<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/blog/authors/todd-schell/rss" /><link>https://www.ivanti.com/blog/authors/todd-schell</link><item><guid isPermaLink="false">331fe042-9a9f-4fc2-9264-3a7113fcdc48</guid><link>https://www.ivanti.com/blog/how-implementing-risk-based-patch-management-prioritizes-active-exploits</link><atom:author><atom:name>Todd Schell</atom:name><atom:uri>https://www.ivanti.com/blog/authors/todd-schell</atom:uri></atom:author><category>Security</category><category>Endpoint Management</category><title>How Risk-Based Patch Management Prioritizes Active Exploits</title><description>&lt;p&gt;Resistance to change is always present, especially if you think the processes you have in place are efficient and effective. Many organizations feel this way about their software management procedures until they have a security breach or incident and are left wondering where they went wrong.&lt;/p&gt;

&lt;p&gt;The reality is that most patch management programs are built on assumptions and recommendations, rather than facts about actively exploited vulnerabilities.&amp;nbsp;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-patch-management"&gt;Risk-based patch management&lt;/a&gt;&amp;nbsp;is the answer to this issue.&lt;/p&gt;

&lt;p&gt;In this article, find:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="#one"&gt;What’s wrong with keeping typical prioritizations.&amp;nbsp;&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#two"&gt;What risk-based patch management is.&amp;nbsp;&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#three"&gt;Why it’s the perfect time to adopt risk-based patch management.&amp;nbsp;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h2 id="one"&gt;The problems with typical patch prioritization&lt;/h2&gt;

&lt;p&gt;Software feature updates, security fixes, bug fixes, performance enhancements and many other types of software releases have existed since the software industry started. Vendors often assign a severity rating or other score to each of these to let customers know what they think is most important.&lt;/p&gt;

&lt;p&gt;Unfortunately, there’s no industry standard associated with these ratings, so we are left to compare and prioritize releases for deployment on our systems based on recommendations. On top of that, such ratings are rarely updated to account for active threat context even as vulnerabilities change.&lt;/p&gt;

&lt;h3&gt;Overlooking an actively exploited vulnerability&lt;/h3&gt;

&lt;p&gt;While better than nothing at all, vendor severity ratings often come up short.&amp;nbsp;Consider the Follina vulnerability (&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-30190" rel="noopener" target="_blank"&gt;CVE-2022-30190)&lt;/a&gt;&amp;nbsp;published in May of 2022. This vulnerability in the Microsoft Windows Support Diagnostic Tool (MSDT) allows for remote code execution.&lt;/p&gt;

&lt;p&gt;Follina was under attack for several months before Microsoft finally responded with several updates. Alarmingly, Microsoft only assigned this vulnerability a Common Vulnerability Scoring System (CVSS) v3 rating of 7.8 and severity of Important. If you’re only patching based on Critical severity,&amp;nbsp;you'd&amp;nbsp;have missed this one, leaving a significant gap in your attack surface.&lt;/p&gt;

&lt;p&gt;Worse yet, Follina’s CVSS score remained at 7.8 even after it was revealed the vulnerability was being&amp;nbsp;&lt;a href="https://www.fortinet.com/blog/threat-research/ransomware-roundup-bisamware-and-chile-locker" rel="noopener" target="_blank"&gt;actively exploited to distribute Bisamware ransomware&lt;/a&gt;, exposing organizations that had overlooked the vulnerability to even more risk.&amp;nbsp;&lt;/p&gt;

&lt;figure&gt;&lt;img alt="Ivanti Neurons for Vuln KB" src="https://static.ivanti.com/sites/marketing/media/images/blog/2023/05/bisamware-ransomware-intel.png"&gt;
&lt;figcaption&gt;Intelligence on the ransomware threat associated with CVE-2022-30190 displayed in Ivanti Neurons for VULN KB&lt;/figcaption&gt;
&lt;/figure&gt;

&lt;h3&gt;CVSS shortcomings&lt;/h3&gt;

&lt;p&gt;Severity ratings are ‘augmented’ with CVSS scores from&amp;nbsp;&lt;a href="https://www.first.org/cvss/" rel="noopener" target="_blank"&gt;FIRST&lt;/a&gt;. Each CVE is assigned a CVSS number, such as the 7.8 given to CVE-2022-30190 in the example above.&lt;/p&gt;

&lt;p&gt;One of the major objectives behind&amp;nbsp;calculating&amp;nbsp;the actual CVSS number is to ensure standardization so all CVEs are scored consistently and can be accurately compared. The higher the CVSS score for a vulnerability and the associated patch, the more critical it is to deploy in most environments.&lt;/p&gt;

&lt;p&gt;For software updates that address multiple CVEs, the highest CVSS value is usually considered for prioritization. But is this value even accurate?&lt;/p&gt;

&lt;p&gt;The results of an analysis of CVSS scores in a&amp;nbsp;&lt;a href="https://www.darkreading.com/application-security/discrepancies-discovered-in-vulnerability-severity-ratings" rel="noopener" target="_blank"&gt;recent article&lt;/a&gt; showed&amp;nbsp;there's&amp;nbsp;a discrepancy for nearly 20% of CVSS scores (25,000). This analysis was based on a comparison of the scores reported in the NIST National Vulnerability Database (NVD) and those reported directly by the vendors themselves.&lt;/p&gt;

&lt;h3&gt;Vendor severity inconsistencies&lt;/h3&gt;

&lt;p&gt;One important point to keep in mind is vendors have historically assigned their own terminology to severity (e.g., critical, important).&amp;nbsp;Using&amp;nbsp;vendor severity scoring as a priority mechanism may work well when comparing all patches by a given&amp;nbsp;vendor,&amp;nbsp;but&amp;nbsp;doesn't&amp;nbsp;always provide an accurate comparison of patches between vendors. In fact, many use different terminology entirely.&lt;/p&gt;

&lt;p&gt;Likewise, vendor severity&amp;nbsp;isn't&amp;nbsp;always a positive indicator. Many zero-day vulnerabilities are only rated Important by Microsoft but have high CVSS numbers. You can see how patching using severity and CVSS for prioritization is using assumptions and recommendations and can result in a vulnerable environment.&lt;/p&gt;

&lt;h3&gt;Why prioritize active exploits over any other prioritization method?&lt;/h3&gt;

&lt;p&gt;According to the US&amp;nbsp;Cybersecurity and Infrastructure Security Agency (CISA), an&amp;nbsp;&lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" rel="noopener" target="_blank"&gt;actively exploited vulnerability&lt;/a&gt;&amp;nbsp;is “one for which there is reliable evidence that execution of malicious code was performed by an actor on a system without permission of the system owner.” In layman’s terms, a vulnerability under active exploitation is one&amp;nbsp;that's been used by a threat actor to launch a cyberattack.&lt;/p&gt;

&lt;p&gt;Thus, to minimize the risk of an attack on your organization, you must prioritize actively exploited vulnerabilities above all others. This is good news as most vulnerabilities aren't being actively exploited and thus pose little to no risk to your organization. You can identify those that have been exploited through risk-based patch management.&lt;/p&gt;

&lt;h2 id="two"&gt;What is&amp;nbsp;risk-based patch management?&lt;/h2&gt;

&lt;p&gt;Risk-based patch management is an extension of risk-based vulnerability management, which goes beyond vendor severity and basic CVSS scores to identify and qualify the specific vulnerabilities that pose the most significant risk to an organization. This brings real-world risk context into the patch management process so that IT teams can focus their efforts on updates with known exploited vulnerabilities that matter most to an organization’s security posture.&lt;/p&gt;

&lt;h3&gt;How can my organization adopt risk-based patch management?&lt;/h3&gt;

&lt;p&gt;For organizations ready to adopt a risk-based approach to patch management, a good place to start is the CISA&amp;nbsp;&lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" rel="noopener" target="_blank"&gt;Known Exploited Vulnerabilities&lt;/a&gt; (KEV)&amp;nbsp;catalog. CISA took a major step forward to help prioritize vulnerabilities when it introduced&amp;nbsp;&lt;a href="https://www.cisa.gov/news-events/directives/bod-22-01-reducing-significant-risk-known-exploited-vulnerabilities" rel="noopener" target="_blank"&gt;Binding Operational Directive 22–01&lt;/a&gt;&amp;nbsp;along with its KEV&amp;nbsp;catalog.&amp;nbsp;When originally released, the catalog contained some 200 actively exploited vulnerabilities. It has since grown to almost 900.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;CISA builds the list with the knowledge the vulnerabilities it contains are being exploited in the wild by active threats.&amp;nbsp;However, the list does have its shortcomings, as it currently excludes&amp;nbsp;&lt;a href="https://www.securin.io/ransomware/" rel="noopener" target="_blank"&gt;131 vulnerabilities associated with ransomware&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;Is the CISA KEV catalog the only resource available for risk-based patch management?&lt;/h3&gt;

&lt;p&gt;Organizations with more mature risk-based patch management practices leverage advanced risk scoring methodologies in place of or in addition to CVSS. These methodologies assign scores to every vulnerability identified in an organization’s environment, allowing those organizations to expand their risk-based approach beyond the CISA KEV.&lt;/p&gt;

&lt;p&gt;Many vendors in the risk-based vulnerability management space have developed proprietary scoring methodologies that represent the true risk posed by a vulnerability. They do so by delivering dynamic risk ratings that give extra weight to actively exploited vulnerabilities.&lt;/p&gt;

&lt;p&gt;For example, Ivanti’s&amp;nbsp;&lt;a href="/resources/v/doc/ivi/2683/cbe60d387c0b" target="_blank"&gt;Vulnerability Risk Rating&lt;/a&gt; (VRR)&amp;nbsp;has assigned Follina a score of 10, a score that more accurately represents the risk posed by that vulnerability than its CVSS score of 7.8.&lt;/p&gt;

&lt;figure&gt;&lt;img alt="Ivanti's VRR rating of Follina." src="https://static.ivanti.com/sites/marketing/media/images/blog/2023/05/follina-cvss-vs-vrr.png"&gt;
&lt;figcaption&gt;The difference between the VRR and CVSS v3 scores and severity levels for CVE-2022-30190 as shown in Ivanti Neurons for VULN KB&amp;nbsp;&lt;/figcaption&gt;
&lt;/figure&gt;

&lt;h2 id="three"&gt;Why it’s the perfect time to adopt risk-based patch management&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;If you feel you’ve fallen behind on system updates or are overwhelmed by new systems and applications in your company, now is the perfect time to adopt risk-based patch management.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Even if you feel you have a solid program in place based on severity ratings and CVSS scores, it’s time to remove the resistance to change and start a new process before your business is devastated by a data breach stemming from an exploited vulnerability.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Start by using the CISA KEV to prioritize your updates and&amp;nbsp;earmark&amp;nbsp;a budget&amp;nbsp;for a risk-based vulnerability and patch management solution. With the proper tools in&amp;nbsp;place,&amp;nbsp;you can quickly identify the highest risk systems to patch first and work down the list to ensure your systems are secure.&lt;/p&gt;

