareMicrosoft Office 2016 (64-bit edition)Microsoft Office 2016 (32-bit edition)Microsoft Office LTSC 2021 for 32-bit editionsMicrosoft Office LTSC 2021 for 64-bit editionsMicrosoft 365 Apps for Enterprise for 64-bit SystemsMicrosoft 365 Apps for Enterprise for 32-bit SystemsMicrosoft Office 2019 for 64-bit editionsMicrosoft Office 2019 for 32-bit editionsCVE-2024-38052 – Kernel Streaming WOW Thunk Service Driver Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 11 version 21H2 for ARM64-based SystemsCVE-2024-38054 – Kernel Streaming WOW Thunk Service Driver Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 11 version 21H2 for ARM64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2024-38059 – Win32k Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 11 version 21H2 for ARM64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022CVE-2024-38085 – Windows Graphics Component Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based Systems]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 5 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-5-new-vulnerabilities-for-windows-june-2024</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-5-new-vulnerabilities-for-windows-june-2024</guid>
            <pubDate>Wed, 12 Jun 2024 00:16:23 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their&nbsp;MAPP program, has proactively deployed protection for the following 5 vulnerabilities included in the June 2024 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the June release and deploy additional protections, as necessary.CVE-2024-30089 – Microsoft Streaming Service Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 11 version 21H2 for ARM64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit Systems&nbsp;CVE-2024-30084 – Windows Kernel-Mode Driver Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 11 version 21H2 for ARM64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit Systems&nbsp;CVE-2024-30091 – Win32k Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 11 version 21H2 for ARM64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit Systems&nbsp;CVE-2024-35250 – Windows Kernel-Mode Driver Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 11 version 21H2 for ARM64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit Systems&nbsp;CVE-2024-30080 – Microsoft Message Queuing (MSMQ) Remote Code Execution VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 11 version 21H2 for ARM64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit Systems&nbsp;]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 4 new vulnerabilities for Adobe Acrobat and Reader]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-4-new-vulnerabilities-for-adobe-may-2024</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-4-new-vulnerabilities-for-adobe-may-2024</guid>
            <pubDate>Tue, 14 May 2024 23:43:09 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their&nbsp;MAPP program, has proactively deployed protection for the following 4 vulnerabilities included in the May 2024 Adobe security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the May release and deploy additional protections, as necessary.APSB24-29 – Security updates available for Adobe Acrobat and Reader.Adobe has released security updates for Adobe Acrobat and Reader for Windows and macOS. These updates address critical and important vulnerabilities. Successful exploitation could lead to arbitrary code execution, privilege escalation, security feature bypass and memory leak.&nbsp;Affected Software:Acrobat DC Continuous 24.002.20736 and earlier versions for WindowsAcrobat Reader DC Continuous 24.002.20736 and earlier versions for WindowsAcrobat 2020 Classic 2020 20.005.30574 and earlier versions for WindowsAcrobat Reader 2020 Classic 20.005.30574 and earlier versions for WindowsCVE-2024-30284 – Use After Free vulnerability leading to Arbitrary code execution.Severity:&nbsp;CriticalSubscriptions RequiredAdvanced Threat ProtectionCVE-2024-30310 – Out-of-bounds Write vulnerability leading to Arbitrary code execution.Severity:&nbsp;CriticalSubscriptions RequiredAdvanced Threat ProtectionCVE-2024-30311 – Out-of-bounds Read vulnerability leading to Memory leak.Severity:&nbsp;CriticalSubscriptions RequiredAdvanced Threat ProtectionCVE-2024-30312 – Out-of-bounds Read vulnerability leading to Memory leak.Severity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat Protection]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 7 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-7-new-vulnerabilities-for-windows-may-2024</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-7-new-vulnerabilities-for-windows-may-2024</guid>
            <pubDate>Tue, 14 May 2024 23:18:31 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their MAPP program, has proactively deployed protection for the following 7 vulnerabilities included in the May 2024 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the May release and deploy additional protections, as necessary.CVE-2024-29996 – Windows Common Log File System Driver Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 11 version 21H2 for ARM64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit Systems&nbsp;CVE-2024-30025 – Windows Common Log File System Driver Elevation of Privilege Vulnerability&nbsp;Severity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 11 version 21H2 for ARM64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit Systems&nbsp;CVE-2024-30032 – Windows DWM Core Library Elevation of Privilege Vulnerability&nbsp;Severity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 11 version 21H2 for ARM64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2024-30034 – Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability&nbsp;Severity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 11 version 21H2 for ARM64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2024-30035 – Windows DWM Core Library Elevation of Privilege Vulnerability&nbsp;Severity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 11 version 21H2 for ARM64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2024-30037 – Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability&nbsp;Severity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareSubscriptions RequiredWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 11 version 21H2 for ARM64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2024-30044 – Microsoft SharePoint Server Remote Code Execution Vulnerability&nbsp;Severity:&nbsp;ImportantSubscriptions RequiredAdvanced Threat ProtectionAffected SoftwareMicrosoft SharePoint Server Subscription EditionMicrosoft SharePoint Server 2019Microsoft SharePoint Enterprise Server 2016]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 4 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-4-new-vulnerabilities-windows-april-2024</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-4-new-vulnerabilities-windows-april-2024</guid>
            <pubDate>Tue, 09 Apr 2024 23:52:02 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their&nbsp;MAPP program, has proactively deployed protection for the following 4 vulnerabilities included in the April 2024 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the April release and deploy additional protections, as necessary.CVE-2024-26212 – DHCP Server Service Denial of Service VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2016 (Server Core installation)Windows Server 2016Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2022 (Server Core installation)Windows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2&nbsp;CVE-2024-26209 – Microsoft Local Security Authority Subsystem Service Information Disclosure VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 11 version 21H2 for ARM64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)CVE-2024-26234 – Proxy Driver Spoofing VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 11 version 21H2 for ARM64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2024-26211 – Windows Remote Access Connection Manager Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantSubscriptions RequiredAdvanced Cloud SandboxAdvanced Threat ProtectionAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 11 version 21H2 for ARM64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based Systems]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 4 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-4-new-vulnerabilities-windows-march-2024</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-4-new-vulnerabilities-windows-march-2024</guid>
            <pubDate>Tue, 12 Mar 2024 23:40:56 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their&nbsp;MAPP program, has proactively deployed protection for the following 4 vulnerabilities included in the March 2024 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the March release and deploy additional protections, as necessary.CVE-2024-21433 – Windows Print Spooler Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantAffected SoftwareWindows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 11 version 21H2 for ARM64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2024-21437 – Windows Graphics Component Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantAffected SoftwareWindows Server 2016 (Server Core installation)Windows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows 11 version 21H2 for ARM64-based SystemsWindows 11 version 21H2 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2024-26182 – Windows Kernel Elevation of Privilege VulnerabilitySeverity:&nbsp;ImportantAffected SoftwareWindows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsCVE-2024-26160 – Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability&nbsp;Severity:&nbsp;ImportantAffected SoftwareWindows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2 for x64-based SystemsWindows 11 Version 23H2 for ARM64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 11 Version 22H2 for ARM64-based Systems]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 2 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-2-new-vulnerabilities-windows-february-2024</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-2-new-vulnerabilities-windows-february-2024</guid>
            <pubDate>Tue, 13 Feb 2024 22:45:10 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their MAPP program, has proactively deployed protection for the following 2 vulnerabilities included in the February 2024 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the February release and deploy additional protections, as necessary.
CVE-2024-21338 – Windows Kernel Elevation of Privilege Vulnerability

Severity: Important

Affected Software


	Windows Server 2022, 23H2 Edition (Server Core installation)
	Windows 11 Version 23H2 for x64-based Systems
	Windows 11 Version 23H2 for ARM64-based Systems
	Windows 10 Version 22H2 for 32-bit Systems
	Windows 10 Version 22H2 for ARM64-based Systems
	Windows 10 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for ARM64-based Systems
	Windows 10 Version 21H2 for x64-based Systems
	Windows 10 Version 21H2 for ARM64-based Systems
	Windows 10 Version 21H2 for 32-bit Systems
	Windows 11 version 21H2 for ARM64-based Systems
	Windows 11 version 21H2 for x64-based Systems
	Windows Server 2022 (Server Core installation)
	Windows Server 2022
	Windows Server 2019 (Server Core installation)
	Windows Server 2019
	Windows 10 Version 1809 for ARM64-based Systems
	Windows 10 Version 1809 for x64-based Systems
	Windows 10 Version 1809 for 32-bit Systems

CVE-2024-21371 – Windows Kernel Elevation of Privilege Vulnerability

Severity: Important

Affected Software


	Windows Server 2012 R2 (Server Core installation)
	Windows Server 2012 R2
	Windows Server 2012 (Server Core installation)
	Windows Server 2012
	Windows Server 2016 (Server Core installation)
	Windows Server 2016
	Windows 10 Version 1607 for x64-based Systems
	Windows 10 Version 1607 for 32-bit Systems
	Windows 10 for x64-based Systems
	Windows 10 for 32-bit Systems
	Windows Server 2022, 23H2 Edition (Server Core installation)
	Windows 11 Version 23H2 for x64-based Systems
	Windows 11 Version 23H2 for ARM64-based Systems
	Windows 10 Version 22H2 for 32-bit Systems
	Windows 10 Version 22H2 for ARM64-based Systems
	Windows 10 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for ARM64-based Systems
	Windows 10 Version 21H2 for x64-based Systems
	Windows 10 Version 21H2 for ARM64-based Systems
	Windows 10 Version 21H2 for 32-bit Systems
	Windows 11 version 21H2 for ARM64-based Systems
	Windows 11 version 21H2 for x64-based Systems
	Windows Server 2022 (Server Core installation)
	Windows Server 2022
	Windows Server 2019 (Server Core installation)
	Windows Server 2019
	Windows 10 Version 1809 for ARM64-based Systems
	Windows 10 Version 1809 for x64-based Systems
	Windows 10 Version 1809 for 32-bit Systems

]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 13 new vulnerabilities for Adobe Acrobat and Reader.]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-13-new-vulnerabilities-for-adobe-february-2024</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-13-new-vulnerabilities-for-adobe-february-2024</guid>
            <pubDate>Tue, 13 Feb 2024 22:42:41 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their MAPP program, has proactively deployed protection for the following 13 vulnerabilities included in the February 2024 Adobe security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the February release and deploy additional protections, as necessary.

