{"id":18778,"date":"2022-04-15T10:30:08","date_gmt":"2022-04-15T18:30:08","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/04\/15\/news-12511\/"},"modified":"2022-04-15T10:30:08","modified_gmt":"2022-04-15T18:30:08","slug":"news-12511","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/04\/15\/news-12511\/","title":{"rendered":"April&#039;s Patch Tuesday: a lot of large, diverse and urgent updates"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/08\/hand_reaches_to_activate_controls_with_gear_icons_process_development_update_fix_automate_by_putilich_gettyimages-1220461550_2400x1600-100854509-large.3x2.jpg?auto=webp&amp;quality=85,70\"\/><\/p>\n<p><strong>Credit to Author: Greg Lambert| Date: Fri, 15 Apr 2022 10:40:00 -0700<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">This week&#8217;s Patch Tuesday release was huge, diverse, risky, and urgent, with late update arrivals for Microsoft browsers (<\/span><a href=\"https:\/\/chromereleases.googleblog.com\/2022\/04\/stable-channel-update-for-desktop_14.html\" rel=\"noopener nofollow\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2022-1364<\/span><\/a><span style=\"font-weight: 400;\">) and two zero-day vulnerabilities affecting Windows (<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-26809\" rel=\"noopener nofollow\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2022-26809<\/span><\/a><span style=\"font-weight: 400;\"> and<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-24500\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">CVE-2022-24500<\/span><\/a><span style=\"font-weight: 400;\">). Fortunately, Microsoft has not released any patches for Microsoft Exchange, but this month we do have to deal with more Adobe (PDF) printing related vulnerabilities and associated testing efforts. We have added the Windows and Adobe updates to our &#8220;Patch Now&#8221; schedule, and will be watching closely to see what happens with any further Microsoft Office updates.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As a reminder, Windows 10 1909\/20H2 (Home and Pro) will reach their end of servicing dates on May 10. And if you are looking for an easy way to update your server-based .NET components, Microsoft now has<\/span><a href=\"https:\/\/devblogs.microsoft.com\/dotnet\/server-operating-systems-auto-updates\/\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">.NET auto-update updates for servers<\/span><\/a><span style=\"font-weight: 400;\">. You can find more information on the risk of deploying these Patch Tuesday updates <a href=\"https:\/\/applicationreadiness.com\/assurance-security-dashboard-april-2022\/\" rel=\"noopener nofollow\" target=\"_blank\">in this useful infographic<\/a>.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Given what we know so far, there are three reported high-risk changes included in this month&#8217;s patch release, including:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">More generally, given the large number and diverse nature of the changes for this month&#8217;s cycle, we recommend testing the following areas:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft has updated a number of APIs, including key file and kernel components (<\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/api\/fileapi\/nf-fileapi-findnextfilea\" rel=\"noopener nofollow\" target=\"_blank\"><span style=\"font-weight: 400;\">FindNextFile<\/span><\/a><span style=\"font-weight: 400;\">,<\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/api\/fileapi\/nf-fileapi-findfirststreamw\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">FindFirstStream<\/span><\/a><span style=\"font-weight: 400;\"> and<\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/api\/fileapi\/nf-fileapi-findnextstreamw\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">FindNextStream<\/span><\/a><span style=\"font-weight: 400;\">). Given the ubiquity of these common API calls, we suggest creating a server stress test that employs very heavy local file loads and pay particular attention to the Windows Installer update that requires both install and uninstall testing. Validating application uninstallation routines has fallen out of vogue lately due to improvements with application deployment, but the following should be kept in mind when applications are removed from a system:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I have found that keeping application uninstallation Installer logs and comparing (hopefully the same) information across updates is probably the only accurate method \u2014 &#8220;eyeballing&#8221; a cleaned system is not sufficient. And finally, given the changes to the kernel in this update, test (<\/span><a href=\"https:\/\/en.wikipedia.org\/wiki\/Smoke_testing_(software)\" rel=\"noopener nofollow\" target=\"_blank\"><span style=\"font-weight: 400;\">smoke test<\/span><\/a><span style=\"font-weight: 400;\">) your legacy applications. Microsoft has now included <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/security-update-deployment-information-april-12-2022-kb5012926-a9545214-b8aa-450d-87d1-26a2199c7e75\" rel=\"noopener nofollow\" target=\"_blank\">deployment and reboot requirements in a single page<\/a><\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Each month, Microsoft includes a list of known issues that relate to the operating system and platforms included in the latest update cycle. There are more than usual this month, so I have referenced a few key issues that relate to the latest builds from Microsoft, including:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For more information about known issues, please visit the <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/release-health\/\" rel=\"noopener nofollow\" target=\"_blank\">Windows Health Release<\/a> site<\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This month, we see two major revisions to updates that have been previously released:<\/span><\/p>\n<p><strong>Mitigations and workarounds<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">This is a large update for a Patch Tuesday, so we have seen a larger-than-expected number of documented mitigations for Microsoft products and components, including:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And for the following reported vulnerabilities, Microsoft recommends &#8220;blocking port 445 at the perimeter firewall.