{"id":18044,"date":"2022-02-02T10:47:04","date_gmt":"2022-02-02T18:47:04","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/02\/02\/news-11777\/"},"modified":"2022-02-02T10:47:04","modified_gmt":"2022-02-02T18:47:04","slug":"news-11777","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/02\/02\/news-11777\/","title":{"rendered":"&#8216;Wormable&#8217; Flaw Leads January 2022 Patch Tuesday"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Tue, 11 Jan 2022 22:18:55 +0000<\/strong><\/p>\n<p><strong>Microsoft<\/strong> today released updates to plug nearly 120 security holes in <strong>Windows<\/strong> and supported software. Six of the vulnerabilities were publicly detailed already, potentially giving attackers a head start in figuring out how to exploit them in unpatched systems. More concerning, Microsoft warns that one of the flaws fixed this month is &#8220;wormable,&#8221; meaning no human interaction would be required for an attack to spread from one vulnerable Windows box to another.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-52647\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2020\/08\/windowsec.png\" alt=\"\" width=\"746\" height=\"545\" \/><\/p>\n<p>Nine of the vulnerabilities fixed in this month&#8217;s Patch Tuesday received Microsoft&#8217;s &#8220;critical&#8221; rating, meaning malware or miscreants can exploit them to gain remote access to vulnerable Windows systems through no help from the user.<\/p>\n<p>By all accounts, the most severe flaw addressed today is <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21907\" target=\"_blank\" rel=\"noopener\">CVE-2022-21907,<\/a> a critical, remote code execution flaw in the &#8220;<strong>HTTP Protocol Stack<\/strong>.&#8221; Microsoft says the flaw affects <strong>Windows 10<\/strong> and <strong>Windows 11<\/strong>, as well as <strong>Server 2019<\/strong> and <strong>Server 2022<\/strong>.<\/p>\n<p>&#8220;While this is definitely more server-centric, remember that Windows clients can also run http.sys, so all affected versions are affected by this bug,&#8221; said <strong>Dustin Childs<\/strong> from <strong>Trend Micro&#8217;s Zero Day Initiative<\/strong>. &#8220;Test and deploy this patch quickly.&#8221;<\/p>\n<p>Quickly indeed. In May 2021, Microsoft patched a similarly critical and wormable vulnerability in the HTTP Protocol Stack; less than a week later, computer code made to exploit the flaw <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/exploit-released-for-wormable-windows-http-vulnerability\/\" target=\"_blank\" rel=\"noopener\">was posted online<\/a>.<\/p>\n<p>Microsoft also fixed three more remote code execution flaws in <strong>Exchange Server<\/strong>, a technology that hundreds of thousands of organizations worldwide use to manage their email. Exchange flaws are a major target of malicious hackers. Almost a year ago, hundreds of thousands of Exchange servers worldwide were compromised by malware after attackers started mass-exploiting four zero-day flaws in Exchange.<\/p>\n<p>Microsoft says the limiting factor with these three newly found Exchange flaws is that an attacker would need to be tied to the target&#8217;s network somehow to exploit them. But <strong>Satnam Narang<\/strong> at <strong>Tenable<\/strong> notes Microsoft has labeled all three Exchange flaws as &#8220;exploitation more likely.&#8221;<\/p>\n<p>&#8220;One of the flaws, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21846\" target=\"_blank\" rel=\"noopener\">CVE-2022-21846<\/a>, was disclosed to Microsoft by the <strong>National Security Agency<\/strong>,&#8221; Narang said. &#8220;Despite the rating, Microsoft notes the attack vector is adjacent, meaning exploitation will require more legwork for an attacker, unlike the ProxyLogon and ProxyShell vulnerabilities which were remotely exploitable.&#8221;<span id=\"more-58072\"><\/span><\/p>\n<p>Security firm <strong>Rapid7<\/strong> points out that roughly a quarter of the security updates this month address vulnerabilities in Microsoft&#8217;s <strong>Edge<\/strong> browser via Chromium.<\/p>\n<p>&#8220;None of these have yet been seen exploited in the wild, though six were publicly disclosed prior to today,&#8221; Rapid7&#8217;s <strong>Greg Wiseman<\/strong> said. &#8220;This includes two Remote Code Execution vulnerabilities affecting open source libraries that are bundled with more recent versions of Windows:\u00a0<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-22947\" target=\"_blank\" rel=\"noopener\">CVE-2021-22947<\/a>, which affects the curl library, and\u00a0<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-36976\" target=\"_blank\" rel=\"noopener\">CVE-2021-36976<\/a>\u00a0which affects libarchive.