{"id":18055,"date":"2022-02-02T10:48:03","date_gmt":"2022-02-02T18:48:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/02\/02\/news-11788\/"},"modified":"2022-02-02T10:48:03","modified_gmt":"2022-02-02T18:48:03","slug":"news-11788","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/02\/02\/news-11788\/","title":{"rendered":"Patch Tuesday gets off to a busy start for January"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/07\/microsoft_windows_updates_cycle_arrows_laptop_mobile_phone_3x2_1200x800-100851684-large.3x2.jpg?auto=webp&amp;quality=85,70\"\/><\/p>\n<p><strong>Credit to Author: Greg Lambert| Date: Fri, 14 Jan 2022 12:10:00 -0800<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">For this week&#8217;s Patch Tuesday, the first of the year, Microsoft addressed 97 security issues, six of them rated critical. Though six vulnerabilities have been publicly reported, I do not classify them as<\/span> <span style=\"font-weight: 400;\">zero-days<\/span><span style=\"font-weight: 400;\">. Microsoft has fixed a lot of security related issues and is aware of several known issues that may have inadvertently caused significant server issues including:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are a variety of known issues this month, and I&#8217;m not sure whether we&#8217;ll see more issues reported with the January server patches. You can find more information on the risk of deploying these latest updates with our <a href=\"https:\/\/applicationreadiness.com\/assurance-security-dashboard-january-2022\/\" rel=\"noopener nofollow\" target=\"_blank\">helpful infographic<\/a><\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><strong>Key testing scenarios<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">There are no reported high-risk changes to the Windows platform this month. However, there is one reported functional change, and an additional feature added.<\/span><\/p>\n<p><strong>Known issues<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Each month, Microsoft includes a list of known issues that relate to the operating system and platforms included in this update cycle. I&#8217;ve referenced a few key issues that relate to the company&#8217;s latest builds, including:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft is working on the Windows 11 issues, but has yet to respond to the Hyper-V, ReFS, or Domain Controller problems. <\/span><span style=\"font-weight: 400;\">One of the best ways to see whether known issues might affect your target platform is to check out the many configuration options for downloading patch data at the<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-us\" rel=\"nofollow noopener\" target=\"_blank\"> Microsoft Security Update guidance site<\/a><span style=\"font-weight: 400;\">\u00a0or the <a href=\"https:\/\/support.microsoft.com\/es-es\/topic\/security-update-deployment-information-january-11-2022-kb5010029-df340fef-e896-407e-92bf-5e96baf4af23\" rel=\"noopener nofollow\" target=\"_blank\">summary page for this month&#8217;s security update<\/a><\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft has not released any major revisions (or minor documentation changes) for the January Patch release.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Although there are no published mitigations or workarounds relating to the January patches, we expect a response from Microsoft to the Server 2022 patch-related issues within the next few days.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Each month, we break down the update cycle into product families (as defined by Microsoft) with the following basic groupings:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This month sees a mixed bag of updates for Microsoft browsers. Though we don&#8217;t get any patches for the legacy browsers, Microsoft has released five updates that are specific to the Chromium version of Edge. In addition to these changes, the Chromium project has released a further 24 updates to the Chromium browser core. You can find more information about the Microsoft updates<\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/DeployEdge\/microsoft-edge-relnotes-security\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">here<\/span><\/a><span style=\"font-weight: 400;\">, with the release notes for the Chromium project updates found<\/span><a href=\"https:\/\/chromereleases.googleblog.com\/2022\/01\/stable-channel-update-for-desktop.html\" rel=\"nofollow\"> <span style=\"font-weight: 400;\">here<\/span><\/a><span style=\"font-weight: 400;\">. Microsoft has published detailed information on the Microsoft Edge-specific issues (found in the<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-us\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">Security Update Guide<\/span><\/a><span style=\"font-weight: 400;\">) while Google refrains from publishing detailed security and vulnerability information until all patches are released. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Add these Chrome (Edge and Chromium) updates to your regular scheduled update release schedule.