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You can <a href=\"https:\/\/docs.microsoft.com\/windows-server\/storage\/file-server\/smb-secure-traffic\" rel=\"noopener nofollow\" target=\"_blank\">read more here<\/a> about securing these vulnerabilities and your SMB networks<\/span><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Each month, we break down the update cycle into product families (as defined by Microsoft) with the following basic groupings:<\/span><\/p>\n<p><strong>Browsers<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">There were no critical updates to any of Microsoft\u2019s browsers. There were 17 updates to the Chromium project&#8217;s Edge browser, which, given how they were implemented, should have marginal to no effect on enterprise deployments. All these updates were released last week as part of the Chromium update cycle. However, it looks like we will see another set of<\/span><a href=\"https:\/\/chromereleases.googleblog.com\/2022\/04\/stable-channel-update-for-desktop_14.html\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">critical\/emergency Chrome updates<\/span><\/a><span style=\"font-weight: 400;\">\u00a0with reports of<\/span><a href=\"https:\/\/chromereleases.googleblog.com\/2022\/04\/stable-channel-update-for-desktop_14.html\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">CVE-2022-1364<\/span><\/a><span style=\"font-weight: 400;\"> exploited in the wild. This will be the third set of emergency updates this year. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">If your IT team is seeing large numbers of<\/span><a href=\"https:\/\/www.ghacks.net\/2022\/04\/14\/browsers-are-crashing-with-error-code-0xc0000022-after-installing-the-april-2022-windows-updates\/\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">unexpected browser crashes<\/span><\/a><span style=\"font-weight: 400;\">, you may be vulnerable to this very serious<\/span><a href=\"https:\/\/bufferoverflows.net\/type-confusion-vulnerabilities\/\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">type confusion\u00a0issue<\/span><\/a><span style=\"font-weight: 400;\">\u00a0in the V8 JavaScript engine. Microsoft has not released any updates this month for its other browsers. So, now is a good time to ensure your emergency change management practices are in place to support large, very rapid changes to key desktop components (such as browser updates).<\/span><\/p>\n<p><strong>Windows<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">This Patch Tuesday delivered a large number of updates to the Windows platform. With over 117 reported fixes (now 119) covering key components of both desktop and server platforms including:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With all of these varied patches, this update carries a diverse testing profile and, unfortunately with the recent reports of<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-26809\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">CVE-2022-26809<\/span><\/a><span style=\"font-weight: 400;\"> and<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-24500\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">CVE-2022-24500<\/span><\/a><span style=\"font-weight: 400;\"> exploited in the wild, a sense of urgency. In addition to these two worm-able, zero-day exploits, Microsoft has recommended immediate mitigations (blocking network ports) against five reported vulnerabilities. We have also been advised that for most large organizations, testing Windows installer (install, repair and uninstall) is recommended for core applications, further increasing some of the technical effort required before general deployment of these patches. And, yes, printing is going to be an issue. We suggest a focus on printing large PDF files over remote (VPN) connections as a good start to your testing regime. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Add this large Windows update to your &#8220;Patch Now&#8221; release schedule.<\/span><strong>\u00a0<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Though Microsoft has released five updates for the Office platform (all rated as important), this is really a &#8220;let&#8217;s update Excel release&#8221; with<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-24473\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">CVE-2022-24473<\/span><\/a><span style=\"font-weight: 400;\"> and<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-26901\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">CVE-2022-26901<\/span><\/a><span style=\"font-weight: 400;\"> addressing potential arbitrary code execution (<\/span><a href=\"https:\/\/en.wikipedia.org\/wiki\/Arbitrary_code_execution\" rel=\"noopener nofollow\" target=\"_blank\"><span style=\"font-weight: 400;\">ACE<\/span><\/a><span style=\"font-weight: 400;\">) issues. These are two serious security issues that when paired with an elevation-of-privilege vulnerability leads to a &#8220;click-to-own&#8221; scenario. We fully expect that this vulnerability will be reported as exploited in the wild in the next few days. Add these Microsoft Office updates to your standard patch release schedule.<\/span><\/p>\n<p><strong>Microsoft Exchange Server<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Fortunately for us, Microsoft has not released any update for Exchange Server this month. That said, the return of Adobe PDF issues should keep us busy.