{"id":17597,"date":"2020-01-30T10:30:05","date_gmt":"2020-01-30T18:30:05","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2020\/01\/30\/news-11332\/"},"modified":"2020-01-30T10:30:05","modified_gmt":"2020-01-30T18:30:05","slug":"news-11332","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/01\/30\/news-11332\/","title":{"rendered":"The perils of shouting &#039;fire&#039; in a crowd of PC patchers"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/01\/cw_forest_fire_at_night_by_byronsdad_gettyimages-157478613-100827775-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Thu, 30 Jan 2020 10:14:00 -0800<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Time and again we see the same drama play out. Microsoft releases a security patch and scary warnings appear from every corner. When your local news broadcast tells you that you better patch Windows <\/span><strong><i>right now<\/i><\/strong><span style=\"font-weight: 400;\">\u2026, more temperate advice should prevail.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A little over two weeks ago, on Patch Tuesday, Microsoft released a patch for a security hole known as\u00a0 CVE-2020-0601 \u2013 the Crypt32.dll vulnerability also called\u00a0<\/span><a href=\"https:\/\/www.computerworld.com\/article\/3514350\/patch-tuesday-aftermath-the-nsa-crypt32-threat-is-real-but-not-yet-imminent.html\"><span style=\"font-weight: 400;\">ChainOfFools or CurveBall<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The claxons screamed. In a first, even the U.S. National Security Agency got into the act, first by staking an unprecedented claim on the security hole\u2019s genesis, and then by issuing the first-ever NSA Cybersecurity Advisory (<\/span><a href=\"https:\/\/media.defense.gov\/2020\/Jan\/14\/2002234275\/-1\/-1\/0\/CSA-WINDOWS-10-CRYPT-LIB-20190114.PDF\" rel=\"nofollow\"><span style=\"font-weight: 400;\">PDF<\/span><\/a><span style=\"font-weight: 400;\">) warning folks to duck and cover:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">NSA recommends installing all January 2020 Patch Tuesday patches as soon as possible to effectively mitigate the vulnerability on all Windows 10 and Windows Server 2016\/2019 systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Of course, every news outlet in the world picked it up. What news editor could avoid echoing an NSA pronouncement, for heaven\u2019s sake, even if it involves Elliptic Curve Cryptography certificates, whatever those are? My son\u2019s precocious nine-year-old friend asked me if I\u2019d installed the patch \u2013 then scolded me (in the nicest possible way) when I scoffed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">NSA assesses the vulnerability to be severe and that sophisticated cyber actors will understand the underlying flaw very quickly and, if exploited, would render the previously mentioned platforms as fundamentally vulnerable.The consequences of not patching the vulnerability are severe and widespread. Remote exploitation tools will likely be made quickly and widely available.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To be fair, Microsoft didn\u2019t take up NSA\u2019s sky-is-falling routine. The <\/span><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0601\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2020-0601 warning<\/span><\/a><span style=\"font-weight: 400;\"> says now, as it said then, that this is a not-publicly-disclosed, not-exploited vulnerability with an \u201cImportant\u201d (which is lower than a \u201cCritical\u201d) <\/span><a href=\"https:\/\/isc.sans.edu\/forums\/diary\/Microsoft+Patch+Tuesday+for+January+2020\/25710\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">severity rating<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That didn\u2019t stop the pandits or pundits from recommending that you drop everything and get the Patch Tuesday patches installed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s hardly an isolated incident:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That\u2019s just the past five months. Go back farther and you see the same pattern repeated: Patch gets released. Security folks cry \u201cWolf!\u201d Knowledgeable experts expound. News outlets, industry blogosphere, popular magazines, local TV newscasters and your car mechanic\u2019s brother-in-law parrot the battle cry. People applying patches get embroiled in a tizzy\u2026 and no significant attack ever appears.