<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/en-au/blog/authors/chris-goettl/rss" /><link>https://www.ivanti.com/en-au/blog/authors/chris-goettl</link><item><guid isPermaLink="false">5e2bd862-5df7-47f6-af46-8a38ca7881c0</guid><link>https://www.ivanti.com/en-au/blog/november-2023-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><title>November 2023 Patch Tuesday</title><description>&lt;div&gt;&lt;iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen="" frameborder="0" src="https://www.youtube.com/embed/BLQaT3KTfq0" title="YouTube video player"&gt;&lt;/iframe&gt;&lt;/div&gt;

&lt;p&gt;November 2023 Patch Tuesday has arrived and has a lower overall CVE count than previous months, but includes some urgent fixes that organizations will want to take note of. This month is also the first patch cycle for Server 2012 and 2012 R2 extended support (ESU). On the third-party&amp;nbsp;side,&amp;nbsp;Adobe has released updates and an update from Google Chrome Stable Channel has&amp;nbsp;been updated.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2023/11/patchtues-page-blog_nov2023-2.jpg"&gt;&lt;/p&gt;

&lt;h2&gt;Microsoft updates&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved 58 new unique CVEs this month, three of which are critical. Three CVEs have confirmed exploits in the wild. There are also some publicly disclosed vulnerabilities that could be considered at higher risk of being exploited. Products affected include Windows OS, Office&amp;nbsp;365, .Net, ASP.NET, Azure DevOps Server, Visual Studio, Exchange Server&amp;nbsp;and&amp;nbsp;SQL Server.&lt;/p&gt;

&lt;p&gt;Microsoft Server 2012 and 2012 R2 officially reached their end-of-life in October. Today, there are updates available for these server editions if an organization has subscribed to Microsoft ESU.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Microsoft zero-day ulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability is Windows DWN Core Library (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36033" rel="noopener" target="_blank"&gt;CVE-2023-36033&lt;/a&gt;). The CVE is rated as Important by Microsoft and has a CVSS score of 7.8, but exploits have been detected in the wild.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;There is proof-of-concept code samples publicly&amp;nbsp;available,&amp;nbsp;making it easy for additional attackers to utilize. No user interaction is required to exploit the&amp;nbsp;vulnerability, and if&amp;nbsp;exploited,&amp;nbsp;an attacker could gain&amp;nbsp;system-level&amp;nbsp;privileges. The vulnerability affects all Windows 10, 11&amp;nbsp;and Server editions. Regardless of severity and CVSS&amp;nbsp;rating,&amp;nbsp;this vulnerability is actively being exploited and warrants higher prioritization.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Windows Cloud Files Mini Filter Driver (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36036" rel="noopener" target="_blank"&gt;CVE-2023-36036&lt;/a&gt;). The vulnerability is rated as Important and has a CVSS score of 7.8, but exploits have been detected in the wild. No user interaction is required to exploit the&amp;nbsp;vulnerability,&amp;nbsp;and if exploited, an attacker could gain&amp;nbsp;system-levelprivileges. The vulnerability affects Windows 10, 11, and Server 2008 and newer server OS editions.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Organizations that are still running Server 2008, 2008 R2, 2012 or 2012 R2 should ensure they are subscribing to a Microsoft ESU subscription or take additional precautions to protect these older server editions. Regardless of severity and CVSS&amp;nbsp;rating,&amp;nbsp;this vulnerability is actively being exploited and warrants higher prioritization.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a Security Feature Bypass vulnerability in Windows SmartScreen (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36025" rel="noopener" target="_blank"&gt;CVE-2023-36025&lt;/a&gt;). The vulnerability is rated as Important and has a CVSS score of 8.8, but exploits have been detected in the wild. An attacker can convince a user to click on a specially crafted URL and bypass Windows Defender SmartScreen checks.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The vulnerability affects Windows 10, 11, and Server 2008 and newer server OS editions. Organizations that are still running Server 2008, 2008 R2, 2012 or 2012 R2 should ensure they are subscribing to a Microsoft ESU subscription or take additional precautions to protect these older server editions.&lt;/p&gt;

&lt;p&gt;Regardless of severity and CVSS&amp;nbsp;rating,&amp;nbsp;this vulnerability is actively being exploited and warrants higher prioritization.&lt;/p&gt;

&lt;h2&gt;Microsoft publicly disclosed vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved a Denial of Server vulnerability in ASP.NET (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36038" rel="noopener" target="_blank"&gt;CVE-2023-36038&lt;/a&gt;). The vulnerability is rated as Important and has a CVSS score of 8.2. The vulnerability has been publicly&amp;nbsp;disclosed,&amp;nbsp;which increases the risk that threat actors may be developing or will develop an exploit. Under the right&amp;nbsp;conditions,&amp;nbsp;an attacker who successfully exploits this vulnerability could cause a total loss of availability.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a Security Feature Bypass in Microsoft Office that allows an attacker to bypass the Office Protected&amp;nbsp;View and&amp;nbsp;open in editing mode rather than protected mode (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36413" rel="noopener" target="_blank"&gt;CVE-2023-36413&lt;/a&gt;). The vulnerability is rated as Important and has a CVSS score of 6.5. The vulnerability has been publicly&amp;nbsp;disclosed,&amp;nbsp;which increases the risk that threat actors may be developing or will develop an exploit. The vulnerability affects Microsoft Office and 365 Apps editions.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has updated a previously published CVEs (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38039" rel="noopener" target="_blank"&gt;CVE-2023-38039&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38545" rel="noopener" target="_blank"&gt;CVE-2023-38545&lt;/a&gt;) affecting HTTP headers and SOCKS5 heap buffer overflow to include an updated version of curl&amp;nbsp;8.4.0,&amp;nbsp;which addresses the vulnerabilities. Organizations that implemented the mitigations provided on&amp;nbsp;October 19th, 2023 should follow the guidance provided in the following documentation: &lt;a href="https://learn.microsoft.com/en-us/windows/security/application-security/application-control/windows-defender-application-control/deployment/disable-wdac-policies" rel="noopener" target="_blank"&gt;Remove Windows Defender Application Control (WDAC) policies&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;Microsoft Exchange vulnerabilities of note&lt;/h2&gt;

&lt;p&gt;Some of these exchange vulnerabilities&amp;nbsp;&lt;a href="https://www.bleepingcomputer.com/news/microsoft/new-microsoft-exchange-zero-days-allow-rce-data-theft-attacks/" rel="noopener" target="_blank"&gt;caught some recent headlines in early November&amp;nbsp;&lt;/a&gt;because of timing of the disclosures from the researcher not lining up with Microsoft’s release criteria. Some researchers have very hard timeframes, from informing the vendor to releasing details publicly. If the vulnerabilities didn't meet criteria for out-of-band release, then they would fall into the next release cycle. A few of these Exchange CVEs appear to fall into such a case. No exploits or disclosures were reported against the five Exchanges CVEs.&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36035" rel="noopener" target="_blank"&gt;CVE-2023-36035&lt;/a&gt;&amp;nbsp;Microsoft Exchange Server Spoofing Vulnerability&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36039" rel="noopener" target="_blank"&gt;CVE-2023-36039&lt;/a&gt;&amp;nbsp;Microsoft Exchange Server Spoofing Vulnerability&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36050" rel="noopener" target="_blank"&gt;CVE-2023-36050&lt;/a&gt;&amp;nbsp;Microsoft Exchange Server Spoofing Vulnerability&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36439" rel="noopener" target="_blank"&gt;CVE-2023-36439&lt;/a&gt;&amp;nbsp;Microsoft Exchange Server Remote Code Execution Vulnerability&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1730" rel="noopener" target="_blank"&gt;CVE-2021-1730&lt;/a&gt;&amp;nbsp;Microsoft Exchange Server Spoofing Vulnerability (information only change)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Third-party updates&lt;/h2&gt;

&lt;p&gt;Adobe has released updates for 14 products including Adobe Acrobat and Acrobat Reader. Adobe resolved 76 CVEs across the product updates, including 40 Critical CVEs. No exploits or public disclosures have been reported.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Based on Adobe's priorities, these would all fall into their Priority 3 as most of the products are less likely to be targeted (like ColdFusion, InCopy, etc.) Adobe Acrobat and Acrobat Reader is the most likely to be targeted as it is more widely available on systems. Recommendation would be to prioritize&amp;nbsp;&lt;a href="https://helpx.adobe.com/security/products/acrobat/apsb23-54.html" rel="noopener" target="_blank"&gt;APSB23-54&amp;nbsp;: Security update available for Adobe Acrobat and Reader&amp;nbsp;for remediation to be safe&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Google Chrome has moved to a &lt;a href="https://security.googleblog.com/2023/08/an-update-on-chrome-security-updates.html" rel="noopener" target="_blank"&gt;weekly release cadence for security updates&lt;/a&gt;. Chrome's stable channel has been updated to 119.0.6045.159 for Mac and Linux and 119.0.6045.159/.160 for Windows and includes 4 CVEs. Expect Chromium-based browsers to update shortly.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Tue, 14 Nov 2023 22:18:09 Z</pubDate></item><item><guid isPermaLink="false">059a9b21-6ddf-4d21-9dab-167a76a27543</guid><link>https://www.ivanti.com/en-au/blog/october-2023-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><title>October 2023 Patch Tuesday</title><description>&lt;p&gt;There's been&amp;nbsp;a long string of zero-day events through September and into the October Patch Tuesday lineup. Apple had five zero-day vulnerabilities across most of their products culminating in their updates that&amp;nbsp;were released&amp;nbsp;on September 26th&amp;nbsp;(which also included the EoL of Big Sur).&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Google and Mozilla continued to be busy with several zero-day vulnerabilities in&amp;nbsp;the open-source library, Libwebp. This also impacted chromium-based browsers like Microsoft Edge, Opera and others. For more details on the lineup of CVEs leading up to October Patch&amp;nbsp;Tuesday,&amp;nbsp;check out our&amp;nbsp;&lt;a href="https://www.helpnetsecurity.com/2023/10/06/october-2023-patch-tuesday-forecast/" rel="noopener" target="_blank"&gt;Patch Tuesday Forecast on HelpNetSecurity&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has resolved 104 new CVEs this month, three of which are flagged as exploited. The lineup from Microsoft includes Windows, Office 365, SQL Server, Exchange Server&amp;nbsp;and&amp;nbsp;multiple Azure components. Along with the large lineup of&amp;nbsp;fixes,&amp;nbsp;October also marks the end-of-life for Windows Server 2012 and 2012 R2.&lt;/p&gt;

&lt;p&gt;&lt;img alt="Patch Tuesday graphic for October." src="https://static.ivanti.com/sites/marketing/media/images/blog/2023/10/patchtues-page-blog_october2023.jpg" /&gt;&lt;/p&gt;

&lt;h2&gt;Microsoft zero-day vulnerabilities&amp;nbsp;&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Skype (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41763" rel="noopener" target="_blank"&gt;CVE-2023-41763&lt;/a&gt;) which allows an attacker to send a specially crafted network call to a target Skype for Business server. The network call could cause the parsing of an http request made to an arbitrary address. This could disclose IP addresses or port numbers or both to the attacker. The CVE is rated as important and has a CVSSv3.1 of 5.3, but proof-of-concept code has been disclosed and there are exploits detected in the wild. This CVE should be treated as a higher severity than Important due to the risk of exploit.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Microsoft has resolved an&amp;nbsp;information&amp;nbsp;disclosure vulnerability in WordPad (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36563" rel="noopener" target="_blank"&gt;CVE-2023-36563)&lt;/a&gt; which allows the disclosure of NTLM hashes. The CVE is rated as Important and has a CVSSv3.1 of 6.5, but proof-of-concept code has been disclosed and there are exploits detected in the wild. This CVE should be treated as a higher severity than Important due to the risk of exploit.&lt;/li&gt;
	&lt;li&gt;Microsoft has resolved a Denial of Service vulnerability in&amp;nbsp;the HTTP/2&amp;nbsp;protocol (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487" rel="noopener" target="_blank"&gt;CVE-2023-44487&lt;/a&gt;) which allows request cancellation that can reset many streams quickly. The vulnerability has been exploited in the wild since August. The vulnerability has been resolved in the Windows OS and in Visual Studio, .Net and ASP.Net. The CVE&amp;nbsp;doesn't&amp;nbsp;have a CVSS calculated, and Microsoft’s severity is only rated as Important, but due to active exploitation this CVE should be treated as a higher severity.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Windows Server 2012\2012 R2 and Windows 11 21H2 end-of-life&lt;/h2&gt;