&lt;p&gt;Looking to take the first step? Dive into this eBook for&amp;nbsp;a one-stop guide for&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/v/doc/ivi/2705/11190ce11e80"&gt;implementing a modern risk-based patch management program&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;
</description><pubDate>Fri, 03 Jan 2025 18:10:36 Z</pubDate></item><item><guid isPermaLink="false">089b75d6-4633-4427-8e04-c0fbdd6e5542</guid><link>https://www.ivanti.com/blog/effective-modern-patch-management-processes-and-best-practices-for-patch-operations</link><atom:author><atom:name>Todd Schell</atom:name><atom:uri>https://www.ivanti.com/blog/authors/todd-schell</atom:uri></atom:author><category>Patch Management</category><title>Effective Modern Patch Management Processes and Best Practices for Patch Operations</title><description>&lt;p&gt;Running a &lt;a href="https://www.ivanti.com/products/risk-based-vulnerability-management"&gt;risk-based vulnerability management program&lt;/a&gt; is essential to maintaining a secure business computing environment. In a previous blog, “&lt;a href="https://www.ivanti.com/blog/how-implementing-risk-based-patch-management-prioritizes-active-exploits"&gt;How Implementing Risk-Based Patch Management Prioritizes Active Exploits&lt;/a&gt;,” I provided perspective on how to prioritize vulnerabilities. Honing the operational aspect of securing your systems is essential to that process.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Conducting patch operations in your organization can be a complicated process. Even with some perspective on vulnerability priority, you still need to consider:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;The release cadence of patches.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Supporting policies to make this process effective.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Campaigns to deploy the updates.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Service-level agreements (SLA) and compliance measurement.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This may seem like a lot to balance – but a flexible system that manages planned events and can account for the unplanned will put you in total control.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Do you have control?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;There are some facets of patch releases you can plan for and others you can’t.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Take for example the cadence of security patch releases. On Patch Tuesday, the second Tuesday of each month, Microsoft attempts to release all its latest updates. These include updates for operating systems, Office and other user applications, development tools like Visual Studio and cloud components in Azure to name a few.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Patch Tuesday, which celebrated its 20th anniversary in October 2023, is the foundation for many patch programs – providing a point in time to distribute all the latest Microsoft and available third-party updates. No other vendor has had such a profound impact on driving organizational patch programs – and to this day the monthly patch cycle, anchored on Patch Tuesday, remains a standard in the industry.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Other vendors have attempted to follow suit and release their updates on a schedule:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Oracle releases its &lt;a href="https://www.oracle.com/security-alerts/" rel="noopener" target="_blank"&gt;Critical Patch Update&lt;/a&gt; once a quarter.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Adobe typically releases its updates once a month, often in sync with Patch Tuesday.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Google recently began releasing a single update each week.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;However, most vendors release security updates as soon and as often they can to make sure they are addressing vulnerabilities as quickly as possible. This results in a random and never-ending stream of updates that need to be constantly prioritized and distributed across an organization.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Patch management process for policies and campaigns&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Bringing the chaos of patch releases under control requires a clearly defined set of rules and an infrastructure to enforce them. In the patch realm these translate to policies and campaigns.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Patch policy requires a wide range of considerations beyond prioritizing vulnerabilities, including the impact of updates on business operations, applicability to different types of systems, degree of control over the updates and other factors.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Patch policies offer a study in contrast, depending on your business. For a server hosting critical business applications, its policy involves a clearly defined set of updates under strict configuration control, occurs only during a defined maintenance window, and always enforces a reboot upon completion to ensure the system is fully updated. The patch policy for a marketing user’s laptop identifies a series of applications with approved updates that may or may not be present and lets the user delay updates and reboot when convenient.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Campaigns take these policies into account but also bring control to the myriad patches constantly being released.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Modern patch management best practices require more frequent patching than just once a month. Google Chrome patches are being released weekly, and zero-day patches can be released at any time. A monthly campaign will leave many systems vulnerable for extended periods of time.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Establish three types of campaigns&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;A best practice is to establish three types of campaigns: regular maintenance, priority updates and critical deployments.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Regular maintenance campaign&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Regular maintenance campaigns enforce the standard monthly ringed rollout of patches most organizations use today. This campaign includes:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Initial testing in a controlled environment to ensure patches install as planned.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Rollout to a larger pilot group of early adopters who are on the lookout to report issues.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Rollout to the pre-defined groups of production systems to complete the overall distribution.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The patches in a maintenance campaign include security updates that are released less frequently, like Microsoft Patch Tuesday releases, as well as performance or application upgrades. The targeted systems in this campaign may also be those that have limited maintenance windows and cannot be interrupted without major business impact. Most patches will most likely fall into the priority updates campaign.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Priority updates campaign&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;The priority updates campaign is designed to quickly address those systems that have ongoing exposure to new vulnerabilities but can be updated more frequently. User systems running productivity applications and browsers fall under this campaign and are often at the highest risk with exposure to phishing, malware and ransomware.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The patches associated with this campaign are often the highest priority due to vulnerabilities with known exploitation but may also be of relatively low business impact requiring a browser or application restart. As a result, the policies may have a shorter test cycle before release and may be more quickly distributed to larger groups of systems which are not business critical, e.g. servers may not have a browser installed, but sales laptops do.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Zero-day response campaign&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;The zero-day response campaign is reserved for the “hair on fire” company- or industry-mandated emergency patch deployment that must be in place within a short period of time. This campaign takes precedence over all others.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The policy for this campaign could shorten the time or lower the standards between gated rollout – or it could ignore them altogether depending upon the SLA which must be met. Most importantly with zero-day response campaigns: This is still a controlled distribution of patches, and all activity is still reported to accurately track campaign events to completion.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Exposure time determines compliance&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;If compliance is measured in terms of fully patched machines, then under this metric most systems are only compliant for a limited number of hours each month. While technically accurate, this is a poor indicator to show the security of the system over time under a risk-based program. Showing the “exposure time” to a given vulnerability or group of vulnerabilities provides a better indicator of risk.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Here’s an example: &lt;a href="https://www.ivanti.com/blog/may-2024-patch-tuesday"&gt;CVE-2024-4761&lt;/a&gt; was reported fixed in a Google Chrome update released May 14, which happened to be May Patch Tuesday.&amp;nbsp; The next day, this Chrome patch was added to a priority update campaign that included a two-week distribution period across 500 systems in Group 1 and 1,000 systems in Group 2. Assuming most systems were successfully updated within that two-week window, a report would show when each system was updated, but more importantly how long each of these 1,500 systems remained unpatched – exposed to the vulnerability and at risk.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This is a simple one-vulnerability, one-patch example. But if there were multiple patches in the campaign with several vulnerabilities, the information could be aggregated to provide a more comprehensive campaign view. If multiple campaigns were run over the same period, the result could be overlaid or combined to provide an even more accurate risk assessment.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Armed with this data, you can show an auditor the true security state of your systems. Perhaps more importantly, you can start to assess the results and improve the effectiveness of your modern patch management operation. At that point, you are running the operation – it’s not running you.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Thu, 01 Aug 2024 06:01:00 Z</pubDate></item><item><guid isPermaLink="false">94256912-65bc-444d-9985-a3d0e4d5eaf0</guid><link>https://www.ivanti.com/blog/june-patch-tuesday-2022</link><atom:author><atom:name>Todd Schell</atom:name><atom:uri>https://www.ivanti.com/blog/authors/todd-schell</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><title>June Patch Tuesday 2022</title><description>&lt;p&gt;June Patch Tuesday is here, and we’ve now reached the midway point of 2022. It’s been and up and down six months so far with a wide swing in the number of vulnerabilities Microsoft has been addressing each month. We started off with 85 CVEs addressed in Windows 10 in January, dropped to a low of 21 CVEs in February, and are back up to 97 CVEs addressed in May. This month, we saw 33 vulnerabilities fixed in Windows 10 and its associated servers. The hot discussion topic this past month was CVE-2022-30190, also known as the Follina vulnerability, which was fixed today with updates from Windows 7 through Windows 11. The second phase of the DCOM server security update was also implemented this month. Don’t forget to upgrade Windows 10 1909 and others that reached end-of-life last month and have a plan in place if you still need Internet Explorer 11 for any of your applications. Despite a standard set of updates from Microsoft, there is plenty of additional work to keep us busy this month.&lt;/p&gt;

&lt;h2&gt;Microsoft Patch Tuesday update&lt;/h2&gt;

&lt;p&gt;Microsoft has released their updates resolving 61 unique vulnerabilities, 5 of which are re-issued vulnerabilities from April and May. Only 3 of the new CVEs are rated as Critical. CVE-2022-30190, surprisingly rated as Important, is the only one reported known to be known exploited and publicly disclosed this month. Updates this month affect the Windows Operating System, O365 applications, Exchange Server, .Net, Visual Studio, RDP, Hyper-V and a rare security update to SQL Server as well.&lt;/p&gt;

&lt;p&gt;The most important of the 3 new Critical updates is for CVE-2022-30136, a network file system remote code execution vulnerability impacting Windows Server 2012, Server 2016, and Server 2019. It has a CVSS score of 9.8 due to its Network attack vector and Low complexity to exploit. In addition to updates which were released, Microsoft has provided detailed mitigation options in the CVE KB. The other two Critical CVEs – CVE-2022-30139 and CVE-30163 are also remote code execution vulnerabilities in Lightweight Directory Access Protocol (LDAP) and Hyper-V respectively; these are more difficult to exploit with lower CVSS scores. All three should be given priority depending upon the level of risk they impart on your systems.&lt;/p&gt;

&lt;p&gt;Microsoft has also re-issued an update from June 2021 to CVE-2021-26414 DCOM Server Security Feature Bypass. This is phase 2 of 3 in the process of improving overall server security. With the month’s release, the registry key RPC_C_AUTHN_LEVEL_PKT_INTEGRITY on DCOM servers is now enabled by default. Administrators can still manually disable it if needed for their environment. The final phase will occur with the March 2023 Patch Tuesday update where it will be permanently enabled. Complete details surrounding DCOM can be found in &lt;a href="https://support.microsoft.com/en-us/topic/kb5004442-manage-changes-for-windows-dcom-server-security-feature-bypass-cve-2021-26414-f1400b52-c141-43d2-941e-37ed901c769c" target="_blank" rel="noopener"&gt;KB 5004442&lt;/a&gt;—Manage changes for Windows DCOM Server Security Feature Bypass (CVE-2021-26414).&lt;/p&gt;

&lt;p&gt;Take note that Microsoft also released &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/ADV220002" target="_blank" rel="noopener"&gt;Advisory 220002&lt;/a&gt; Microsoft Guidance on Intel Processor MMIO Stale Data Vulnerabilities which describes several CVEs addressed this month as part of a set of Intel updates.&lt;/p&gt;

&lt;h2&gt;The Follina vulnerability&lt;/h2&gt;

&lt;p&gt;The hot topic this month has been around &lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-30190" target="_blank" rel="noopener"&gt;CVE-2022-30190&lt;/a&gt;, also known as the Follina vulnerability. This vulnerability in the Microsoft Windows Support Diagnostic Tool (MSDT) allows for remote code execution. This diagnostic tool sends troubleshooting information back to Microsoft when you have a problem on your local machine. The vulnerability is exploited via malicious code included in a Word document, and what makes it particularly troublesome is the user doesn’t even have to open the document directly. Any Office program that provides a preview mode will trigger the exploit. This vulnerability has been under attack for several months. This vulnerability fix must have been a late addition this month, because although it shows up in the Vulnerabilities list of the Security Guide, it was not shown in the breakdown of CVEs for each patch.&lt;/p&gt;

&lt;h2&gt;EOL and EOS&lt;/h2&gt;

&lt;p&gt;Internet Explorer is &lt;a href="https://learn.microsoft.com/en-us/lifecycle/faq/internet-explorer-microsoft-edge" target="_blank" rel="noopener"&gt;officially&lt;/a&gt; (almost) coming to an end tomorrow - June 15&lt;sup&gt;th&lt;/sup&gt;. Internet Explorer 11 (IE 11) is the last of the line and will no longer be supported in Teams, Office 365, and most versions of the Windows operating system. If you still need IE 11 for critical business functionality, Microsoft recommends using IE mode in the Edge browser. This functionality is scheduled to be supported in Edge until 2029. The IE 11 desktop application will continue to get security updates in Windows 8.1, Windows 7 (ESU), and Windows Server LTSC until they reach their respective EOL dates. This &lt;a href="https://techcommunity.microsoft.com/t5/windows-it-pro-blog/internet-explorer-11-desktop-app-retirement-faq/ba-p/2366549" target="_blank" rel="noopener"&gt;Microsoft FAQ&lt;/a&gt; provide the best details on the end of this longtime favorite application.&lt;/p&gt;

&lt;p&gt;Remember, you won’t see any updates for Windows 10 1909 Enterprise and Education, 20H2 Professional, or Windows Server 20H2 this month. May contained the last Patch Tuesday updates for those operating systems, so you should be moving to an updated and supported version as soon as possible to minimize your exposure. Under the Microsoft SaaS model, the next Windows 10 EOLs come in December so you have a little breathing room until the next round.&lt;/p&gt;</description><pubDate>Tue, 14 Jun 2022 22:55:13 Z</pubDate></item><item><guid isPermaLink="false">341dc4a0-8898-4b4c-96a8-5de247fb97a5</guid><link>https://www.ivanti.com/blog/patch-security-in-2019</link><atom:author><atom:name>Todd Schell</atom:name><atom:uri>https://www.ivanti.com/blog/authors/todd-schell</atom:uri></atom:author><category>Security</category><title>Are We Doing Better? Patch and Security in 2019 So Far</title><description>&lt;p&gt;&lt;a href="https://www.ivanti.com/" target="_blank"&gt;&lt;img alt="Join Thousands Who Have Benefitted from the Virtual Event of the Year - WATCH NOW " src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/10/cta-thousands2.png"&gt;&lt;/a&gt;The year 2019 has been an interesting one for security so far. A record number of vulnerabilities have been reported with Microsoft, Adobe, Mozilla, Google, and others cranking out regular security updates. We’ve also seen some easily exploited vulnerabilities hit the public domain, with lots of media hype and the potential for catastrophic exploitation … but the number of associated and reported attacks have been relatively low. Are we finally getting ahead of the attackers and closing the gaping holes in our systems?&lt;/p&gt;

&lt;h3&gt;Plenty of Potential Risk but No WannaCry Scale Attacks&lt;/h3&gt;

&lt;p&gt;Let’s begin by reviewing the updates released by Microsoft this year up through August Patch Tuesday.&lt;/p&gt;

&lt;p&gt;During this time period, there have been 10 zero-day and 18 publicly disclosed vulnerabilities reported. As expected, Windows 10 and its associated server versions continue to get the most attention having the most vulnerabilities addressed. The average number of CVEs fixed each month is 55, with a high of 78 in August and a low of 32 in January.&lt;/p&gt;

&lt;p&gt;The legacy operating systems also get their fair share of attention. For example, Windows 7/Server 2008 R2 averages 32 CVEs fixed each month, as does Windows 8/Server 2012 R2. Like Windows 10, the low number of CVEs addressed occurred in January, with 15 and 18 respectively for those two groups. The high numbers occurred in June for Windows 7/Server 2008 R2 at 49 and in August for Windows 8/Server 2012 R2 at 43. The general trend has been a slow growth in the number of CVEs addressed each month, so we will see if that continues to the end of the year.&lt;/p&gt;