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is a significant update to the Windows platform with seven updates rated critical, and a hefty 80 patches rated as important. There are now several reported issues with this month&#8217;s server patches affecting (probably all) Windows domain controllers. If you are seeing the following error message post update \u2014 &#8220;<\/span><i><span style=\"font-weight: 400;\">The system process &#8216;C:Windowssystem32lsass.exe&#8217; terminated unexpectedly with status code -1073741819. The system will now shut down and restart<\/span><\/i><span style=\"font-weight: 400;\">.&#8221; \u2014 you are not alone. There are also significant numbers of<\/span> <span style=\"font-weight: 400;\">reports<\/span><span style=\"font-weight: 400;\"> that <a href=\"https:\/\/www.borncity.com\/blog\/2022\/01\/12\/patchday-windows-8-1-server-2012-r2-updates-11-januar-2022-mgliche-boot-probleme\/#comment-120077\" rel=\"noopener nofollow\" target=\"_blank\">virtual machines on recently updated Hyper-V do not start<\/a>.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Normally, we would recommend a significant testing cycle before a production release of Windows updates. However this month&#8217;s update addresses<\/span><a href=\"https:\/\/nam11.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2Fvulnerability%2FCVE-2022-21907&amp;data=04%7C01%7Ckburke%40virsec.com%7C4574195dd7714054084008d9d53482c1%7Cb9db4e90e1e046c8ac7725cc6454e1d9%7C0%7C0%7C637775243771475117%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=1HgtdMhfXTm2HiPPmMSq2qQ%2FwfCS7ajNA6CZYQ6H6Vs%3D&amp;reserved=0\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">CVE-2022-21907<\/span><\/a><span style=\"font-weight: 400;\"> &#8220;which is a particularly dangerous CVE because of its ability to allow for an attacker to affect an entire intranet once the attack succeeds&#8221;, said Danny Kim, principal architect at <\/span><a href=\"http:\/\/www.virsec.com\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Virsec<\/span><\/a><span style=\"font-weight: 400;\">. The CVE is the latest example of how software capabilities can be warped and weaponized; it \u00a0targets the HTTP trailer support feature, which allows a sender to include additional fields in a message to supply metadata by providing a specially crafted message that can lead to remote code execution.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"> Microsoft says this vulnerability is \u201cwormable\u201d so we recommend that you add this month&#8217;s Windows update to your &#8220;Patch Now&#8221; schedule.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Windows Testing Guidelines<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This month&#8217;s Windows patches included a major update to NTFS (with no functional changes); for more information and suggested testing scenarios, refer to the Microsoft document<\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/fileio\/transactional-ntfs-portal\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">Transactional NTFS (TxF)<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft has released four updates for the venerable Office productivity suite (one rated critical, the remaining three, important). The critical patch (<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-21840\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2022-21840<\/span><\/a><span style=\"font-weight: 400;\">) addresses a remote code execution vulnerability in the Microsoft Core libraries that (thankfully) requires user interaction such as the following scenario by Microsoft: &#8220;In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.&#8221; So, it&#8217;s 2022 and by clicking on an email, we can just give it all away. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft has confirmed that these four patches fully address the issue, so please add this update to your standard Office patch release schedule.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are three updates to the Microsoft Exchange Server platform this month. With two rated as important (<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-21969\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2022-21969<\/span><\/a><span style=\"font-weight: 400;\"> and<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-21855\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">CVE-2022-21855<\/span><\/a><span style=\"font-weight: 400;\">), the focus should be on the critical patch<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-21846\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">CVE-2022-21846<\/span><\/a><span style=\"font-weight: 400;\">. This vulnerability has a very high<\/span><a href=\"https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">CVSS<\/span><\/a><span style=\"font-weight: 400;\"> rating of 9.0. However, the risk of exploitation is much reduced due to the propagation nature of this vulnerabilities&#8217; attack vector. To be successful, an attacker must be present on the network or able to access an adjacent component on the target system (such as Bluetooth). <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft offered the following testing guidelines for these three patches, which include:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Fortunately, we are not expecting the challenging configuration issues this month that we&#8217;ve seen in past updates. So, &#8220;test before deploy&#8221; and add these Exchange updates to your standard server update schedule.