APSB24-07 – Security updates available for Adobe Acrobat and Reader.

Adobe has released security updates for Adobe Acrobat and Reader for Windows and macOS. These updates address critical and important vulnerabilities. Successful exploitation could lead to arbitrary code execution, privilege escalation, security feature bypass and memory leak. 

Affected Software


	Acrobat DC Continuous 23.008.20470 and earlier versions for Windows & macOS
	Acrobat Reader DC Continuous 23.008.20470 and earlier versions for Windows & macOS
	Acrobat 2020 Classic 2020 20.005.30539 and earlier versions for Windows & macOS
	Acrobat Reader 2020 Classic 20.005.30539 and earlier versions for Windows & macOS


CVE-2024-20726 – Out-of-bounds Write vulnerability leading to Arbitrary code execution. 

Severity: Critical

CVE-2024-20727 – Out-of-bounds Write vulnerability leading to Arbitrary code execution. 

Severity: Critical

CVE-2024-20728 – Out-of-bounds Write vulnerability leading to Arbitrary code execution.

Severity: Critical

CVE-2024-20729 – Use After Free vulnerability leading to Arbitrary code execution.

Severity: Important

CVE-2024-20730 – Integer Overflow or Wraparound vulnerability leading to Arbitrary code execution. 

Severity: Critical

CVE-2024-20731 – Use After Free vulnerability leading to Arbitrary code execution.

Severity: Critical

CVE-2024-20733 – Improper Input Validation vulnerability leading to Application denial-of-service. 

Severity: Important

CVE-2024-20734 – Use After Free vulnerability leading to Memory leak. 

Severity: Important

CVE-2024-20735 – Out-of-bounds Read vulnerability leading to Memory leak. 

Severity: Important

CVE-2024-20736 – Out-of-bounds Read vulnerability leading to Memory leak. 

Severity: Important

CVE-2024-20747 – Out-of-bounds Read vulnerability leading to Memory leak. 

Severity: Important

CVE-2024-20748 – Out-of-bounds Read vulnerability leading to Memory leak. 

Severity: Important

CVE-2024-20749 – Out-of-bounds Read vulnerability leading to Memory leak. 

Severity: Important
]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 4 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-4-new-vulnerabilities-windows-january-2024</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-4-new-vulnerabilities-windows-january-2024</guid>
            <pubDate>Tue, 09 Jan 2024 18:37:58 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their MAPP program, has proactively deployed protection for the following 4 vulnerabilities included in the January 2024 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the January release and deploy additional protections, as necessary.
CVE-2024-21307 – Remote Desktop Client Remote Code Execution Vulnerability

Severity: Important

Affected Software


	Windows Server 2012 R2 (Server Core installation)
	Windows Server 2012 R2
	Windows Server 2012 (Server Core installation)
	Windows Server 2012
	Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
	Windows Server 2008 R2 for x64-based Systems Service Pack 1
	Windows Server 2016 (Server Core installation)
	Windows Server 2016
	Windows 10 Version 1607 for x64-based Systems
	Windows 10 Version 1607 for 32-bit Systems
	Windows 10 for x64-based Systems
	Windows 10 for 32-bit Systems
	Windows 11 Version 23H2 for x64-based Systems
	Windows 11 Version 23H2 for ARM64-based Systems
	Windows 10 Version 22H2 for 32-bit Systems
	Windows 10 Version 22H2 for ARM64-based Systems
	Windows 10 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for ARM64-based Systems
	Windows 10 Version 21H2 for x64-based Systems
	Windows 10 Version 21H2 for ARM64-based Systems
	Windows 10 Version 21H2 for 32-bit Systems
	Windows 11 version 21H2 for ARM64-based Systems
	Windows 11 version 21H2 for x64-based Systems
	Windows Server 2022 (Server Core installation)
	Windows Server 2022
	Windows Server 2019 (Server Core installation)
	Windows Server 2019
	Windows 10 Version 1809 for ARM64-based Systems
	Windows 10 Version 1809 for x64-based Systems
	Windows 10 Version 1809 for 32-bit Systems

CVE-2024-20698 – Windows Kernel Elevation of Privilege Vulnerability

Severity: Important

Affected Software


	Windows Server 2022, 23H2 Edition (Server Core installation)
	Windows 11 Version 23H2 for x64-based Systems
	Windows 11 Version 23H2 for ARM64-based Systems
	Windows 10 Version 22H2 for 32-bit Systems
	Windows 10 Version 22H2 for ARM64-based Systems
	Windows 10 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for ARM64-based Systems
	Windows 10 Version 21H2 for x64-based Systems
	Windows 10 Version 21H2 for ARM64-based Systems
	Windows 10 Version 21H2 for 32-bit Systems
	Windows 11 version 21H2 for ARM64-based Systems
	Windows 11 version 21H2 for x64-based Systems
	Windows Server 2022 (Server Core installation)
	Windows Server 2022
	Windows Server 2019 (Server Core installation)
	Windows Server 2019
	Windows 10 Version 1809 for ARM64-based Systems
	Windows 10 Version 1809 for x64-based Systems
	Windows 10 Version 1809 for 32-bit Systems

CVE-2024-21310 – Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

Severity: Important

Affected Software


	Windows Server 2022, 23H2 Edition (Server Core installation)
	Windows 11 Version 23H2 for ARM64-based Systems
	Windows 11 Version 23H2 for x64-based Systems
	Windows 10 Version 22H2 for 32-bit Systems
	Windows 10 Version 22H2 for ARM64-based Systems
	Windows 10 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for ARM64-based Systems
	Windows 10 Version 21H2 for x64-based Systems
	Windows 10 Version 21H2 for ARM64-based Systems
	Windows 10 Version 21H2 for 32-bit Systems
	Windows 11 version 21H2 for ARM64-based Systems
	Windows 11 version 21H2 for x64-based Systems
	Windows Server 2022 (Server Core installation)
	Windows Server 2022
	Windows Server 2019 (Server Core installation)
	Windows Server 2019
	Windows 10 Version 1809 for ARM64-based Systems
	Windows 10 Version 1809 for x64-based Systems
	Windows 10 Version 1809 for 32-bit Systems

CVE-2024-20653 – Microsoft Common Log File System Elevation of Privilege Vulnerability

Severity: Important

Affected Software


	Windows Server 2012 R2 (Server Core installation)
	Windows Server 2012 R2
	Windows Server 2012 (Server Core installation)
	Windows Server 2012
	Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
	Windows Server 2008 R2 for x64-based Systems Service Pack 1
	Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for x64-based Systems Service Pack 2
	Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for 32-bit Systems Service Pack 2
	Windows Server 2016 (Server Core installation)
	Windows Server 2016
	Windows 10 Version 1607 for x64-based Systems
	Windows 10 Version 1607 for 32-bit Systems
	Windows 10 for x64-based Systems
	Windows 10 for 32-bit Systems
	Windows 10 Version 22H2 for 32-bit Systems
	Windows 10 Version 22H2 for ARM64-based Systems
	Windows 10 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for ARM64-based Systems
	Windows 10 Version 21H2 for x64-based Systems
	Windows 10 Version 21H2 for ARM64-based Systems
	Windows 10 Version 21H2 for 32-bit Systems
	Windows 11 version 21H2 for ARM64-based Systems
	Windows 11 version 21H2 for x64-based Systems
	Windows Server 2022 (Server Core installation)
	Windows Server 2022
	Windows Server 2019 (Server Core installation)
	Windows Server 2019
	Windows 10 Version 1809 for ARM64-based Systems
	Windows 10 Version 1809 for x64-based Systems
	Windows 10 Version 1809 for 32-bit Systems
	Windows 11 Version 23H2 for ARM64-based Systems
	Windows 11 Version 23H2 for x64-based Systems
	Windows Server 2022, 23H2 Edition (Server Core installation)

]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 4 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-4-new-vulnerabilities-windows-december-2023</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-4-new-vulnerabilities-windows-december-2023</guid>
            <pubDate>Tue, 12 Dec 2023 20:32:13 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their MAPP program, has proactively deployed protection for the following 4 vulnerabilities included in the December 2023 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the December release and deploy additional protections, as necessary.
CVE-2023-35633 – Windows Kernel Elevation of Privilege Vulnerability

Severity: Important

Affected Software


	Windows Server 2012 R2 (Server Core installation)
	Windows Server 2012 R2
	Windows Server 2012 (Server Core installation)
	Windows Server 2012
	Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
	Windows Server 2008 R2 for x64-based Systems Service Pack 1
	Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for x64-based Systems Service Pack 2
	Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for 32-bit Systems Service Pack 2
	Windows 10 for x64-based Systems
	Windows 10 for 32-bit Systems

CVE-2023-35644 – Windows Sysmain Service Elevation of Privilege

Severity: Important

Affected Software


	Windows Server 2022, 23H2 Edition (Server Core installation)
	Windows 11 Version 23H2 for x64based Systems
	Windows 11 Version 23H2 for ARM64based Systems
	Windows 10 Version 22H2 for 32bit Systems
	Windows 10 Version 22H2 for ARM64based Systems
	Windows 10 Version 22H2 for x64based Systems
	Windows 11 Version 22H2 for x64based Systems
	Windows 11 Version 22H2 for ARM64based Systems
	Windows 10 Version 21H2 for x64based Systems
	Windows 10 Version 21H2 for ARM64based Systems
	Windows 10 Version 21H2 for 32bit Systems
	Windows 11 version 21H2 for ARM64based Systems
	Windows 11 version 21H2 for x64based Systems
	Windows Server 2022 (Server Core installation)
	Windows Server 2022
	Windows Server 2019 (Server Core installation)
	Windows Server 2019
	Windows 10 Version 1809 for ARM64based Systems
	Windows 10 Version 1809 for x64based Systems
	Windows 10 Version 1809 for 32bit Systems

