Endpoint Protection

 View Only

Microsoft Patch Tuesday – November 2016 

Nov 08, 2016 03:39 PM

Hello, welcome to this month's blog on the Microsoft patch release. This month the vendor is releasing 14 bulletins, six of which are rated Critical.

As always, customers are advised to follow these security best practices:

  • Install vendor patches as soon as they are available.
  • Run all software with the least privileges required while still maintaining functionality.
  • Avoid handling files from unknown or questionable sources.
  • Never visit sites of unknown or questionable integrity.
  • Block external access at the network perimeter to all key systems unless specific access is required.

Microsoft's summary of the November 2016 releases can be found here:
http://technet.microsoft.com/en-us/security/bulletin/ms16-nov

The following is a breakdown of the issues being addressed this month:

  1. MS16-129 Cumulative Security Update for Microsoft Edge (3199057) MS Rating: Critical

    Microsoft Browser Memory Corruption Vulnerability (CVE-2016-7196) MS Rating: Critical

    A remote code execution vulnerability exists in the way that Microsoft browsers handle objects in memory. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.

    Microsoft Browser Memory Corruption Vulnerability (CVE-2016-7198) MS Rating: Critical

    A remote code execution vulnerability exists in the way that Microsoft browsers handle objects in memory. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.

    Scripting Engine Memory Corruption Vulnerability (CVE-2016-7200) MS Rating: Critical

    A remote code execution vulnerability exist in the way that the Chakra JavaScript engine renders when handling objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.

    Scripting Engine Memory Corruption Vulnerability (CVE-2016-7201) MS Rating: Critical

    A remote code execution vulnerability exist in the way that the Chakra JavaScript engine renders when handling objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.

    Scripting Engine Memory Corruption Vulnerability (CVE-2016-7203) MS Rating: Important

    A remote code execution vulnerability exist in the way that the Chakra JavaScript engine renders when handling objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.

    Scripting Engine Memory Corruption Vulnerability (CVE-2016-7242) MS Rating: Critical

    A remote code execution vulnerability exist in the way that the Chakra JavaScript engine renders when handling objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.

    Microsoft Browser Memory Corruption Vulnerability (CVE-2016-7195) MS Rating: Important

    A remote code execution vulnerability exists in the way that Microsoft browsers handles objects in memory. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.

    Microsoft Browser Information Disclosure Vulnerability (CVE-2016-7199) MS Rating: Moderate

    An information disclosure vulnerability exist when the Microsoft Browser improperly handles objects in memory.

    Scripting Engine Memory Corruption Vulnerability (CVE-2016-7202) MS Rating: Important

    A remote code execution vulnerability exist in the way that the Chakra JavaScript engine renders when handling objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.

    Microsoft Edge Information Disclosure Vulnerability (CVE-2016-7204) MS Rating: Important

    An information disclosure vulnerability exists when Microsoft Edge improperly handle objects in memory. An attacker who successfully exploited this vulnerability could trick a user into allowing access to the user's My Documents folder.

    Scripting Engine Memory Corruption Vulnerability (CVE-2016-7208) MS Rating: Important

    A remote code execution vulnerability exist in the way that the Chakra JavaScript engine renders when handling objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.

    Microsoft Edge Spoofing Vulnerability (CVE-2016-7209) MS Rating: Moderate

    A spoofing vulnerability exists when Microsoft Edge does not properly parse HTTP content. An attacker who successfully exploited this vulnerability could trick a user by redirecting the user to a specially crafted website. The specially crafted website could either spoof content or serve as a pivot to chain an attack with other vulnerabilities in web services.

    Microsoft Browser Information Disclosure Vulnerability (CVE-2016-7227) MS Rating: Important

    An information disclosure vulnerability exist when the Microsoft browser improperly handles objects in memory.

    Microsoft Browser Information Disclosure Vulnerability (CVE-2016-7239) MS Rating: Moderate

    An information disclosure vulnerability exists when the Microsoft browser XSS filter is abused to leak sensitive page information. An attacker who successfully exploited the vulnerability could obtain sensitive information from certain web pages.

    Scripting Engine Memory Corruption Vulnerability (CVE-2016-7240) MS Rating: Critical

    A remote code execution vulnerability exist in the way that the Chakra JavaScript engine renders when handling objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.

    Scripting Engine Memory Corruption Vulnerability (CVE-2016-7241) MS Rating: Critical

    A remote code execution vulnerability exist in the way that the Chakra JavaScript engine renders when handling objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.

    Scripting Engine Memory Corruption Vulnerability (CVE-2016-7243) MS Rating: Critical

    A remote code execution vulnerability exist in the way that the Chakra JavaScript engine renders when handling objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.


