{"id":17448,"date":"2020-01-15T08:30:07","date_gmt":"2020-01-15T16:30:07","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2020\/01\/15\/news-11184\/"},"modified":"2020-01-15T08:30:07","modified_gmt":"2020-01-15T16:30:07","slug":"news-11184","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/01\/15\/news-11184\/","title":{"rendered":"Patch Tuesday aftermath: The NSA Crypt32 threat is real, but not yet imminent"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security10-100734740-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Wed, 15 Jan 2020 07:26:00 -0800<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Get ready for your local news station\u2019s weather reporter to start lecturing on the importance of installing Windows patches.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Yesterday we were treated to a remarkable Patch Tuesday. \u201cRemarkable\u201d specifically in the sense that the U.S. National Security Agency was moved to put out a press release (<\/span><a href=\"https:\/\/media.defense.gov\/2020\/Jan\/14\/2002234275\/-1\/-1\/0\/CSA-WINDOWS-10-CRYPT-LIB-20190114.PDF\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">PDF<\/span><\/a><span style=\"font-weight: 400;\">):<\/span><\/p>\n<p><span style=\"font-weight: 400;\">NSA recommends installing all January 2020 Patch Tuesday patches as soon as possible to effectively mitigate the vulnerability on all Windows 10 and Windows Server 2016\/2019 systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That\u2019s a first. Until now, the NSA has never publicly acknowledged its contributions to Microsoft\u2019s patching efforts\u00a0\u2014 nor has it picked up the flogging whip in Microsoft\u2019s patching drive. Security guru Brian Krebs attributes it to a <\/span><a href=\"https:\/\/twitter.com\/briankrebs\/status\/1217125030452256768\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">change of heart <\/span><\/a><span style=\"font-weight: 400;\">at the NSA:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sources say this disclosure from NSA is planned to be the first of many as part of a new initiative at NSA dubbed &#8220;Turn a New Leaf,&#8221; aimed at making more of the agency&#8217;s vulnerability research available to major software vendors and ultimately to the public.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Krebs has an <\/span><a href=\"https:\/\/krebsonsecurity.com\/2020\/01\/patch-tuesday-january-2020-edition\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">excellent overview<\/span><\/a><span style=\"font-weight: 400;\">\u00a0of the security hole, loaded with several mind-bending analogies. Get the tech details of the vulnerability in Kenneth White\u2019s <\/span><a href=\"https:\/\/blog.lessonslearned.org\/chain-of-fools\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Microsoft\u2019s Chain of Fools <\/span><\/a><span style=\"font-weight: 400;\">expos\u00e9. If you haven\u2019t yet been inundated with half-fast explanations, rest assured that every news outlet in the world is in the process of trying to digest and regurgitate <\/span><a href=\"https:\/\/news.ycombinator.com\/item?id=22048619\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">the complexities<\/span><\/a><span style=\"font-weight: 400;\"> of CryptoAPI and Elliptic Curve Cryptography certs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What does it all mean? If someone can crack the CVE-2020-0601 conundrum, they\u2019ll be able to create programs that appear to come from a trusted source. That\u2019s a scary possibility, but it\u2019s a long way from a third-degree polynomial to working ransomware.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And, no, CVE-2020-0601 can\u2019t be used to break into the Windows Update chain.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As of early Wednesday morning, at least one A-list hacker has put together a working \u201cProof of Concept\u201d exploit. Casey Smith (@subTee) <\/span><a href=\"https:\/\/twitter.com\/GossiTheDog\/status\/1217392069188165633\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">has a PoC<\/span><\/a><span style=\"font-weight: 400;\">, but it isn\u2019t yet ready for widespread release. As Kevin Beaumont says, \u201cIt\u2019s not practical at scale for a variety of reasons.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So with everybody \u2014 the NSA, the \u2018Softies, your weather forecaster, your hairdresser\u2019s boyfriend\u2019s precocious but smelly nine-year-old\u00a0\u2014 recommending that you patch NOW, why wait?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Because there are problems with this month\u2019s Win10 patches.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It always takes time for bugs to surface. This month\u2019s no different. As of very early Wednesday morning, I\u2019m seeing plenty of problem reports when installing the patches \u2014 the same problems we\u2019ve had for many years. Whether any darker problems lie in lurk is anybody\u2019s guess, and it\u2019s still too early to tell.