&lt;p&gt;This patch Tuesday will include the&amp;nbsp;latest&amp;nbsp;updates for Windows 11 21H2 and Microsoft Server 2012/2012 R2. The later go into Extended Security Support (ESU) starting with a November release, and Microsoft also announced the keys used to&amp;nbsp;&lt;a href="https://learn.microsoft.com/en-us/azure/azure-arc/servers/deliver-extended-security-updates" rel="noopener" target="_blank"&gt;enable&amp;nbsp;these updates&lt;/a&gt; will be managed as part of Azure Arc. They should be released next week.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;End-of-life software poses a risk to an organization. No public updates will be available for these OS versions going forward. For Windows 11&amp;nbsp;users,&amp;nbsp;this means upgrading to a new Windows 11 branch. For Server 2012\2012 R2&amp;nbsp;it'shighly recommended to subscribe to ESU or migrate to a newer server edition.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Linux zero-day vulnerabilities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;CVE-2023-42115 has a whopping 9.8 CVSS and affects the Exim software solution, a message transfer agent (fancy way of saying email server) that’s very popular on Linux (including web hosters), which&amp;nbsp;wasvulnerable to remote code execution. This vulnerability had been reported for over a year to the original developers but never&amp;nbsp;addressed properly&amp;nbsp;and is now public.&amp;nbsp;There's&amp;nbsp;exploit code available in the wild. It particularly affects servers configured with centralized identity management, including in mixed Windows/Linux environments with Active Directory.&lt;/li&gt;
	&lt;li&gt;Exim announced on October 2nd&amp;nbsp;that a security update for exim-4.96.1 and 4.97 has been created to mitigate this CVE and two other zero-days (with three other zero-days remaining unpatched). Exim is an important MTA software because it’s bundled with “control panel”&amp;nbsp;web hosters, including in docker images.&lt;/li&gt;
	&lt;li&gt;CVE-2023-4863 is a 9.1 CVSS heap-based buffer overflow that affects libwebp, which is a library used by countless applications (for example Google Chrome, Firefox or Brave) to render images on screen.&amp;nbsp;It's beenfound to be vulnerable to an exploit, which is already in the wild, and all the applications using&amp;nbsp;it'll&amp;nbsp;be affected&amp;nbsp;—&amp;nbsp;which are essentially any applications that show or process images in the "webp" format (or its derivatives). This is remotely exploitable and requires no interaction to trigger – simply viewing a malicious image is enough to trigger it.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Linux vulnerabilities can have a long tail, from the publishing of the CVE to patches being made available by Linux distributions. To monitor the latest Linux CVEs,&amp;nbsp;check out &lt;a href="https://cve.tuxcare.com/els/cve" rel="noopener" target="_blank"&gt;TuxCare’s detailed CVE Tracker&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Tue, 10 Oct 2023 22:03:02 Z</pubDate></item><item><guid isPermaLink="false">9c753f4a-e211-48e7-b266-4b6b926ddfa9</guid><link>https://www.ivanti.com/en-au/blog/september-2023-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><title>September 2023 Patch Tuesday</title><description>&lt;div&gt;&lt;iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen="" frameborder="0" src="https://www.youtube.com/embed/YAaxvXFaWZw" title="YouTube video player"&gt;&lt;/iframe&gt;&lt;/div&gt;

&lt;p&gt;September 2023 Patch Tuesday has a lot of activity. The theme this month:&amp;nbsp;"Everyone has a zero-day release!"&lt;/p&gt;

&lt;p&gt;Microsoft has resolved 63 total vulnerabilities including two exploited zero-days (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36761" rel="noopener" target="_blank" title="https://msrc.microsoft.com/update-guide/vulnerability/cve-2023-36761"&gt;CVE-2023-36761&lt;/a&gt; and &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36802" rel="noopener" target="_blank" title="https://msrc.microsoft.com/update-guide/vulnerability/cve-2023-36802"&gt;CVE-2023-36802&lt;/a&gt;). Google Chrome resolved one zero-day vulnerability (&lt;a href="https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html" rel="noopener" target="_blank" title="https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html"&gt;CVE-2023-4863&lt;/a&gt;) on September 11, which is also included in the Microsoft Edge Chromium release. Adobe resolved a zero-day vulnerability in Acrobat and Reader (&lt;a href="https://helpx.adobe.com/security/products/acrobat/apsb23-34.html" rel="noopener" target="_blank" title="https://helpx.adobe.com/security/products/acrobat/apsb23-34.html"&gt;APSB23-34 CVE-2023-26369&lt;/a&gt;) on September 12. Apple resolved two zero-days on September 7 (&lt;a href="https://support.apple.com/en-us/106361" rel="noopener" target="_blank" title="https://support.apple.com/en-us/ht213905"&gt;CVE-2023-41064 and CVE-2023-41061&lt;/a&gt;). There aren’t any recent zero-day vulnerabilities on the Linux side, but there are three recent vulnerabilities that are affecting some core capabilities in the Linux Kernel that warrant some attention.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Microsoft updates&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved a total of 63 vulnerabilities this month, including two exploited vulnerabilities. The zero-day vulnerabilities are in Word (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36761" rel="noopener" target="_blank"&gt;CVE-2023-36761&lt;/a&gt;) and the Windows OS (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36802" rel="noopener" target="_blank"&gt;CVE-2023-36802&lt;/a&gt;). Microsoft Edge (Chromium) should be releasing shortly and will include a fix for the Chrome zero-day &lt;a href="https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html" rel="noopener" target="_blank"&gt;CVE-2023-4863&lt;/a&gt;. &amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Microsoft has resolved an Information Disclosure vulnerability in Word (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36761" rel="noopener" target="_blank"&gt;CVE-2023-36761&lt;/a&gt;) that has been exploited in the wild. The vulnerability is only rated as Important by Microsoft and has a CVSSv3.1 score of 6.2, but the confirmed exploitation should raise this on your priority list. The Preview Pane can also be used as an attack vector, making it easier to target users to exploit the vulnerability. If exploited, the attacker could gain access to NTLM hashes.&lt;/li&gt;
	&lt;li&gt;Microsoft has resolved an Elevation of Privilege vulnerability in the Microsoft Streaming Service Proxy (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36802" rel="noopener" target="_blank"&gt;CVE-2023-36802&lt;/a&gt;). The vulnerability is only rated as Important by Microsoft and has a CVSSv3.1 score of 7.8, but the confirmed exploitation should raise this on your priority list. If exploited the attacker could gain SYSTEM privileges on the target system.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Third-party update&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Google has resolved a Critical heap buffer overflow vulnerability in the Chrome browser (&lt;a href="https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html" rel="noopener" target="_blank"&gt;CVE-2023-4863&lt;/a&gt;). Google is aware that an exploit for CVE-2023-4863 exists in the wild. Windows instances should update to 116.0.5845.187/.188 and for MacOS and Linux 116.0.5845.187.&lt;/li&gt;
	&lt;li&gt;Adobe Acrobat and Reader released &lt;a href="https://helpx.adobe.com/security/products/acrobat/apsb23-34.html" rel="noopener" target="_blank"&gt;APSB23-34&lt;/a&gt;, resolving one critical vulnerability (CVE-2023-26369) that is confirmed to be exploited in the wild. The vulnerability is an out-of-bounds write vulnerability that could allow an attacker to execute arbitrary code.&lt;/li&gt;
	&lt;li&gt;Mozilla has released updates for Firefox and Firefox ESR. No zero-days, just a decent lineup of CVEs resolved.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Linux update&lt;/h2&gt;

&lt;p&gt;There are three CVEs of note on the Linux platforms:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;CVE-2023-3111 is a use after free vulnerability in btrfs in the Linux Kernel affecting all versions of Linux. A use after free vulnerability could allow an attacker to leak data from memory, overwrite critical information, execute arbitrary code and bypass Address Space Layout Randomization (ASLR).&lt;/li&gt;
	&lt;li&gt;CVE-2023-3390 is a vulnerability in the Linux Kernel’s nftables API in the netfilter subsystem that could allow privilege escalation. The vulnerability affects Debian and Ubuntu.&lt;/li&gt;
	&lt;li&gt;CVE-2023-35001 is an out of bounds read\write vulnerability in nftables. These types of vulnerabilities can cause a crash, data corruption, code execution, or allow attackers to read sensitive information from other memory locations.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The changes affect two commonly used components in the Linux Kernel. These components are also used by a variety of solutions from Firewalls to SANs and could affect foundational capabilities.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Btrfs is the filesystem utilized by most Enterprise Linux distributions (Ubuntu, Debian, Redhat, etc.).&lt;/li&gt;
	&lt;li&gt;Nftables is used by any modern firewall solution. Regardless of distribution, it will either be built in through the system itself or third-party applications it will use. The component provides high-performance packet inspection and routing. &amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;None of the vulnerabilities are currently exploited so there is time, but you should take advantage to ensure you are testing the changes across your environment adequately.&lt;/p&gt;

&lt;p&gt;Linux vulnerabilities can have a long tail from publishing of the CVE to patches being made available by Linux distributions. To monitor the latest Linux CVEs,&amp;nbsp;&lt;a href="https://cve.tuxcare.com/els/cve" rel="noopener" target="_blank"&gt;check out TuxCare’s detailed CVE Tracker&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;Apple update&lt;/h2&gt;

&lt;p&gt;Apple released updates resolving two exploited vulnerabilities on September 7. The updates affect iOS, iPadOS and macOS. The two CVEs have confirmed exploits in the wild and &lt;a href="https://www.cisa.gov/news-events/alerts/2023/09/11/cisa-adds-two-known-vulnerabilities-catalog" rel="noopener" target="_blank"&gt;CISA has updated the KEV list&lt;/a&gt; adding these two vulnerabilities.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://support.apple.com/en-us/106361" rel="noopener" target="_blank"&gt;CVE-2023-41061&lt;/a&gt; is a vulnerability in Apple Wallet affecting iPhone and iPad. The vulnerability allows an attacker to create a specially crafted attachment which could allow them to execute arbitrary code.&lt;/li&gt;
	&lt;li&gt;CVE-2023-41064 is a vulnerability in Apple ImageIO affecting iPhone, iPad and macOS. The vulnerability could be used to craft a malicious image which would allow an attacker to execute arbitrary code when processed.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Update priorities for September&lt;/h2&gt;

&lt;p&gt;Windows OS, macOS, iPhone, iPad, all browsers and Adobe Acrobat and Reader. Which pretty much feels like everything.&lt;/p&gt;
</description><pubDate>Tue, 12 Sep 2023 21:17:26 Z</pubDate></item><item><guid isPermaLink="false">c631b2a0-c9e7-4250-b987-eb3b355e1a6b</guid><link>https://www.ivanti.com/en-au/blog/august-2023-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><title>August 2023 Patch Tuesday</title><description>&lt;div&gt;&lt;iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen="" frameborder="0" src="https://www.youtube.com/embed/OESD6bAXqvE" title="YouTube video player"&gt;&lt;/iframe&gt;&lt;/div&gt;

&lt;h2&gt;2023 Year to Date: How Vulnerable Are We?&lt;/h2&gt;

&lt;p&gt;We are past the mid-way point of 2023. The average ransomware payment is up, but the percentage of victims paying the ransom are down. The shift toward a risk-based approach to vulnerability management is moving along, but slowly. Threat actors are fast to move on zero-day and recently resolved vulnerabilities, but just as likely to target vulnerabilities that have been exposed for years.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;img alt="Patch Tuesday graphic." src="https://static.ivanti.com/sites/marketing/media/images/blog/2023/08/microsoftteams-image-12.png"&gt;&lt;/p&gt;

&lt;h2&gt;The shift to data exfiltration only ransoms&lt;/h2&gt;

&lt;p&gt;The Ransomware market is constantly shifting and rapidly innovating and trying new things. The latest shift in tactics to skip the encryption and focus on Data Exfiltration only has made a huge impact on the average ransoms being paid this year, but the drop in victims willing to pay is driving the overall percentage of ransoms paid to an all time low.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.coveware.com/blog/2023/7/21/ransom-monetization-rates-fall-to-record-low-despite-jump-in-average-ransom-payments" rel="noopener" target="_blank"&gt;Coveware’s July 2023 Quarterly Report&lt;/a&gt;&amp;nbsp;is tracking the Average Ransom Payment at $740k (+126% from Q1 2023) and attributes this spike to the massive MOVEit campaign executed by CloP impacting over 1000 companies. While the average ransom paid has spiked due to this massive DXF-Only campaign, it has also driven the overall percentage of victims willing to pay to an all time low of 34%.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;The shift to risk-based vulnerability management continues&lt;/h2&gt;