&lt;h3&gt;Microsoft Gets the Most Attention, But All Vendors Are Responding&lt;/h3&gt;

&lt;p&gt;Microsoft gets the bulk of the attention because of Patch Tuesday, but all vendors have been responding to the growing number of reported vulnerabilities. Oracle Java 8 and 11 updates have addressed 4, 5, and 10 vulnerabilities in the first three Critical Product Update releases this year.&lt;/p&gt;

&lt;p&gt;Browser software is always in the spotlight because it’s so heavily used. The major security updates for Google Chrome and Mozilla Firefox have been addressed and average of 19 and 21 CVEs, respectively. These vendors also have to respond to zero-days from time to time, such as this &lt;a href="https://www.zdnet.com/article/google-chrome-zero-day-was-used-together-with-a-windows-7-zero-day/" target="_blank" rel="noopener"&gt;Chrome issue&lt;/a&gt; back in March. Apple has been busy with regular bi-monthly releases for iTunes and iCloud, averaging 19 CVE fixes. These are just a few of the vendors Ivanti supports but provide a good example of the pace and volume of security updates that must be managed.&lt;/p&gt;

&lt;p&gt;Microsoft is aggressively improving the overall security and stability of their upgrade process. They began a six-month campaign in March of this year to switch the digital signature on all operating-system and product updates from using Secure Hash Algorithm 1 (SHA-1) to SHA-2. This required installing the current SHA-2 algorithms in all the operating systems so they could read and deploy the newly signed patches.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft took a phased approach using both dual-signed patches in conjunction with the SHA-2 operating system upgrades where needed. The campaign came to completion on September Patch Tuesday, with operating system releases for Windows Server 2012, Windows 8.1, and Windows Server 2012 R2 signed only with SHA-2. SHA-1 was an excellent algorithm when originally released but the latest advances in high-speed computing have put its security at risk, so Microsoft rightfully moved to the latest security standard in SHA-2.&lt;/p&gt;

&lt;p&gt;Microsoft released regular &lt;a href="https://msrc.microsoft.com/en-US/security-guidance/advisory/ADV990001" target="_blank" rel="noopener"&gt;Service Stack Updates&lt;/a&gt; (SSUs) to improve their update process. The SSUs essentially update the Windows Update components on the endpoint. These updates have been released for both Windows 10 and the legacy operating systems. Some are required in order to perform the next update, and ALL are strongly recommended by Microsoft. Major updates for almost all versions of Windows 10 were released in February and May. The “software as a service model” will continue to evolve as Microsoft provides regular adjustments to the process.&lt;/p&gt;

&lt;h3&gt;Remote Desktop Services Vulnerabilities – “BlueKeep”&lt;/h3&gt;

&lt;p&gt;The remote desktop services vulnerabilities, also known as “BlueKeep”, were first reported and addressed in the May Patch Tuesday release. The most publicized vulnerability was &lt;a href="https://msrc.microsoft.com/blog/2019/05/14/prevent-a-worm-by-updating-remote-desktop-services-cve-2019-0708/" target="_blank" rel="noopener"&gt;CVE-2010-0708&lt;/a&gt;, which is “wormable”. This means it could be exploited without authorization and without user interaction. An attack could propagate silently from computer to computer, supporting an Internet worm attack.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Found and fixed in Windows 7 and Server 2008 R2, updates were also released for out-of-support XP and Server 2003 also containing the vulnerability due to the high potential risk of exploitation. June Patch Tuesday continued to raise awareness around the BlueKeep vulnerability.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The first &lt;a href="https://news.sophos.com/en-us/2019/07/01/bluekeep-poc-demonstrates-risk-of-remote-desktop-exploit/" target="_blank" rel="noopener"&gt;demos&lt;/a&gt; of exploitation by Sophos and others appeared in July, and not long thereafter an active exploit was found in a crypto-mining package. The media hype and threat of another WannCry-type event spurred the industry to apply the latest updates—and few known attacks were reported. Interestingly, a second round of remote-desktop vulnerabilities surfaced in August, so we’ll be monitoring them closely.&lt;/p&gt;

&lt;h3&gt;Spectre and Meltdown Vulnerabilities&lt;/h3&gt;

&lt;p&gt;Our “friends” from 2018—the Spectre and Meltdown vulnerabilities—were also in the news this year. Just as a reminder, Spectre is named after “Speculative Execution”, which is a vulnerability in the firmware of the CPU that allows an attacker to run tasks in advance of others. Updates from Microsoft help to mitigate some of the issues, but microcode updates from Intel are required to fix the actual vulnerability.&lt;/p&gt;

&lt;p&gt;In the first part of 2019, we’ve seen updates for both Variant 2 in April and Variant 1 in August. In May, we saw the arrival of &lt;a href="https://msrc.microsoft.com/en-US/security-guidance/advisory/ADV190013" target="_blank" rel="noopener"&gt;Microarchitectural Data Sampling (MDS) vulnerabilities&lt;/a&gt;. While similar, these are considered more &lt;a href="https://www.bleepingcomputer.com/news/security/new-ridl-and-fallout-attacks-impact-all-modern-intel-cpus/" target="_blank" rel="noopener"&gt;dangerous&lt;/a&gt; than Spectre because the vulnerability allows information to be read directly from the CPU buffers. Unlike the BlueKeep vulnerabilities, those associated with Spectre and MDS are much more difficult to exploit, requiring highly specialized code to both access and process the data retrieved. While also getting some publicity, it’s not surprising there have been no known successful attacks exploiting these vulnerabilities.&lt;/p&gt;

&lt;p&gt;We saw end-of-support on October 8 for Windows 10 Enterprise and Education Versions of 1703. The Home, Professional, and Professional for Workstations will do the same for Version 1803 on November 12. Microsoft is now only four months away from the end-of-life for Windows 7 and Server 2008/2008 R2. If you aren’t actively in migration to a newer workstation or server operating system, you should be budgeting for extended support. Microsoft has both cloud and on-premise options to consider. And on a final Windows 10 note, we are looking forward to Version 1909 and the changes it will bring.&lt;/p&gt;

&lt;p&gt;In summary, I would characterize vulnerability remediation and patch operations so far in 2019 as extremely busy, but not frantic. Vulnerabilities are being addressed in a timely manner, the patches released and distributed, and IT administrators deploying them in the next patch cycle. The fact that a high-risk vulnerability like BlueKeep did not result in another WannaCry event supports this view.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;For now, I’m going to continue wearing my “rose-colored” glasses and congratulate everyone on a job well done! Let’s continue the good work for the remainder of 2019 but be vigilant as always.&lt;/p&gt;</description><pubDate>Mon, 07 Oct 2019 17:35:26 Z</pubDate></item><item><guid isPermaLink="false">450e7b93-74d6-4103-a27e-c8c70b933c56</guid><link>https://www.ivanti.com/blog/september-patch-tuesday-2019</link><atom:author><atom:name>Todd Schell</atom:name><atom:uri>https://www.ivanti.com/blog/authors/todd-schell</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><title>September Patch Tuesday 2019</title><description>&lt;p&gt;September marks the second month in a row with a relatively light set of updates, but that doesn’t mean the threat of attack has gone down. In fact, there have been an escalating number of recent ransomware attacks in the public sector. With the slowdown in patch activity and ransomware back in the news, it’s a good time to take a look at the rest of your IT operations program, especially your cyber-attack and disaster recovery plan. Before we dig into those topics, let’s review this month’s Patch Tuesday updates.&lt;/p&gt;

&lt;p&gt;Microsoft resolved a total of 79 unique CVEs this month. Among the vulnerabilities were three publicly disclosed CVEs. Public Disclosed is an indicator of risk that can be used to better prioritize remediation of vulnerabilities. In this case details of the three vulnerabilities have been made public giving threat actors a head start on engineering an exploit.&lt;/p&gt;

&lt;p&gt;Microsoft continues to adjust their software update process, releasing service stack updates for all operating systems this month. Usually these release for one or a couple of Windows editions, so for all Windows OSs to be impacted by this one is a bit out of the ordinary. A couple of things to note about servicing stack updates. They are rated as Critical but are not resolving security vulnerabilities. They are also not part of the cumulative update chain. Servicing stack updates are a separate update that needs to be installed outside of the normal cumulative or security-only bundle. This is a critical update to Microsoft’s update system within the OS. This means some changes are coming down the line and there will be a point where you cannot apply the Windows updates on the system if the servicing stack update is not applied. The shortest we have seen from availability to enforcement is two months. Our guidance is to begin testing as soon as possible and plan to have these in place before November to be on the safe side. Before October would be best case on the off-chance Microsoft enforces these changes sooner.&lt;/p&gt;

&lt;p&gt;For September Microsoft provided the usual set of operating system and application security updates. In the pre-Windows 10 operating systems we see as many at 37 CVEs addressed, and 57 CVEs for the latest Windows 10 updates. A critical update addressing seven CVEs was released for all versions of Sharepoint server, so pay close attention to that one. There are important updates for Office and Exchange server. In keeping with their usual bi-monthly release cadence, Microsoft also issued updates for .NET. &amp;nbsp;However, these updates were for 2012 and newer versions of operating systems.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In wrapping up this month we want to draw attention to some continuing ransomware trends.&lt;/p&gt;

&lt;p&gt;Hardly a month has gone by this year without a report of ransomware attacks against state and local government systems. Ivanti CISO, Phil Richards, wrote a &lt;a href="https://www.ivanti.com/blog/ransomware-in-the-public-sector" target="_blank"&gt;blog&lt;/a&gt; that provides an overview of many of these attacks, and shared his insight on some dangerous trends. According to Phil, “Criminals are demanding higher ransoms of these government entities. They are targeting victims specifically, striking with greater precision and timing, and demanding large sums as ransom.” Of particular interest was an &lt;a href="https://statescoop.com/louisiana-declares-emergency-over-cyberattacks-targeting-schools/" target="_blank" rel="noopener"&gt;attack&lt;/a&gt; against several public school systems in the State of Louisiana. For the first time, a cyber-attack is being treated more like a natural disaster with cybersecurity experts pulled in from multiple state agencies plus Louisiana State University.&lt;/p&gt;

&lt;p&gt;What is the state of your disaster preparedness plan (no pun intended)? Every month I talk about the importance of patching and remediating vulnerabilities, but the harsh reality is that sometimes these actions are not enough or not in time. Are you ready to respond to a cyber-attack? Do you have detection, isolation, and containment resources identified? Once you have the attack under control do you have the recovery process identified, including system restore/reimage and secure data backups to bring everything back online? And finally, make sure you include steps to handle legal and public relations issues. It is very important that everyone involved knows how information is to be shared both inside and outside your organization.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/resources/library?eol=rl" target="_blank"&gt;&lt;img alt="Free Whitepaper: What to do BEFORE all hell breaks loose" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/07/hell.breaks.loose.1.png"&gt;&lt;/a&gt;&lt;/p&gt;
</description><pubDate>Wed, 11 Sep 2019 01:30:57 Z</pubDate></item><item><guid isPermaLink="false">0034d298-5288-4528-9cdb-830dfa45dab1</guid><link>https://www.ivanti.com/blog/august-patch-tuesday-2019</link><atom:author><atom:name>Todd Schell</atom:name><atom:uri>https://www.ivanti.com/blog/authors/todd-schell</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><title>August Patch Tuesday 2019</title><description>&lt;p&gt;August Patch Tuesday was a pleasant relief after the massive release of updates in July. But don’t sit in your lawn chair and open that cold beverage just yet; you still have some things to do before you rest comfortably.&lt;/p&gt;

&lt;p&gt;Microsoft provided a light set of operating system and application security updates. On the operating system side, we see 35 CVEs addressed for Server 2008 up through 78 CVEs for the latest Windows 10 updates. There are the updates for Office and SharePoint, but that’s about it. Microsoft has noAdobe Flash Player update this month either!&lt;/p&gt;

&lt;p&gt;Microsoft resolved a total of 93 unique CVEs this month, but surprisingly there are NO zero days OR publicly disclosed vulnerabilities! It has been a long time since I remember that happening. Glancing through the list, I do see a lot of RDP vulnerabilities this month so make sure you apply these updates soon. Microsoft calls out two CVEs in particular CVE-2019-1181 and -1182 in their &lt;a href="https://msrc.microsoft.com/blog/2019/08/13/patch-new-wormable-vulnerabilities-in-remote-desktop-services-cve-2019-1181-1182/" target="_blank" rel="noopener"&gt;Response Center&lt;/a&gt; this month which could be exploited via a worm attack.&amp;nbsp; All of the operating system updates are rated priority 1 due to critical vulnerability ratings and the possibility of remote code execution.&lt;/p&gt;

&lt;p&gt;One vulnerability of interest is (&lt;a href="https://msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-9506" target="_blank" rel="noopener"&gt;CVE-2019-9506&lt;/a&gt;) titled Encryption Key Negotiation of Bluetooth Vulnerability. CERT/CC has issued CVE-2019-9506 and VU#918987 for this tampering vulnerability, which has a CVSS score of 9.3. It requires specialized hardware to exploit but can allow wireless access and disruption within Bluetooth range of the device being attacked. Microsoft provided an update to address the issue, but the new functionality is disabled by default. You must enable the functionality by setting a flag in the registry. Check out the KB for more details.&lt;/p&gt;