<\/span><\/p>\n<p><strong>Microsoft development platforms<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">For this cycle, Microsoft released a single update (<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-21911\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2022-21911<\/span><\/a><span style=\"font-weight: 400;\">) rated as important for its development platforms. This denial-of-service attack does not require user interaction or admin privileges to succeed in compromising a target system. Microsoft has published an official fix for the issue, which may affect .NET COM servers and REGEX expressions. These components will need some testing before deployment of the singular .NET update. You may also have to download these and future updates in a separate file for .NET 4.8 patches. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft has published a blog on <a href=\"https:\/\/devblogs.microsoft.com\/dotnet\/upcoming-updates-for-net-framework-4-8\/\" rel=\"noopener nofollow\" target=\"_blank\">.NET 4.8 release cadences and methodologies<\/a><\/span><span style=\"font-weight: 400;\">. Add this update to your regular patch release schedule.<\/span><\/p>\n<p><strong>Adobe (really just Reader)<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">It&#8217;s back with a vengeance! Adobe has published so many vulnerabilities for its Adobe Reader (and Acrobat) products, I initially thought that the long list of memory related issues addressed the entire Adobe suite. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Nope. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Adobe Reader has seen no less than 26 updates, with 15 rated critical, three as important, and another seven as moderate. All versions are affected, and all currently supported platforms will require an update. You can read more about this (very) long list of updates<\/span><a href=\"https:\/\/helpx.adobe.com\/security\/products\/acrobat\/apsb22-01.html\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">here<\/span><\/a><span style=\"font-weight: 400;\">. Add these Adobe updates to your &#8220;Patch Now&#8221; schedule.<\/span><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3647150\/patch-tuesday-gets-off-to-a-busy-start-for-january.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/07\/microsoft_windows_updates_cycle_arrows_laptop_mobile_phone_3x2_1200x800-100851684-large.3x2.jpg?auto=webp&amp;quality=85,70\"\/><\/p>\n<p><strong>Credit to Author: Greg Lambert| Date: Fri, 14 Jan 2022 12:10:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p><span style=\"font-weight: 400;\">For this week&#8217;s Patch Tuesday, the first of the year, Microsoft addressed 97 security issues, six of them rated critical. Though six vulnerabilities have been publicly reported, I do not classify them as<\/span> <span style=\"font-weight: 400;\">zero-days<\/span><span style=\"font-weight: 400;\">. Microsoft has fixed a lot of security related issues and is aware of several known issues that may have inadvertently caused significant server issues including:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Hyper-V, which no longer starts with the message, &#8220;Virtual machine xxx could not be started because the hypervisor is not running.&#8221;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">ReFS (Resilient) file systems that are no longer accessible (which is kind of ironic).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">And Windows<\/span><a href=\"https:\/\/borncity.com\/win\/2022\/01\/12\/windows-server-januar-2022-sicherheitsupdates-verursachen-boot-schleife\/\" rel=\"nofollow\"> <span style=\"font-weight: 400;\">domain controller boot loops<\/span><\/a>.<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">There are a variety of known issues this month, and I&#8217;m not sure whether we&#8217;ll see more issues reported with the January server patches. You can find more information on the risk of deploying these latest updates with our <a href=\"https:\/\/applicationreadiness.com\/assurance-security-dashboard-january-2022\/\" rel=\"noopener nofollow\" target=\"_blank\">helpful infographic<\/a><\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3647150\/patch-tuesday-gets-off-to-a-busy-start-for-january.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10516,714,24580,10525,10761,24583],"class_list":["post-18055","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-microsoft","tag-security","tag-small-and-medium-business","tag-windows","tag-windows-10","tag-windows-11"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18055","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18055"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18055\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18055"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18055"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18055"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}