CVE-2023-36005 – Windows Telephony Server Elevation of Privilege Vulnerability

Severity: Important

Affected Software


	Windows 10 for x64based Systems
	Windows 10 for 32bit Systems
	Windows Server 2022, 23H2 Edition (Server Core installation)
	Windows 11 Version 23H2 for x64based Systems
	Windows 11 Version 23H2 for ARM64based Systems
	Windows 10 Version 22H2 for 32bit Systems
	Windows 10 Version 22H2 for ARM64based Systems
	Windows 10 Version 22H2 for x64based Systems
	Windows 11 Version 22H2 for x64based Systems
	Windows 11 Version 22H2 for ARM64based Systems
	Windows 10 Version 21H2 for x64based Systems
	Windows 10 Version 21H2 for ARM64based Systems
	Windows 10 Version 21H2 for 32bit Systems
	Windows 11 version 21H2 for ARM64based Systems
	Windows 11 version 21H2 for x64based Systems
	Windows Server 2022 (Server Core installation)
	Windows Server 2022
	Windows Server 2019 (Server Core installation)
	Windows Server 2019
	Windows 10 Version 1809 for ARM64based Systems
	Windows 10 Version 1809 for x64based Systems
	Windows 10 Version 1809 for 32bit Systems

CVE-2023-36391 – Local Security Authority Subsystem Service Elevation of Privilege Vulnerability

Severity: Important

Affected Software


	Windows 11 Version 23H2 for x64based Systems
	Windows 11 Version 23H2 for ARM64based Systems

]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 17 new vulnerabilities for Adobe Acrobat and Reader]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-17-new-vulnerabilities-for-adobe-november-2023</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-17-new-vulnerabilities-for-adobe-november-2023</guid>
            <pubDate>Wed, 15 Nov 2023 01:17:42 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their MAPP program, has proactively deployed protection for the following 17 vulnerabilities included in the November 2023 Adobe security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the November release and deploy additional protections, as necessary.

APSB23-54 – Security updates available for Adobe Acrobat and Reader.

Adobe has released security updates for Adobe Acrobat and Reader for Windows and macOS. These updates address critical and important vulnerabilities. Successful exploitation could lead to arbitrary code execution, privilege escalation, security feature bypass and memory leak. 

Affected Software


	Acrobat DC Continuous 23.006.20380 (Win), 23.006.20380 (Mac) and&nbsp;earlier&nbsp;versions for Windows & macOS
	Acrobat Reader DC Continuous 23.006.20380 (Win), 23.006.20380 (Mac) and&nbsp;earlier&nbsp;versions for Windows & macOS
	Acrobat 2020 Classic 2020 20.005.30539 and earlier versions for Windows & macOS
	Acrobat Reader 2020 Classic 20.005.30539 and earlier versions for Windows & macOS


CVE-2023-44336 – Use After Free vulnerability leading to Arbitrary code execution.

Severity: Critical

CVE-2023-44337 – Use After Free vulnerability leading to Arbitrary code execution. 

Severity: Critical

CVE-2023-44338 – Out-of-bounds Read vulnerability leading to Arbitrary code execution.

Severity: Critical

CVE-2023-44359 – Use After Free vulnerability leading to Arbitrary code execution.

Severity: Critical

CVE-2023-44365 – Access of Uninitialized Pointer vulnerability leading to Arbitrary code execution. 

Severity: Critical

CVE-2023-44366 – Out-of-bounds Write vulnerability leading to Arbitrary code execution.

Severity: Critical

CVE-2023-44367 – Use After Free vulnerability leading to Arbitrary code execution. 

Severity: Critical

CVE-2023-44371 – Use After Free vulnerability leading to Arbitrary code execution. 

Severity: Critical

CVE-2023-44372 – Use After Free vulnerability leading to Arbitrary code execution. 

Severity: Critical

CVE-2023-44339 – Out-of-bounds Read leading to Memory leak. 

Severity: Important

CVE-2023-44340 – Out-of-bounds Read vulnerability leading to Memory leak. 

Severity: Moderate

CVE-2023-44348 – Out-of-bounds Read vulnerability leading to Memory leak. 

Severity: Moderate

CVE-2023-44356 – Out-of-bounds Read vulnerability leading to Memory leak. 

Severity: Moderate

CVE-2023-44357– Out-of-bounds Read vulnerability leading to Memory leak. 

Severity: Moderate

CVE-2023-44358 – Out-of-bounds Read vulnerability leading to Memory leak. 

Severity: Moderate

CVE-2023-44360 – Out-of-bounds Read vulnerability leading to Memory leak. 

Severity: Moderate

CVE-2023-44361 – Use After Free vulnerability leading to Memory leak. 

Severity: Moderate
]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 6 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-6-new-vulnerabilities-windows-november-2023</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-6-new-vulnerabilities-windows-november-2023</guid>
            <pubDate>Wed, 15 Nov 2023 01:12:46 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their MAPP program, has proactively deployed protection for the following 6 vulnerabilities included in the November 2023 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the November release and deploy additional protections, as necessary.

CVE-2023-36033 – Windows DWM Core Library Elevation of Privilege Vulnerability

Severity: Important

Affected Software


	Windows Server 2022, 23H2 Edition (Server Core installation)
	Windows 11 Version 23H2 for x64-based Systems
	Windows 11 Version 23H2 for ARM64-based Systems
	Windows 10 Version 22H2 for 32-bit Systems
	Windows 10 Version 22H2 for ARM64-based Systems
	Windows 10 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for ARM64-based Systems
	Windows 10 Version 21H2 for x64-based Systems
	Windows 10 Version 21H2 for ARM64-based Systems
	Windows 10 Version 21H2 for 32-bit Systems
	Windows 11 version 21H2 for ARM64-based Systems
	Windows 11 version 21H2 for x64-based Systems
	Windows Server 2022 (Server Core installation)
	Windows Server 2022
	Windows Server 2019 (Server Core installation)
	Windows Server 2019
	Windows 10 Version 1809 for ARM64-based Systems
	Windows 10 Version 1809 for x64-based Systems
	Windows 10 Version 1809 for 32-bit Systems


CVE-2023-36036 – Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

Severity: Important

Affected Software


	Windows 11 Version 23H2 for x64-based Systems
	Windows Server 2022, 23H2 Edition (Server Core installation)
	Windows 11 Version 23H2 for ARM64-based Systems
	Windows Server 2012 R2 (Server Core installation)
	Windows Server 2012 R2
	Windows Server 2012 (Server Core installation)
	Windows Server 2012
	Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
	Windows Server 2008 R2 for x64-based Systems Service Pack 1
	Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for x64-based Systems Service Pack 2
	Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for 32-bit Systems Service Pack 2
	Windows Server 2016 (Server Core installation)
	Windows Server 2016
	Windows 10 Version 1607 for x64-based Systems
	Windows 10 Version 1607 for 32-bit Systems
	Windows 10 for x64-based Systems
	Windows 10 for 32-bit Systems
	Windows 10 Version 22H2 for 32-bit Systems
	Windows 10 Version 22H2 for ARM64-based Systems
	Windows 10 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for ARM64-based Systems
	Windows 10 Version 21H2 for x64-based Systems
	Windows 10 Version 21H2 for ARM64-based Systems
	Windows 10 Version 21H2 for 32-bit Systems
	Windows 11 version 21H2 for ARM64-based Systems
	Windows 11 version 21H2 for x64-based Systems
	Windows Server 2022 (Server Core installation)
	Windows Server 2022
	Windows Server 2019 (Server Core installation)
	Windows Server 2019
	Windows 10 Version 1809 for ARM64-based Systems
	Windows 10 Version 1809 for x64-based Systems
	Windows 10 Version 1809 for 32-bit Systems


CVE-2023-36394 – Windows Search Service Elevation of Privilege Vulnerability

Severity: Important

Affected Software


	Windows Server 2016 (Server Core installation)
	Windows Server 2016
	Windows 10 Version 1607 for x64-based Systems
	Windows 10 Version 1607 for 32-bit Systems
	Windows 10 for x64-based Systems
	Windows 10 for 32-bit Systems
	Windows 10 Version 22H2 for 32-bit Systems
	Windows 10 Version 22H2 for ARM64-based Systems
	Windows 10 Version 22H2 for x64-based Systems
	Windows 10 Version 21H2 for x64-based Systems
	Windows 10 Version 21H2 for ARM64-based Systems
	Windows 10 Version 21H2 for 32-bit Systems
	Windows 11 version 21H2 for ARM64-based Systems
	Windows 11 version 21H2 for x64-based Systems
	Windows Server 2022 (Server Core installation)
	Windows Server 2022
	Windows Server 2019 (Server Core installation)
	Windows Server 2019
	Windows 10 Version 1809 for ARM64-based Systems
	Windows 10 Version 1809 for x64-based Systems
	Windows 10 Version 1809 for 32-bit Systems


CVE-2023-36399 – Windows Storage Elevation of Privilege Vulnerability

Severity: Important

Affected Software


	Windows 11 Version 23H2 for ARM64-based Systems
	Windows 11 Version 23H2 for x64-based Systems
	Windows 11 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for ARM64-based Systems
	Windows 11 version 21H2 for ARM64-based Systems
	Windows 11 version 21H2 for x64-based Systems
	Windows Server 2022 (Server Core installation)
	Windows Server 2022
	Windows Server 2022, 23H2 Edition (Server Core installation)


CVE-2023-36424 – Windows Common Log File System Driver Elevation of Privilege Vulnerability

Severity: Important

Affected Software


	Windows Server 2012 R2 (Server Core installation)
	Windows Server 2012 R2
	Windows Server 2012 (Server Core installation)
	Windows Server 2012
	Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
	Windows Server 2008 R2 for x64-based Systems Service Pack 1
	Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for x64-based Systems Service Pack 2
	Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for 32-bit Systems Service Pack 2
	Windows Server 2016 (Server Core installation)
	Windows Server 2016
	Windows 10 Version 1607 for x64-based Systems
	Windows 10 Version 1607 for 32-bit Systems
	Windows 10 for x64-based Systems
	Windows 10 for 32-bit Systems
	Windows 10 Version 22H2 for 32-bit Systems
	Windows 10 Version 22H2 for ARM64-based Systems
	Windows 10 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for ARM64-based Systems
	Windows 10 Version 21H2 for x64-based Systems
	Windows 10 Version 21H2 for ARM64-based Systems
	Windows 10 Version 21H2 for 32-bit Systems
	Windows 11 version 21H2 for ARM64-based Systems
	Windows 11 version 21H2 for x64-based Systems
	Windows Server 2022 (Server Core installation)
	Windows Server 2022
	Windows Server 2019 (Server Core installation)
	Windows Server 2019
	Windows 10 Version 1809 for ARM64-based Systems
	Windows 10 Version 1809 for x64-based Systems
	Windows 10 Version 1809 for 32-bit Systems
	Windows 11 Version 23H2 for x64-based Systems
	Windows Server 2022, 23H2 Edition (Server Core installation)
	Windows 11 Version 23H2 for ARM64-based Systems