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That said, there certainly <\/span><strong><i>are <\/i><\/strong><span style=\"font-weight: 400;\">legitimate \u201cget-patched\u201d cries. The BlueKeep security hole in Microsoft Remote Desktop was fixed in <\/span><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0708\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2019-0708<\/span><\/a><span style=\"font-weight: 400;\">, released in May 2019. That patch fixed a vulnerability that was finally exploited (but <\/span><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/11\/07\/the-new-cve-2019-0708-rdp-exploit-attacks-explained\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">not very successfully<\/span><\/a><span style=\"font-weight: 400;\">) in the wild in November. The daddy of them all, WannaCry, started spreading in May 2017 (thank you, NSA), although it had been patched by <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/security-updates\/securitybulletins\/2017\/ms17-010\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">MS17-010 in March<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Viewed from 30,000 feet, the repeat behavior would seem comical \u2013 what\u2019s <\/span><a href=\"https:\/\/www.businessinsider.com\/misattributed-quotes-2013-10\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">that quote about <\/span><\/a><span style=\"font-weight: 400;\">doing the same thing over and over and expecting different results? But it masks two very important, deleterious consequences of crying \u201cWolf!\u201d<\/span><\/p>\n<p><strong>1. Lots of people get stampeded into applying buggy patches.<\/strong> <i><span style=\"font-weight: 400;\">\u00a0<\/span><\/i><span style=\"font-weight: 400;\">I know that some of you feel that the quality of Microsoft\u2019s Windows patching is pretty good, and that it\u2019s getting better. To my mind, recent observations don\u2019t support that conclusion. Take a look at this ongoing <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3216425\/microsoft-patch-alert-january-2020-patches-look-relatively-benign.html\"><span style=\"font-weight: 400;\">list of bad patches <\/span><\/a><span style=\"font-weight: 400;\">and their consequences, going back two and a half years.<\/span><\/p>\n<p><strong>2. Organizations put off patching important holes when they\u2019re distracted by these howlers.<\/strong><span style=\"font-weight: 400;\"> So the CEO or CIO or CFO or some other exec hears about a horrible new security hole, and the people in charge of patching are cowed into fixing the high profile problems first. Heck if the NSA or the US Department of Homeland Security issues an alert, it\u2019s gotta be a big, spooky problem, right? Well, no. In the past few weeks, several organizations have responded to the perceived threat to get the ChainOfFools\/CurveBall security hole plugged, when their time would&#8217;ve been much better spent on more important patches for, <\/span><i><span style=\"font-weight: 400;\">i.a.<\/span><\/i><span style=\"font-weight: 400;\">, <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3515046\/dont-worry-about-curveball-just-yet-get-your-citrix-systems-patched.html\"><span style=\"font-weight: 400;\">Citrix network apps<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/aa20-010a\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Pulse Secure VPN<\/span><\/a><span style=\"font-weight: 400;\">,\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Sky-is-falling organizations have their own priorities, their own chests to beat, their own products to peddle. What\u2019s good for them isn\u2019t necessarily good for you.<\/span><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3518439\/the-perils-of-shouting-fire-in-a-crowd-of-pc-patchers.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/01\/cw_forest_fire_at_night_by_byronsdad_gettyimages-157478613-100827775-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Thu, 30 Jan 2020 10:14:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p><span style=\"font-weight: 400;\">Time and again we see the same drama play out. Microsoft releases a security patch and scary warnings appear from every corner. When your local news broadcast tells you that you better patch Windows <\/span><strong><i>right now<\/i><\/strong><span style=\"font-weight: 400;\">\u2026, more temperate advice should prevail.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A little over two weeks ago, on Patch Tuesday, Microsoft released a patch for a security hole known as\u00a0 CVE-2020-0601 \u2013 the Crypt32.dll vulnerability also called\u00a0<\/span><a href=\"https:\/\/www.computerworld.com\/article\/3514350\/patch-tuesday-aftermath-the-nsa-crypt32-threat-is-real-but-not-yet-imminent.html\"><span style=\"font-weight: 400;\">ChainOfFools or CurveBall<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3518439\/the-perils-of-shouting-fire-in-a-crowd-of-pc-patchers.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10516,13764,714,10525],"class_list":["post-17597","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-microsoft","tag-pcs","tag-security","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17597","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17597"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17597\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17597"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17597"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17597"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}