&lt;p&gt;Microsoft may have had a slow day, but Adobe released 8 &lt;a href="https://helpx.adobe.com/security.html" target="_blank" rel="noopener"&gt;updates&lt;/a&gt;. If you are a Creative Cloud or Experience Manager user be sure to review the bulletins because several are rated Critical. Adobe also released updates for Acrobat and the more common Acrobat Reader with details under &lt;a href="https://helpx.adobe.com/security/products/acrobat/apsb19-41.html" target="_blank" rel="noopener"&gt;APSB19-41&lt;/a&gt;.&amp;nbsp;This update for both Windows and macOS fixes 76 vulnerabilities which are all rated as Important.&amp;nbsp; There are updates for the Continuous, Classic 2015, and Classic 2017 versions of the products. There was also a non-security update for Flash, but it was not included with the release from Microsoft.&lt;/p&gt;

&lt;p&gt;With a light patch load this month, it may be a good time to revisit the asset inventory of systems you are patching. We often set up our patch groups of systems and go through the motions each month of applying the latest patches, but we may be missing the bigger picture. IT organizations are often dispersed and the systems they support are constantly changing.&amp;nbsp; Without ongoing communication across the organization or dynamic settings in your patch products, you may be missing many machines that need updates. The good news is the patch tools we use each month have extensive discovery features and can help identify the latest systems on the network.&amp;nbsp; Likewise, there are a whole host of network and system tools you can use. Don’t forget to coordinate with your security operations team. The vulnerability scanners they use have built-in discovery as well.&lt;/p&gt;

&lt;p&gt;Armed with a consolidated list of systems on your network from all these sources, you can confirm your patch groups are up-to-date and investigate any suspicious devices you may have discovered. Finally, with an updated asset inventory and your patches all applied, you can now relax, enjoy the sun, and open that cold beverage!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/resources/library?eol=rl" target="_blank"&gt;&lt;img alt="Free Whitepaper: What to do BEFORE all hell breaks loose" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/07/hell.breaks.loose.1.png"&gt;&lt;/a&gt;&lt;/p&gt;</description><pubDate>Tue, 13 Aug 2019 22:19:45 Z</pubDate></item><item><guid isPermaLink="false">bae8a93c-3939-4bd4-bfba-9a651614c5ad</guid><link>https://www.ivanti.com/blog/device-control-an-often-overlooked-technology</link><atom:author><atom:name>Todd Schell</atom:name><atom:uri>https://www.ivanti.com/blog/authors/todd-schell</atom:uri></atom:author><category>Security</category><title>Device Control – An Often-Overlooked Technology</title><description>&lt;p&gt;When it comes to IT security, Ivanti strongly supports the defense-in-depth strategy by providing products that underpin the Center for Internet Security (CIS) basic controls. The first and second CIS basic controls are 1) Inventory and Control of Hardware Assets, and 2) Inventory and Control of Software Assets. Device control provides direct enforcement of these controls yet is often overshadowed by patch and application control technologies.&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/library?eol=rl" target="_blank"&gt;&lt;img alt="Free Whitepaper: What to do BEFORE all hell breaks loose" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/10/hell.breaks.loose.400267.jpg"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;A Quick Look at This Often-Overlooked Technology&lt;/h2&gt;

&lt;p&gt;Basic device control typically provides management of physical components that can be connected to a workstation, server, or mobile system such as a laptop. An agent is usually installed on the system that can then detect and inventory the currently installed hardware and monitor when other devices are attached.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Of prime concern are USB drives on which sensitive data can be copied and removed from a facility, often without a trace. Device control can be configured to block the attachment of these devices completely or can allow control over these devices by tracking at the vendor, model, or even serial number level. For example, you could allow SanDisk Model xy12 USB devices in your organization but disable use of all others. This would prevent the user from inserting an unknown USB device that may come with pre-installed malware.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;We’ve seen cases where companies are blocking many types of devices that come with added risks—smart keyboards with data storage capability, Bluetooth transmitters, additional network cards, and so forth. The flexibility of device control to meet your needs in this capacity is almost endless for this mature technology.&lt;/p&gt;

&lt;h2&gt;Beyond Physical Device Management&lt;/h2&gt;

&lt;p&gt;There are additional aspects of device control to consider as the term ‘device control’ is often simply construed as management of physical devices only. Ivanti device control includes not only physical control, but encryption of data and monitoring/control of data from a perspective of data loss prevention (DLP).&lt;/p&gt;

&lt;p&gt;The base operating system can be enabled to provide encryption of system disks, which provides laptops with an added level of security in case of theft. However, this encryption does not often extend to removable drives. Device control can provide this added protection, encrypting removable drives so they can be used on other machines with password authentication, or even locking them down further where they can only be used on machines with the device control agent.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Device control can also monitor the volume of data traffic to devices as well as the type of data. In the former case, limits can be set on the amount of data a machine or person can copy to removable media. Likewise, the device control agent can monitor and log the names and types of the files being used. File shadowing is an extension of this option, where copies of the entire file are sent to secondary storage for review. Key word searches can also be performed by device control agents looking within the files themselves as they are copied and then taking appropriate action based on the pre-established policy. As you can see, Ivanti device control is much more than just blocking USB devices.&lt;/p&gt;

&lt;h2&gt;Device Control Implementation&lt;/h2&gt;

&lt;p&gt;Device control implementation is a straightforward, logical process. The device control agents are installed across the desired set of endpoints and are first set to capture device usage. This information is collected as log activity and sent back to a central console for analysis. The administrator reviews the devices that are in use and constructs a policy based on company needs.&lt;/p&gt;

&lt;p&gt;As covered throughout this blog, this policy can address the physical, encryption, and DLP aspects of security, and can be as simple or as complex as needed. Once the policy is established, it can be pushed out to the endpoints and they are placed in audit mode. Best practices dictate a subset of systems should be chosen as the sample test group. Audit mode will show how the policy performs identifying what is blocked and what is allowed. This is very similar in concept to how application control is typically rolled out. At this point, the policy can be updated or ‘fine-tuned’ and placed into enforcement mode. After a period of time and with sufficient positive feedback, the policy can be deployed to a larger group of systems. Again, you can implement at your own pace and ensure your security objectives are being met.&lt;/p&gt;

&lt;p&gt;Device control provides a detailed hardware inventory, a strong degree of control over the use of these devices, and also control over the copying and storage of data on these devices. While not directly controlling your software assets, it does provide insight into what software assets are in use. Device control is not difficult to implement and can provide protection in an area frequently overlooked area when all the attention is on network-based attacks.&lt;/p&gt;

&lt;p&gt;Consider device control as you build out your security program; it provides a valuable technology and added layer in the defense in depth strategy. Take a few minutes to learn more about &lt;a href="https://www.ivanti.com/products/device-control" target="_blank"&gt;proven device control technology&lt;/a&gt; from Ivanti.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Product manager for Ivanti’s patch-related products, including Patch for Windows, Patch for SCCM, and our OEM patch engines, Todd Schell has also worked in computer security as an officer in the United States Air Force.&lt;a href="https://www.ivanti.com/resources/library" target="_blank"&gt;&lt;img alt="How Ivanti Endpoint Security Customers Can Achieve a 176% ROI Over 3 Years - DOWNLOAD THE STUDY " src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/10/copy-of-cybersec-month_ppc-bnr-728x90-1.png"&gt;&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;
</description><pubDate>Tue, 23 Oct 2018 23:00:12 Z</pubDate></item><item><guid isPermaLink="false">a783d982-f46a-42e8-8526-ec8c282c3dde</guid><link>https://www.ivanti.com/blog/october-patch-tuesday-2018</link><atom:author><atom:name>Todd Schell</atom:name><atom:uri>https://www.ivanti.com/blog/authors/todd-schell</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><title>October Patch Tuesday 2018</title><description>&lt;p&gt;Microsoft has given us a ‘Fall Break’ this October with a very light set of updates. We have one zero-day vulnerability and one publicly disclosed vulnerability and NO security updates for Adobe Flash this month... a break indeed!&lt;/p&gt;

&lt;p&gt;The zero-day vulnerability is &lt;a href="https://msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8453" rel="noopener" target="_blank"&gt;CVE-2018-8453&lt;/a&gt;. This vulnerability exists in the Win32 component of the operating system and fails to properly handle objects in memory.&amp;nbsp;An attacker first needs to log into the operating system, but then can exploit this vulnerability to run code in the kernel and gain administrator privileges.&amp;nbsp;This vulnerability has a Base CVSS score of 7 and is present in all operating systems with updates this month from Server 2008 through Windows 10.&lt;/p&gt;

&lt;p&gt;The publicly disclosed vulnerability is &lt;a href="https://msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8423" rel="noopener" target="_blank"&gt;CVE-2018-8423&lt;/a&gt; Microsoft JET Database Engine Remote Code Execution Vulnerability.&amp;nbsp;An attacker who successfully exploited this vulnerability could take control of an affected system; however, this vulnerability does not allow for elevation of privilege directly.&amp;nbsp;A local user exploiting this vulnerability will have limited rights compared to an administrator.&amp;nbsp; This vulnerability requires a specially crafted file to take advantage of the JET database engine.&amp;nbsp;It also is addressed in all operating systems.&amp;nbsp;The Base CVSS score for this vulnerability is 7.8.&lt;/p&gt;

&lt;p&gt;There was a total of 49 CVEs addressed across the portfolio.&amp;nbsp;As expected, the majority, 33 were fixed in Windows 10, Edge, and the associated Server versions. Also, please note that there was an update for Server 2019 which was made generally available last week.&amp;nbsp;Microsoft continued the trend from last month where they introduced both a monthly rollup and a security-only release for Server 2008.&amp;nbsp;Prior to that there was only a single security update.&amp;nbsp;Updates were released for all supported versions of Exchange Server and Sharepoint Server this month as well.&lt;/p&gt;

&lt;h2&gt;Updates for Office&lt;/h2&gt;

&lt;p&gt;Office received updates for Excel, Outlook, Powerpoint, and Word and of course the Office Suite bundle. Office for Mac version 16.17 from last patch Tuesday, and all future 16.17+ releases are now officially “Office 2019”. “Office 2016” will continue to receive updates “as needed” until October 2020, and thankfully they now have a &lt;a href="https://support.microsoft.com/en-us/office/end-of-support-for-office-2016-for-mac-e944a907-bbc8-4be5-918d-a514068d0056" rel="noopener" target="_blank"&gt;separate release notes&lt;/a&gt; page for this. Office 2016 will continue to support macOS all the way back to Yosemite (10.10), while Office 2019 requires Sierra (10.12) or later. Office 365 will work fine with either the Office 2016 or Office 2019 patches, though Office 365 is technically now on the Office 2019 branch.&lt;/p&gt;

&lt;h2&gt;Wait on Windows 10 Update&lt;/h2&gt;

&lt;p&gt;If you are looking for Windows 10, version 1809, also known as the Windows 10 October 2018 Update, you can’t download it right now.&amp;nbsp;Microsoft has paused the rollout while they fix some significant issues.&amp;nbsp;The biggest problem reported by many users, our content team included, is the update deletes all your files in the C:/Users/[username]/Documents/ folder.&amp;nbsp; To add further concern, rolling back to the previous version does not restore the files.&amp;nbsp;There were other problems reported including a compatibility problem with Intel Display Audio device drivers and Task manager not displaying proper CPU usage information.&amp;nbsp;Like me, you are probably asking how can this happen? We’re not alone, with&amp;nbsp;several &lt;a href="https://www.theverge.com/2018/10/8/17951298/microsoft-windows-10-bugs-issues-report" rel="noopener" target="_blank"&gt;articles&lt;/a&gt; questioning the Microsoft quality control process and the Insider program which is supposed to expose all these bugs prior to release.&lt;/p&gt;

&lt;h2&gt;But Wait, There's More&lt;/h2&gt;

&lt;p&gt;I mentioned in my introduction we did not have a Flash update from Microsoft, but Adobe did release a non-security update under &lt;a href="https://helpx.adobe.com/security/products/flash-player/apsb18-35.html" rel="noopener" target="_blank"&gt;APSB18-35&lt;/a&gt;.&amp;nbsp;Apple released a security update for iCloud for Windows 7.7 that addresses 19 vulnerabilities, so definitely look into that if you use Apple products.&lt;/p&gt;

&lt;p&gt;In closing, don’t forget Oracle has their Critical Patch Update (CPU) on October 16 so in addition to their application updates you can get the latest Java patches.&amp;nbsp;Enjoy your fall break!&lt;/p&gt;