&lt;p&gt;In&amp;nbsp;&lt;a href="https://www.ivanti.com/en-au/blog/may-2023-patch-tuesday"&gt;Ivanti’s May Patch Tuesday Blog&lt;/a&gt;,&amp;nbsp;I mentioned the CISA KEV (Known Exploited Vulnerabilities) list had reached 925 CVEs and predicted they would reach 1k CVEs by late August. CISA KEV has reached 982 prior to August Patch Tuesday and appears to be slowing down their additions to the list vs previous years. While my prediction is close, I may have been off by a month or so. We shall see as the month of August progresses.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;For those who read&amp;nbsp;&lt;a href="https://www.helpnetsecurity.com/2023/08/04/august-2023-patch-tuesday-forecast/" rel="noopener" target="_blank"&gt;Todd Schell’s Patch Tuesday Forecast&lt;/a&gt;&amp;nbsp;on Help-Net Security last week or caught some of the recent news regarding the CVSS 4.0 public preview.&amp;nbsp;&lt;a href="https://www.first.org/cvss/v4-0/" rel="noopener" target="_blank"&gt;CVSS 4.0&lt;/a&gt;&amp;nbsp;is the next step towards providing a better risk-based approach to assessing vulnerabilities and prioritizing remediation. The question is, will it be enough of a step forward?&lt;/p&gt;

&lt;p&gt;A lot of news focuses on Zero-day vulnerabilities, but CISA KEV is still adding more older CVEs than new ones. Coming into August Patch Tuesday 2023 there have been 114 CVEs added to CISA KEV so far this year. 55 (48.2%) were CVEs first identified in 2023. The additional 59 CVEs (51.8%) were CVEs from 2022 or earlier dating as far back as 2004 (CVE-2004-1464). 76 of the CVEs added in 2023 were CVEs reported in 2022 or 2023 (66%), but one third of the additions were older than 2022. This is a pretty large gap in remediation of exploited vulnerabilities.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Risk-based vulnerability management vs ransomware&lt;/h2&gt;

&lt;p&gt;A risk-based vulnerability management solution can provide the visibility to shift vulnerability remediation to focus on the vulnerabilities actively being used by threat actors, especially ransomware threat actors. Comparing Ivanti Risk-Based Vulnerability Management data vs CISA KEV you can see that progress is being made, but there is still a gap.&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;CISA KEV is tracking 982 CVEs currently vs Ivanti RBVM is tracking almost 39k weaponized vulnerabilities.&lt;/li&gt;
	&lt;li&gt;Ivanti RBVM tracks vulnerabilities tied to Ransomware campaigns and is currently tracking 367 vulnerabilities. CISA KEV contains 132 (~40%) of those CVEs.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;26 of the 367 CVEs tied to Ransomware campaigns were from 2022 or 2023. The majority (341 or ~93%) were older than 2022.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;In the past 30 days there have been 104 CVEs that are trending amongst threat actors (Ransomware, Malware and other sources of exploitation). 18 of the 104 CVEs are from 2023. CISA currently is tracking only 40 of the 104 CVEs.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is not a product pitch (although it is a good one) but calling out that we are still falling behind in the vulnerability remediation race. CVSS 4.0 is a step in the right direction, but not nearly good enough to keep up with the challenges we face. CISA KEV is a good start but has many gaps in visibility especially for the vulnerabilities that are trending and that are tied to ransomware campaigns.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;August 2023 patch tuesday&lt;/h2&gt;

&lt;p&gt;Microsoft has released updates resolving 74 new CVEs this month, one of which is confirmed exploited and six are rated by Microsoft as Critical. Microsoft also updated&amp;nbsp;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884" rel="noopener" target="_blank"&gt;CVE-2023-36884&lt;/a&gt;&amp;nbsp;released in July to split the Office products out into a separate Defense in Depth Advisory (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/ADV230003" rel="noopener" target="_blank"&gt;ADV230003&lt;/a&gt;). Besides the OS and Office updates, Microsoft has updates for Exchange Server, .NET, Azure, SQL Server, and Teams making for a significant lineup this August.&lt;/p&gt;

&lt;p&gt;Additional updates from Google Chrome released on August 3rd&amp;nbsp;and Microsoft Edge (Chromium) updated on August 7th&amp;nbsp;and a lineup of updates from Adobe should also be included in your update activities this month.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Ivanti EPMM vulnerability remediation update&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Ivanti continues to collaborate with threat researchers after the joint release of Cybersecurity Advisories on&amp;nbsp;&lt;a href="https://www.cisa.gov/news-events/alerts/2023/07/24/ivanti-releases-security-updates-endpoint-manager-mobile-epmm-cve-2023-35078" rel="noopener" target="_blank"&gt;CVE-2023-35078&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://www.cisa.gov/news-events/alerts/2023/07/28/ivanti-releases-security-updates-epmm-address-cve-2023-35081" rel="noopener" target="_blank"&gt;CVE-2023-35081&lt;/a&gt;&amp;nbsp;on August 1, 2023, and urged organizations to apply the patches released by the organization. Ivanti is continuing to work actively with customers to upgrade their appliances and helping them apply the fix.&lt;/p&gt;

&lt;p&gt;An additional advisory (CVE-2023-35082 - Remote Unauthenticated API Access Vulnerability) was released on August 2nd&amp;nbsp;and updated on August 7th. An update and additional script is required to remediate the vulnerability.&amp;nbsp;&lt;a href="https://forums.ivanti.com/s/article/KB-Remote-Unauthenticated-API-Access-Vulnerability-CVE-2023-35082?language=en_US" target="_blank"&gt;Guidance on how to remediate&lt;/a&gt;&amp;nbsp;can be found on the Ivanti Community. The update to resolve the previous two CVEs with the additional RPM script will remediate all three vulnerabilities.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;While not confirmed to be used in active exploits in the wild, CVE-2023-35082 has been publicly disclosed by the researchers who discovered it. Ivanti is recommending customers update to the latest version and apply the script as soon as possible to respond to confirmed exploits of CVE-2023-35078 and CVE-2023-35081 and to stay ahead of any attempt to utilize CVE-2023-35082.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Microsoft updates&lt;/h2&gt;

&lt;p&gt;Microsoft updated the affected products listed in&amp;nbsp;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884" rel="noopener" target="_blank"&gt;CVE-2023-36884&lt;/a&gt;&amp;nbsp;removing the Office products originally listed in the CVE. The Office products listed in&amp;nbsp;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/ADV230003" rel="noopener" target="_blank"&gt;ADV230003&lt;/a&gt;&amp;nbsp;are not directly vulnerable, but can be used in an attack chain to exploited CVE-2023-36884. Microsoft has clarified the changes in the Office updates were a Defense in Depth measure. Microsoft recommends applying the Office updates discussed in the advisory in addition to the August Windows OS updates.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a Denial of Service vulnerability in .NET and Visual Studio (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38180" rel="noopener" target="_blank"&gt;CVE-2023-38180&lt;/a&gt;). According to the CVE details code maturity has reached proof-of-concept and it is confirmed to be exploited in the wild. The CVE is only rated as Important and the CVSS v3.1 score is 7.5, but taking a risk-based approach this should be treated as a higher priority this month.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Third Party Updates for August 2023 Patch Tuesday&amp;nbsp;&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Google Chrome released Chrome 115.0.5790.171 on August 3 resolving 11 CVEs.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Microsoft Edge (Chromium 115.0.5790.171) released on August 7 resolving 11 CVEs.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Adobe released Acrobat and Reader (&lt;a href="https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" rel="noopener" target="_blank"&gt;APSB23-30&lt;/a&gt;) resolving 30 CVEs.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Adobe released Commerce (&lt;a href="https://helpx.adobe.com/security/products/magento/apsb23-42.html" rel="noopener" target="_blank"&gt;APSB23-42&lt;/a&gt;) resolving 3 CVEs.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Adobe released Dimension (&lt;a href="https://helpx.adobe.com/security/products/dimension/apsb23-44.html" rel="noopener" target="_blank"&gt;APSB23-44&lt;/a&gt;) resolving 3 CVEs.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Adobe released XMP Toolkit SDK (&lt;a href="https://helpx.adobe.com/security/products/xmpcore/apsb23-45.html" rel="noopener" target="_blank"&gt;APSB23-45&lt;/a&gt;) resolving 1 CVE.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 08 Aug 2023 22:58:39 Z</pubDate></item><item><guid isPermaLink="false">4c628da9-8b78-4b7a-b305-ba4827288147</guid><link>https://www.ivanti.com/en-au/blog/july-2023-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/chris-goettl</atom:uri></atom:author><category>Security</category><category>Patch Tuesday</category><title>July 2023 Patch Tuesday</title><description>&lt;div&gt;&lt;iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen="" frameborder="0" src="https://www.youtube.com/embed/rgltOAO2Sn4" title="YouTube video player"&gt;&lt;/iframe&gt;&lt;/div&gt;

&lt;p&gt;&lt;img alt="Patch Tuesday updates for July 2023 showing 10 bulletins, 7 critical, and 3 important Microsoft vulnerabilities and 2 Mozilla bulletins" src="https://static.ivanti.com/sites/marketing/media/images/blog/2023/07/patchtues-page-blog_july2023.jpg"&gt;&lt;/p&gt;

&lt;p&gt;This month is going to be a painful one, with:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="#Microsoft"&gt;Multiple zero-day exploits being resolved by Microsoft&lt;/a&gt;,&lt;/li&gt;
	&lt;li&gt;&lt;a href="#Kerberos-Netlogon"&gt;Some operational changes for Kerberos and Netlogon vulnerability resolutions&lt;/a&gt;, and&lt;/li&gt;
	&lt;li&gt;&lt;a href="#Post-Tuesday-Updates"&gt;A large lineup of third-party updates releasing on and after July’s Patch Tuesday&lt;/a&gt; – including Oracle's quarterly CPU and Java updates.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id="Kerberos-Netlogon"&gt;&lt;strong&gt;Kerberos and Netlogon Vulnerability Changes&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;July is going to be a big month from an operational perspective.&lt;/p&gt;

&lt;p&gt;A number of changes are going into effect regarding two previously resolved CVEs:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;An Elevation of Privilege vulnerability resolution in Kerberos (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37967" rel="noopener" target="_blank"&gt;CVE-2022-37967&lt;/a&gt;), and&lt;/li&gt;
	&lt;li&gt;An Elevation of Privilege vulnerability in Netlogon RPC (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38023" rel="noopener" target="_blank"&gt;CVE-2022-38023&lt;/a&gt;).&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Both CVEs were resolved in 2022, but the code change alone did not resolve the vulnerabilities.&lt;/p&gt;

&lt;h3&gt;What to expect in July 2023’s updates for Kerberos and Netlogon vulnerabilities&lt;/h3&gt;

&lt;p&gt;Microsoft outlined a phased rollout of enforcement for both vulnerabilities, due to the fact that they are changing some core behaviors in two commonly used authentication mechanisms.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;&lt;a href="https://support.microsoft.com/en-us/topic/kb5020805-how-to-manage-kerberos-protocol-changes-related-to-cve-2022-37967-997e9acc-67c5-48e1-8d0d-190269bf4efb" rel="noopener" target="_blank"&gt;KB5020805&lt;/a&gt; outlines the timing of changes for the Kerberos vulnerability&lt;/strong&gt; (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37967" rel="noopener" target="_blank"&gt;CVE-2022-37967&lt;/a&gt;). For July, Microsoft is stepping up to initial enforcement. The earlier changes have been to add the capabilities to address the security bypass and audit logging to show if organizations had systems that needed attention to prepare for the change.

