Changeflow GovPing Data Privacy & Cybersecurity Microsoft Products Vulnerabilities
Priority review Notice Added Final

Microsoft Products Vulnerabilities

Favicon for www.cert.ssi.gouv.fr CERT-FR Security Advisories
Published March 19th, 2026
Detected March 19th, 2026
Email

Summary

CERT-FR has issued an advisory regarding multiple vulnerabilities discovered in Microsoft products. These vulnerabilities could allow an attacker to exploit unspecified security issues. Affected systems include specific versions of azl3 and cbl2 components.

What changed

CERT-FR, the French national cybersecurity agency, has published an advisory (CERTFR-2026-AVI-0321) detailing multiple vulnerabilities affecting Microsoft products. The advisory references several Microsoft security bulletins (CVE-2026-23941 through CVE-2026-4111) and highlights affected versions of specific software components like azl3 and cbl2. The exact risk is not specified by the publisher, but the vulnerabilities could allow an attacker to cause an unspecified security problem.

Organizations using the affected Microsoft products and components should consult the provided Microsoft security bulletins and CVE references for detailed information on the vulnerabilities and recommended remediation steps. The advisory directs users to obtain patches from the editor, implying that applying these updates is the primary solution to mitigate the risks associated with these security flaws. While no specific compliance deadline is mentioned, prompt patching is crucial for maintaining system security.

What to do next

  1. Review Microsoft security bulletins for affected products.
  2. Apply vendor-provided patches and updates to mitigate vulnerabilities.
  3. Assess impact on systems running azl3 and cbl2 components.

Source document (simplified)

Premier Ministre S.G.D.S.N

Agence nationale
de la sécurité des
systèmes d'information

Paris, le 19 mars 2026 N° CERTFR-2026-AVI-0321 Affaire suivie par: CERT-FR

Avis du CERT-FR

Objet: Multiples vulnérabilités dans les produits Microsoft

Gestion du document

| Référence | CERTFR-2026-AVI-0321 |
| Titre | Multiples vulnérabilités dans les produits Microsoft |
| Date de la première version | 19 mars 2026 |
| Date de la dernière version | 19 mars 2026 |
| Source(s) | Bulletin de sécurité Microsoft CVE-2026-23941 du 17 mars 2026
Bulletin de sécurité Microsoft CVE-2026-23942 du 17 mars 2026
Bulletin de sécurité Microsoft CVE-2026-23943 du 17 mars 2026
Bulletin de sécurité Microsoft CVE-2026-32775 du 17 mars 2026
Bulletin de sécurité Microsoft CVE-2026-4111 du 17 mars 2026 |
Une gestion de version détaillée se trouve à la fin de ce document.


Risque

  • Non spécifié par l'éditeur

Systèmes affectés

  • azl3 erlang 26.2.5.17-1 versions antérieures à 26.2.5.18-1
  • azl3 libexif 0.6.24-1 versions antérieures à 0.6.24-2
  • cbl2 erlang 25.3.2.21-4 versions antérieures à 25.3.2.21-5
  • cbl2 libarchive 3.6.1-8 versions antérieures à 3.6.1-9

Résumé

De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Documentation


Gestion détaillée du document

  1. le 19 mars 2026 Version initiale

Named provisions

Risque Systèmes affectés Résumé Solutions Documentation

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CERT-FR
Published
March 19th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
CERTFR-2026-AVI-0321

Who this affects

Applies to
Technology companies
Industry sector
5112 Software & Technology
Activity scope
Vulnerability Management Patch Management
Geographic scope
France FR

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Topics
Information Technology Product Safety

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-FR Security Advisories publishes new changes.

Free. Unsubscribe anytime.