&lt;p&gt;Stay informed by visiting&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/patch-tuesday" target="_blank"&gt;Ivanti’s Patch Tuesday landing page&lt;/a&gt;&amp;nbsp;for updated analysis and sign up for our&amp;nbsp;monthly &lt;a href="https://www.ivanti.com/webinars" target="_blank"&gt;Patch Tuesday webinar&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Ivanti is the home of award-winning Patch Tuesday coverage. Check it out: &lt;a href="https://www.ivanti.com/company/press-releases/2021/ivanti-wins-two-globee-awards-for-helping-customers-achieve-faster-vulnerability-remediation" target="_blank"&gt;Ivanti wins GOLD from PR World Awards for its Patch Tuesday Campaign!&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/resources/library?eol=rl" target="_blank"&gt;&lt;img alt="National Cybersecurity Month: How to be Prepared" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/10/security-blog-banner-560x315.png"&gt;&lt;/a&gt;&lt;/p&gt;
</description><pubDate>Tue, 09 Oct 2018 23:08:54 Z</pubDate></item><item><guid isPermaLink="false">d4a64400-bb8e-4674-9ddf-92c6948e2b3c</guid><link>https://www.ivanti.com/blog/want-to-increase-your-security-start-thinking-like-a-hacker</link><atom:author><atom:name>Todd Schell</atom:name><atom:uri>https://www.ivanti.com/blog/authors/todd-schell</atom:uri></atom:author><category>Security</category><title>Want to Increase Your Security? Start Thinking Like a Hacker</title><description>&lt;p&gt;Do you ever feel overwhelmed when it comes to updating your software? Not sure where to start and what to do first? Or maybe you’re not sure if the &lt;a href="https://www.ivanti.com/blog/9-types-of-phishing-and-ransomware-attacks-and-how-to-identify-them" target="_blank"&gt;malware protection&lt;/a&gt; and other tools and processes you’ve used in the past are still providing the proper security? If so, it may be time to look at your enterprise from the outside and think like a hacker!&lt;/p&gt;

&lt;h2&gt;What’s of Most Value to an Outsider?&lt;/h2&gt;

&lt;p&gt;Securing your systems is all about using common sense and applying some simple risk-management principles. So let’s start by talking about value and targets.&lt;/p&gt;

&lt;p&gt;You should ask yourself, what is the most valuable business information an outsider would want from my systems? What other valuable information do I have on my systems an attacker would want? It may be easy to identify the key business systems because those are critical to your day-to-day operations—and you should be monitoring them closely already. We automatically assume the hackers will be associated with organized crime, a competitor, or a state entity, so we have prioritized protection around these critical operational systems.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;But what about other systems we often overlook? For example, your human resources (HR) systems contain critical personal data of all your employees. A random hacker gaining access to your intranet may not be able to penetrate your critical systems, but they still may be able to gather social security, date of birth, and other information from a less protected HR system. Keep this in mind as you identify and prioritize data assets in your organization.&lt;/p&gt;

&lt;h2&gt;How Would a Hacker Try to Gain Access?&lt;/h2&gt;

&lt;p&gt;Once our potential targets with their valuable data have been prioritized, we need to look at how a hacker would attempt to gain access. Looking at the Verizon 2018 Data Breach Investigations Report (DBIR), we see that our employees continue to be the weakest security links. “Phishing and pretexting represent 98% of social incidents and 93% of breaches. Email continues to be the most common vector (96%).”&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The good news, according to the DBIR, is that more people are aware of the danger of opening attachments or clicking on suspicious website links, and a larger number than ever don’t fall prey to this attack. The bad news of course is that it only takes one employee to click and open the door.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;So, thinking like a hacker, you would want to create a very realistic website or email attachment that may be appealing for your employees to open. To counter this, in addition to continuing your employee security awareness training, you’ll want to make sure these avenues of attack are restricted. Keep the web browsers and internet-facing components such as Flash updated to their latest version, ensuring the reported vulnerabilities are closed. And to cover that email threat, make sure you have a good spam-blocking and malware-detection capability in place.&lt;/p&gt;

&lt;p&gt;But we know that hackers will get some malware onto your intranet. It could enter through that curious employee, or maybe via a direct network attack that found a hole in your firewall.&lt;/p&gt;

&lt;p&gt;Now what do you do?&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Again, turning to the Verizon 2018 DBIR, the most common file types of ‘first-stage’ malware, i.e., used to initially compromise a system, are: JavaScript (.js), 37.2%; Visual Basic Script (.vbs), 20.8%; MS Office, 14.8%; and PDF, 3.3%. Second-stage malware is typically a full executable of some type, but can be anything based on capabilities of the initial malware. It may be less clear what to do at this point.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Thinking like a hacker, my malware may attempt to grab a password file, open the firewall, search for keywords in files, encrypt files for ransom, delete log files, and so forth. As the administrator charged with combating all these vectors of attack, you’ll need to take a ‘multi-pronged’ approach as well.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;First, as you did with the browsers, make sure your applications and software add-ons, like Java, are up-to-date. Some of this malware is successful because it exploits a known vulnerability. Second, enforce least privilege in your organization. Most malware break-ins assume the privilege level of the user who let them in the door. The malware will be limited in what it can do if it’s not running with administrator privileges.&amp;nbsp; And finally, consider running security software that can detect and prevent unknown or unauthorized applications from running. This is often a big step up for most companies, but the addition of application control will stop many malware attacks before they ever get started.&lt;/p&gt;

&lt;h2&gt;Leverage the Hacker’s Perspective&lt;/h2&gt;

&lt;p&gt;Thinking like a hacker, you can gain a different perspective on your current security implementation and practices. You’ll probably see much more than the few basic ideas I’ve presented here. It may validate your security program or may propel you in a different direction. Don’t be afraid to challenge the status quo with your new perspective and combat the ‘that’s the way we’ve always done it’ mentality. Oh, and by the way, don’t forget that defense in depth still has its place, which I think we demonstrated in this discussion.&lt;/p&gt;

&lt;p&gt;Carve out some time to consider what Ivanti’s &lt;a href="https://www.ivanti.com/network-security" target="_blank"&gt;Endpoint Security&lt;/a&gt; solutions could offer your organization. You can also &lt;a href="https://www.ivanti.com/lp/security/demos/endpoint-security-solutions"&gt;request a free demo&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Product manager for Ivanti’s patch-related products, including Patch for Windows, Patch for SCCM, and our OEM patch engines, Todd Schell has also worked in computer security as an officer in the United States Air Force.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;a href="https://www.ivanti.com/resources/library?eol=rl" target="_blank"&gt;&lt;img alt="National Cybersecurity Month: How to be Prepared" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/10/sm-copy-of-cybersec-month_ppc-bnr-1200x628.jpg"&gt;&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;
</description><pubDate>Mon, 01 Oct 2018 20:08:29 Z</pubDate></item><item><guid isPermaLink="false">ecd0a026-e99d-4bc8-8522-c28dfe122afe</guid><link>https://www.ivanti.com/blog/shore-up-your-security-visit-ivanti-at-microsoft-ignite</link><atom:author><atom:name>Todd Schell</atom:name><atom:uri>https://www.ivanti.com/blog/authors/todd-schell</atom:uri></atom:author><category>Security</category><title>Shore Up Your Security: Visit Ivanti at Microsoft Ignite</title><description>&lt;p&gt;Do you ever have those days when you just dread going in to work?&amp;nbsp;You know it’s coming and you avoid it like the plague.&amp;nbsp;It happens at the same time each quarter and is just a struggle to deal with – tedious, time-consuming . . . &lt;em&gt;sigh.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Yes, of course I’m talking about dealing with the latest vulnerability scan report from your security auditors!&lt;/p&gt;

&lt;h2&gt;Ivanti at Microsoft Ignite&lt;/h2&gt;

&lt;p&gt;But wait, are you coming to the &lt;a href="https://www.ivanti.com/blog/ivanti-at-microsoft-ignite-2018" target="_blank"&gt;Microsoft Ignite conference&lt;/a&gt; in Orlando this year?&amp;nbsp;Are you using it as an excuse to push off the inevitable?&amp;nbsp;What if I told you we a have an easy solution for handling that vulnerability scan issue and you will be excited to get back to work after the conference?&amp;nbsp;If so you need to stop by Ivanti booth #1600 at the show!&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Ivanti at Ignite: Sept. 24–28 in Orlando, Florida: Booth #1600&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h4&gt;&lt;a href="https://www.ivanti.com/" target="_blank"&gt;Schedule a demo now&lt;/a&gt;&lt;/h4&gt;
&lt;/blockquote&gt;

&lt;p&gt;The October release of &lt;a href="https://www.ivanti.com/products/patch-for-configuration-manager" target="_blank"&gt;Ivanti Patch for SCCM&lt;/a&gt; includes a new feature for managing the Common Vulnerability and Exposures (CVEs) found by a vulnerability scanner.&amp;nbsp;This feature allows you import the most common vulnerability scan results, display the patches that address the CVEs, filter and identify the one you want to manage, and then publish them to your update point.&amp;nbsp;From there, Configuration Manager will take over and deploy the third-party patches to your endpoints according to your Automatic Deployment Rules.&amp;nbsp;Easy peasy!&lt;/p&gt;

&lt;p&gt;So don’t dread dealing with vulnerability scans! Come by our booth at Ignite. The first 40 people to pre-register for a demo will receive a $20 Amazon gift card!&amp;nbsp;You can also register at the show for a free set of airline tickets to a location of your choice in the United States.&amp;nbsp;You can’t miss us!&amp;nbsp;We will all be wearing the red and yellow aloha shirts.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/" target="_blank"&gt;&lt;img alt="Beaches. Better than Breaches. Enjoy stress-free life w stronger security graphic" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/08/ignite.blog.png"&gt;&lt;/a&gt;&lt;/p&gt;</description><pubDate>Tue, 11 Sep 2018 17:23:25 Z</pubDate></item><item><guid isPermaLink="false">941b06b3-ec38-4194-8edd-7f8ba261d44b</guid><link>https://www.ivanti.com/blog/august-patch-tuesday-2018</link><atom:author><atom:name>Todd Schell</atom:name><atom:uri>https://www.ivanti.com/blog/authors/todd-schell</atom:uri></atom:author><category>Patch Tuesday</category><title>August Patch Tuesday 2018</title><description>&lt;p&gt;The updates continued to flow today despite this being the time for summer vacations.&amp;nbsp; Microsoft has released 17 updates today resolving 60 distinct vulnerabilities, and Adobe released security updates for several of their products.&amp;nbsp; After two Patch Tuesdays with no zero-day vulnerabilities reported, we get two this month.&amp;nbsp; Spectre and Meltdown continue to haunt us as well.&amp;nbsp; So let’s dig into these recent releases.&lt;/p&gt;

&lt;p&gt;The two zero-day vulnerabilities are CVE-2018-8373 and CVE-2018-8414.&amp;nbsp; Both are publicly disclosed and exploited.&amp;nbsp; CVE-2018-8373 is a vulnerability that exists in the way that the scripting engine handles objects in memory in Internet Explorer.&amp;nbsp; Exploitation could result in remote code execution and grants the same privileges as the logged-in user including administrative rights.&amp;nbsp; Because this vulnerability exists in IE 9, 10, and 11, it affects all Windows operating systems from Server 2008 to Windows 10.&amp;nbsp; The second zero-day vulnerability, CVE-2018-8414, is a code execution vulnerability that exists when the Windows Shell does not properly validate file paths. &amp;nbsp;Exploitation can also result in remote code execution with the privileges of the logged-in user.&amp;nbsp; This vulnerability is not as widespread, existing on only Windows 10 1703 and newer, Server 1709 and Server 1803.&amp;nbsp; Now that the fixes are available, and given there are known exploits, you should give these fixes top priority this month.&lt;/p&gt;

&lt;p&gt;Microsoft also issued &lt;a href="https://msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018" target="_blank" rel="noopener"&gt;Advisory 180018&lt;/a&gt; regarding a new Meltdown and Spectre variant. &amp;nbsp;This advisory, Microsoft Guidance to mitigate L1TF variant, addresses three vulnerabilities – CVE-2018-3615, CVE-2018-3620, and CVE-2018-3646. &amp;nbsp;According to Microsoft, “Speculative execution side-channel vulnerabilities such as L1 Terminal Fault (L1TF) can be used to read the content of memory across a trusted boundary and if exploited, can lead to information disclosure.” &amp;nbsp;Correcting these vulnerabilities requires both a software and firmware (microcode) update.&amp;nbsp; As a temporary mitigation, Microsoft does recommend disabling Hyper-threading which can have a major performance impact.&amp;nbsp; Like the previous guidance around these vulnerability variants, management and remediation is time-consuming and tedious.&amp;nbsp; Read the Advisory carefully before you take action and test your non-production systems before proceeding.&amp;nbsp; Incidentally, this variant is also known by the code name Foreshadow.&amp;nbsp; If you are looking for more information, check out this Usenix &lt;a href="https://foreshadowattack.eu/" target="_blank" rel="noopener"&gt;page&lt;/a&gt; for a detailed explanation.&lt;/p&gt;

&lt;p&gt;Microsoft released updates for many of their products this month.&amp;nbsp; Of special note, there are new updates for .NET which interestingly only fix one vulnerability.&amp;nbsp; The release of .NET caused a number of stability problems last month, so suspect a number of fixes besides the base security vulnerability are included.&amp;nbsp; Test carefully before applying on production machines. Microsoft continues the variety with a critical vulnerability in SQL 2016 and 2017. Exchange was also patched with updates to Exchange 2010, 2013, and 2016 covering 2 CVEs. Visual Studio 2015 and 2017 round out the group with a single CVE.&lt;/p&gt;