  2. MS16-130 Security Update for Microsoft Windows (3199172) MS Rating: Critical

    Windows File Manager Remote Code Execution Vulnerability (CVE-2016-7212) MS Rating: Critical

    A remote code execution vulnerability exists when Windows image file loading functionality does not properly handle malformed image files, which could allow an attacker to execute arbitrary code. To exploit the vulnerability, an attacker would have to convince a user to load a malformed image file from either a webpage or an email message.

    Windows IME Elevation of Privilege Vulnerability (CVE-2016-7221) MS Rating: Important

    An elevation of privilege vulnerability exists in Windows Input Method Editor (IME) when Windows Input Method Editor (IME) improperly handles DLL loading. To exploit this vulnerability, a locally authenticated attacker would run a specially crafted application.

    Task Scheduler Elevation of Privilege Vulnerability (CVE-2016-7222) MS Rating: Important

    This security update addresses an elevation of privilege vulnerability in the Windows Task Scheduler. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. To exploit the vulnerability, a locally authenticated attacker could use Windows Task Scheduler to schedule a new task with a malicious UNC path.


  3. MS16-131 Security Update for Microsoft Video Control (3199151) MS Rating: Critical

    Microsoft Video Control Remote Code Execution Vulnerability (CVE-2016-7248) MS Rating: Critical

    A remote code execution vulnerability exists when Microsoft Video Control fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.


  4. MS16-132 Security Update for Microsoft Graphics Component (3199120) MS Rating: Critical

    Windows Animation Manager Memory Corruption Vulnerability (CVE-2016-7205) MS Rating: Critical

    A remote code execution vulnerability exists when the Windows Animation Manager improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights.

    Open Type Font Information Disclosure Vulnerability (CVE-2016-7210) MS Rating: Important

    An information disclosure vulnerability exists when the ATMFD component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerabilities could obtain information to further compromise the user's system.

    Media Foundation Memory Corruption Vulnerability (CVE-2016-7217) MS Rating: Important

    A memory corruption vulnerability exists when the Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights.

    Open Type Font Remote Code Execution Vulnerability (CVE-2016-7256) MS Rating: Critical

    A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploits this vulnerability could take control of the affected system.


  5. MS16-133 Security Update for Microsoft Office (3199168) MS Rating: Important

    Microsoft Office Memory Corruption Vulnerability (CVE-2016-7213) MS Rating: Important

    A remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.

    Microsoft Office Memory Corruption Vulnerability (CVE-2016-7228) MS Rating: Important

    A remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.

    Microsoft Office Memory Corruption Vulnerability (CVE-2016-7229) MS Rating: Important

    A remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.

    Microsoft Office Memory Corruption Vulnerability (CVE-2016-7230) MS Rating: Important

    A remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.

    Microsoft Office Memory Corruption Vulnerability (CVE-2016-7231) MS Rating: Important

    A remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.

    Microsoft Office Memory Corruption Vulnerability (CVE-2016-7232) MS Rating: Important

    A remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.

    Microsoft Office Information Disclosure Vulnerability (CVE-2016-7233) MS Rating: Important

    An information disclosure vulnerability exists when Office or Word reads out of bound memory which may disclose the contents of memory. An attacker who successfully exploited the vulnerability could view out of bounds memory.

    Microsoft Office Memory Corruption Vulnerability (CVE-2016-7234) MS Rating: Important

    A remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.

    Microsoft Office Memory Corruption Vulnerability (CVE-2016-7235) MS Rating: Important

    A remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.

    Microsoft Office Memory Corruption Vulnerability (CVE-2016-7236) MS Rating: Important

    A remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.

    Microsoft Office Denial of Service Vulnerability (CVE-2016-7244) MS Rating: Important

    A denial of service vulnerability exists in Microsoft Office when a specially crafted file is opened in Microsoft Office. An attacker who successfully exploited the vulnerability could cause Office to stop responding. Note that the denial of service would not allow an attacker to execute code or to elevate their user rights.

    Microsoft Office Memory Corruption Vulnerability (CVE-2016-7245) MS Rating: Important

    A remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.