	&lt;ul&gt;
		&lt;li&gt;&lt;strong&gt;This July 2023&amp;nbsp;OS update will default the behavior to Enforcement mode&lt;/strong&gt;, but still allow an Administrator to override and set Audit mode explicitly.&lt;/li&gt;
		&lt;li&gt;&lt;strong&gt;The future October 10, 2023&lt;/strong&gt;, update will remove the Admin override and default to full enforcement.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;&lt;a href="https://support.microsoft.com/en-us/topic/kb5021130-how-to-manage-the-netlogon-protocol-changes-related-to-cve-2022-38023-46ea3067-3989-4d40-963c-680fd9e8ee25" rel="noopener" target="_blank"&gt;KB5021130&lt;/a&gt; outlines the timing of changes for the Netlogon vulnerability&lt;/strong&gt; (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38023" rel="noopener" target="_blank"&gt;CVE-2022-38023&lt;/a&gt;). For July, Microsoft is stepping up to full enforcement. The earlier changes have been to add the capabilities to address the security bypass and audit logging to show if organizations had systems that needed attention to prepare for the change.
	&lt;ul&gt;
		&lt;li&gt;&lt;strong&gt;This July 2023&amp;nbsp;update will remove the ability &lt;/strong&gt;to override enforcement and allow compatibility mode for RPC Sealing.&lt;/li&gt;
		&lt;li&gt;&lt;strong&gt;After deploying the July update&lt;/strong&gt;, Netlogon will fully enforce RPC Sealing.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id="Microsoft"&gt;&lt;strong&gt;Multiple Zero Days and Public Disclosures from Microsoft for July 2023&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved 130 net new vulnerabilities this month, and there are updates to 9 previously released CVEs. Six CVEs and one Advisory have confirmed exploits.&lt;/p&gt;

&lt;p&gt;One of the six exploited vulnerabilities &lt;a href="https://www.ivanti.com/en-au/blog/may-2023-patch-tuesday" target="_blank"&gt;released originally in May&lt;/a&gt;, and has been updated this month to address all versions of Microsoft Windows.&lt;/p&gt;

&lt;p&gt;This month, I'd specifically like to highlight:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="#CVE-24932"&gt;&lt;strong&gt;CVE-2023-24932&lt;/strong&gt;&lt;/a&gt; (Security Feature Bypass - Secure Boot): Critical Confirmed Exploits&lt;/li&gt;
	&lt;li&gt;&lt;a href="#CVE-36871"&gt;&lt;strong&gt;CVE-2023-36871 &lt;/strong&gt;&lt;/a&gt;(Security Feature Bypass - AD): Functional Code Maturity&lt;/li&gt;
	&lt;li&gt;&lt;a href="#CVE-35311"&gt;&lt;strong&gt;CVE-2023-35311&lt;/strong&gt;&lt;/a&gt; (Security Feature Bypass - Outlook): Critical Confirmed Exploits&lt;/li&gt;
	&lt;li&gt;&lt;a href="#CVE-36884"&gt;&lt;strong&gt;CVE-2023-36884&lt;/strong&gt;&lt;/a&gt; (Remote Code Execution - Office and Windows HTML): Critical Confirmed Exploits&lt;/li&gt;
	&lt;li&gt;&lt;a href="#CVE-36874"&gt;&lt;strong&gt;CVE-2023-36874&lt;/strong&gt;&lt;/a&gt; (Privilege Escalation - Windows Error Reporting): Reported Exploits&lt;/li&gt;
	&lt;li&gt;&lt;a href="#CVE-32049"&gt;&lt;strong&gt;CVE-2023-32049&lt;/strong&gt;&lt;/a&gt; (Security Feature Bypass - SmartScreen): Critical Confirmed Exploits&lt;/li&gt;
	&lt;li&gt;&lt;a href="#CVE-32046"&gt;&lt;strong&gt;CVE-2023-32046&lt;/strong&gt;&lt;/a&gt; (Privilege Escalation - MSHTML): Important Confirmed Exploits&lt;/li&gt;
	&lt;li&gt;&lt;a href="#ADV23001"&gt;&lt;strong&gt;Microsoft Advisory ADV23001&lt;/strong&gt;&lt;/a&gt; - Malicious Signed Drivers&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id="CVE-24932"&gt;&lt;strong&gt;Microsoft CVE-2023-24932&lt;/strong&gt; (Security Feature Bypass - Secure Boot): Critical Confirmed Exploits&lt;/h3&gt;

&lt;p&gt;Microsoft has updated &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24932" rel="noopener" target="_blank"&gt;CVE-2023-24932&lt;/a&gt;, which is a Security Feature Bypass in Secure Boot.&lt;/p&gt;

&lt;p&gt;The CVE was originally resolved in May 2023, but Microsoft has expanded the affected OS versions, and is recommending customers update to the July update on all affected Windows OS version this month. The vulnerability has confirmed exploits in the wild.&lt;/p&gt;

&lt;p&gt;The CVSS v3.1 base score is 6.7 and it is rated as Important by Microsoft. However,&amp;nbsp;with confirmed exploits and publicly disclosed functional code, this vulnerability should be treated as Critical.&lt;/p&gt;

&lt;h3 id="CVE-36871"&gt;&lt;strong&gt;Microsoft CVE-2023-36871 &lt;/strong&gt;(Security Feature Bypass - AD): Functional Code Maturity&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved a Security Feature Bypass in Azure Active Directory (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36871" rel="noopener" target="_blank"&gt;CVE-2023-36871&lt;/a&gt;). The CVE is rated as Important and has a CVSS v3.1 base score of 6.5, but the temporal metrics list code maturity as functional.&lt;/p&gt;

&lt;p&gt;An attacker would require a low privileged session on the user’s device to obtain a JSON web token. The token could thenbe used to create a long-lived assertion using the Windows Hello for Business Key from the victim’s device.&lt;/p&gt;

&lt;p&gt;In this case, the fix is to:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Update to the July update&lt;/strong&gt; on all AD FS servers.&lt;/li&gt;
	&lt;li&gt;Then, &lt;strong&gt;enable the setting&lt;/strong&gt; required to turn on the EnforceNonceInJWT setting.
	&lt;ul&gt;
		&lt;li&gt;The PowerShell command to enable this setting is provided in the CVE article.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id="CVE-35311"&gt;&lt;strong&gt;Microsoft CVE-2023-35311&lt;/strong&gt;&amp;nbsp;(Security Feature Bypass - Outlook): Critical Confirmed Exploits&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved a Security Feature Bypass in Microsoft Outlook (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35311" rel="noopener" target="_blank"&gt;CVE-2023-35311&lt;/a&gt;). This vulnerability has confirmed exploitation.&lt;/p&gt;

&lt;p&gt;The attacker could send a user a specially crafted URL to bypass the Microsoft Outlook Security Notice prompt. The Preview Pane is an attack vector for this vulnerability, but user interaction is required.&lt;/p&gt;

&lt;p&gt;Given the fact that &lt;a href="https://www.ivanti.com/en-au/webinars/2023/phishing-2-0-how-to-stop-cyberattacks-even-pros-can-t-catch" target="_blank"&gt;phishing a user is a statistical challenge&lt;/a&gt;, the priority for getting this fix rolled out is Critical, even though Microsoft’s severity rating is only Important.&lt;/p&gt;

&lt;h3 id="CVE-36884"&gt;&lt;strong&gt;Microsoft CVE-2023-36884&lt;/strong&gt; (Remote Code Execution - Office and Windows HTML): Critical Confirmed Exploits&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved a Remote Code Execution vulnerability in Office and Windows HTML (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884" rel="noopener" target="_blank"&gt;CVE-2023-36884&lt;/a&gt;). The CVE is rated as Important, but has confirmed reports of exploitation in the wild and functional code has been publicly disclosed for this vulnerability.&lt;/p&gt;

&lt;p&gt;An attacker could create a specially crafted Microsoft Office document that enables them to perform remote code execution in the context of the victim.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Microsoft has not yet released an update to fix this issue,&lt;/strong&gt; but has provided a configuration level mitigation to block Office applications from creating child processes. Running as least privileged could also help to mitigate the attack and require the attacker to execute additional exploits to elevate their privilege level.&lt;/p&gt;

&lt;p&gt;Microsoft has released a &lt;a href="https://aka.ms/Storm-0978" rel="noopener" target="_blank"&gt;blog entry&lt;/a&gt; describing steps that can be taken to protect systems until a fix becomes available.&lt;/p&gt;

&lt;h3 id="CVE-36874"&gt;&lt;strong&gt;Microsoft CVE-2023-36874&lt;/strong&gt;&amp;nbsp;(Privilege Escalation - Windows Error Reporting): Reported Exploits&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Windows Error Reporting (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36874" rel="noopener" target="_blank"&gt;CVE-2023-36874&lt;/a&gt;). The CVE is rated as important but has reported cases of exploitation. An attacker – with local access to the target machine with permission to create folders and performance traces on the machine&amp;nbsp;– could gain administrator privileges.&lt;/p&gt;

&lt;h3 id="CVE-32049"&gt;&lt;strong&gt;Microsoft CVE-2023-32049&lt;/strong&gt; (Security Feature Bypass - SmartScreen): Critical Confirmed Exploits&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved a Security Feature Bypass vulnerability in Windows SmartScreen (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32049" rel="noopener" target="_blank"&gt;CVE-2023-32049&lt;/a&gt;). The CVE is rated as Important, but Microsoft has confirmed reports of exploitation for this vulnerability increasing the urgency to Critical.&lt;/p&gt;

&lt;p&gt;The attacker can send a user a specially crafted URL that could allow the "Open File – Security Warning" prompt to be bypassed, opening additional opportunities to further compromise the target system.&lt;/p&gt;

&lt;h3 id="CVE-32046"&gt;&lt;strong&gt;Microsoft CVE-2023-32046&lt;/strong&gt; (Privilege Escalation - MSHTML): Important Confirmed Exploits&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Windows MSHTML (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32046" rel="noopener" target="_blank"&gt;CVE-2023-32046&lt;/a&gt;). Microsoft has rated the CVE as Important and has reports of exploitation in the wild.&lt;/p&gt;

&lt;p&gt;An attacker could target a user in a variety of ways, including email- and web-based attack scenarios. If exploited, the attacker would gain the rights of the user that is running the affected application. So,&amp;nbsp;running least privilege would help to mitigate the impact of this vulnerability, forcing&amp;nbsp;the attacker to take additional steps to take full control of the target system.&lt;/p&gt;

&lt;p&gt;While IE 11 has been retired, you will see a reference to IE Cumulative updates listed for Windows Server 2008, 2008 R2, 2012&amp;nbsp;and 2012 R2 due to the MSHTML, EdgeHTML&amp;nbsp;and scripting platforms still being supported.&lt;/p&gt;

&lt;p&gt;If you are installing the Security Only updates on these platforms, Microsoft is recommending running the IE Cumulative update as well to fully resolve the CVE.&lt;/p&gt;

&lt;h3 id="ADV23001"&gt;&lt;strong&gt;Microsoft Advisory ADV23001&lt;/strong&gt; - Malicious Signed Drivers&lt;/h3&gt;

&lt;p&gt;Microsoft has released an Advisory (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/ADV230001" rel="noopener" target="_blank"&gt;ADV23001&lt;/a&gt;) providing guidance on Microsoft Signed Drivers being used maliciously.&lt;/p&gt;

&lt;p&gt;Several developer accounts for the Microsoft Partner Center (MPC) were engaged in submitting malicious drivers to obtain a Microsoft signature.&lt;/p&gt;

&lt;p&gt;Microsoft has released Window Security updates (see their &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/ADV230001" rel="noopener" target="_blank"&gt;"Security Updates" table&lt;/a&gt;) that untrust drivers and driver signing certificates for the impacted files, and has suspended the partners' seller accounts.&amp;nbsp;All the developer accounts involved in this incident were immediately suspended.&lt;/p&gt;

&lt;p&gt;Additionally, Microsoft has implemented blocking detections (Microsoft Defender 1.391.3822.0 and newer) to help protect customers from legitimately signed drivers that have been used maliciously in post-exploit activity.&lt;/p&gt;

&lt;p&gt;For more information about how the Windows Code Integrity feature protects Microsoft customers from revoked certificates, see Microsoft Support's "&lt;a href="https://support.microsoft.com/en-us/topic/kb5029033-notice-of-additions-to-the-windows-driver-stl-revocation-list-d330efa5-3fb7-4903-9f0b-3230d31fca38" rel="noopener" target="_blank"&gt;Notice of additions to the Windows Driver.STL revocation list&lt;/a&gt;".&amp;nbsp;&lt;/p&gt;