&lt;p&gt;In our July blog, we mentioned that Oracle was releasing their quarterly Critical Patch Update (CPU) on July 17&lt;sup&gt;th&lt;/sup&gt;.&amp;nbsp; Make sure you take a look at their &lt;a href="https://www.oracle.com/security-alerts/cpujul2018.html" target="_blank" rel="noopener"&gt;Advisory&lt;/a&gt; providing the latest updates including those for Java.&amp;nbsp; Oracle also provided a rare out-of-band &lt;a href="https://www.oracle.com/security-alerts/alert-cve-2018-3110.html" target="_blank" rel="noopener"&gt;Advisory&lt;/a&gt; on August 10&lt;sup&gt;th&lt;/sup&gt; to address CVE-2018-3110. &amp;nbsp;With a CVSS v3 base score of 9.9, this vulnerability is easy to exploit and can provide direct shell access to your database.&amp;nbsp; If you are using Oracle database versions 11.2.0.4 or 12.2.0.1 on Windows, we strongly recommend you apply this latest patch soon.&amp;nbsp; Note that updates for any version on Linux and Windows 12.1.0.2 were provided in the July CPU.&amp;nbsp; This new advisory is for previous versions of the database.&lt;/p&gt;

&lt;p&gt;After the large volume of non-Microsoft security releases in late July and earlier this month, we should have expected more Adobe updates. &amp;nbsp;Flash Player, as usual, was updated to fix five vulnerabilities. &amp;nbsp;However, after 104 vulnerabilities were addressed in a scheduled update last month, we didn’t expect another Reader and Acrobat update fixing two new critical vulnerabilities.&amp;nbsp; There were updates for Creative Cloud and other Adobe products, so please revisit your Adobe patch routine this month.&lt;/p&gt;

&lt;p&gt;This busy patch cycle continues.&amp;nbsp; Take a close look at all the third party and Microsoft security updates that were recently released and plan accordingly.&amp;nbsp; There is lots of work ahead.&lt;/p&gt;
</description><pubDate>Tue, 14 Aug 2018 22:57:15 Z</pubDate></item><item><guid isPermaLink="false">19b74615-16f4-4470-9c51-e0d9a97d2d16</guid><link>https://www.ivanti.com/blog/patching-week-in-review-week-25</link><atom:author><atom:name>Todd Schell</atom:name><atom:uri>https://www.ivanti.com/blog/authors/todd-schell</atom:uri></atom:author><category>Security</category><category>Patch Tuesday</category><title>Patching in Review – Week 25</title><description>&lt;p&gt;Happy summer solstice, everyone! Thursday, June 21, marked the longest day of the year, and while the remaining days of the year will slowly lead us into an arctic wasteland in Minnesota, the patches keep flowing.&amp;nbsp;We always have a slide ‘Between the &lt;a href="https://www.ivanti.com/blog/june-patch-tuesday-2018" target="_blank"&gt;Patch Tuesdays&lt;/a&gt;’ on our &lt;a href="https://www.ivanti.com/webinars/2018/june-patch-tuesday" target="_blank"&gt;Patch Tuesday webinar&lt;/a&gt;, so we’ve decide to expand our blog and get the information to you as it occurs.&amp;nbsp;Stay tuned for regular updates.&lt;/p&gt;

&lt;h2&gt;Security Releases&lt;/h2&gt;

&lt;p&gt;Microsoft released its quarterly cumulative updates for Exchange 2010, 2013, and 2016 on Wednesday, June 19, which cover 3 CVEs (CVE-2018-2768, CVE-2018-2806, CVE-2018-2801). Microsoft Exchange is using a custom implementation of Oracle Outside in its libraries and could allow disruption of service through user interaction. See &lt;a href="https://msrc.microsoft.com/en-US/security-guidance/advisory/ADV180010" target="_blank" rel="noopener"&gt;Microsoft’s advisory&lt;/a&gt; for further details.&lt;/p&gt;

&lt;p&gt;These quarterly updates also have some new prerequisites of .Net 4.7.1 and VC++ 2013 runtime library, so be sure to apply those prerequisites before you patch your Exchange servers! See the &lt;a href="https://techcommunity.microsoft.com/t5/exchange-team-blog/bg-p/Exchange" target="_blank" rel="noopener"&gt;Microsoft Exchange team’s blog post&lt;/a&gt; for further details.&lt;/p&gt;

&lt;h2&gt;OS Non-Securities&lt;/h2&gt;

&lt;p&gt;Last week&amp;nbsp;Microsoft released their quality preview rollups for the month. Interestingly, all supported operating systems were updated except Windows 10 1803, so we might expect that to release before next Patch Tuesday.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Windows 10 1607/Server 2016 still has the May servicing stack (KB4132216) as a prerequisite, so be sure to apply that first&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These patches contain a preview of the numerous bug fixes that will be included in the Patch Tuesday security monthly rollup. This provides a great opportunity to roll out the update to a test group before the next patching cycle.&lt;/p&gt;

&lt;h2&gt;Third-Party Updates&lt;/h2&gt;

&lt;p&gt;As always, a series of third parties updated this week. Even though these updates do not have any CVEs, they may still have undisclosed security fixes as well as helpful stability fixes for your organization. Here are the updates we released in our content two weeks ago:&lt;/p&gt;