CVE-2023-36017 – Windows Scripting Engine Memory Corruption Vulnerability

Severity: Important

Affected Software


	Windows 11 Version 23H2 for x64-based Systems
	Windows Server 2022, 23H2 Edition (Server Core installation)
	Windows 11 Version 23H2 for ARM64-based Systems
	Windows Server 2012 R2 (Server Core installation)
	Windows Server 2012 R2
	Windows Server 2012 (Server Core installation)
	Windows Server 2012
	Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
	Windows Server 2008 R2 for x64-based Systems Service Pack 1
	Windows Server 2016 (Server Core installation)
	Windows Server 2016
	Windows 10 Version 1607 for x64-based Systems
	Windows 10 Version 1607 for 32-bit Systems
	Windows 10 for x64-based Systems
	Windows 10 for 32-bit Systems
	Windows 10 Version 22H2 for 32-bit Systems
	Windows 10 Version 22H2 for ARM64-based Systems
	Windows 10 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for ARM64-based Systems
	Windows 10 Version 21H2 for x64-based Systems
	Windows 10 Version 21H2 for ARM64-based Systems
	Windows 10 Version 21H2 for 32-bit Systems
	Windows 11 version 21H2 for ARM64-based Systems
	Windows 11 version 21H2 for x64-based Systems
	Windows Server 2022 (Server Core installation)
	Windows Server 2022
	Windows Server 2019 (Server Core installation)
	Windows Server 2019
	Windows 10 Version 1809 for ARM64-based Systems
	Windows 10 Version 1809 for x64-based Systems
	Windows 10 Version 1809 for 32-bit Systems

]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 7 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-7-new-vulnerabilities-windows-october-2023</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-7-new-vulnerabilities-windows-october-2023</guid>
            <pubDate>Wed, 11 Oct 2023 00:08:59 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their MAPP program, has proactively deployed protection for the following 7 vulnerabilities included in the October 2023 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the October release and deploy additional protections, as necessary



CVE-2023-38159 – Windows Graphics Component Elevation of Privilege Vulnerability

Severity: Important

Affected Software


	Windows Server 2016 (Server Core installation)
	Windows Server 2016
	Windows 10 Version 1607 for x64-based Systems
	Windows 10 Version 1607 for 32-bit Systems
	Windows 10 for x64-based Systems
	Windows 10 for 32-bit Systems
	Windows 10 Version 22H2 for 32-bit Systems
	Windows 10 Version 22H2 for ARM64-based Systems
	Windows 10 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for ARM64-based Systems
	Windows 10 Version 21H2 for x64-based Systems
	Windows 10 Version 21H2 for ARM64-based Systems
	Windows 10 Version 21H2 for 32-bit Systems
	Windows 11 version 21H2 for ARM64-based Systems
	Windows 11 version 21H2 for x64-based Systems
	Windows Server 2022 (Server Core installation)
	Windows Server 2022
	Windows Server 2019 (Server Core installation)
	Windows Server 2019
	Windows 10 Version 1809 for ARM64-based Systems
	Windows 10 Version 1809 for x64-based Systems
	Windows 10 Version 1809 for 32-bit Systems

CVE-2023-36776 – Win32k Elevation of Privilege Vulnerability

Severity: Important

Affected Software


	Windows Server 2012 R2 (Server Core installation)
	Windows Server 2012 R2
	Windows Server 2012 (Server Core installation)
	Windows Server 2012
	Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
	Windows Server 2008 R2 for x64-based Systems Service Pack 1
	Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for x64-based Systems Service Pack 2
	Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for 32-bit Systems Service Pack 2
	Windows Server 2016 (Server Core installation)
	Windows Server 2016
	Windows 10 Version 1607 for x64-based Systems
	Windows 10 Version 1607 for 32-bit Systems
	Windows 10 for x64-based Systems
	Windows 10 for 32-bit Systems
	Windows 10 Version 22H2 for 32-bit Systems
	Windows 10 Version 22H2 for ARM64-based Systems
	Windows 10 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for ARM64-based Systems
	Windows 10 Version 21H2 for x64-based Systems
	Windows 10 Version 21H2 for ARM64-based Systems
	Windows 10 Version 21H2 for 32-bit Systems
	Windows 11 version 21H2 for ARM64-based Systems
	Windows 11 version 21H2 for x64-based Systems
	Windows Server 2022 (Server Core installation)
	Windows Server 2022
	Windows Server 2019 (Server Core installation)
	Windows Server 2019
	Windows 10 Version 1809 for ARM64-based Systems
	Windows 10 Version 1809 for x64-based Systems
	Windows 10 Version 1809 for 32-bit Systems

CVE-2023-41772 – Win32k Elevation of Privilege Vulnerability

Severity: Important

Affected Software


	Windows 10 Version 22H2 for 32-bit Systems
	Windows 10 Version 22H2 for ARM64-based Systems
	Windows 10 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for ARM64-based Systems
	Windows 10 Version 21H2 for x64-based Systems
	Windows 10 Version 21H2 for ARM64-based Systems
	Windows 10 Version 21H2 for 32-bit Systems
	Windows 11 version 21H2 for ARM64-based Systems
	Windows 11 version 21H2 for x64-based Systems
	Windows Server 2022 (Server Core installation)
	Windows Server 2022
	Windows Server 2019 (Server Core installation)
	Windows Server 2019
	Windows 10 Version 1809 for ARM64-based Systems
	Windows 10 Version 1809 for x64-based Systems
	Windows 10 Version 1809 for 32-bit Systems

CVE-2023-36743 – Win32k Elevation of Privilege Vulnerability

Severity: Important

Affected Software


	Windows Server 2012 R2 (Server Core installation)
	Windows Server 2012 R2
	Windows Server 2012 (Server Core installation)
	Windows Server 2012
	Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
	Windows Server 2008 R2 for x64-based Systems Service Pack 1
	Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for x64-based Systems Service Pack 2
	Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for 32-bit Systems Service Pack 2
	Windows Server 2016 (Server Core installation)
	Windows Server 2016
	Windows 10 Version 1607 for x64-based Systems
	Windows 10 Version 1607 for 32-bit Systems
	Windows 10 for x64-based Systems
	Windows 10 for 32-bit Systems
	Windows 10 Version 22H2 for 32-bit Systems
	Windows 10 Version 22H2 for ARM64-based Systems
	Windows 10 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for ARM64-based Systems
	Windows 10 Version 21H2 for x64-based Systems
	Windows 10 Version 21H2 for ARM64-based Systems
	Windows 10 Version 21H2 for 32-bit Systems
	Windows 11 version 21H2 for ARM64-based Systems
	Windows 11 version 21H2 for x64-based Systems
	Windows Server 2022 (Server Core installation)
	Windows Server 2022
	Windows Server 2019 (Server Core installation)
	Windows Server 2019
	Windows 10 Version 1809 for ARM64-based Systems
	Windows 10 Version 1809 for x64-based Systems
	Windows 10 Version 1809 for 32-bit Systems

CVE-2023-36594 – Windows Graphics Component Elevation of Privilege Vulnerability

Severity: Important

Affected Software


	Windows Server 2012 R2 (Server Core installation)
	Windows Server 2012 R2
	Windows Server 2012 (Server Core installation)
	Windows Server 2012
	Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
	Windows Server 2008 R2 for x64-based Systems Service Pack 1
	Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for x64-based Systems Service Pack 2
	Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for 32-bit Systems Service Pack 2
	Windows Server 2016 (Server Core installation)
	Windows Server 2016
	Windows 10 Version 1607 for x64-based Systems
	Windows 10 Version 1607 for 32-bit Systems
	Windows 10 for x64-based Systems
	Windows 10 for 32-bit Systems
	Windows 10 Version 22H2 for 32-bit Systems
	Windows 10 Version 22H2 for ARM64-based Systems
	Windows 10 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for ARM64-based Systems
	Windows 10 Version 21H2 for x64-based Systems
	Windows 10 Version 21H2 for ARM64-based Systems
	Windows 10 Version 21H2 for 32-bit Systems
	Windows 11 version 21H2 for ARM64-based Systems
	Windows 11 version 21H2 for x64-based Systems
	Windows Server 2022 (Server Core installation)
	Windows Server 2022
	Windows Server 2019 (Server Core installation)
	Windows Server 2019
	Windows 10 Version 1809 for ARM64-based Systems
	Windows 10 Version 1809 for x64-based Systems
	Windows 10 Version 1809 for 32-bit Systems

CVE-2023-36713 – Windows Common Log File System Driver Information Disclosure Vulnerability

Severity: Important

Affected Software


	Windows Server 2012 R2 (Server Core installation)
	Windows Server 2012 R2
	Windows Server 2012 (Server Core installation)
	Windows Server 2012
	Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
	Windows Server 2008 R2 for x64-based Systems Service Pack 1
	Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for x64-based Systems Service Pack 2
	Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for 32-bit Systems Service Pack 2
	Windows Server 2016 (Server Core installation)
	Windows Server 2016
	Windows 10 Version 1607 for x64-based Systems
	Windows 10 Version 1607 for 32-bit Systems
	Windows 10 for x64-based Systems
	Windows 10 for 32-bit Systems
	Windows 10 Version 22H2 for 32-bit Systems
	Windows 10 Version 22H2 for ARM64-based Systems
	Windows 10 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for ARM64-based Systems
	Windows 10 Version 21H2 for x64-based Systems
	Windows 10 Version 21H2 for ARM64-based Systems
	Windows 10 Version 21H2 for 32-bit Systems
	Windows 11 version 21H2 for ARM64-based Systems
	Windows 11 version 21H2 for x64-based Systems
	Windows Server 2022 (Server Core installation)
	Windows Server 2022
	Windows Server 2019 (Server Core installation)
	Windows Server 2019
	Windows 10 Version 1809 for ARM64-based Systems
	Windows 10 Version 1809 for x64-based Systems
	Windows 10 Version 1809 for 32-bit Systems