&lt;h2 id="Post-Tuesday-Updates"&gt;Third-Party Updates for July 2023&amp;nbsp;– Including Java Updates from Oracle&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Mozilla &lt;/strong&gt;has released updates for Firefox and Firefox ESR.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Adobe &lt;/strong&gt;Acrobat and Reader has an update that appears to be non-security related, but has released updates for Adobe InDesign and ColdFusion.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Google Chrome&lt;/strong&gt; is likely to update on July 11&lt;sup&gt;th&lt;/sup&gt; or shortly after.&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/" rel="noopener" target="_blank"&gt;&lt;strong&gt;Oracle&lt;/strong&gt;’s quarterly CPU (Critical Patch Update)&lt;/a&gt; is due to release on July 18&lt;span&gt;,&amp;nbsp;&lt;/span&gt;with updates for the lineup of Oracle products&amp;nbsp;– including Java.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;As you begin your maintenance this cycle, keep in mind that – after the Oracle Java release – there is a stream of additional updates that will occur, including:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;RedHat OpenJDK,&lt;/li&gt;
	&lt;li&gt;Amazon Corretto,&lt;/li&gt;
	&lt;li&gt;Azul Zulu,&lt;/li&gt;
	&lt;li&gt;Eclipse Adoptium,&lt;/li&gt;
	&lt;li&gt;Adopt OpenJDK, and&lt;/li&gt;
	&lt;li&gt;Other Java frameworks.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 11 Jul 2023 22:31:12 Z</pubDate></item><item><guid isPermaLink="false">e7fde10c-de6d-4885-8000-213275b4ef82</guid><link>https://www.ivanti.com/en-au/blog/june-2023-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><title>June 2023 Patch Tuesday</title><description>&lt;div&gt;&lt;iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen="" frameborder="0" src="https://www.youtube.com/embed/kIFFbMy3DiY" title="YouTube video player"&gt;&lt;/iframe&gt;&lt;/div&gt;

&lt;p&gt;We are at the half-way point for Patch Tuesday releases in 2023. Microsoft has resolved 78 new CVEs and has made updates to seven previously released CVEs for&amp;nbsp;85 CVEs&amp;nbsp;in this month’s update. This month’s update will have a lot more operational focus for organizations as Microsoft has advanced changes in Kerberos and Netlogon to address vulnerabilities originally discovered in 2022.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;img alt="Patch Tuesday infographic" src="https://static.ivanti.com/sites/marketing/media/images/blog/2023/06/patchtues-page-blog_june2023.jpg"&gt;&lt;/p&gt;

&lt;h2&gt;Microsoft updates&lt;/h2&gt;

&lt;p&gt;Microsoft made updates to two previously resolved CVEs that were confirmed to be exploited in the wild.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24880" rel="noopener" target="_blank"&gt;CVE-2023-24880&lt;/a&gt;&amp;nbsp;is a Security Feature Bypass in Windows SmartScreen and was first resolved in March 2023. Microsoft updated the CVSS score of this vulnerability (CVSSv3.1 4.4/4.1). Most organizations have likely patched this already, but the fact that it is confirmed exploited supersedes the CVSS and Microsoft severity of Moderate and should be considered in your prioritization.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527" rel="noopener" target="_blank"&gt;CVE-2021-34527&lt;/a&gt;&amp;nbsp;is a vulnerability in Windows Print Spooler that could allow Remote Code Execution. Yes, this is a blast from the past known as&amp;nbsp;&lt;a href="https://www.cisa.gov/news-events/alerts/2021/06/30/printnightmare-critical-windows-print-spooler-vulnerability" rel="noopener" target="_blank"&gt;PrintNightmare!&lt;/a&gt;&amp;nbsp;The change is&amp;nbsp;documentation-specific. Microsoft “added all supported editions of Windows 10 version 21H2, Windows 11 version 21H2, Windows 11 version 22H2 and Windows Server 2022 as they are affected by this vulnerability.”&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Drilling into the KB articles and looking at the&amp;nbsp;downloads,&amp;nbsp;if you have done any updates since November 8th, 2022 or&amp;nbsp;later,&amp;nbsp;you should be covered from an update perspective, so this should be an information only change for most organizations.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has implemented the third phase of Windows security updates to address an Elevation of Privilege vulnerability in Windows Kerberos (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37967" rel="noopener" target="_blank"&gt;CVE-2022-37967&lt;/a&gt;). The first phase was implemented in November 2022 and added PAC signatures to the Kerberos PAC buffer and added security measures to address the security bypass vulnerability.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Phase two was implemented with the December 2022&amp;nbsp;update&amp;nbsp;and put all devices into Audit mode by default, but still allowed the authentication.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;With this month’s release,&amp;nbsp;Microsoft is removing the ability to disable PAC signature addition. Next month (July 11th, 2023), Microsoft will start the initial enforcement by default, but still allows some override. In October&amp;nbsp;2023,&amp;nbsp;Microsoft will transition to full&amp;nbsp;enforcement,&amp;nbsp;meaning any service tickets without the new PAC signature will be denied. For more&amp;nbsp;details,&amp;nbsp;see&amp;nbsp;&lt;a href="https://support.microsoft.com/en-us/topic/kb5020805-how-to-manage-kerberos-protocol-changes-related-to-cve-2022-37967-997e9acc-67c5-48e1-8d0d-190269bf4efb" rel="noopener" target="_blank"&gt;the following&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Microsoft has implemented the second phase of Windows security updates to address an Elevation of Privilege vulnerability in Netlogon (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38023" rel="noopener" target="_blank"&gt;CVE-2022-38023&lt;/a&gt;). The first phase was implemented in November 2022 and implemented&amp;nbsp;a default&amp;nbsp;compatibility mode that removed the ability to disable RPC sealing. This enforced RPC sealing for Domain Controllers and use of Trusted accounts.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In the June update, Microsoft has moved to Enforced mode by default unless an administrator&amp;nbsp;is explicitly&amp;nbsp;configured to be in compatibility mode. In&amp;nbsp;next month’s release,&amp;nbsp;Microsoft will implement Phase three of the Netlogon changes to remove the ability to run in compatibility mode. For more&amp;nbsp;details,&amp;nbsp;see&amp;nbsp;&lt;a href="https://support.microsoft.com/en-us/topic/kb5021130-how-to-manage-the-netlogon-protocol-changes-related-to-cve-2022-38023-46ea3067-3989-4d40-963c-680fd9e8ee25" rel="noopener" target="_blank"&gt;the following&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Chrome and Adobe updates&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://chromereleases.googleblog.com/" rel="noopener" target="_blank"&gt;Google Chrome has released a security update&lt;/a&gt;&amp;nbsp;resolving five CVEs including one Critical and three High severity CVEs. The most concerning of these five is a use after free in Autofill payments (CVE-2023-3214).&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Adobe has released four Priority 3 updates, three of which include one or more Critical CVEs. The updates affect Adobe Experience Manager, Commerce, Animate and Substance 3D Designer.&amp;nbsp;Adobe’s &lt;a href="https://helpx.adobe.com/security/severity-ratings.html" rel="noopener" target="_blank"&gt;priority definitions identify a priority 3&lt;/a&gt;&amp;nbsp;as an update that&amp;nbsp;“resolves vulnerabilities in a product that has historically not been a target for attackers. Adobe recommends administrators install the update at their discretion.”&lt;/p&gt;
</description><pubDate>Tue, 13 Jun 2023 23:59:38 Z</pubDate></item><item><guid isPermaLink="false">50cbff5b-c6ce-4c6c-ab8a-dd0b732d6c9e</guid><link>https://www.ivanti.com/en-au/blog/may-2023-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><title>May 2023 Patch Tuesday</title><description>&lt;p&gt;It’s Patch Tuesday once again. The&amp;nbsp;&lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" rel="noopener" target="_blank"&gt;CISA KEV database&lt;/a&gt;&amp;nbsp;is now up to 925 CVEs and at the rate it’s&amp;nbsp;increasing,&amp;nbsp;it's likely&amp;nbsp;we'll&amp;nbsp;see it turn over the 1,000&amp;nbsp;mark around&amp;nbsp;late&amp;nbsp;August this year. Apple has released a new capability called&amp;nbsp;&lt;a href="https://support.apple.com/en-us/102657" rel="noopener" target="_blank"&gt;Rapid Security Responses&lt;/a&gt;&amp;nbsp;for iOS,&amp;nbsp;iPad&amp;nbsp;and&amp;nbsp;MacOS. For systems running the latest version of each,&amp;nbsp;they'll&amp;nbsp;start receiving faster responses to security vulnerabilities, security&amp;nbsp;improvements&amp;nbsp;and mitigations. In general, the world is moving quickly toward a risk-based approach to security with the goal of taking faster action to reduce the most possible risk to your environment.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;That's&amp;nbsp;one of the key goals of Ivanti’s Patch Tuesday efforts. To provide quick analysis on&amp;nbsp;what's released&amp;nbsp;from Microsoft and other vendors, identify priorities from a risk perspective and give as much of a heads up as possible regarding changes and known issues that may impact your environment as you roll out the updates each month.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2023/05/patchtues-page-blog_may2023.jpg"&gt;&lt;/p&gt;

&lt;h2&gt;Microsoft updates&lt;/h2&gt;

&lt;p&gt;For&amp;nbsp;May 9th, 2023, Microsoft has resolved&amp;nbsp;51 vulnerabilities, 13 of which were previously released and recently updated. There are three known exploited vulnerabilities resolved this month, one of which was previously released and recently updated.&amp;nbsp;There's&amp;nbsp;one additional publicly disclosed vulnerability&amp;nbsp;that's reached&amp;nbsp;proof-of-concept code&amp;nbsp;maturity,&amp;nbsp;meaning the risk of exploit is high. Six CVEs are rated as Critical, five affecting the Windows OS and one affecting Sharepoint.&lt;/p&gt;

&lt;p&gt;The good news this month is all three known&amp;nbsp;exploits&amp;nbsp;and the public disclosure along with five of the six Critical CVEs will be resolved by pushing the Microsoft OS updates this month.&amp;nbsp;That's&amp;nbsp;going to be your highest priority on the Microsoft side.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a Secure Feature Bypass vulnerability in Secure Boot (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24932" rel="noopener" target="_blank"&gt;CVE-2023-24932&lt;/a&gt;). The vulnerability was reported by SentinelOne and ESET and has been confirmed to be exploited in the wild. The CVE is rated as Important by Microsoft’s assessment algorithms, but with the confirmed exploits you can ignore that severity rating and respond to the real-world risk indicators.&lt;/p&gt;

&lt;p&gt;The vulnerability does require the attacker to have either physical access or administrative permissions on the target system, with which they can install an affected boot policy&amp;nbsp;that'llbe able to bypass Secure Boot to further compromise the system. The vulnerability affects all currently supported versions of the Windows OS.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a Win32k Elevation of Privilege vulnerability (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29336" rel="noopener" target="_blank"&gt;CVE-2023-29336&lt;/a&gt;). The vulnerability was reported by analysts from Avast and has been detected in exploits in the wild. The CVE is rated as Important by Microsoft’s assessment algorithms, but with the confirmed exploits you can ignore that severity rating and respond to the real-world risk indicators. The exploit&amp;nbsp;doesn't&amp;nbsp;require user interaction and if exploited would give the attacker&amp;nbsp;system-level&amp;nbsp;privileges. The vulnerability affects Windows 10 and Server 2008 up to 2016.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a Remote Code Execution vulnerability in Windows OLE (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29325" rel="noopener" target="_blank"&gt;CVE-2023-29325&lt;/a&gt;). The vulnerability was reported by an analyst from Vul Labs. The CVE is rated as Critical and while it&amp;nbsp;hasn't&amp;nbsp;been detected in active exploits in the&amp;nbsp;wild,&amp;nbsp;it does have proof-of-concept level code samples and has been publicly&amp;nbsp;disclosed,&amp;nbsp;meaning the risk of exploit is high. The vulnerability can be exploited over the network and&amp;nbsp;doesn'trequire user&amp;nbsp;interaction,&amp;nbsp;but can easily target a user to be exploited.&lt;/p&gt;