&lt;table border="1" cellpadding="0" cellspacing="0"&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Software Title&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Ivanti ID&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Ivanti KB&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Beyond Compare 4.2.5.23088&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;BEYOND-004&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QBC42523088&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Citrix Receiver 4.9.3000, LTSR Cumulative Update 3&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CTXR-014&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QCTXR493000&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Dropbox 52.4.58&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;DROPBOX-085&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QDROPBOX52458&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;FileZilla Client 3.34.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;FILEZ-073&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QFILEZ3340&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GoodSync 10.9.2&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GOODSYNC-088&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QGS1092&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GoToMeeting 8.29.1&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GOTOM-045&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QGTM829&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;HipChat 4.30.6.7676&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;HCHAT-023&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QHCHAT43061676&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;LibreOffice 6.0.5&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;LIBRE-098&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QLIBRE605&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;LogMeIn 4.1.11340&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;LMI-010&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QLMI4111340&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Visual Studio 2017 version 15.7.4&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;MSNS18-0618-VS2017&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QVS20171574&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Opera 53.0.2907.106&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;OPERA-170&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QOP5302907106&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;RealVNC Connect 6.3.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;RVNC-024&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QRVNC630&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Skype 8.24.0.2&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;SKYPE-137&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QSKY82402&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Snagit 2018.2.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;SNAG-016&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QSNAG1820&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Cumulative Update 12 for SQL Server 2014 SP2&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;SQL2014SP2-CU12&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Q4130489&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Cumulative Update 8 for SQL Server 2017&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;SQL2017RTM-CU08&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Q4338363&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TortoiseHG 4.6.1&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TOHG-016&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTOHG461&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;WinSCP 5.13.3&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;WINSCP-019&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QWINSCP5133&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;h2&gt;&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;More Patch&amp;nbsp;Resources:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/topics/patch-tuesday" target="_blank"&gt;Patch Tuesday Blogs&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/resources/patch-tuesday" target="_blank"&gt;Patch Tuesday Resource Page&lt;/a&gt;: Infographics, presentations, webinars, etc.&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/network-security" target="_blank"&gt;Ivanti Security Products&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Mon, 25 Jun 2018 20:49:52 Z</pubDate></item><item><guid isPermaLink="false">745e01e8-2b6f-4ac1-91c9-1d311c0c2a8a</guid><link>https://www.ivanti.com/blog/october-patch-tuesday-2017</link><atom:author><atom:name>Todd Schell</atom:name><atom:uri>https://www.ivanti.com/blog/authors/todd-schell</atom:uri></atom:author><category>Patch Tuesday</category><title>October Patch Tuesday 2017</title><description>&lt;p class="p1"&gt;&lt;span class="s1"&gt;Halloween might be just around the corner, but this &lt;a href="https://www.ivanti.com/resources/patch-tuesday" target="_blank" rel="noopener"&gt;Patch Tuesday&lt;/a&gt; wasn’t scary and we didn’t see Microsoft play any tricks.&lt;span class="Apple-converted-space"&gt;&amp;nbsp;In fact, w&lt;/span&gt;e were given a special treat!&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;Microsoft resolved a total of 62 unique vulnerabilities, down nearly 20% from the 76 unique vulnerabilities resolved last month.&lt;span class="Apple-converted-space"&gt;&amp;nbsp;&lt;/span&gt;There were 10 bulletins, nine of which were rated Critical and one rated Important.&lt;span class="Apple-converted-space"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;h2&gt;&lt;em&gt;&lt;strong&gt;Be sure to check out all of Ivanti’s patch products:&lt;/strong&gt;&lt;/em&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;a href="https://www.ivanti.com/products/patch-for-configuration-manager" target="_blank" rel="noopener"&gt;Patch for SCCM&lt;/a&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;a href="https://www.ivanti.com/products/security-controls" target="_blank" rel="noopener"&gt;Patch for Windows&lt;/a&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;a href="https://www.ivanti.com/solutions/needs/manage-patches-for-linux-unix-and-mac-devices" target="_blank" rel="noopener"&gt;Patch for Linux, UNIX, Mac&lt;/a&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;a href="https://www.ivanti.com/products/patch-for-endpoint-manager" target="_blank" rel="noopener"&gt;Patch for Endpoint Manager&lt;/a&gt;&lt;/h2&gt;
&lt;/blockquote&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;The resolved vulnerabilities included two public disclosures and one vulnerability that has been both exploited in the wild and publicly disclosed.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;h2 class="p1"&gt;&lt;span class="s1"&gt;Affected Microsoft Products: &lt;/span&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li class="p2"&gt;&lt;span class="s1"&gt;Internet Explorer&lt;/span&gt;&lt;/li&gt;
&lt;li class="p2"&gt;&lt;span class="s1"&gt;Microsoft Edge&lt;/span&gt;&lt;/li&gt;
&lt;li class="p2"&gt;&lt;span class="s1"&gt;Microsoft Windows&lt;/span&gt;&lt;/li&gt;
&lt;li class="p2"&gt;&lt;span class="s1"&gt;Microsoft Office and Microsoft Office Services and Web Apps&lt;/span&gt;&lt;/li&gt;
&lt;li class="p2"&gt;&lt;span class="s1"&gt;Skype for Business and Lync&lt;/span&gt;&lt;/li&gt;
&lt;li class="p1"&gt;&lt;span class="s1"&gt;Microsoft SharePoint Server&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;We’ve been asked quite often if the Linux support that Microsoft is adding into their operating system is going to introduce additional vulnerabilities.&lt;span class="Apple-converted-space"&gt;&amp;nbsp;&lt;/span&gt;The simple answer is yes, since any time new functionality is added, there is always opportunity for new vulnerabilities to be introduced.&lt;span class="Apple-converted-space"&gt;&amp;nbsp;&lt;/span&gt;We’ve seen them pop up from time to time, and this month we have one that is publicly disclosed.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="s1"&gt;&lt;strong&gt;• CVE-2017-8703 | Windows Subsystem for Linux Denial of Service Vulnerability (Publicly Disclosed)&lt;/strong&gt; –&amp;nbsp;An attacker can execute a specially crafted application to affect an object in memory allowing them to cause the system to become unresponsive.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;It’s interesting Microsoft chose to rate the severity of their Office updates this month as Important when there was both a publicly disclosed and exploited vulnerability resolved.&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;&lt;strong&gt;• CVE-2017-11777 | Microsoft Office SharePoint XSS Vulnerability (Publicly Disclosed)&lt;/strong&gt; – An attacker can send a specially crafted request to an affected SharePoint server.&lt;span class="Apple-converted-space"&gt;&amp;nbsp;&lt;/span&gt;The attacker would have the same security context as the current user allowing them to read data they should not have access to, use the victim’s identity to take actions on the SharePoint site on behalf of the user, and inject malicious content in the browser of the user. &lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;&lt;strong&gt;• CVE-2017-11826 | Microsoft Office Memory Corruption Vulnerability (Publicly Disclosed\Exploited)&lt;/strong&gt; – An attacker could exploit this vulnerability by sending a specially crafted file to the user and convincing them to open it.&lt;span class="Apple-converted-space"&gt;&amp;nbsp;&lt;/span&gt;An attacker could also host a website containing specially crafted files designed to exploit the vulnerability. If exploited, the attacker would have the same context as the user.&lt;span class="Apple-converted-space"&gt;&amp;nbsp;&lt;/span&gt;In this case, less privileges would mitigate the impact of an exploited system.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;This is the last month that Microsoft will release security updates for Windows 10 1511.&lt;span class="Apple-converted-space"&gt;&amp;nbsp;&lt;/span&gt;It is time to move to the 1607 Anniversary Update or all the way to 1703 Creators update if you want to have the latest version.&lt;span class="Apple-converted-space"&gt;&amp;nbsp;&lt;/span&gt;If you have any questions, consult their &lt;a href="https://support.microsoft.com/en-us/windows/serviced-versions-of-windows-10-frequently-asked-questions-0543e712-b23e-b6c0-034a-45d7b559ae88" target="_blank" rel="noopener"&gt;&lt;span class="s2"&gt;help documentation&lt;/span&gt;&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="s1"&gt;Oracle will release its quarterly CPU next week on Tuesday, October 17, so expect critical updates for Java JRE and JDK as well as other Oracle products.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;Special Treat&lt;/h2&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;I mentioned we were given a special treat this month.&lt;span class="Apple-converted-space"&gt;&amp;nbsp;&lt;/span&gt;For the first time in ages, Adobe Flash does &lt;em&gt;not&lt;/em&gt; include any security fixes.&lt;span class="Apple-converted-space"&gt;&amp;nbsp;&lt;/span&gt;That’s right!&lt;span class="Apple-converted-space"&gt;&amp;nbsp;&lt;/span&gt;A priority three, feature bug fix-only release for Adobe Flash, and no required update from Microsoft!&lt;/span&gt;&lt;/p&gt;
&lt;h2 class="p1"&gt;&lt;span class="s1"&gt;In the News&lt;/span&gt;&lt;/h2&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;The Equifax security breach and associated congressional hearing dominated the security news for most of September.&lt;span class="Apple-converted-space"&gt;&amp;nbsp;&lt;/span&gt;The company testimony showed a breakdown in both the personnel and technology aspects of their patch program.&lt;span class="Apple-converted-space"&gt;&amp;nbsp;&lt;/span&gt;Although the vulnerability was known for some time, the patch process was delayed due to employee initiative.&lt;span class="Apple-converted-space"&gt;&amp;nbsp;&lt;/span&gt;And to add insult to injury, the tools they were using showed the systems as patched when they weren’t.&lt;span class="Apple-converted-space"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;As I mentioned in my &lt;a href="https://www.ivanti.com/blog/patch-tuesday-forecast-october" target="_blank" rel="noopener"&gt;&lt;span class="s2"&gt;forecast blog&lt;/span&gt;&lt;/a&gt;, it may be time we all do a quick review of our patch policy and implemented processes to make sure we are minimizing our exposure and risk.&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;The complexity of attacks continues to rise, and the EternalBlue v1SMB vulnerability continues to be a an entry point. Recent announcements include the introduction of a &lt;a href="https://threatpost.com/eternalblue-exploit-used-in-retefe-banking-trojan-campaign/128103/" target="_blank" rel="noopener"&gt;&lt;span class="s2"&gt;banking system&lt;/span&gt;&lt;/a&gt; Trojan in Europe and Japan, and a complex &lt;a href="https://threatpost.com/apt28-using-eternalblue-to-attack-hotels-in-europe-middle-east/127419/" target="_blank" rel="noopener"&gt;&lt;span class="s2"&gt;hotel reservation system&lt;/span&gt;&lt;/a&gt; attack in Europe and the Middle East.&lt;span class="Apple-converted-space"&gt;&amp;nbsp;&lt;/span&gt;Both attacks used a complex set of tools to gain access to the target systems and attempted to grab user credentials.&lt;span class="Apple-converted-space"&gt;&amp;nbsp;This is j&lt;/span&gt;ust another example of why we need to remain vigilant and make sure we are keeping up with the latest patches to close these avenues of vulnerability.&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;For deeper analysis on the October Patch Tuesday release, join us live for the &lt;a href="https://www.ivanti.com/resources/patch-tuesday" target="_blank" rel="noopener"&gt;&lt;span class="s2"&gt;October Ivanti Patch Tuesday Webinar&lt;/span&gt;&lt;/a&gt;!&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description><pubDate>Tue, 10 Oct 2017 20:39:43 Z</pubDate></item><item><guid isPermaLink="false">b73f01ed-0c8a-464e-859a-a18e31caff73</guid><link>https://www.ivanti.com/blog/patch-tuesday-forecast-october</link><atom:author><atom:name>Todd Schell</atom:name><atom:uri>https://www.ivanti.com/blog/authors/todd-schell</atom:uri></atom:author><category>Security</category><category>Patch Tuesday</category><title>Patch Tuesday Forecast for October 2017</title><description>&lt;p class="p1"&gt;&lt;span class="s1"&gt;Hurricanes hammered the United States last month and cyberattacks continue to rain down throughout the world.&lt;span class="Apple-converted-space"&gt;&amp;nbsp; &lt;/span&gt;The EternalBlue v1SMB vulnerability continues to be a focus of attacks.&lt;span class="Apple-converted-space"&gt;&amp;nbsp; &lt;/span&gt;Recent announcements include the introduction of a banking system Trojan in Europe and Japan, and a complex hotel reservation system attack in Europe and the Middle East.&lt;span class="Apple-converted-space"&gt;&amp;nbsp; &lt;/span&gt;In both situations, the objective of the attack was to collect a user’s login and password credentials.&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;Here in the US, the recent Equifax security breach is dominating the security news.&lt;span class="Apple-converted-space"&gt;&amp;nbsp; &lt;/span&gt;Details are continuing to emerge, but there was a clear breakdown of security process that affected 145 million people.&lt;span class="Apple-converted-space"&gt;&amp;nbsp; &lt;/span&gt;The exploited vulnerability was in the Apache Struts application used on the company web portal.&lt;span class="Apple-converted-space"&gt;&amp;nbsp; &lt;/span&gt;A patch for this vulnerability was released on March 6&lt;/span&gt;&lt;span class="s2"&gt;&lt;sup&gt;th&lt;/sup&gt;&lt;/span&gt;&lt;span class="s1"&gt;; the first indication Equifax had a problem was not reported internally until May.&lt;span class="Apple-converted-space"&gt;&amp;nbsp; &lt;/span&gt;Equifax had a quarterly patch policy in place which clearly let them down.&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;My recommendation this month is to revisit your patch policy.&lt;span class="Apple-converted-space"&gt;&amp;nbsp; &lt;/span&gt;Considering these recent events, think about the level of risk you are willing to accept for both your critical and non-critical systems.&lt;span class="Apple-converted-space"&gt;&amp;nbsp; &lt;/span&gt;If you are running a quarterly patch cycle, are you willing to run with unpatched systems for up to three months when the next patch cycle begins?&lt;span class="Apple-converted-space"&gt;&amp;nbsp; &lt;/span&gt;It may be that you have mitigating controls in place, but at least think about the implications.&lt;span class="Apple-converted-space"&gt;&amp;nbsp; &lt;/span&gt;The vendors have been doing a much better job responding to reported vulnerabilities in their software, now it is up to us as security professionals to make sure we patch and protect our systems in a timely manner.&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;On a closing note, we mentioned the BlueBorne vulnerability last month on our &lt;a href="https://www.ivanti.com/resources/patch-tuesday" target="_blank" rel="noopener"&gt;&lt;span class="s3"&gt;September Patch Tuesday webinar&lt;/span&gt;&lt;/a&gt; but it warrants some additional commentary.&lt;span class="Apple-converted-space"&gt;&amp;nbsp; &lt;/span&gt;This vulnerability, originally reported by Armis security, exists in the BlueTooth protocol.&lt;span class="Apple-converted-space"&gt;&amp;nbsp; &lt;/span&gt;It can be a problem because BlueTooth runs with a high privilege level to effectively connect with a wide range of devices.&lt;span class="Apple-converted-space"&gt;&amp;nbsp; &lt;/span&gt;Patches have been released by Microsoft and Google, but may take time to reach the end devices so be aware of this issue.&lt;span class="Apple-converted-space"&gt;&amp;nbsp; &lt;/span&gt;Apple iOS 10 is not vulnerable.&lt;span class="Apple-converted-space"&gt;&amp;nbsp; &lt;/span&gt;You may want to issue a warning to your users to turn off BlueTooth on their mobile devices unless it is really needed.&lt;/span&gt;&lt;/p&gt;
&lt;h4 class="p2"&gt;&lt;span class="s1"&gt;October forecast:&lt;/span&gt;&lt;/h4&gt;
&lt;ul class="ul1"&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;Expect the usual Microsoft OS updates this month.&lt;span class="Apple-converted-space"&gt;&amp;nbsp; &lt;/span&gt;After the YUGE release for Office last month (51 KB articles) and the .NET release, we’re hoping for a small number of patches beyond the regular OS updates.&lt;/span&gt;&lt;/li&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;Mozilla just released a new major version of Firefox in the past week, so we probably will not see a new version next week.&lt;/span&gt;&lt;/li&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;History tends to repeat itself, so we should expect an update to Adobe Flash as usual.&lt;/span&gt;&lt;/li&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;October is an Oracle CPU. They update quarterly and this is the month, so Tuesday the 17th Oracle will release updates for all their software including Java.&lt;span class="Apple-converted-space"&gt;&amp;nbsp; &lt;/span&gt;We may see an announcement on the future of Solaris and SPARC support as well. &lt;span class="Apple-converted-space"&gt;&amp;nbsp; &lt;/span&gt;Oracle had a major layoff of those software and hardware employees the beginning of September.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;As always tune into &lt;a href="https://www.ivanti.com/resources/patch-tuesday" target="_blank" rel="noopener"&gt;&lt;span class="s3"&gt;Ivanti’s Patch Tuesday landing page&lt;/span&gt;&lt;/a&gt; for updated analysis as Patch Tuesday unfolds and sign up for our &lt;a href="https://www.ivanti.com/webinars" target="_blank" rel="noopener"&gt;&lt;span class="s3"&gt;monthly Patch Tuesday webinar&lt;/span&gt;&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
</description><pubDate>Fri, 06 Oct 2017 15:40:15 Z</pubDate></item><item><guid isPermaLink="false">e93d4e95-5fd4-4218-a619-87e520327ba9</guid><link>https://www.ivanti.com/blog/delayed-start-microsofts-security-bulletin-replacement-program</link><atom:author><atom:name>Todd Schell</atom:name><atom:uri>https://www.ivanti.com/blog/authors/todd-schell</atom:uri></atom:author><category>Ivanti News</category><title>A Delayed Start for Microsoft’s Security Bulletin Replacement Program</title><description>&lt;p&gt;Microsoft has delayed the release of this month’s security updates.&amp;nbsp; Just minutes before the scheduled updates release, they provided a short statement on&amp;nbsp;&lt;a href="https://msrc.microsoft.com/blog/2017/02/14/february-2017-security-update-release/" target="_blank" rel="noopener"&gt;TechNet&lt;/a&gt; announcing a delay.&amp;nbsp; No new timeline has been provided for the February updates but we will continue monitoring the situation and provide an update on the blog and in a bulletin to our customers when we learn more.&lt;/p&gt;
&lt;p&gt;As announced last month, Microsoft will revise it’s 12-year old security bulletin system to the new Security Update Guide approach. &amp;nbsp;&amp;nbsp;This new tool provides a dashboard and API for users to search for needed updates for all products by unique vulnerability IDs or knowledge base article IDs.&amp;nbsp; Security bulletin IDs will no longer be used though past bulletins will remain online for your reference and use as needed. One important item to note: the software maker says they will continue to issue out-of-band patch notifications as required although they opted not to do that when&amp;nbsp;&lt;a href="https://www.pcworld.com/article/411929/microsoft-will-likely-fix-windows-smb-denial-of-service-flaw-on-patch-tuesday.html" target="_blank" rel="noopener"&gt;news of a SMB flaw zero-day broke&lt;/a&gt;&amp;nbsp;on February 3.&amp;nbsp;The vulnerability has yet to be patched.&lt;/p&gt;
&lt;p&gt;For more, visit the&amp;nbsp;&lt;a href="https://www.microsoft.com/en-us/msrc/faqs-security-update-guide?rtc=1" target="_blank" rel="noopener"&gt;frequently asked questions&lt;/a&gt;&amp;nbsp;to the Security Update Guide.&lt;/p&gt;</description><pubDate>Tue, 14 Feb 2017 18:52:41 Z</pubDate></item><item><guid isPermaLink="false">7531a4cd-325f-4f8e-940b-130591936383</guid><link>https://www.ivanti.com/blog/new-year-signals-end-patch-tuesday-know</link><atom:author><atom:name>Todd Schell</atom:name><atom:uri>https://www.ivanti.com/blog/authors/todd-schell</atom:uri></atom:author><category>Ivanti News</category><title>A New Year Signals the End of Patch Tuesday as We Know It</title><description>&lt;p&gt;The big news in today’s January Patch Tuesday is that this release marks the end of the 12-year Patch Tuesday update cycle as we know it. Last month, Microsoft announced impending changes to their security update process, which is set to begin in February. Before jumping into more detail on what the coming year will look like for your patch team however, we have&amp;nbsp;&lt;a href="https://learn.microsoft.com/en-us/security-updates/SecurityBulletinSummaries/2017/ms17-jan" target="_blank" rel="noopener"&gt;four&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;updates to address now&lt;/a&gt;. You heard me right…only four. And none of them are reported under active exploit.&lt;/p&gt;
&lt;p&gt;Of the four security bulletins released, just two are rated critical. And your first priority this month actually comes from Adobe.&amp;nbsp;&lt;a href="https://www.microsoft.com/en-us/msrc?rtc=1" target="_blank" rel="noopener"&gt;MS17-003&lt;/a&gt;&amp;nbsp;is an update for Adobe Flash Player when installed on Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, Windows 10, and Windows Server 2016. The update addresses the vulnerabilities in Adobe Flash Player by updating the affected Adobe Flash libraries contained within Internet Explorer 10, Internet Explorer 11, and Microsoft Edge. You’ll find more in Adobe Security Bulletin&amp;nbsp;&lt;a href="https://helpx.adobe.com/security/products/flash-player/apsb17-02.html" target="_blank" rel="noopener"&gt;APSB17-02&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Your second priority should be&amp;nbsp;&lt;a href="https://www.microsoft.com/en-us/msrc?rtc=1" target="_blank" rel="noopener"&gt;MS17-002&lt;/a&gt;&amp;nbsp;which resolves a vulnerability in Office which could allow a remote code execution if a user opens a malicious file. Microsoft Word 2016 and Enterprise Sharepoint Server are impacted.&lt;/p&gt;
&lt;p&gt;If your users rely on Microsoft Edge,&amp;nbsp;&lt;a href="https://learn.microsoft.com/en-us/security-updates/SecurityBulletins/2017/ms17-001" target="_blank" rel="noopener"&gt;MS17-001&lt;/a&gt;&amp;nbsp;will take third priority. It’s an important, cumulative update for the browser and the vulnerability could result in elevation of privilege. Lastly,&amp;nbsp;&lt;a href="https://www.microsoft.com/en-us/msrc?rtc=1" target="_blank" rel="noopener"&gt;MS17-004&lt;/a&gt;&amp;nbsp;is an update for Local Security Authority Subsystem Service (LSASS). The update addresses a denial of service vulnerability in the way the LSASS handles authentication requests in older versions of Windows. The denial of service on the target system’s LSASS service could trigger an automatic reboot of the system. If you’re running old Windows, make this update or better yet, upgrade.&lt;/p&gt;
&lt;p&gt;Next month, Microsoft will categorize needed updates by unique vulnerability IDs through the Security Update Guide which will be accessible by a dashboard and API. Security bulletin IDs will no longer be used, though past bulletins will remain online for your reference and use as needed. One important item to note: the software maker says they will continue to issue out-of-band patch notifications as required. For more, visit the&amp;nbsp;&lt;a href="https://www.microsoft.com/en-us/msrc/faqs-security-update-guide?rtc=1" target="_blank" rel="noopener"&gt;frequently asked questions&lt;/a&gt;&amp;nbsp;to the Security Update Guide.&lt;/p&gt;</description><pubDate>Tue, 10 Jan 2017 19:07:29 Z</pubDate></item><item><guid isPermaLink="false">b1c576c8-5d82-4467-86dd-ad73f2e018c7</guid><link>https://www.ivanti.com/blog/november-patch-tuesday-election-style</link><atom:author><atom:name>Todd Schell</atom:name><atom:uri>https://www.ivanti.com/blog/authors/todd-schell</atom:uri></atom:author><category>Patch Tuesday</category><title>November Patch Tuesday: Election Style</title><description>&lt;p&gt;November Patch Tuesday is forced to share the spotlight this month. It’s Election Day in the U.S. and likely on the minds of most people. However, Microsoft also&amp;nbsp;&lt;a href="https://www.microsoft.com/en-us/msrc?rtc=1" target="_blank" rel="noopener"&gt;released&lt;/a&gt;14 security updates today, 6 of which are rated critical. Thankfully, there is just one active exploit on an older version of Windows this month so once you’ve cast your vote, make sure to apply these updates.&lt;/p&gt;