CVE-2023-36731 – Win32k Elevation of Privilege Vulnerability

Severity: Important

Affected Software


	Windows 10 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for ARM64-based Systems
	Windows 10 Version 21H2 for x64-based Systems
	Windows 10 Version 21H2 for ARM64-based Systems
	Windows 10 Version 21H2 for 32-bit Systems
	Windows 11 version 21H2 for ARM64-based Systems
	Windows 11 version 21H2 for x64-based Systems
	Windows Server 2022 (Server Core installation)
	Windows Server 2022
	Windows Server 2019 (Server Core installation)
	Windows Server 2019
	Windows 10 Version 1809 for ARM64-based Systems
	Windows 10 Version 1809 for x64-based Systems
	Windows 10 Version 1809 for 32-bit Systems
	Windows Server 2008 for x64-based Systems Service Pack 2
	Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for 32-bit Systems Service Pack 2
	Windows Server 2016 (Server Core installation)
	Windows Server 2016
	Windows 10 Version 1607 for x64-based Systems
	Windows 10 Version 1607 for 32-bit Systems
	Windows 10 for x64-based Systems
	Windows 10 for 32-bit Systems
	Windows 10 Version 22H2 for 32-bit Systems
	Windows 10 Version 22H2 for ARM64-based Systems
	Windows Server 2012 R2 (Server Core installation)
	Windows Server 2012 R2
	Windows Server 2012 (Server Core installation)
	Windows Server 2012
	Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
	Windows Server 2008 R2 for x64-based Systems Service Pack 1
	Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)

]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 1 new vulnerability for Adobe Acrobat and Reader]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-1-new-vulnerability-for-adobe-september-2023</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-1-new-vulnerability-for-adobe-september-2023</guid>
            <pubDate>Tue, 12 Sep 2023 23:46:21 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their MAPP program, has proactively deployed protection for the following 1 vulnerability included in the September 2023 Adobe security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the September release and deploy additional protections, as necessary.

APSB23-34 – Security updates available for Adobe Acrobat and Reader.

Adobe has released security updates for Adobe Acrobat and Reader for Windows and macOS. These updates address critical and important vulnerabilities. Successful exploitation could lead to arbitrary code execution. 

Affected Software


	Acrobat DC Continuous 23.003.20284 (Win), 23.003.20284 (Mac) and&nbsp;earlier&nbsp;versions for Windows & macOS
	Acrobat Reader DC Continuous 23.003.20244 (Win), 23.003.20284 (Mac) and&nbsp;earlier&nbsp;versions for Windows & macOS
	Acrobat 2020 Classic 2020 20.005.30516 (Mac), 20.005.30514 (Win) and earlier versions for Windows & macOS
	Acrobat Reader 2020 Classic 2020 20.005.30516 (Mac), 20.005.30514 (Win) and earlier versions for Windows & macOS


CVE-2023-26369 – Out-of-bounds Write vulnerability leading to Arbitrary code execution. 

Severity: Critical
]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 3 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-3-new-vulnerabilities-windows-september-2023</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-3-new-vulnerabilities-windows-september-2023</guid>
            <pubDate>Tue, 12 Sep 2023 23:43:07 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their MAPP program, has proactively deployed protection for the following 3 vulnerabilities included in the September 2023 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the September release and deploy additional protections, as necessary.



CVE-2023-38144 – Windows Common Log File System Driver Elevation of Privilege Vulnerability

Severity: Important

Affected Software


	Windows Server 2012 R2 (Server Core installation)
	Windows Server 2012 R2
	Windows Server 2012 (Server Core installation)
	Windows Server 2012
	Windows Server 2008 R2 for x64based Systems Service Pack 1 (Server Core installation)
	Windows Server 2008 R2 for x64based Systems Service Pack 1
	Windows Server 2008 for x64based Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for x64based Systems Service Pack 2
	Windows Server 2008 for 32bit Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for 32bit Systems Service Pack 2
	Windows Server 2016 (Server Core installation)
	Windows Server 2016
	Windows 10 Version 1607 for x64based Systems
	Windows 10 Version 1607 for 32bit Systems
	Windows 10 for x64based Systems
	Windows 10 for 32bit Systems
	Windows 10 Version 22H2 for 32bit Systems
	Windows 10 Version 22H2 for ARM64based Systems
	Windows 10 Version 22H2 for x64based Systems
	Windows 11 Version 22H2 for x64based Systems
	Windows 11 Version 22H2 for ARM64based Systems
	Windows 10 Version 21H2 for x64based Systems
	Windows 10 Version 21H2 for ARM64based Systems
	Windows 10 Version 21H2 for 32bit Systems
	Windows 11 version 21H2 for ARM64based Systems
	Windows 11 version 21H2 for x64based Systems
	Windows Server 2022 (Server Core installation)
	Windows Server 2022
	Windows Server 2019 (Server Core installation)
	Windows Server 2019
	Windows 10 Version 1809 for ARM64based Systems
	Windows 10 Version 1809 for x64based Systems
	Windows 10 Version 1809 for 32bit Systems

CVE-2023-36802 – Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability

Severity: Important

Affected Software


	Windows 10 Version 22H2 for 32bit Systems
	Windows 10 Version 22H2 for ARM64based Systems
	Windows 10 Version 22H2 for x64based Systems
	Windows 11 Version 22H2 for x64based Systems
	Windows 11 Version 22H2 for ARM64based Systems
	Windows 10 Version 21H2 for x64based Systems
	Windows 10 Version 21H2 for ARM64based Systems
	Windows 10 Version 21H2 for 32bit Systems
	Windows 11 version 21H2 for ARM64based Systems
	Windows 11 version 21H2 for x64based Systems
	Windows Server 2022 (Server Core installation)
	Windows Server 2022
	Windows Server 2019 (Server Core installation)
	Windows Server 2019
	Windows 10 Version 1809 for ARM64based Systems
	Windows 10 Version 1809 for x64based Systems
	Windows 10 Version 1809 for 32bit Systems

CVE-2023-38143 – Windows Common Log File System Driver Elevation of Privilege Vulnerability

Severity: Important

Affected Software


	Windows Server 2012 R2 (Server Core installation)
	Windows Server 2012 R2
	Windows Server 2012 (Server Core installation)
	Windows Server 2012
	Windows Server 2008 R2 for x64based Systems Service Pack 1 (Server Core installation)
	Windows Server 2008 R2 for x64based Systems Service Pack 1
	Windows Server 2008 for x64based Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for x64based Systems Service Pack 2
	Windows Server 2008 for 32bit Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for 32bit Systems Service Pack 2
	Windows Server 2016 (Server Core installation)
	Windows Server 2016
	Windows 10 Version 1607 for x64based Systems
	Windows 10 Version 1607 for 32bit Systems
	Windows 10 for x64based Systems
	Windows 10 for 32bit Systems
	Windows 10 Version 22H2 for 32bit Systems
	Windows 10 Version 22H2 for ARM64based Systems
	Windows 10 Version 22H2 for x64based Systems
	Windows 11 Version 22H2 for x64based Systems
	Windows 11 Version 22H2 for ARM64based Systems
	Windows 10 Version 21H2 for x64based Systems
	Windows 10 Version 21H2 for ARM64based Systems
	Windows 10 Version 21H2 for 32bit Systems
	Windows 11 version 21H2 for ARM64based Systems
	Windows 11 version 21H2 for x64based Systems
	Windows Server 2022 (Server Core installation)
	Windows Server 2022
	Windows Server 2019 (Server Core installation)
	Windows Server 2019
	Windows 10 Version 1809 for ARM64based Systems
	Windows 10 Version 1809 for x64based Systems
	Windows 10 Version 1809 for 32bit Systems

]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 26 new vulnerabilities for Adobe Acrobat and Reader]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-26-new-vulnerabilities-for-adobe-august-2023</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-26-new-vulnerabilities-for-adobe-august-2023</guid>
            <pubDate>Wed, 09 Aug 2023 07:01:45 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their MAPP program, has proactively deployed protection for the following 26 vulnerabilities included in the August 2023 Adobe security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the August release and deploy additional protections, as necessary.

&nbsp;

APSB23-30 – Security updates available for Adobe Acrobat and Reader.

Adobe has released security updates for Adobe Acrobat and Reader for Windows and macOS. These updates address critical and important vulnerabilities. Successful exploitation could lead to arbitrary code execution, privilege escalation, security feature bypass and memory leak. 

Affected Software


	Acrobat DC Continuous 23.003.20244 (Win), 23.003.20244 (Mac) and&nbsp;earlier&nbsp;versions for Windows & macOS
	Acrobat Reader DC Continuous 23.003.20244 (Win), 23.003.20244 (Mac) and&nbsp;earlier&nbsp;versions for Windows & macOS
	Acrobat 2020 Classic 2020 20.005.30467 and earlier versions for Windows & macOS
	Acrobat Reader 2020 Classic 20.005.30467 and earlier versions for Windows & macOS


CVE-2023-38235 – Out-of-bounds Read vulnerability leading to Memory Leak. 

Severity: Critical

CVE-2023-38236 – Out-of-bounds Read vulnerability leading to Memory leak. 

Severity: Important

CVE-2023-38237 – Out-of-bounds Read vulnerability leading to Memory leak.

Severity: Important

CVE-2023-38238 – Use After Free vulnerability leading to Memory leak.

Severity: Moderate

CVE-2023-38240 – Out-of-bounds Read vulnerability leading to Memory leak. 

Severity: Important

CVE-2023-38239 – Out-of-bounds Read vulnerability leading to Memory leak.

Severity: Important

CVE-2023-38241 – Out-of-bounds Read vulnerability leading to Memory leak. 

Severity: Important

CVE-2023-38234 – Access of Uninitialized Pointer vulnerability leading to Arbitrary code execution. 

Severity: Critical

CVE-2023-38242 – Out-of-bounds Read vulnerability leading to Memory leak. 

Severity: Important

CVE-2023-38233 – Out-of-bounds write vulnerability leading to Arbitrary code execution. 