  6. MS16-134 Security Update for Common Log File System Driver (3193706) MS Rating: Important

    Windows Common Log File System Driver Elevation of Privilege Vulnerability (CVE-2016-0026) MS Rating: Important

    A privilege escalation vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

    Windows Common Log File System Driver Elevation of Privilege Vulnerability (CVE-2016-3332) MS Rating: Important

    A privilege escalation vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

    Windows Common Log File System Driver Elevation of Privilege Vulnerability (CVE-2016-3333) MS Rating: Important

    A privilege escalation vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

    Windows Common Log File System Driver Elevation of Privilege Vulnerability (CVE-2016-3334) MS Rating: Important

    A privilege escalation vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

    Windows Common Log File System Driver Elevation of Privilege Vulnerability (CVE-2016-3335) MS Rating: Important

    A privilege escalation vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

    Windows Common Log File System Driver Elevation of Privilege Vulnerability (CVE-2016-3338) MS Rating: Important

    A privilege escalation vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

    Windows Common Log File System Driver Elevation of Privilege Vulnerability (CVE-2016-3340) MS Rating: Important

    A privilege escalation vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

    Windows Common Log File System Driver Elevation of Privilege Vulnerability (CVE-2016-3342) MS Rating: Important

    A privilege escalation vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

    Windows Common Log File System Driver Elevation of Privilege Vulnerability (CVE-2016-3343) MS Rating: Important

    A privilege escalation vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

    Windows Common Log File System Driver Elevation of Privilege Vulnerability (CVE-2016-7184) MS Rating: Important

    A privilege escalation vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.


  7. MS16-135 Security Update for Kernel-Mode Drivers (3199135) MS Rating: Important

    Win32k Information Disclosure Vulnerability (CVE-2016-7214) MS Rating: Important

    An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited this vulnerability could retrieve the memory address of a kernel object.

    Win32k Elevation of Privilege Vulnerability (CVE-2016-7215) MS Rating: Important

    An elevation of privilege vulnerability exists when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in kernel mode.

    Windows Bowser.sys Information Disclosure Vulnerability (CVE-2016-7218) MS Rating: Important

    An information disclosure vulnerability exists in Windows when the Windows bowser.sys kernel-mode driver fails to properly handle objects in memory. To exploit this vulnerability, an authenticated attacker would run a specially crafted application.

    Win32k Elevation of Privilege Vulnerability (CVE-2016-7246) MS Rating: Important

    An elevation of privilege vulnerability exists when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in kernel mode.

    Win32k Elevation of Privilege Vulnerability (CVE-2016-7255) MS Rating: Important

    An elevation of privilege vulnerability exists when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in kernel mode.


  8. MS16-136 Security Update for SQL Server (3199641) MS Rating: Important

    SQL RDBMS Engine EoP vulnerability (CVE-2016-7249) MS Rating: Important

    An elevation of privilege vulnerability exists in Microsoft SQL Server when it improperly handles pointer casting. An attacker could exploit the vulnerability if their credentials allow access to an affected SQL server database.

    SQL RDBMS Engine EoP vulnerability (CVE-2016-7250) MS Rating: Important

    An elevation of privilege vulnerability exists in Microsoft SQL Server when it improperly handles pointer casting. An attacker could exploit the vulnerability if their credentials allow access to an affected SQL server database.

    SQL RDBMS Engine EoP vulnerability (CVE-2016-7254) MS Rating: Important

    An elevation of privilege vulnerability exists in Microsoft SQL Server when it improperly handles pointer casting. An attacker could exploit the vulnerability if their credentials allow access to an affected SQL server database.

    MDS API XSS Vulnerability (CVE-2016-7251) MS Rating: Important

    An XSS vulnerability exists in SQL Server MDS that could allow an attacker to inject a client-side script into the user's instance of Internet Explorer. The vulnerability is caused when the SQL Server MDS does not properly validate a request parameter on the SQL Server site. The script could spoof content, disclose information, or take any action that the user could take on the site on behalf of the targeted user.

    SQL Analysis Services Information Disclosure Vulnerability (CVE-2016-7252) MS Rating: Moderate

    An information Disclosure vulnerability exists in Microsoft SQL Analysis Services when it improperly checks filestream path. An attacker could exploit the vulnerability if their credentials allow access to an affected SQL server database. An attacker who successfully exploited this vulnerability could gain additional database and file information.

    SQL Server Agent Elevation of Privilege Vulnerability (CVE-2016-7253) MS Rating: Moderate

    An elevation of privilege vulnerability exists in Microsoft SQL Server Engine when SQL Server Agent incorrectly check ACLs on atxcore.dll. An attacker could exploit the vulnerability if their credentials allow access to an affected SQL server database.


  9. MS16-137 Security Update for Windows Authentication Methods (3199173) MS Rating: Important

    Virtual Secure Mode Information Disclosure Vulnerability (CVE-2016-7220) MS Rating: Important

    An information disclosure vulnerability exists when Windows Virtual Secure Mode improperly handles objects in memory. A locally-authenticated attacker who successfully exploited this vulnerability could be able to read sensitive information on the target system.

    Local Security Authority Subsystem Service Denial of Service Vulnerability (CVE-2016-7237) MS Rating: Important

    This security update corrects a denial of service in the Local Security Authority Subsystem Service (LSASS) caused when an attacker sends a specially crafted request. A remote, but authenticated, attacker who successfully exploited this vulnerability could cause a denial of service on a target system.