&lt;p&gt;The vulnerability is in the Windows OS, but the Preview Pane in Outlook can be used as an attack vector. Microsoft has even recommended users read email messages in plain text format to mitigate the risk until you can get the update in place. There are other steps and a race condition to win for the attack to be successful, which gives the complexity to exploit as High and may reduce the possibility of this vulnerability being utilised in an attack.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft updated 13 CVEs this month.&amp;nbsp;Most of&amp;nbsp;the updates were only changes to CVSS or URL data in the CVE bulletins. The CVEs that were updated with more than an informational change are:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2013-3900" rel="noopener" target="_blank"&gt;CVE-2013-3900&lt;/a&gt;&amp;nbsp;– WinVerifyTrust Signature Validation vulnerability which has a long history and was updated in April 2023 as well. This vulnerability is known to be exploited. The update this month states that supporting code to resolve this vulnerability has been incorporated into all current Windows OS editions already (as of April 2023 Patch Tuesday release), but a registry key must be set to turn on enforcement.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26928" rel="noopener" target="_blank"&gt;CVE-2022-26928&lt;/a&gt;&amp;nbsp;– Elevation of Privilege vulnerability in Windows OS. Originally released in September 2022. Microsoft expanded the affected products to include all currently supported versions of Windows OS. This will be taken care of as part of your OS updates this month.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Third party security updates&lt;/h2&gt;

&lt;p&gt;Mozilla has released security updates for Firefox and Firefox&amp;nbsp;ESR,&amp;nbsp;resolving 13 CVEs.&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Firefox 113 released resolving 13 CVEs, five of which&amp;nbsp;were&amp;nbsp;rated as high.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Firefox ESR 102.11 released resolving eight CVEs, four of which are rated as high.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For more details from our graphic summary of this month's releases, read our blog post or register for the Ivanti Patch Tuesday webinar (live or on-demand) to get up to date analysis on priorities, known issues and other security news. Visit our&amp;nbsp;&lt;a href="https://www.ivanti.com/en-au/resources/patch-tuesday"&gt;Patch Tuesday page&lt;/a&gt;&amp;nbsp;for more information.&lt;/p&gt;
</description><pubDate>Tue, 09 May 2023 20:22:47 Z</pubDate></item><item><guid isPermaLink="false">9fc9e7be-07eb-49b8-875a-05726ad952a7</guid><link>https://www.ivanti.com/en-au/blog/april-2023-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><title>April 2023 Patch Tuesday</title><description>&lt;p&gt;Microsoft released updates resolving 97 new CVEs and five older CVEs in the April Patch Tuesday release. Seven CVEs are rated as critical this month. The updates affect the Windows OS, Microsoft Office and 365 Apps, .Net Core, Visual Studio, Azure Machine Learning and Service Connector&amp;nbsp;and updates for SQL Server and Microsoft ODBC and OLE DB.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;There’s a new confirmed exploited vulnerability (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28252" rel="noopener" target="_blank"&gt;CVE-2023-28252&lt;/a&gt;) resolved in the Windows OS update this month and Microsoft has updated the affected products list for&amp;nbsp;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2013-3900" rel="noopener" target="_blank"&gt;CVE-2013-3900&lt;/a&gt;, a previously resolved vulnerability that has been confirmed to be exploited.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft updated the affected products list for a WinVerifyTrust Signature Validation vulnerability (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2013-3900" rel="noopener" target="_blank"&gt;CVE-2013-3900&lt;/a&gt;). The vulnerability has been publicly disclosed and has confirmed exploits in the wild. No changes have been made to the guidance from Microsoft. The April update just adds Server Core editions to the affected products list.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Windows Common Log File System Driver (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28252" rel="noopener" target="_blank"&gt;CVE-2023-28252&lt;/a&gt;) that if successfully exploited could allow the attacker to gain SYSTEM privileges. The vulnerability has been confirmed to be exploited in the wild. The vulnerability is rated as Important and affects all currently supported versions of the Windows OS.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a vulnerability in SQL Server which could allow Remote Code Execution (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23384" rel="noopener" target="_blank"&gt;CVE-2023-23384&lt;/a&gt;). The vulnerability is rated as Important and has a CVSS v3.1 score of 7.3. The crash required to exploit the vulnerability would not be easily achieved, but the attack could be attempted over the network as an unauthenticated user.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2023/04/april-patch-tuesday-infographic-.png"&gt;&lt;/p&gt;

&lt;h2&gt;Azure vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved two Azure vulnerabilities this month. Depending on your configuration you may need to take manual steps to resolve these vulnerabilities.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The first is a Security Feature Bypass in Azure Service Connector (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28300" rel="noopener" target="_blank"&gt;CVE-2023-28300&lt;/a&gt;). In order to gain unauthorized access to the target environment the attacker must have RBAC Reader role access or above and would need to chain additional vulnerabilities. The Azure Service Connector updates when Azure Command-Line Interface is updated to the latest version. If you have automatic updates enabled (not enabled by default), no action is needed. If you prefer to manually update Microsoft has &lt;a href="https://learn.microsoft.com/en-us/cli/azure/update-azure-cli" rel="noopener" target="_blank"&gt;an&amp;nbsp;update article for the CLI&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The second is an Information Disclose vulnerability in Azure Machine Learning (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28312" rel="noopener" target="_blank"&gt;CVE-2023-28312&lt;/a&gt;). The vulnerability could allow an attacker to disclose system logs but would not allow ability to modify data or make the service unavailable. To update the Azure Machine Learning Compute Instance&amp;nbsp;&lt;a href="https://learn.microsoft.com/en-us/rest/api/azureml/2022-10-01/compute/update?tabs=HTTP" rel="noopener" target="_blank"&gt;you will need to reference Microsoft’s guidance&lt;/a&gt;. If a compute instance currently exists it will be overwritten by applying the update command.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a Remote Code Execution vulnerability in Raw Image Extension Code (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28291" rel="noopener" target="_blank"&gt;CVE-2023-28291&lt;/a&gt;), a Microsoft Store app. The store app should automatically update, but if you are running a disconnected environment the app would not be automatically updated.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Third-party updates&amp;nbsp;&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Apple released updates resolving two exploited Zero day vulnerabilities (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28205" rel="noopener" target="_blank"&gt;CVE-2023-28205&lt;/a&gt; and &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28206" rel="noopener" target="_blank"&gt;CVE-2023-28206&lt;/a&gt;). The vulnerabilities affect macOS, iOS&amp;nbsp;and iPad OS. Apple started releasing updates on April 7, 2023. More details can be found on the following release pages:&amp;nbsp;&lt;a href="https://support.apple.com/en-gb/102796" rel="noopener" target="_blank"&gt;MacOS 13.3.1&lt;/a&gt;,&lt;a href="https://support.apple.com/en-gb/102795" rel="noopener" target="_blank"&gt;&amp;nbsp;iOS 16.4.1&lt;/a&gt; and&lt;a href="https://support.apple.com/en-gb/102795" rel="noopener" target="_blank"&gt; iPad OS 16.4.1&lt;/a&gt;, &lt;a href="https://support.apple.com/en-gb/102791" rel="noopener" target="_blank"&gt;macOS&amp;nbsp;12.6.5&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://support.apple.com/en-gb/106356" rel="noopener" target="_blank"&gt;11.7.6&lt;/a&gt;,&lt;a href="https://support.apple.com/en-gb/102790" rel="noopener" target="_blank"&gt; iOS/iPad&amp;nbsp;15.7.5&lt;/a&gt;&amp;nbsp;and &lt;a href="https://support.apple.com/en-gb/102797" rel="noopener" target="_blank"&gt;Safari&amp;nbsp;16.4.1&lt;/a&gt;. A&amp;nbsp;&lt;a href="https://www.cisa.gov/news-events/alerts/2023/04/07/cisa-adds-five-known-exploited-vulnerabilities-catalog" rel="noopener" target="_blank"&gt;CISA advisory&lt;/a&gt;&amp;nbsp;on April 7 warned of the active exploits of the two Apple CVEs and three additional 2021 CVEs for Veritas Backup Exec.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.mozilla.org/en-US/security/advisories/mfsa2023-13/" rel="noopener" target="_blank"&gt;Mozilla&amp;nbsp;Firefox 112&lt;/a&gt;&amp;nbsp;and&lt;a href="https://www.mozilla.org/en-US/security/advisories/mfsa2023-14/" rel="noopener" target="_blank"&gt;&amp;nbsp;Firefox ESR 102.10&lt;/a&gt;&amp;nbsp;were released resolving 22 unique vulnerabilities, including eight high severity vulnerabilities.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Adobe released an update for Acrobat and Reader (&lt;a href="https://helpx.adobe.com/security/products/acrobat/apsb23-24.html" rel="noopener" target="_blank"&gt;APSB23-24&lt;/a&gt;). The update is a priority 3 resolving 16 CVEs, 14 of which are rated as Critical.&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/" rel="noopener" target="_blank"&gt;Oracle CPU&lt;/a&gt;&amp;nbsp;will be releasing on April 18. This will include many Oracle solutions including Java. After the Oracle Java release there is a stream of additional updates that will occur. RedHat OpenJDK, Amazon Corretto, Azul Zulu, Eclipse Adoptium, Adopt OpenJDK and other Java frameworks will all begin updating once the Oracle Java release is out. Keep that in mind as you begin your maintenance this cycle.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Prioritization guidance&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;The Windows OS update should be the top priority this month for Microsoft updates to respond to the Zero day exploit (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28252" rel="noopener" target="_blank"&gt;CVE-2023-28252&lt;/a&gt;).&lt;/li&gt;
	&lt;li&gt;Apple updates for macOS, iPad OS, iOS and Safari should also be on top of your priority list to respond to the pair of Zero day exploits (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28205" rel="noopener" target="_blank"&gt;CVE-2023-28205&lt;/a&gt; and &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28206" rel="noopener" target="_blank"&gt;CVE-2023-28206&lt;/a&gt;)&lt;/li&gt;
	&lt;li&gt;Updates for Microsoft Office, Mozilla Firefox and Adobe Acrobat and Reader should be secondary priorities. No active exploits or public disclosures have been reported at this time, but these are more commonly targeted applications and typically have a low risk of impacting users when updated.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;
</description><pubDate>Tue, 11 Apr 2023 21:20:41 Z</pubDate></item><item><guid isPermaLink="false">b8dffa2f-925d-4e8a-8881-e62f1a6724e3</guid><link>https://www.ivanti.com/en-au/blog/march-2023-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><title>March 2023 Patch Tuesday</title><description>&lt;div&gt;&lt;iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen="" frameborder="0" src="https://www.youtube.com/embed/clK8nMc_UHY" title="YouTube video player"&gt;&lt;/iframe&gt;&lt;/div&gt;

&lt;div&gt;
&lt;p&gt;Microsoft has resolved 80 new CVEs this month and expanded four previously released CVEs to include additional Windows versions. This brings the total number of CVEs addressed this month to 84. There are two confirmed zero-day exploits resolved in this month’s updates that impact Microsoft Office and Windows Smart Screen.&lt;/p&gt;

&lt;p&gt;Both exploits are user targeted. There is a total of nine CVEs rated as Critical this month. Eight of the nine Critical CVEs are in the Windows OS update this month. Mozilla has released updates for Firefox and Firefox ESR resolving 13 unique CVEs.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a Security Feature Bypass vulnerability in Windows SmartScreen (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24880" rel="noopener" target="_blank"&gt;CVE-2023-24880&lt;/a&gt;). The vulnerability has been detected in exploits in the wild. According to Microsoft’s FAQ:&lt;/p&gt;

&lt;p&gt;“An attacker can craft a malicious file that would evade Mark of the Web (MOTW) defenses, resulting in a limited loss of integrity and availability of security features such as Protected View in Microsoft Office, which rely on MOTW tagging.”&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This CVE affects all currently supported versions of the Windows OS. The CVSSv3.1 score is only 5.4, which may avoid notice by many organizations and on its own this CVE may not be all that threatening, but it was likely used in an attack chain with additional exploits. Prioritizing this month’s OS update would reduce the risk to your organization.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Microsoft 365 Apps and Microsoft Office (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23397" rel="noopener" target="_blank"&gt;CVE-2023-23397&lt;/a&gt;). The vulnerability has been detected in exploits in the wild. The vulnerability has a CVSSv3.1 of 9.8 and is rated as Critical by Microsoft. According to Microsoft’s FAQ:&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;“The attacker could exploit this vulnerability by sending a specially crafted email which triggers automatically when it is retrieved and processed by the email server. This could lead to exploitation BEFORE the email is viewed in the Preview Pane.”&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;There are additional mitigations included in the CVE page to mitigate some of the risk for this vulnerability. There is also additional documentation for&amp;nbsp;mitigating &lt;a href="https://www.microsoft.com/en-us/download/details.aspx?id=36036" rel="noopener" target="_blank"&gt;Pass-the-Hash&lt;/a&gt; attacks&amp;nbsp;that is recommended by Microsoft to work along with the security update to provide a more effective defense. Microsoft Office and Microsoft 365 Apps should be a priority this month to reduce risk to your organization.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft updated four CVEs this month to expand the impacted software /&amp;nbsp;applications.&amp;nbsp;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-43552" rel="noopener" target="_blank"&gt;CVE-2022-43552&lt;/a&gt;,&amp;nbsp;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23257" rel="noopener" target="_blank"&gt;CVE-2022-23257&lt;/a&gt;,&amp;nbsp;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23825" rel="noopener" target="_blank"&gt;CVE-2022-23825&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23816" rel="noopener" target="_blank"&gt;CVE-2022-23816&lt;/a&gt;&amp;nbsp;all have added additional versions of Windows OS to the affected products list.&lt;/p&gt;