Severity: Critical

CVE-2023-38244 – Out-of-bounds Read vulnerability leading to Memory leak. 

Severity: Important

CVE-2023-38247 – Out-of-bounds Read vulnerability leading to Memory leak. 

Severity: Moderate

CVE-2023-38248 – Out-of-bounds Read vulnerability leading to Memory leak. 

Severity: Moderate

CVE-2023-38232 – Out-of-bounds Read vulnerability leading to Memory Leak. 

Severity: Critical

CVE-2023-38231 – Out-of-bounds Write vulnerability leading to Arbitrary code execution. 

Severity: Critical

CVE-2023-38230 – Use After Free vulnerability leading to Memory Leak. 

Severity: Critical

CVE-2023-38229 – Out-of-bounds Read vulnerability leading to Memory Leak. 

Severity: Critical

CVE-2023-29303 – Use After Free vulnerability leading to Memory leak. 

Severity: Important

CVE-2023-38222 – Use After Free vulnerability leading to Arbitrary code execution. 

Severity: Critical

CVE-2023-38228 – Use After Free vulnerability leading to Arbitrary code execution. 

Severity: Critical

CVE-2023-38227 – Use After Free vulnerability leading to Arbitrary code execution. 

Severity: Critical

CVE-2023-38226 – Access of Uninitialized Pointer vulnerability leading to Arbitrary code execution. 

Severity: Critical

CVE-2023-38225 – Use After Free vulnerability leading to Arbitrary code execution. 

Severity: Critical

CVE-2023-38224 – Use After Free vulnerability leading to Arbitrary code execution. 

Severity: Critical

CVE-2023-38246 – Access of Uninitialized Pointer vulnerability leading to Arbitrary code execution. 

Severity: Critical

CVE-2023-38223 – Access of Uninitialized Pointer vulnerability leading to Arbitrary code execution. 

Severity: Critical
]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 2 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-2-new-vulnerabilities-windows-august-2023</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-2-new-vulnerabilities-windows-august-2023</guid>
            <pubDate>Wed, 09 Aug 2023 06:56:29 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their MAPP program, has proactively deployed protection for the following 2 vulnerabilities included in the August 2023 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the August release and deploy additional protections, as necessary.



CVE-2023-35384 – Windows HTML Platforms Security Feature Bypass Vulnerability

Severity: Important

Affected Software


	Windows Server 2012 R2 (Server Core installation)
	Windows Server 2012 R2
	Windows Server 2016 (Server Core installation)
	Windows Server 2016
	Windows 10 Version 1607 for x64-based Systems
	Windows 10 Version 1607 for 32-bit Systems
	Windows 10 for x64-based Systems
	Windows 10 for 32-bit Systems
	Windows 10 Version 22H2 for 32-bit Systems
	Windows 10 Version 22H2 for ARM64-based Systems
	Windows 10 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for ARM64-based Systems
	Windows 10 Version 21H2 for x64-based Systems
	Windows 10 Version 21H2 for ARM64-based Systems
	Windows 10 Version 21H2 for 32-bit Systems
	Windows 11 version 21H2 for ARM64-based Systems
	Windows 11 version 21H2 for x64-based Systems
	Windows Server 2022 (Server Core installation)
	Windows Server 2022
	Windows Server 2019 (Server Core installation)
	Windows Server 2019
	Windows 10 Version 1809 for ARM64-based Systems
	Windows 10 Version 1809 for x64-based Systems
	Windows 10 Version 1809 for 32-bit Systems

CVE-2023-36900 – Windows Common Log File System Driver Elevation of Privilege Vulnerability

Severity: Important

Affected Software


	Windows Server 2012 R2 (Server Core installation)
	Windows Server 2012 R2
	Windows Server 2012 (Server Core installation)
	Windows Server 2012
	Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
	Windows Server 2008 R2 for x64-based Systems Service Pack 1
	Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for x64-based Systems Service Pack 2
	Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for 32-bit Systems Service Pack 2
	Windows Server 2016 (Server Core installation)
	Windows Server 2016
	Windows 10 Version 1607 for x64-based Systems
	Windows 10 Version 1607 for 32-bit Systems
	Windows 10 for x64-based Systems
	Windows 10 for 32-bit Systems
	Windows 10 Version 22H2 for 32-bit Systems
	Windows 10 Version 22H2 for ARM64-based Systems
	Windows 10 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for ARM64-based Systems
	Windows 10 Version 21H2 for x64-based Systems
	Windows 10 Version 21H2 for ARM64-based Systems
	Windows 10 Version 21H2 for 32-bit Systems
	Windows 11 version 21H2 for ARM64-based Systems
	Windows 11 version 21H2 for x64-based Systems
	Windows Server 2022 (Server Core installation)
	Windows Server 2022
	Windows Server 2019 (Server Core installation)
	Windows Server 2019
	Windows 10 Version 1809 for ARM64-based Systems
	Windows 10 Version 1809 for x64-based Systems
	Windows 10 Version 1809 for 32-bit Systems

]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 2 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-2-new-vulnerabilities-windows-july-2023</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-2-new-vulnerabilities-windows-july-2023</guid>
            <pubDate>Tue, 11 Jul 2023 18:56:41 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their MAPP program, has proactively deployed protection for the following 2 vulnerabilities included in the July 2023 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the July release and deploy additional protections, as necessary.



CVE-2023-33157 – Microsoft SharePoint Remote Code Execution Vulnerability

Severity: Critical

Affected Software


	Microsoft SharePoint Server Subscription Edition
	Microsoft SharePoint Server 2019
	Microsoft SharePoint Enterprise Server 2016

CVE-2023-35311 – Microsoft Outlook Security Feature Bypass Vulnerability

Severity: Important

Affected Software


	Microsoft 365 Apps for Enterprise for 64-bit Systems
	Microsoft Office LTSC 2021 for 32-bit editions
	Microsoft 365 Apps for Enterprise for 32-bit Systems
	Microsoft Outlook 2013 RT Service Pack 1
	Microsoft Outlook 2013 (64-bit editions)
	Microsoft Outlook 2013 (32-bit editions)
	Microsoft Outlook 2016 (64-bit edition)
	Microsoft Office 2019 for 64-bit editions
	Microsoft Outlook 2016 (32-bit edition)
	Microsoft Office 2019 for 32-bit editions
	Microsoft Office LTSC 2021 for 64-bit editions

]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 6 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-6-new-vulnerabilities-windows-june-2023</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-6-new-vulnerabilities-windows-june-2023</guid>
            <pubDate>Tue, 13 Jun 2023 22:15:00 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their MAPP program, has proactively deployed protection for the following 6 vulnerabilities included in the June 2023 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the June release and deploy additional protections, as necessary.



CVE-2023-29360 – Windows TPM Device Driver Elevation of Privilege Vulnerability

Severity: Important

Affected Software


	Windows Server 2016 (Server Core installation)
	Windows Server 2016
	Windows 10 Version 1607 for x64-based Systems
	Windows 10 Version 1607 for 32-bit Systems
	Windows 10 Version 22H2 for 32-bit Systems
	Windows 10 Version 22H2 for ARM64-based Systems
	Windows 10 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for ARM64-based Systems
	Windows 10 Version 21H2 for x64-based Systems
	Windows 10 Version 21H2 for ARM64-based Systems
	Windows 10 Version 21H2 for 32-bit Systems
	Windows 11 version 21H2 for ARM64-based Systems
	Windows 11 version 21H2 for x64-based Systems
	Windows Server 2022 (Server Core installation)
	Windows Server 2022




CVE-2023-29358 – Windows GDI Elevation of Privilege Vulnerability

Severity: Important

Affected Software


	Windows Server 2012 R2 (Server Core installation)
	Windows Server 2012 R2
	Windows Server 2012 (Server Core installation)
	Windows Server 2012
	Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
	Windows Server 2008 R2 for x64-based Systems Service Pack 1
	Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for x64-based Systems Service Pack 2
	Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for 32-bit Systems Service Pack 2
	Windows Server 2016 (Server Core installation)
	Windows Server 2016
	Windows 10 Version 1607 for x64-based Systems
	Windows 10 Version 1607 for 32-bit Systems
	Windows 10 for x64-based Systems
	Windows 10 for 32-bit Systems




CVE-2023-29357 – Microsoft SharePoint Server Elevation of Privilege Vulnerability

Severity: Critical

Affected Software


	Microsoft SharePoint Server 2019




CVE-2023-28310 – Microsoft Exchange Server Remote Code Execution Vulnerability

Severity: Important

Affected Software


	Microsoft Exchange Server 2019 Cumulative Update 13
	Microsoft Exchange Server 2019 Cumulative Update 12
	Microsoft Exchange Server 2016 Cumulative Update 23




CVE-2023-29361 – Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

Severity: Important

Affected Software


	Windows 10 Version 22H2 for 32-bit Systems
	Windows 10 Version 22H2 for ARM64-based Systems
	Windows 10 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for ARM64-based Systems
	Windows 10 Version 21H2 for x64-based Systems
	Windows 10 Version 21H2 for ARM64-based Systems
	Windows 10 Version 21H2 for 32-bit Systems
	Windows 11 version 21H2 for ARM64-based Systems
	Windows 11 version 21H2 for x64-based Systems
	Windows Server 2022 (Server Core installation)
	Windows Server 2022




CVE-2023-29371 – Windows GDI Elevation of Privilege Vulnerability

Severity: Important

Affected Software


	Windows Server 2012 R2 (Server Core installation)
	Windows Server 2012 R2
	Windows Server 2012 (Server Core installation)
	Windows Server 2012
	Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
	Windows Server 2008 R2 for x64-based Systems Service Pack 1
	Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for x64-based Systems Service Pack 2
	Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for 32-bit Systems Service Pack 2
	Windows Server 2016 (Server Core installation)
	Windows Server 2016
	Windows 10 Version 1607 for x64-based Systems
	Windows 10 Version 1607 for 32-bit Systems
	Windows 10 for x64-based Systems
	Windows 10 for 32-bit Systems

]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 14 new vulnerabilities for Adobe Acrobat and Reader]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-14-new-vulnerabilities-for-adobe-april-2023</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-14-new-vulnerabilities-for-adobe-april-2023</guid>
            <pubDate>Tue, 11 Apr 2023 22:58:30 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their MAPP program, has proactively deployed protection for the following 14 vulnerabilities included in the April 2023 Adobe security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the April release and deploy additional protections, as necessary.