    Windows NTLM Elevation of Privilege Vulnerability (CVE-2016-7238) MS Rating: Important

    This security update corrects a local elevation of privilege that exists when Windows fails to properly handle NTLM password change requests. An attacker who successfully exploited this vulnerability could elevate their permissions from unprivileged user account to administrator.


  10. MS16-138 Security Update to Microsoft Virtual Hard Drive (3199647) MS Rating: Important

    VHDFS Driver Elevation of Privilege Vulnerability (CVE-2016-7223) MS Rating: Important

    An elevation of privilege vulnerability exists when the Windows VHDMP kernel driver fails to properly handle user access to certain files. An attacker who successfully exploited the vulnerability could manipulate files in locations not intended to be available to the user.

    VHDFS Driver Elevation of Privilege Vulnerability (CVE-2016-7224) MS Rating: Important

    An elevation of privilege vulnerability exists when the Windows VHDMP kernel driver fails to properly handle user access to certain files. An attacker who successfully exploited the vulnerability could manipulate files in locations not intended to be available to the user.

    VHDFS Driver Elevation of Privilege Vulnerability (CVE-2016-7225) MS Rating: Important

    An elevation of privilege vulnerability exists when the Windows VHDMP kernel driver fails to properly handle user access to certain files. An attacker who successfully exploited the vulnerability could manipulate files in locations not intended to be available to the user.

    VHDFS Driver Elevation of Privilege Vulnerability (CVE-2016-7226) MS Rating: Important

    An elevation of privilege vulnerability exists when the Windows VHDMP kernel driver fails to properly handle user access to certain files. An attacker who successfully exploited the vulnerability could manipulate files in locations not intended to be available to the user.


  11. MS16-139 Security Update for Windows Kernel (3199720) MS Rating: Important

    Windows Kernel Elevation of Privilege Vulnerability (CVE-2016-7216) MS Rating: Important

    Local elevation of privilege can occur when a Windows Kernel API improperly allows a user to access sensitive information. A locally authenticated attacker could attempt to exploit this vulnerability by running a specially crafted application. An attacker can gain access to information not intended to be available to the user by using this method.


  12. MS16-140 Security Update For Boot Manager (3193479) MS Rating: Important

    Secure Boot Component Vulnerability (CVE-2016-7247) MS Rating: Important

    A security feature bypass vulnerability exists when Windows Secure Boot improperly loads a boot policy that is affected by the vulnerability. An attacker who successfully exploited this vulnerability could disable code integrity checks, allowing test-signed executables and drivers to be loaded onto a target device.


  13. MS16-141 Security Update for Adobe Flash Player (3202790) MS Rating: Critical

    This security update resolves vulnerabilities in Adobe Flash Player when installed on all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, Windows 10, and Windows Server 2016.


  14. MS16-142 Cumulative Security Update for Internet Explorer (3198467) MS Rating: Critical

    Microsoft Browser Memory Corruption Vulnerability (CVE-2016-7195) MS Rating: Important

    A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user.

    Microsoft Browser Memory Corruption Vulnerability (CVE-2016-7196) MS Rating: Critical

    A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user.

    Microsoft Browser Memory Corruption Vulnerability (CVE-2016-7198) MS Rating: Critical

    A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user.

    Microsoft Browser Memory Corruption Vulnerability (CVE-2016-7241) MS Rating: Critical

    A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user.

    Microsoft Browser Information Disclosure Vulnerability (CVE-2016-7199) MS Rating: Moderate

    An information disclosure vulnerability exists when Microsoft browsers improperly handles objects in memory. An attacker who successfully exploited this vulnerability could allow an attacker to obtain browser window state from a different domain.

    Microsoft Browser Information Disclosure Vulnerability (CVE-2016-7227) MS Rating: Important

    An information disclosure vulnerability exists when Microsoft browsers improperly handles objects in memory. An attacker who successfully exploited this vulnerability could allow an attacker to obtain browser window state from a different domain.

    Microsoft Browser Information Disclosure Vulnerability (CVE-2016-7239) MS Rating: Moderate

    An information disclosure vulnerability exists when the Microsoft browser XSS filter is abused to leak sensitive page information. An attacker who successfully exploited the vulnerability could obtain sensitive information from certain web pages.To exploit the vulnerability, an attacker would have to know what information that the attacker is seeking, identify a page that is susceptible to the attack, and then craft a special script to gather the information from the web pages.

More information on the vulnerabilities being addressed this month is available at Symantec's free Security Response portal and to our customers through the DeepSight Threat Management System.

Statistics
0 Favorited
0 Views
0 Files
0 Shares
0 Downloads

Tags and Keywords

Related Entries and Links

No Related Resource entered.