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For now, I\u2019m recommending that you keep all of the Patch Tuesday patches at bay, until we\u2019ve had a chance to see what other surprises await. That assessment may change quickly, so stay alert.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you\u2019re in charge of Server 2012, 2012 R2, 2016 and\/or 2019 systems, there\u2019s a much larger problem you should confront right now. Two of this month\u2019s patched security holes,\u00a0<\/span><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0609\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2020-0609<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0610\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2020-0610<\/span><\/a><span style=\"font-weight: 400;\">, reveal a security hole in the Windows Remote Desktop Gateway, RDgateway, that will let anybody into your system if they crawl in through port 443. As Patch Lady Susan Bradley <\/span><a href=\"https:\/\/www.askwoody.com\/2020\/patch-lady-forget-that-crypto-one-worry-about-this-one\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">puts it<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you are a IT consultant or admin with an Essentials 2012 (or later) server, or use the RDgateway role and expose it over port 443 to allow users to gain access to RDweb or their desktops, forget that crypt32.dll bug. This one is one to worry about.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The January patches should be a top priority for this, active security hole. And of course, if you\u2019re using <\/span><a href=\"https:\/\/kb.pulsesecure.net\/articles\/Pulse_Security_Advisories\/SA44101\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Pulse Connect Secure VPN<\/span><\/a><span style=\"font-weight: 400;\">, or a <\/span><a href=\"https:\/\/www.trustedsec.com\/blog\/critical-exposure-in-citrix-adc-netscaler-unauthenticated-remote-code-execution\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Citrix Gateway\/ADC\/NetScaler box<\/span><\/a><span style=\"font-weight: 400;\"> you have it locked down (or unplugged) by now, right?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This month we had almost no non-security \u201cquality updates\u201d\u00a0\u2014 which is to say, bug fixes. With a few niggling exceptions (one in Win10 version 1809), none of the Windows patches this month include documented non-security bug fixes. In fact, we\u2019ve seen very few non-security patches since October.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">All of which underlines an ongoing problem with the \u201cas a Service\u201d method of bundling all the month&#8217;s patches into one big gob. If we had separate Crypt32 and RDgateway patches, people could choose to fix the big holes while waiting for problem reports on the little ones.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If wishes were horses then hackers would ride.<\/span><\/p>\n<p><em><span style=\"font-weight: 400;\">Stay up-to-the-minute on Crypt32 cracking <\/span><a href=\"https:\/\/www.askwoody.com\/2020\/the-morning-after-i-recommend-that-you-hold-off-on-installing-this-months-patches\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">with AskWoody.com<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/em><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3514350\/patch-tuesday-aftermath-the-nsa-crypt32-threat-is-real-but-not-yet-imminent.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security10-100734740-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Wed, 15 Jan 2020 07:26:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p><span style=\"font-weight: 400;\">Get ready for your local news station\u2019s weather reporter to start lecturing on the importance of installing Windows patches.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Yesterday we were treated to a remarkable Patch Tuesday. \u201cRemarkable\u201d specifically in the sense that the U.S. National Security Agency was moved to put out a press release (<\/span><a href=\"https:\/\/media.defense.gov\/2020\/Jan\/14\/2002234275\/-1\/-1\/0\/CSA-WINDOWS-10-CRYPT-LIB-20190114.PDF\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">PDF<\/span><\/a><span style=\"font-weight: 400;\">):<\/span><\/p>\n<blockquote>\n<p><span style=\"font-weight: 400;\">NSA recommends installing all January 2020 Patch Tuesday patches as soon as possible to effectively mitigate the vulnerability on all Windows 10 and Windows Server 2016\/2019 systems.<\/span><\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3514350\/patch-tuesday-aftermath-the-nsa-crypt32-threat-is-real-but-not-yet-imminent.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10516,714,10525],"class_list":["post-17448","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-microsoft","tag-security","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17448","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17448"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17448\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17448"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17448"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17448"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}