APSB23-24 – Security updates available for Adobe Acrobat and Reader.

Adobe has released security updates for Adobe Acrobat and Reader for Windows and macOS. These updates address critical and important vulnerabilities. Successful exploitation could lead to arbitrary code execution, privilege escalation, security feature bypass and memory leak.

Affected Software


	Acrobat DC Continuous 23.001.200932 (Win), 23.001.200932 (Mac) and&nbsp;earlier&nbsp;versions for Windows & macOS
	Acrobat Reader DC Continuous 23.001.200932 (Win), 23.001.200932 (Mac) and&nbsp;earlier&nbsp;versions for Windows & macOS
	Acrobat 2020 Classic 2020 20.005.30441 and earlier versions for Windows & macOS
	Acrobat Reader 2020 Classic 20.005.30441 and earlier versions for Windows & macOS


CVE-2023-26420 – Use After Free vulnerability leading to Arbitrary code execution.

Severity: Critical

CVE-2023-26419 – Use After Free vulnerability leading to Arbitrary code execution.

Severity: Critical

CVE-2023-26418 – Use After Free vulnerability leading to Arbitrary code execution.

Severity: Critical

CVE-2023-26417 – Use After Free vulnerability leading to Arbitrary code execution.

Severity: Critical

CVE-2023-26395 – Out-of-bounds Write vulnerability leading to Arbitrary code execution.

Severity: Critical

CVE-2023-26421 – Integer Underflow vulnerability leading to Arbitrary code execution.

Severity: Critical

CVE-2023-26422 – Use After Free vulnerability leading to Arbitrary code execution.

Severity: Critical

CVE-2023-26423 – Use after free vulnerability leading to Arbitrary code execution.

Severity: Critical

CVE-2023-26424 – Use After Free vulnerability leading to Arbitrary code execution.

Severity: Critical

CVE-2023-26425 – Out-of-bounds write vulnerability leading to Arbitrary code execution.

Severity: Critical

CVE-2023-26397 – Out-of-bounds Read vulnerability leading to Memory leak.

Severity: Important

CVE-2023-26405 – Improper Input validation vulnerability leading to Arbitrary code execution.

Severity: Critical

CVE-2023-26406 – Improper Access Control leading to Security Feature Bypass

Severity: Critical

CVE-2023-26408 – Improper Access Control vulnerability leading to Security Feature bypass.

Severity: Important
]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 5 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-5-new-vulnerabilities-for-windows-april-2023</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-5-new-vulnerabilities-for-windows-april-2023</guid>
            <pubDate>Tue, 11 Apr 2023 22:45:59 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their MAPP program, has proactively deployed protection for the following 5 vulnerabilities included in the April 2023 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the April release and deploy additional protections, as necessary.



CVE-2023-28274 – Windows Win32k Elevation of Privilege Vulnerability

Severity: Important

Affected Software


	Windows 10 Version 22H2 for 32-bit Systems
	Windows 10 Version 22H2 for ARM64-based Systems
	Windows 10 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for ARM64-based Systems
	Windows 10 Version 21H2 for x64-based Systems
	Windows 10 Version 21H2 for ARM64-based Systems
	Windows 10 Version 21H2 for 32-bit Systems
	Windows 11 version 21H2 for ARM64-based Systems
	Windows 11 version 21H2 for x64-based Systems
	Windows 10 Version 20H2 for ARM64-based Systems
	Windows 10 Version 20H2 for 32-bit Systems
	Windows 10 Version 20H2 for x64-based Systems
	Windows Server 2022 (Server Core installation)
	Windows Server 2022
	Windows Server 2019 (Server Core installation)
	Windows Server 2019
	Windows 10 Version 1809 for ARM64-based Systems
	Windows 10 Version 1809 for x64-based Systems
	Windows 10 Version 1809 for 32-bit Systems




CVE-2023-28285 – Windows Graphics Component Remote Code Execution Vulnerability

Severity: Important

Affected Software


	Microsoft Office LTSC for Mac 2021
	Microsoft 365 Apps for Enterprise for 64-bit Systems
	Microsoft 365 Apps for Enterprise for 32-bit Systems
	Microsoft Office 2019 for Mac




CVE-2023-24912 – Windows Graphics Component Elevation of Privilege Vulnerability

Severity: Important

Affected Software


	Windows Server 2012 R2 (Server Core installation)
	Windows Server 2012 R2
	Windows Server 2012 (Server Core installation)
	Windows Server 2012
	Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
	Windows Server 2008 R2 for x64-based Systems Service Pack 1
	Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for x64-based Systems Service Pack 2
	Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for 32-bit Systems Service Pack 2
	Windows Server 2016 (Server Core installation)
	Windows Server 2016
	Windows 10 Version 1607 for x64-based Systems
	Windows 10 Version 1607 for 32-bit Systems
	Windows 10 for x64-based Systems
	Windows 10 for 32-bit Systems
	Windows 10 Version 22H2 for 32-bit Systems
	Windows 10 Version 22H2 for ARM64-based Systems
	Windows 10 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for ARM64-based Systems
	Windows 10 Version 21H2 for x64-based Systems
	Windows 10 Version 21H2 for ARM64-based Systems
	Windows 10 Version 21H2 for 32-bit Systems
	Windows 11 version 21H2 for ARM64-based Systems
	Windows 11 version 21H2 for x64-based Systems
	Windows 10 Version 20H2 for ARM64-based Systems
	Windows 10 Version 20H2 for 32-bit Systems
	Windows 10 Version 20H2 for x64-based Systems
	Windows Server 2022 (Server Core installation)
	Windows Server 2022
	Windows Server 2019 (Server Core installation)
	Windows Server 2019
	Windows 10 Version 1809 for ARM64-based Systems
	Windows 10 Version 1809 for x64-based Systems
	Windows 10 Version 1809 for 32-bit Systems




CVE-2023-28218 – Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

Severity: Important

Affected Software


	Windows Server 2012 R2 (Server Core installation)
	Windows Server 2012 R2
	Windows Server 2012 (Server Core installation)
	Windows Server 2012
	Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
	Windows Server 2008 R2 for x64-based Systems Service Pack 1
	Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for x64-based Systems Service Pack 2
	Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for 32-bit Systems Service Pack 2
	Windows Server 2016 (Server Core installation)
	Windows Server 2016
	Windows 10 Version 1607 for x64-based Systems
	Windows 10 Version 1607 for 32-bit Systems
	Windows 10 for x64-based Systems
	Windows 10 for 32-bit Systems
	Windows 10 Version 22H2 for 32-bit Systems
	Windows 10 Version 22H2 for ARM64-based Systems
	Windows 10 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for ARM64-based Systems
	Windows 10 Version 21H2 for x64-based Systems
	Windows 10 Version 21H2 for ARM64-based Systems
	Windows 10 Version 21H2 for 32-bit Systems
	Windows 11 version 21H2 for ARM64-based Systems
	Windows 11 version 21H2 for x64-based Systems
	Windows 10 Version 20H2 for ARM64-based Systems
	Windows 10 Version 20H2 for 32-bit Systems
	Windows 10 Version 20H2 for x64-based Systems
	Windows Server 2022 (Server Core installation)
	Windows Server 2022
	Windows Server 2019 (Server Core installation)
	Windows Server 2019
	Windows 10 Version 1809 for ARM64-based Systems
	Windows 10 Version 1809 for x64-based Systems
	Windows 10 Version 1809 for 32-bit Systems




CVE-2023-28220 – Layer 2 Tunneling Protocol Remote Code Execution Vulnerability

Severity: Critical

Affected Software


	Windows Server 2012 R2 (Server Core installation)
	Windows Server 2012 R2
	Windows Server 2012 (Server Core installation)
	Windows Server 2012
	Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
	Windows Server 2008 R2 for x64-based Systems Service Pack 1
	Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for x64-based Systems Service Pack 2
	Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for 32-bit Systems Service Pack 2
	Windows Server 2016 (Server Core installation)
	Windows Server 2016
	Windows 10 Version 1607 for x64-based Systems
	Windows 10 Version 1607 for 32-bit Systems
	Windows 10 for x64-based Systems
	Windows 10 for 32-bit Systems
	Windows 10 Version 22H2 for 32-bit Systems
	Windows 10 Version 22H2 for ARM64-based Systems
	Windows 10 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for ARM64-based Systems
	Windows 10 Version 21H2 for x64-based Systems
	Windows 10 Version 21H2 for ARM64-based Systems
	Windows 10 Version 21H2 for 32-bit Systems
	Windows 11 version 21H2 for ARM64-based Systems
	Windows 11 version 21H2 for x64-based Systems
	Windows 10 Version 20H2 for ARM64-based Systems
	Windows 10 Version 20H2 for 32-bit Systems
	Windows 10 Version 20H2 for x64-based Systems
	Windows Server 2022 (Server Core installation)
	Windows Server 2022
	Windows Server 2019 (Server Core installation)
	Windows Server 2019
	Windows 10 Version 1809 for ARM64-based Systems
	Windows 10 Version 1809 for x64-based Systems
	Windows 10 Version 1809 for 32-bit Systems

]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 2 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-2-new-vulnerabilities-for-windows-march-2023</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-2-new-vulnerabilities-for-windows-march-2023</guid>
            <pubDate>Tue, 14 Mar 2023 22:22:52 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their MAPP program, has proactively deployed protection for the following 2 vulnerabilities included in the March 2023 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the March release and deploy additional protections, as necessary.