&lt;p&gt;Remediation priorities this month:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Microsoft Office and Microsoft 365 Apps are the top priority.&amp;nbsp;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23397" rel="noopener" target="_blank"&gt;CVE-2023-23397&lt;/a&gt;&amp;nbsp;is able to be exploited&amp;nbsp;before&amp;nbsp;the message is even viewable in the preview pane. Also, look into the additional mitigations recommended in the CVE documentation.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Microsoft Windows should be updated soon if possible.&amp;nbsp;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24880" rel="noopener" target="_blank"&gt;CVE-2023-24880&lt;/a&gt;&amp;nbsp;has been exploited and could be used against your organization.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Ensure all of your browsers are up to date. Mozilla just released updates. Google Chrome and Microsoft Edge (Chromium) have had updates since February. Make sure all of your browsers are up to date.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
</description><pubDate>Tue, 14 Mar 2023 21:17:06 Z</pubDate></item><item><guid isPermaLink="false">637d8457-8c32-4e4f-9b35-ff01ec7def10</guid><link>https://www.ivanti.com/en-au/blog/february-2023-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><title>February 2023 Patch Tuesday</title><description>&lt;div&gt;&lt;iframe allow="accelerometer; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen="" frameborder="0" src="https://www.youtube.com/embed/5kFXBNKuMcU" title="YouTube video player"&gt;&lt;/iframe&gt;&lt;/div&gt;

&lt;h2&gt;Microsoft updates&lt;/h2&gt;

&lt;p&gt;February 2023 Patch Tuesday includes fixes for 76 CVEs from Microsoft affecting Microsoft Windows, .NET Framework, Microsoft Office, SQL Server, Exchange Server, several Azure services, HoloLens &lt;a href="https://msrc.microsoft.com/update-guide/releaseNote/2023-Feb" rel="noopener" target="_blank"&gt;and more&lt;/a&gt;. Nine CVEs are rated as Critical, 67 as Important and three CVEs have known exploits in the wild. The three zero-day vulnerabilities are all rated as Important and have CVSS ratings of 7.8 or less. Organizations are urged to expand their prioritization beyond just vendor severity and CVSS score alone, as many exploited vulnerabilities will be less than Critical or CVSS 8.0, which emphasizes the urgent need to utilize risk-based prioritization methods in your vulnerability management program.&lt;/p&gt;

&lt;p&gt;Microsoft resolved a Remote Code Execution vulnerability in Windows Graphics Component (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21823" rel="noopener" target="_blank"&gt;CVE-2023-21823&lt;/a&gt;), which has been exploited in the wild. The CVE was rated as Important and affects Windows 10 and Server 2008 and later Windows editions. The vulnerability also affects Microsoft Office for iOS, Android and Universal. If exploited, the vulnerability in the Windows OS could allow the attacker to gain SYSTSEM privileges. For the apps, the exploit could lead to Remote Code Execution. Windows customers are urged to update to the latest OS version. For the app updates, Microsoft included additional notes regarding how to update through the Microsoft Store or Play Store.&lt;/p&gt;

&lt;p&gt;Microsoft resolved a Security Feature Bypass in Microsoft Publisher (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21715" rel="noopener" target="_blank"&gt;CVE-2023-21715&lt;/a&gt;). The CVE was rated as Important and affects Microsoft 365 Apps for Enterprise and has been exploited in the wild. Microsoft noted that, “The attack itself is carried out locally by a user with authentication to the targeted system. An authenticated attacker could exploit the vulnerability by convincing a victim, through social engineering, to download and open a specially crafted file from a website which could lead to a local attack on the victim computer.” The exploit can bypass Office macro policies used to block untrusted or malicious files.&lt;/p&gt;

&lt;p&gt;Microsoft resolved an Elevation of Privilege vulnerability in Windows Common Log File System Driver (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23376" rel="noopener" target="_blank"&gt;CVE-2023-23376&lt;/a&gt;), which has been exploited in the wild. The CVE was rated as Important and affects Windows 10 and Server 2008 and later Windows editions. If exploited, the attacker could gain SYSTEM privileges. A privilege escalation vulnerability like this would be used in combination with other vulnerabilities in an attack chain.&lt;/p&gt;

&lt;p&gt;The Microsoft SQL Server update resolves six CVEs, one of which is rated Critical. This is the most security fixes released in a single update for SQL Server in many years.&lt;/p&gt;

&lt;p&gt;The Microsoft Exchange Server update resolves four CVEs, all of which are rated as Important. No public disclosures or known exploits have been included in this update yet, but Exchange has been targeted by sophisticated threat actors in the past couple of years. All four of these are Remote Code Execution vulnerabilities. They shouldn't be left too long.&lt;/p&gt;

&lt;h2&gt;Third-party update round-up&lt;/h2&gt;

&lt;p&gt;Mozilla has released updates for Firefox and Firefox ESR, resolving 19 and 14 CVEs, respectively.&lt;/p&gt;

&lt;p&gt;Google Chrome released updates for Windows and MacOS editions on February 7th resolving 10 CVEs.&lt;/p&gt;

&lt;p&gt;Microsoft Edge (Chromium) released an update on February 9th resolving 11 CVEs.&lt;/p&gt;

&lt;p&gt;Apple released updates for MacOS BigSur (8 CVEs), Monterey (18 CVEs), and Safari (3 CVEs) in late January.&lt;/p&gt;

&lt;p&gt;Oracle’s quarterly CPU released on January 17th and included an update for Java (4 CVEs). This event triggers the release of many Java frameworks in quick succession. There have been updates for Corretto, Azul Zulu, Node.JS and other Java frameworks since the CPU release.&lt;/p&gt;
</description><pubDate>Tue, 14 Feb 2023 21:12:53 Z</pubDate></item><item><guid isPermaLink="false">744073e1-c97e-45d6-a4ae-a354d50e02a9</guid><link>https://www.ivanti.com/en-au/blog/january-2023-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><title>January 2023 Patch Tuesday</title><description>&lt;div&gt;&lt;iframe allow="accelerometer; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen="" frameborder="0" src="https://www.youtube.com/embed/P91LOzehmcE" title="YouTube video player"&gt;&lt;/iframe&gt;&lt;/div&gt;

&lt;p&gt;Microsoft has released updates resolving 101 total vulnerabilities (CVEs), 98 new and 3 revisions to CVEs from November and December of 2022. 11 CVEs are rated as Critical this month. The most urgent of these are one known exploited vulnerability (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21674" rel="noopener" target="_blank"&gt;CVE-2023-21674&lt;/a&gt;), one publicly disclosed vulnerability (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21549" rel="noopener" target="_blank"&gt;CVE-2023-21549&lt;/a&gt;) and an update to an advisory from December 2022 (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/ADV220005" rel="noopener" target="_blank"&gt;ADV220005&lt;/a&gt;).&lt;/p&gt;

&lt;p&gt;Advisory 220005 (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/ADV220005" rel="noopener" target="_blank"&gt;ADV220005&lt;/a&gt;) provides “Guidance on Microsoft Signed Drivers Being Used Maliciously”. Microsoft has included a block list in the January 10, 2023, OS updates which blocks the signing certificates that were compromised. Microsoft recommends all customers update to the January 10, 2023 update to ensure they have the most up-to-date block list.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a known exploited vulnerability (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21674" rel="noopener" target="_blank"&gt;CVE-2023-21674&lt;/a&gt;) in Windows Advanced Local Procedure Call (ALPC) which could allow an Elevation of Privileges. The vulnerability is rated as Important and affects all Windows OS versions. The vulnerability could allow a browser sandbox escape and the attacker could gain SYSTEM privileges.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a publicly disclosed vulnerability (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21549" rel="noopener" target="_blank"&gt;CVE-2023-21549&lt;/a&gt;) in Windows SMB Witness Service which could allow an Elevation of Privileges. To exploit the vulnerability an attacker could execute a specially crated malicious script which executes an RPC call to an RPC host.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This could result in elevation of privilege on the server. The vulnerability is rated as Important and can be exploited over the network without need for user interaction. Public disclosure means enough information regarding this vulnerability has been disclosed publicly giving attackers a head start on reverse engineering the vulnerability to attempt to exploit it.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;For January 10, 2023, Patch Tuesday the majority of the risk is in the Windows OS update across all current versions. It is recommended to prioritize the Windows OS updates as a high priority this month.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Adobe released updates for Adobe Acrobat and Reader (&lt;a href="https://helpx.adobe.com/security/products/acrobat/apsb23-01.html" rel="noopener" target="_blank"&gt;APSB23-01&lt;/a&gt;) that resolve a total of 15 CVEs, 8 of which are rated as Critical. The udpate is a Priority 3, which according to Adobe’s rating system means “This update resolves vulnerabilities in a product that has historically not been a target for attackers. Adobe recommends administrators install the update at their discretion.”&lt;/p&gt;

&lt;p&gt;Oracle’s quarterly CPU will be releasing on Tuesday, January 17. Be prepared for updates for all your favorite Oracle products, but more importantly expect updates for Java and additional updates for Java alternatives like Corretto, AdoptOpenJDK, RedHat OpenJDK, Azul Zulu JDK and others. Oracle’s quarterly CPU starts a domino update effect across the Java solutions.&lt;/p&gt;

&lt;p&gt;&lt;img alt="Patch Tuesday summary Jan 2023" src="https://static.ivanti.com/sites/marketing/media/images/blog/2022/09/patchtues-page-blog_jan2023.jpg"&gt;&lt;/p&gt;

&lt;h2&gt;Windows lifecycle update&lt;/h2&gt;

&lt;p&gt;January 2023 Patch Tuesday is the final extended support update (ESU) for Windows 7, Server 2008 and 2008 R2. Microsoft will be continuing one additional year of ESU support for Server 2008 and Server 2008 R2, but only if it is running in Azure.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;January 2023 Patch Tuesday is also the last security update for Windows 8.1.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Windows Server 2012 and 2012 R2 will reach its end date on October 10, 2023. Microsoft will offer ESU support for three years starting from October 11, 2023. More details, including migration guidance and a lifecycle FAQ, can be found on the&amp;nbsp;&lt;a href="https://learn.microsoft.com/en-us/lifecycle/products/windows-server-2012-r2" rel="noopener" target="_blank"&gt;Server 2012 R2 lifecycle page&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Guidance for Exchange customers about ProxyNotShell and OWASSRF exploits with the recent Play Ransomware attack against Rackspace customers&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Microsoft responded to the initial ProxyNotShell exploit with two recommendations. A “URL Rewrite rule” and “Disable Remote Powershell for non-admins”. Microsoft is still recommending the latter disabling of powershell for non-admins as general guidance. The URL Rewrite rule was modified many times between initial release and November 7th. On November 8th, 2022 when the update for Exchange Server was released,&lt;a href="https://techcommunity.microsoft.com/t5/exchange-team-blog/customer-guidance-for-reported-zero-day-vulnerabilities-in/bc-p/3646787" rel="noopener" target="_blank"&gt;&amp;nbsp;Microsoft’s guidance was updated&lt;/a&gt;:&lt;/p&gt;

&lt;h3&gt;Update 11/8/2022&lt;/h3&gt;

&lt;p&gt;We have now released&amp;nbsp;&lt;a href="https://techcommunity.microsoft.com/t5/exchange-team-blog/released-november-2022-exchange-server-security-updates/ba-p/3669045" rel="noopener" target="_blank"&gt;November 2022 Security Updates for Exchange Server&lt;/a&gt;. Please install those (or newer) updates to address vulnerabilities mentioned in this post. Mitigations are no longer recommended.&lt;/p&gt;