&#8221;<\/p>\n<p>Wiseman said slightly less scary than the HTTP Protocol Stack vulnerability is <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21840\" target=\"_blank\" rel=\"noopener\">CVE-2022-21840<\/a>,\u00a0which affects all supported versions of Office, as well as Sharepoint Server.<\/p>\n<p>&#8220;Exploitation would require social engineering to entice a victim to open an attachment or visit a malicious website,&#8221; he said. &#8220;Thankfully the Windows preview pane is not a vector for this attack.&#8221;<\/p>\n<p>Other patches include fixes for <strong>.NET Framework<\/strong>, <strong>Microsoft Dynamics<\/strong>, <strong>Windows Hyper-V<\/strong>, <strong>Windows Defender<\/strong>, and the <strong>Windows Remote Desktop Protocol<\/strong> (RDP). As usual, the <strong>SANS Internet Storm Center<\/strong> has a <a href=\"https:\/\/isc.sans.edu\/forums\/diary\/Microsoft+Patch+Tuesday+January+2022\/28230\/\" target=\"_blank\" rel=\"noopener\">per-patch breakdown by severity and impact<\/a>.<\/p>\n<p>Standard disclaimer: Before you update Windows,\u00a0<em>please<\/em>\u00a0make sure you have backed up your system and\/or important files. It\u2019s not uncommon for a Windows update package to hose one\u2019s system or prevent it from booting properly, and some updates have been known to erase or corrupt files.<\/p>\n<p>So do yourself a favor and backup before installing any patches. Windows 10 even has some\u00a0<a href=\"https:\/\/lifehacker.com\/how-to-back-up-your-computer-automatically-with-windows-1762867473\" target=\"_blank\" rel=\"noopener noreferrer\">built-in tools<\/a>\u00a0to help you do that, either on a per-file\/folder basis or by making a complete and bootable copy of your hard drive all at once.<\/p>\n<p>And if you wish to ensure Windows has been set to pause updating so you can back up your files and\/or system before the operating system decides to reboot and install patches on its own schedule,\u00a0<a href=\"https:\/\/www.computerworld.com\/article\/3543189\/check-to-make-sure-you-have-windows-updates-paused.html\" target=\"_blank\" rel=\"noopener noreferrer\">see this guide<\/a>.<\/p>\n<p>If you experience glitches or problems installing any of these patches this month, please consider leaving a comment about it below; there\u2019s a decent chance other readers have experienced the same and may chime in here with useful tips.<\/p>\n<p><strong>Update, Jan. 12, 9:02 a.m.:<\/strong> Apparently some of the updates Microsoft released yesterday &#8212; KB5009557 (2019) and KB5009555 (2022) &#8212; are causing something to fail on domain controllers, which then keep rebooting every few minutes. That&#8217;s according to <a href=\"https:\/\/old.reddit.com\/r\/sysadmin\/comments\/s21ae1\/january_updates_causing_unexpected_reboots_on\/\" target=\"_blank\" rel=\"noopener\">this growing thread on Reddit<\/a> (hat tip to <a href=\"https:\/\/twitter.com\/campuscodi\/status\/1481231994080178180\" target=\"_blank\" rel=\"noopener\">@campuscodi<\/a>).<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2022\/01\/wormable-flaw-leads-january-2022-patch-tuesday\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2020\/08\/windowsec.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Tue, 11 Jan 2022 22:18:55 +0000<\/strong><\/p>\n<p>Microsoft today released updates to plug nearly 120 security holes in Windows and supported software. Six of the vulnerabilities were publicly detailed already, potentially giving attackers a head start in figuring out how to exploit them in unpatched systems. More concerning, Microsoft warns that one of the flaws fixed this month is &#8220;wormable,&#8221; meaning no human interaction would be required for an attack to spread from one vulnerable Windows box to another.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[24598,24599,24600,24601,24602,17775,24603,16888,24604,11566,15086,20501,20502,17061,16936,20667,10415],"class_list":["post-18044","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-cve-2021-22947","tag-cve-2021-36976","tag-cve-2022-21846","tag-cve-2022-21907","tag-dustin-childs","tag-exchange-server","tag-http-protocol-stack","tag-latest-warnings","tag-microsoft-patch-tuesday-january-2022","tag-national-security-agency","tag-rapid7","tag-satnam-narang","tag-tenable","tag-the-coming-storm","tag-time-to-patch","tag-trend-micro","tag-zero-day-initiative"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18044","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18044"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18044\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18044"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18044"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18044"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}