CVE-2023-24880 – Windows SmartScreen Security Feature Bypass Vulnerability

Severity: Moderate

Affected Software


	Windows Server 2022 (Server Core installation)
	Windows Server 2022
	Windows 10 Version 21H2 for ARM64-based Systems
	Windows 10 Version 21H2 for 32-bit Systems
	Windows 11 version 21H2 for ARM64-based Systems
	Windows 11 version 21H2 for x64-based Systems
	Windows 10 Version 20H2 for ARM64-based Systems
	Windows 10 Version 20H2 for 32-bit Systems
	Windows 10 Version 20H2 for x64-based Systems
	Windows Server 2019 (Server Core installation)
	Windows Server 2019
	Windows 10 Version 1809 for ARM64-based Systems
	Windows 10 Version 1809 for x64-based Systems
	Windows 10 Version 1809 for 32-bit Systems
	Windows Server 2016 (Server Core installation)
	Windows Server 2016
	Windows 10 Version 1607 for x64-based Systems
	Windows 10 Version 1607 for 32-bit Systems
	Windows 10 Version 22H2 for 32-bit Systems
	Windows 10 Version 22H2 for ARM64-based Systems
	Windows 10 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for ARM64-based Systems
	Windows 10 Version 21H2 for x64-based Systems




CVE-2023-23410 – Windows HTTP.sys Elevation of Privilege Vulnerability

Severity: Important

Affected Software


	Windows Server 2012 R2 (Server Core installation)
	Windows Server 2012 R2
	Windows Server 2012 (Server Core installation)
	Windows Server 2012
	Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
	Windows Server 2008 R2 for x64-based Systems Service Pack 1
	Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for x64-based Systems Service Pack 2
	Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for 32-bit Systems Service Pack 2
	Windows Server 2016 (Server Core installation)
	Windows Server 2016
	Windows 10 Version 1607 for x64-based Systems
	Windows 10 Version 1607 for 32-bit Systems
	Windows 10 for x64-based Systems
	Windows 10 for 32-bit Systems
	Windows 10 Version 22H2 for 32-bit Systems
	Windows 10 Version 22H2 for ARM64-based Systems
	Windows 10 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for x64-based Systems
	Windows 11 Version 22H2 for ARM64-based Systems
	Windows 10 Version 21H2 for x64-based Systems
	Windows 10 Version 21H2 for ARM64-based Systems
	Windows 10 Version 21H2 for 32-bit Systems
	Windows 11 version 21H2 for ARM64-based Systems
	Windows 11 version 21H2 for x64-based Systems
	Windows 10 Version 20H2 for ARM64-based Systems
	Windows 10 Version 20H2 for 32-bit Systems
	Windows 10 Version 20H2 for x64-based Systems
	Windows Server 2022 (Server Core installation)
	Windows Server 2022
	Windows Server 2019 (Server Core installation)
	Windows Server 2019
	Windows 10 Version 1809 for ARM64-based Systems
	Windows 10 Version 1809 for x64-based Systems
	Windows 10 Version 1809 for 32-bit Systems

]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 2 new vulnerabilities for Windows]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-2-new-vulnerabilities-for-windows-february-2023</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-2-new-vulnerabilities-for-windows-february-2023</guid>
            <pubDate>Wed, 15 Feb 2023 00:01:32 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their MAPP program, has proactively deployed protection for the following 2 vulnerabilities included in the February 2023 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the February release and deploy additional protections, as necessary.



CVE-2023-23376 – Windows Common Log File System Driver Elevation of Privilege Vulnerability.

Severity: Important

Affected Software


	Windows Server 2012 R2 (Server Core installation)
	Windows Server 2012 R2
	Windows Server 2012 (Server Core installation)
	Windows Server 2012
	Windows Server 2008 R2 for x64based Systems Service Pack 1 (Server Core installation)
	Windows Server 2008 R2 for x64based Systems Service Pack 1
	Windows Server 2008 for x64based Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for x64based Systems Service Pack 2
	Windows Server 2008 for 32bit Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for 32bit Systems Service Pack 2
	Windows Server 2016 (Server Core installation)
	Windows Server 2016
	Windows 10 Version 1607 for x64based Systems
	Windows 10 Version 1607 for 32bit Systems
	Windows 10 for x64based Systems
	Windows 10 for 32bit Systems
	Windows 10 Version 22H2 for 32bit Systems
	Windows 10 Version 22H2 for ARM64based Systems
	Windows 10 Version 22H2 for x64based Systems
	Windows 11 Version 22H2 for x64based Systems
	Windows 11 Version 22H2 for ARM64based Systems
	Windows 10 Version 21H2 for x64based Systems
	Windows 10 Version 21H2 for ARM64based Systems
	Windows 10 Version 21H2 for 32bit Systems
	Windows 11 version 21H2 for ARM64based Systems
	Windows 11 version 21H2 for x64based Systems
	Windows 10 Version 20H2 for ARM64based Systems
	Windows 10 Version 20H2 for 32bit Systems
	Windows 10 Version 20H2 for x64based Systems
	Windows Server 2022 (Server Core installation)
	Windows Server 2022
	Windows Server 2019 (Server Core installation)
	Windows Server 2019
	Windows 10 Version 1809 for ARM64based Systems
	Windows 10 Version 1809 for x64based Systems
	Windows 10 Version 1809 for 32bit Systems




CVE-2023-21823 – Windows Graphics Component Remote Code Execution Vulnerability

Severity: Important

Affected Software


	Windows Microsoft Office for Android
	Microsoft Office for iOS
	Microsoft Office for Universal
	Windows 10 for 32-bit Systems
	Windows 10 for x64-based Systems
	Windows 10 Version 1607 for 32-bit Systems
	Windows 10 Version 1607 for x64-based Systems
	Windows 10 Version 1809 for 32-bit Systems
	Windows 10 Version 1809 for ARM64-based Systems
	Windows 10 Version 1809 for x64-based Systems
	Windows 10 Version 20H2 for 32-bit Systems
	Windows 10 Version 20H2 for ARM64-based Systems
	Windows 10 Version 20H2 for x64-based Systems
	Windows 10 Version 21H2 for 32-bit Systems
	Windows 10 Version 21H2 for ARM64-based Systems
	Windows 10 Version 21H2 for x64-based Systems
	Windows 10 Version 22H2 for 32-bit Systems
	Windows 10 Version 22H2 for ARM64-based Systems
	Windows 10 Version 22H2 for x64-based Systems
	Windows 11 version 21H2 for ARM64-based Systems
	Windows 11 version 21H2 for x64-based Systems
	Windows 11 Version 22H2 for ARM64-based Systems
	Windows 11 Version 22H2 for x64-based Systems
	Windows Server 2008 for 32-bit Systems Service Pack 2
	Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 for x64-based Systems Service Pack 2
	Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
	Windows Server 2008 R2 for x64-based Systems Service Pack 1
	Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
	Windows Server 2012
	Windows Server 2012 (Server Core installation)
	Windows Server 2012 R2
	Windows Server 2012 R2 (Server Core installation)
	Windows Server 2016
	Windows Server 2016 (Server Core installation)
	Windows Server 2019
	Windows Server 2019 (Server Core installation)
	Windows Server 2022
	Windows Server 2022 (Server Core installation)

]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler protects against 15 new vulnerabilities for Adobe Acrobat and Reader]]></title>
            <link>https://www.zscaler.com/security-advisories/zscaler-protects-against-15-new-vulnerabilities-for-adobe-january-2023</link>
            <guid>https://www.zscaler.com/security-advisories/zscaler-protects-against-15-new-vulnerabilities-for-adobe-january-2023</guid>
            <pubDate>Wed, 11 Jan 2023 01:11:39 GMT</pubDate>
            <description><![CDATA[Zscaler, working with Microsoft through their MAPP program, has proactively deployed protection for the following 15 vulnerabilities included in the January 2023 Adobe security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the January release and deploy additional protections, as necessary.

APSB23-01 – Security updates available for Adobe Acrobat and Reader.

Adobe has released security updates for Adobe Acrobat and Reader for Windows and macOS. These updates address critical and important vulnerabilities. Successful exploitation could lead to denial-of-service, arbitrary code execution, privilege escalation and memory leak.

Affected Software


	Acrobat DC Continuous 22.003.20282 (Win), 22.003.20281 (Mac) and&nbsp;earlier&nbsp;versions for Windows &&nbsp; macOS
	Acrobat Reader DC Continuous 22.003.20282 (Win), 22.003.20281 (Mac) &nbsp;and&nbsp;earlier&nbsp;versions for Windows &&nbsp; macOS
	Acrobat 2020 Classic 2020 20.005.30418 and earlier versions for Windows & macOS
	Acrobat Reader 2020 Classic 20.005.30418 and earlier versions for Windows & macOS


&nbsp;

CVE-2023-21579 – Integer Overflow or Wraparound vulnerability leading to Arbitrary code execution

Severity: Critical

&nbsp;

CVE-2023-21581 – Out-of-bounds Read vulnerability leading to memory leak

Severity: Important

&nbsp;

CVE-2023-21585 – Out-of-bounds Read vulnerability leading to memory leak

Severity: Important

&nbsp;

CVE-2023-21586 – NULL Pointer Dereference vulnerability leading to Application denial of service

Severity: Important

&nbsp;

CVE-2023-21604 – Stack-based Buffer Overflow vulnerability leading to Arbitrary code execution

Severity: Critical

&nbsp;

CVE-2023-21605 – Heap-based Buffer Overflow vulnerability leading to Arbitrary code execution

Severity: Critical

&nbsp;

CVE-2023-21606 – Out-of-bounds Write vulnerability leading to Arbitrary code execution

Severity: Critical

&nbsp;

CVE-2023-21607 – Improper Input Validation vulnerability leading to Arbitrary code execution

Severity: Critical

&nbsp;

CVE-2023-21608 – Use After Free vulnerability leading to Arbitrary code execution

Severity: Critical

&nbsp;

CVE-2023-21609 – &nbsp;Out-of-bounds write vulnerability leading to Arbitrary code execution

Severity: Critical

&nbsp;

CVE-2023-21610 – Stack-based Buffer Overflow vulnerability leading to Arbitrary code execution

Severity: Critical

&nbsp;

CVE-2023-21611 – Violation of Secure Design Principles leading to Privilege escalation

Severity: Important

&nbsp;

CVE-2023-21612 – Violation of Secure Design Principles leading to Privilege escalation

Severity: Important

&nbsp;

CVE-2023-21613 – Out-of-bounds Read vulnerability leading to memory leak

Severity: Important

&nbsp;

CVE-2022-35691 – Out-of-bounds Read vulnerability leading to memory leak

Severity: Important
]]></description>
            <dc:creator>mapp-release@zscaler.com (mapp-release@zscaler.com)</dc:creator>
        </item>
    </channel>
</rss>