&lt;p&gt;Rackspace stated the Nov 8th&amp;nbsp;patch had caused performance issues for their hosted Exchange services, so they decided to continue to run with the mitigation. There is a lot of gray area for interpretation of what was the best or right answer, but this event brings up two critical points that I think all organizations should keep in mind.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Mitigations are not permanent fixes. In any case where there is a mitigation option it is meant as a short-term solution but will come with some tradeoffs. Log4J’s mitigation could still be protecting you today if you implemented the guidance specific to solutions in your environment. This would come at the cost of some logging features not being available, but the mitigation would still be effective.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;PrintNightmare was a different story. You needed to turn off the print spooler and have no printing ability until the patch was released. In the case of ProxyNotShell and OWASSRF the original mitigation was intended to stop the initial steps used in the ProxyNotShell attack.&lt;/p&gt;

&lt;p&gt;It did not account for other exploit methods that could bypass the URL Rewrite Rule mitigations created to mitigate ProxyNotShell, so it was very narrow in scope to prevent the original attack specifically.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In the case of the Play Ransomware attack the mitigations were never intended to stop OWASSRF’s attack method. Be careful how much long-term trust you put into mitigations as they were never intended to be permanent fixes.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Products and technologies have a shelf life. At some point a vendor does need to move beyond a solution as the cost of completely revamping said solution to meet more modern use cases and needs becomes very difficult. Exchange Server is a good example of the dangers of holding onto a technology too long.&lt;/p&gt;

&lt;p&gt;Security researchers have stressed some fundamental risks with running Exchange Server. The complexities and difficulties of running an Exchange Server implementation with the level of security that Microsoft can deliver through O365 is really the key tradeoff.&lt;/p&gt;

&lt;p&gt;OWASSRF and ProxyNotShell are the most recent, but the 2021 ProxyShell and HAFNIUM exploits were additional examples of high risk of continuing to invest in Exchange Server.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Can an organization run a secure Exchange server instance? Arguably yes, but a sophisticated threat actor with more intimate knowledge of Exchange Server than your organization will continue to find a way to circumvent how effectively you can secure your email services.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;To properly assess this risk, you must assume you are competing with the concerted efforts of very knowledgeable adversaries. If you have not accounted for this in your risk assessment, chances are your organization is continuing to run Exchange Server under false assumptions.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Tue, 10 Jan 2023 21:58:12 Z</pubDate></item><item><guid isPermaLink="false">4570449b-084a-48c3-a149-6ef828607dc4</guid><link>https://www.ivanti.com/en-au/blog/patch-management-is-integral-for-mature-risk-based-prioritization</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/chris-goettl</atom:uri></atom:author><title>Patch Management is Integral for Mature Risk-based Prioritization</title><description>&lt;p&gt;The term ‘patch’ triggers many familiar images – affixing a rubber patch to a blown bike tire, the ubiquitous duct tape repairs of myriad objects, and so on. While these temporary fixes won’t heal the underlying cause, they are a quick and easy solution.&lt;/p&gt;

&lt;p&gt;Our applications and software frequently need patches as well, to fix bugs, security flaws and add feature enhancements. However, in this case, patching is not a temporary band-aid, but rather a proactive planned strategy.&lt;/p&gt;

&lt;p&gt;Patch management is more than just repairing and updating IT software. It remediates vulnerabilities and manages risk. Patching is a subset of risk-based prioritization, and software life-cycle management. Once you identify a critical vulnerability in the operating system or applications, you must seek a resolution. It may require changing a configuration, removing an old certificate, or updating software with a patch.&lt;/p&gt;

&lt;p&gt;Successfully reducing security risk requires extensive research and data analyses. Microsoft’s Patch Tuesday is a critical starting point and a great source for the latest information on security updates. Ivanti has put great effort and resources into providing in-depth analysis, commentary, bulletins, and tools on &lt;a href="https://www.ivanti.com/en-au/blog/topics/patch-tuesday"&gt;Patch Tuesday’s&lt;/a&gt; security relevance and operational impact. We cull Patch Tuesday information, along with third-party update data, and present it in a way that organizations can easily consume. Additionally, we identify the things they should be prioritizing. This enables your teams to better understand how to deal with the constant barrage of vulnerabilities and threats.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;A&lt;/strong&gt;&lt;strong&gt;ccelerating risk prioritization requires knowing your top vulnerabilities&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Effective risk management requires proper research and the assessment of extensive data. This is critical for helping organizations respond to ongoing vulnerabilities and apply risk-based prioritization. Defined policies, rationalized prioritization processes, and well-organized and analyzed data directly impact the reliability and effectiveness of how vulnerabilities are addressed.&lt;/p&gt;

&lt;p&gt;A mature risk-based prioritization practice addresses known vulnerabilities that are rated by importance. On the day Microsoft releases updates, they include documentation that shows vulnerabilities known to be exploited in the wild. They also release other updates that are not known to be actively exploited, and those have lower priority. However, it’s important to understand how risk priorities can shift, so we can better prioritize our activities to best respond to all critical risks.&lt;/p&gt;

&lt;p&gt;A mature risk-based prioritization approach leverages many data sources, including vulnerability trends by threat actors. It includes an automated process that feeds data sources in, analyzes and prioritizes risks, and lists activities in priority order to quickly mitigate risk.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Challenges with managing risk priority by vendor &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Managing risk priority by focusing on vendor-defined severities can fall short of the mark. Risk-based prioritization takes a broad focus on risk metrics, rather than relying on a single vendor’s severity. The key is identifying, prioritizing and mitigating all critical vulnerabilities, including additional data points to classify the most critical risks to your environment. A single vendor severity simply isn’t enough.&lt;/p&gt;

&lt;p&gt;There are many cases where the vendor’s prioritization does not reflect real world risk. Due to the nature of how vendors classify severity, a vulnerability could be classified as important, but known to be actively exploited on the day an update was released. Additional risk metrics like exploited and publicly disclosed vulnerabilities must be considered. Even telemetry on what is trending among threat actors will focus priorities to ensure the most dangerous threats are quickly resolved.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;An evolutionary process&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Mature risk-based prioritization encompasses an ecosystem with multiple solutions and vendors working cohesively together. An effective intelligence gathering and integration process must bridge the gap between security vulnerability assessments, threat intelligence solutions, and patch management.&lt;/p&gt;

&lt;p&gt;Ivanti is helping to bridge this gap. We take the vulnerability assessment and other patch data, feed it into process management, prioritize vulnerabilities, and drive appropriate actions into the patch management system for rapid remediation. &lt;a href="https://www.ivanti.com/en-au/en-au/en-au/products/ivanti-neurons-for-patch-management" target="_blank"&gt;Ivanti Neurons for Patch Intelligence&lt;/a&gt;&amp;nbsp;helps users easily research, prioritize, and receive better insights for best practice patch management, within one central location. We continue to expand these capabilities to create robust solutions around this evolving practice.&lt;/p&gt;

&lt;p&gt;However, there is no panacea or silver bullet that fully automates processes and integrates everything - end-to-end. Like digital transformation, the alignment of patch management and risk-based prioritization is a layered process and an evolutionary journey.&lt;/p&gt;

&lt;p&gt;Mature risk-based prioritization requires continuous vulnerability management. There are many challenges in overcoming the gaps between security vulnerability assessments, threat intelligence solutions, and patch management. The handoff process must take additional risk metrics into account, or crucial vulnerabilities will be overlooked.&lt;/p&gt;
</description><pubDate>Thu, 15 Apr 2021 22:46:34 Z</pubDate></item><item><guid isPermaLink="false">77aa5536-957c-49e8-9e37-663361a115af</guid><link>https://www.ivanti.com/en-au/blog/ivanti-neurons-self-securing</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/chris-goettl</atom:uri></atom:author><category>Security</category><title>Evolving Your Security Strategy Toward Self-Securing With Ivanti Neurons</title><description>&lt;p&gt;&lt;a href="https://www.ivanti.com/en-au/ivanti-neurons" target="_blank" rel="noopener"&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2020/07/blog-cta-banner-160x600.png"&gt;&lt;/a&gt;Threat actors move fast. They are agile and will shift tactics as opportunities present themselves. As the COVID-19 pandemic changed how we had to work and manage our users and environments, threat actors also made changes. They adapted to a new opportunity and they did so very quickly. &lt;a href="https://www.zscaler.com/blogs/security-research/30000-percent-increase-covid-19-themed-attacks" target="_blank" rel="noopener"&gt;ZScaler released a report in April&lt;/a&gt; showing the increase in COVID themed attacks increasing 30,000% between January and March this year. In just a few months, threat actors made a wholesale shift in tactics to take advantage of a large opportunity. Now that is business agility that many of us can only envy.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.rand.org/content/dam/rand/pubs/research_reports/RR1700/RR1751/RAND_RR1751.pdf" target="_blank" rel="noopener"&gt;According to a research study from RAND&lt;/a&gt;, threat actor can exploit a vulnerability in a median 22 days and most exploits will have a shelf life of 7 years. &lt;a href="https://www.recordedfuture.com/blog/top-vulnerabilities-2019" target="_blank" rel="noopener"&gt;An annual report from Recorded Futures&lt;/a&gt; that shows the most commonly exploited vulnerabilities from 2019 confirms this. Most exploits are compromising vulnerabilities that have been around for some time.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;How do we counter this level of agility and adaptability from threat actors? By adapting ourselves. We need to shift toward a self-securing strategy. Yes, threat actors are gaining in sophistication, but at the root of that sophistication is the same tactical execution that they have been doing for years. Reconnaissance, exploit vulnerabilities, gain persistence, move laterally, exfiltrate/encrypt data. They are performing the same activities, just with more automated and augmented capabilities.&lt;/p&gt;

&lt;p&gt;What do we mean by self-securing? Through analyzing attackers' methods and the use of automation and machine learning we can react more quickly to real threats. This adaptive security approach is made up of three parts:&amp;nbsp;Sensing, Prioritization, and Remediation.&lt;/p&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2020/07/selfsecuring.png"&gt;&lt;/p&gt;

&lt;h3&gt;Sensing&lt;/h3&gt;

&lt;p&gt;Discover what is in your environment. Detect running software and configuration and analyze for vulnerabilities. Continuously monitor for changes; new devices being introduced and changes in state of devices in the environment.&lt;/p&gt;

&lt;h3&gt;Prioritization&lt;/h3&gt;

&lt;p&gt;Risk-based prioritization to identify what is actively being exploited and respond to highest risks quickly. Predictive algorithms to anticipate changes and threats and give prescriptive guidance on what to do next.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Noise reduction:&lt;/strong&gt; There is always way to much data and way to many threats to manage everything, but that noise can be reduced to the critical activities that will mitigate the most risk quickly.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Remediation&lt;/h3&gt;

&lt;p&gt;Acting is the most critical part of the process. Identifying thousands or tens of thousands of threats does no good if action is not taken to eliminate those threats.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Proactive:&lt;/strong&gt; As we discussed earlier, threat actors move quickly. We need to be proactive in our responses. The prioritized risks can quickly bubble up to be responded to first. Knowing what is being actively exploited helps optimize remediation efforts.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Adaptive:&lt;/strong&gt; Our remediation capabilities (as well as assessment) need to be able to adapt to the environments and circumstances. The COVID pandemic is a good example of why this is necessary. As we rapidly shifted to a remote workforce, it is essential that our security capabilities can follow. Public or private clouds, on premises or off premises user systems, corporate devices or BYOD, we need to ensure we can manage and respond to threats to our environment. Finally, we come to Automation.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Automation: &lt;/strong&gt;Threat actors are automating more and more of the attack. This means it can happen fast and at scale. We need to automate the response. Automating the steps, reducing time between steps, and removing human elements wherever possible increases response times and eliminates errors.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The biggest thing to keep in mind is that self-securing does not mean the human is eliminated from the equation. It is a focus on automating activities that can be automated, generating the analytical data needed to make decisions quickly and prioritizing actions for analysts to quickly approve and respond to urgent threats in a timely fashion, which again would be automated. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;Learn more about &lt;a href="https://www.ivanti.com/en-au/ivanti-neurons" target="_blank" rel="noopener"&gt;Ivanti Neurons here&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Tue, 28 Jul 2020 15:46:41 Z</pubDate></item></channel></rss>