&lt;p&gt;First on your list of priorities this month should be your browser updates.&amp;nbsp;&lt;a href="https://learn.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-129" target="_blank" rel="noopener"&gt;MS16-129&lt;/a&gt;&amp;nbsp;is a critical, cumulative update for Edge. It addresses 17 unique CVEs, the most troublesome being the possibility of a remote code execution if a user views a malicious webpage while using Edge. Internet Explorer users also have a critical, cumulative update in&amp;nbsp;&lt;a href="https://learn.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-142" target="_blank" rel="noopener"&gt;MS16-142&lt;/a&gt;&amp;nbsp;which could also result in a remote code execution when successfully exploited.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://learn.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-141" target="_blank" rel="noopener"&gt;MS16-141&lt;/a&gt;&amp;nbsp;is a critical update for Adobe Flash Player when installed on Windows 8.1, Server 2012, RT, Windows 10 and Server 2016. The update addresses 9 separate CVEs by updating the affected Flash libraries contained with IE 10 and 11 and Edge and are described in detail in&amp;nbsp;&lt;a href="https://helpx.adobe.com/security/products/flash-player/apsb16-37.html" target="_blank" rel="noopener"&gt;APSB16-37&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Not rated critical but under active exploit on older versions of Windows is&amp;nbsp;&lt;a href="https://learn.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-135" target="_blank" rel="noopener"&gt;MS16-135&lt;/a&gt;, an update for Kernel-Mode Driver. The vulnerability could allow elevation of privilege, so you may want to give this some attention.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://learn.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-130" target="_blank" rel="noopener"&gt;MS16-130&lt;/a&gt;&amp;nbsp;is a critical update for almost all versions of Windows, both desktop and server applications. Information seems light on this one however we do know exploitation could result in remote code execution. Another update,&amp;nbsp;&lt;a href="https://learn.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-132" target="_blank" rel="noopener"&gt;MS16-132&lt;/a&gt;&amp;nbsp;for Graphics Components also impacts all current versions of Windows. It addresses one information disclosure vulnerability that exists when the Windows font library incorrectly handles fonts.&lt;br&gt;
Rounding out the critical updates this month is&amp;nbsp;&lt;a href="https://learn.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-131" target="_blank" rel="noopener"&gt;MS16-131&lt;/a&gt;, is a critical update for Video Control however a user must open either a file or program from a webpage or email message for this exploit to be successful.&lt;/p&gt;

&lt;p&gt;The bulk of the important class bulletins impact a wide range of applications which allow elevation of privilege and definitely deserves your attention this month as well.&lt;/p&gt;</description><pubDate>Tue, 08 Nov 2016 23:17:09 Z</pubDate></item><item><guid isPermaLink="false">18f98a1f-c603-4c51-a54d-bd3d07ff19e1</guid><link>https://www.ivanti.com/blog/10-bulletins-address-5-active-exploits-october-patch-tuesday</link><atom:author><atom:name>Todd Schell</atom:name><atom:uri>https://www.ivanti.com/blog/authors/todd-schell</atom:uri></atom:author><category>Patch Tuesday</category><title>10 Bulletins Address Exploits on Oct Patch Tuesday</title><description>&lt;p&gt;Cyber criminals have plenty of opportunity this month with 5 vulnerabilities now under active exploit, 2 of which are shared. Microsoft&amp;nbsp;&lt;a href="https://learn.microsoft.com/en-us/security-updates/SecurityBulletinSummaries/2016/ms16-oct" target="_blank" rel="noopener"&gt;has released 10 bulletins&lt;/a&gt;&amp;nbsp;this October Patch Tuesday to address those and other vulnerabilities found in both current and old code. Quick response will be of particular importance this month.&lt;/p&gt;
&lt;p&gt;As is often the case, we will start with the browsers. First on your list of priorities should be&amp;nbsp;&lt;a href="https://learn.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-119" target="_blank" rel="noopener"&gt;MS16-119&lt;/a&gt;, a critical update for Edge. Addressing 13 CVEs, this bulletin includes an active exploit against CVE-2016-7189 allowing remote code execution which could result in deep compromise of your system.&amp;nbsp; Next up is&amp;nbsp;&lt;a href="https://learn.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-118" target="_blank" rel="noopener"&gt;MS16-118&lt;/a&gt;&amp;nbsp;a cumulative, critical update for IE but with many shared Edge vulnerabilities. &amp;nbsp;CVE-2016-3298 is under active exploit for both the latest and older IE releases. This is another large bulletin with 11 CVEs addressed.&lt;/p&gt;
&lt;p&gt;Next on your list of priorities for October should be&amp;nbsp;&lt;a href="https://www.microsoft.com/en-us/msrc?rtc=1" target="_blank" rel="noopener"&gt;MS16-120&lt;/a&gt;&amp;nbsp;which is for vulnerabilities found in older versions of Microsoft Graphics Component. This is a critical update for vulnerabilities found in Windows, .NET, Office, Skype for Business, Silverlight and Lync. Of the seven total CVEs addressed in this bulletin, one is under active exploit, CVE-2016-3393.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.microsoft.com/en-us/msrc?rtc=1" target="_blank" rel="noopener"&gt;MS16-122&lt;/a&gt;&amp;nbsp;is the last of the Microsoft critical bulletins however user interaction is required for an attacker to be successful. It resolves a vulnerability in Windows which could allow a remote code execution if Video Control fails to handle objects in memory correctly.&lt;/p&gt;
&lt;p&gt;We also have another update for Adobe Flash Player,&amp;nbsp;&lt;a href="https://www.microsoft.com/en-us/msrc?rtc=1" target="_blank" rel="noopener"&gt;MS16-127&lt;/a&gt;. This critical bulletin resolves vulnerabilities described in&amp;nbsp;&lt;a href="https://helpx.adobe.com/security/products/flash-player/apsb16-32.html" target="_blank" rel="noopener"&gt;APSB16-32&lt;/a&gt;&amp;nbsp;and found in Flash Player when installed on Windows 8.1, Server 2012, RT 8.1 and Windows 10.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.microsoft.com/en-us/msrc?rtc=1" target="_blank" rel="noopener"&gt;MS16-121&lt;/a&gt;&amp;nbsp;is a bulletin rated important for most versions of Office that patches a RTF remote code execution vulnerability. While the bulletin is only rated important, CVE-2016-7193 is being exploited now.&amp;nbsp;&lt;a href="https://learn.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-126" target="_blank" rel="noopener"&gt;MS16-126&lt;/a&gt;, though rated only as moderate, is also under active exploit. This security update addresses an information disclosure issue in Internet Messaging API that could allow an attacker to test for the presence of files on disk.&lt;/p&gt;
&lt;p&gt;Lastly, Microsoft announced more details around its new cumulative patch update model which were first disclosed last month on&amp;nbsp;&lt;a href="https://techcommunity.microsoft.com/t5/windows-it-pro-blog/bg-p/Windows10Blog" target="_blank" rel="noopener"&gt;Technet&lt;/a&gt;. The new patch strategy is a single monthly rollup designed to streamline patches and provide you with easier, more consistent patching. HEAT Software products support this new model and the first set of security and cumulative updates now appear in the various patch feeds. Pay special attention to the names of the new patches and be sure to read up on the topic from their latest&amp;nbsp;&lt;a href="https://techcommunity.microsoft.com/t5/windows-it-pro-blog/bg-p/Windows10Blog" target="_blank" rel="noopener"&gt;blog post&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Wed, 12 Oct 2016 04:13:42 Z</pubDate></item><item><guid isPermaLink="false">c99575e9-cdb9-44e6-939f-7d477bf8e18f</guid><link>https://www.ivanti.com/blog/14-bulletins-september-patch-tuesday</link><atom:author><atom:name>Todd Schell</atom:name><atom:uri>https://www.ivanti.com/blog/authors/todd-schell</atom:uri></atom:author><category>Patch Tuesday</category><title>14 Bulletins for September Patch Tuesday</title><description>&lt;p&gt;The lazy days of summer are definitely over as Microsoft&amp;nbsp;&lt;a href="https://www.microsoft.com/en-us/msrc?rtc=1" target="_blank" rel="noopener"&gt;released 14 bulletins&lt;/a&gt;&amp;nbsp;in today’s September Patch Tuesday. There are 7 updates rated critical so it is time to get to work. The bulletins also include an update for Adobe Flash Player that’s important for most Windows users to address so all in all, it’s a big month.&lt;/p&gt;
&lt;p&gt;You will likely want to start with the update that addresses vulnerabilities under active exploit in all current versions of Internet Explorer. If your users still rely on the popular browser, apply cumulative update MS16-104 right away. You never know when one of your users may hit a malicious webpage resulting in unwanted code execution. While you’re at it, you might as well address MS16-116 too; it is a critical update in the OLE Automation for VBScript that also requires the patch provided by MS16-104. For those of you that use Microsoft Edge, that browser also has a cumulative update this month with MS16-105 and it too is rated critical.&lt;/p&gt;
&lt;p&gt;Next on your list should be MS16-107, a critical update for most versions of Microsoft Office, including Office for Mac. A remote code execution could result if a user opens a malicious Office file using the widely used programs Excel, Outlook or PowerPoint.&lt;/p&gt;
&lt;p&gt;Third in priority is MS16-117 which is a critical security update for Adobe Flash Player described in APSB16-29. The 29 unique vulnerabilities impact Flash when installed on recent versions of Windows including 8.1, Server 2012, RT 8.1 and 10.&lt;/p&gt;
&lt;p&gt;There are 2 additional bulletins with the rating of critical this month. MS16-106 is a security update for Microsoft Graphics Component on all systems and MS16-108 resolves vulnerabilities found in Exchange Server.&lt;/p&gt;
&lt;p&gt;The remainder of the bulletins are rated important and should be addressed as time permits.&amp;nbsp; Lots of potential work for IT this month as our summer draws to an end.&lt;/p&gt;</description><pubDate>Wed, 14 Sep 2016 16:54:24 Z</pubDate></item></channel></rss>