{"id":19583,"date":"2022-07-13T05:10:14","date_gmt":"2022-07-13T13:10:14","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/07\/13\/news-13316\/"},"modified":"2022-07-13T05:10:14","modified_gmt":"2022-07-13T13:10:14","slug":"news-13316","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/07\/13\/news-13316\/","title":{"rendered":"Update now\u2014July Patch Tuesday patches include fix for exploited zero-day"},"content":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Wed, 13 Jul 2022 12:21:53 +0000<\/strong><\/p>\n<p>It\u2019s time to triage a lot of <a href=\"https:\/\/www.malwarebytes.com\/business\/vulnerability-patch-management\">patching<\/a> again. Microsoft\u2019s July Patch Tuesday includes an actively exploited local privilege escalation vulnerability in the Windows Client\/Server Runtime Subsystem (CSRSS). This vulnerability immediately made it to the Cybersecurity &amp; Infrastructure Security Agency (CISA) list of <a href=\"https:\/\/blog.malwarebytes.com\/reports\/2021\/11\/cisa-sets-two-week-window-for-patching-serious-vulnerabilities\/\">known to be exploited in the wild list<\/a> that are due for patching by August 2, 2022.<\/p>\n<h2>Microsoft<\/h2>\n<p>In total the Microsoft updates include fixes for 84 vulnerabilities. Four of these vulnerabilities are labelled as \u201cCritical\u201d since they are remote code execution (RCE) vulnerabilities.<\/p>\n<p>Publicly disclosed computer security flaws are listed in the Common Vulnerabilities and Exposures (CVE) database. Its goal is to make it easier to share data across separate vulnerability capabilities (tools, databases, and services). These are the CVEs that ware assigned to the four Critical vulnerabilities:<\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-22029\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2022-22029<\/a>: Windows Network File System (NFS) RCE vulnerability. This vulnerability is not exploitable in NFSV4.1. Prior to updating your version of Windows that protects against this vulnerability, you can mitigate an attack by disabling NFSV3, but this may adversely affect your ecosystem and should only be used as a temporary mitigation.<\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-22039\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2022-22039<\/a>: Another Windows Network File System (NFS) RCE vulnerability. It&#8217;s possible to exploit this vulnerability over the network by making an unauthenticated, specially crafted call to a Network File System (NFS) service to trigger an RCE.<\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-22038\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2022-22038<\/a>: Remote Procedure Call Runtime RCE vulnerability. Successful exploitation of this vulnerability requires an attacker to invest time in repeated exploitation attempts through sending constant or intermittent data.<\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-30221\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2022-30221<\/a>: Windows Graphics Component RCE vulnerability. An attacker would have to convince a targeted user to connect to a malicious RDP server. On connecting, the malicious server could execute code on the victim&#8217;s system in the context of the targeted user.<\/p>\n<h2>Azure Site Recovery<\/h2>\n<p>A huge part of the patches consist of 32 vulnerabilities in the Azure Site Recovery suite that could have allowed attackers to gain elevated privileges or perform remote code execution. <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/site-recovery\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Azure Site Recovery<\/a> is an integrated disaster recovery service for Azure that helps ensure business continuity by keeping business apps and workloads running during outages.<\/p>\n<p>According to Microsoft, <a href=\"https:\/\/www.malwarebytes.com\/glossary\/sql-injection\">SQL injection<\/a> vulnerabilities caused most of the privilege escalation bugs in Azure Site Recovery.<\/p>\n<h2>CVE-2022-22047<\/h2>\n<p>The vulnerability that is known to be exploited in the wild is an elevation of privilege (EoP) vulnerability. An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.<\/p>\n<p>This type of vulnerability usually comes into play once an attacker has gained an initial foothold. They can then use this vulnerability to gain more permissions and expand their access to the compromised system.<\/p>\n<p>The vulnerability is described as a Windows CSRSS Elevation of Privilege vulnerability. CSRSS is the Windows component that provides the user mode side of the Win32 subsystem. CSRSS is critical for a system\u2019s operation and is mainly responsible for Win32 console handling and GUI shutdown.<\/p>\n<p>This type of vulnerability are often chained together with others in macros, which makes the decision to <a href=\"https:\/\/blog.malwarebytes.com\/business\/2022\/07\/microsoft-appears-to-be-rolling-back-office-macro-blocking\/\">roll back Office Macro blocking<\/a> incomprehensible, even if it is only temporary.<\/p>\n<h2>Other vendors<\/h2>\n<p>Other vendors have synchronized their periodic updates with Microsoft. Here are few major ones that you may find in your environment.<\/p>\n<p>Adobe released&nbsp;<a href=\"https:\/\/helpx.adobe.com\/security.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">security updates<\/a>&nbsp;for Acrobat, Character Animator, Photoshop,&nbsp;&nbsp;Reader, and RoboHelp.<\/p>\n<p>Cisco released critical updates for Cisco Expressway Series, Cisco TelePresence Video Communication Server, Cisco Email Security Appliance, Cisco Secure Email and Web Manager, Cisco Small Business RV110W, RV130, RV130W, and RV215W routers, and <a href=\"https:\/\/tools.cisco.com\/security\/center\/publicationListing.x\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">several other security updates<\/a>.<\/p>\n<p>Citrix released <a href=\"https:\/\/support.citrix.com\/article\/CTX461397\/citrix-hypervisor-security-bulletin-for-cve202223816-and-cve202223825\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">hotfixes<\/a> to address a problem that may affect Citrix Hypervisor and Citrix XenServer under some circumstances.<\/p>\n<p>Google released <a href=\"https:\/\/source.android.com\/security\/bulletin\/2022-07-01\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Android&#8217;s July security updates<\/a> including 3 labelled as \u201cCritical\u201d.<\/p>\n<p>SAP released its <a href=\"https:\/\/dam.sap.com\/mac\/app\/e\/pdf\/preview\/embed\/ucQrx6G?ltr=a&amp;rc=10\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">July 2022 Patch Day bulletin<\/a> with 20 new Security Notes.<\/p>\n<p>VMWare released <a href=\"https:\/\/www.vmware.com\/security\/advisories.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">security updates<\/a>.<\/p>\n<p>Stay safe, everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/07\/update-now-july-patch-tuesday-patches-include-fix-for-exploited-zero-day\/\">Update now\u2014July Patch Tuesday patches include fix for exploited zero-day<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/07\/update-now-july-patch-tuesday-patches-include-fix-for-exploited-zero-day\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Wed, 13 Jul 2022 12:21:53 +0000<\/strong><\/p>\n<p>July&#8217;s Patch Tuesday gives us a lot of important security updates. Most prominently, a known to be exploited vulnerability in Windows CSRSS.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/07\/update-now-july-patch-tuesday-patches-include-fix-for-exploited-zero-day\/\">Update now\u2014July Patch Tuesday patches include fix for exploited zero-day<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[11414,26945,11560,20352,26946,26934,26935,26936,26938,26940,22783,26947,19245,21748,12096,14138],"class_list":["post-19583","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-adobe","tag-azure-site-recovery","tag-cisco","tag-citrix","tag-csrss","tag-cve-2022-22029","tag-cve-2022-22038","tag-cve-2022-22039","tag-cve-2022-22047","tag-cve-2022-30221","tag-exploits-and-vulnerabilities","tag-google-android","tag-patch-tuesday","tag-sap","tag-sql-injection","tag-vmware"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19583","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19583"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19583\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19583"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19583"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19583"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}