<\/span><\/p>\n<p><strong>Microsoft development platforms<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">For this cycle, Microsoft released six updates (all rated as important) to its development platform affecting Visual Studio, GitHub, and the .NET Framework. Both the Visual Studio (<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-24513\" rel=\"noopener nofollow\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2022-24513<\/span><\/a><span style=\"font-weight: 400;\"> and<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-26921\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">CVE-2022-26921<\/span><\/a><span style=\"font-weight: 400;\">) and the GitHub (<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-24765\" rel=\"noopener nofollow\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2022-24765<\/span><\/a><span style=\"font-weight: 400;\">,<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-24767\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">CVE-2022-24767<\/span><\/a><span style=\"font-weight: 400;\">) vulnerabilities are application-specific and should be deployed as application-specific updates. However, the .NET patch (<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-26832\" rel=\"noopener nofollow\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2022-26832<\/span><\/a><span style=\"font-weight: 400;\">) affects all currently supported .NET versions and will likely be bundled with the latest Microsoft .NET quality updates (read\u00a0<\/span><a href=\"https:\/\/devblogs.microsoft.com\/dotnet\/dotnet-framework-april-2022-updates\/\" rel=\"noopener nofollow\" target=\"_blank\"><span style=\"font-weight: 400;\">more about these updates<\/span>\u00a0<span style=\"font-weight: 400;\">here<\/span><\/a><span style=\"font-weight: 400;\">). We recommend deploying the<\/span><a href=\"https:\/\/github.com\/dotnet\/announcements\/issues\/214\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">.NET April 22 quality updates<\/span><\/a><span style=\"font-weight: 400;\"> with this month&#8217;s patches to reduce your testing time and deployment effort.<\/span><\/p>\n<p><strong>Adobe (really just Reader)<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Well, well, well\u2026, what do we have here? Adobe Reader is back this month with PDF printing causing more headaches for Windows users. For this month, Adobe has released<\/span><a href=\"https:\/\/helpx.adobe.com\/security\/products\/acrobat\/apsb22-16.html\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">APSB22-16<\/span><\/a>,<span style=\"font-weight: 400;\"> which addresses over 62 critical vulnerabilities in how both Adobe Reader and Acrobat handle memory issues (see\u00a0<\/span><a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/416.html\" rel=\"noopener nofollow\" target=\"_blank\"><span style=\"font-weight: 400;\">Use after Free<\/span><\/a><span style=\"font-weight: 400;\">) when generating PDF files. Almost all of these reported security issues could lead to remote code execution on the target system. Additionally, these PDF related issues are linked to several Windows (both desktop and server) printing issues addressed this month by Microsoft. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Add this update to your &#8220;Patch Now&#8221; release schedule.<\/span><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3657754\/aprils-patch-tuesday-a-lot-of-large-diverse-and-urgent-updates.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/08\/hand_reaches_to_activate_controls_with_gear_icons_process_development_update_fix_automate_by_putilich_gettyimages-1220461550_2400x1600-100854509-large.3x2.jpg?auto=webp&amp;quality=85,70\"\/><\/p>\n<p><strong>Credit to Author: Greg Lambert| Date: Fri, 15 Apr 2022 10:40:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p><span style=\"font-weight: 400;\">This week&#8217;s Patch Tuesday release was huge, diverse, risky, and urgent, with late update arrivals for Microsoft browsers (<\/span><a href=\"https:\/\/chromereleases.googleblog.com\/2022\/04\/stable-channel-update-for-desktop_14.html\" rel=\"noopener nofollow\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2022-1364<\/span><\/a><span style=\"font-weight: 400;\">) and two zero-day vulnerabilities affecting Windows (<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-26809\" rel=\"noopener nofollow\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2022-26809<\/span><\/a><span style=\"font-weight: 400;\"> and<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-24500\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">CVE-2022-24500<\/span><\/a><span style=\"font-weight: 400;\">). Fortunately, Microsoft has not released any patches for Microsoft Exchange, but this month we do have to deal with more Adobe (PDF) printing related vulnerabilities and associated testing efforts. We have added the Windows and Adobe updates to our &#8220;Patch Now&#8221; schedule, and will be watching closely to see what happens with any further Microsoft Office updates.\u00a0<\/span><\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3657754\/aprils-patch-tuesday-a-lot-of-large-diverse-and-urgent-updates.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10516,10909,714,24580,10525],"class_list":["post-18778","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-microsoft","tag-microsoft-office","tag-security","tag-small-and-medium-business","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18778","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18778"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18778\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18778"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18778"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18778"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}