{"id":19815,"date":"2022-08-10T09:30:05","date_gmt":"2022-08-10T17:30:05","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/08\/10\/news-13548\/"},"modified":"2022-08-10T09:30:05","modified_gmt":"2022-08-10T17:30:05","slug":"news-13548","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/08\/10\/news-13548\/","title":{"rendered":"DogWalk and several vulnerabilities in Exchange | Kaspersky official blog"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/08\/10125801\/dogwalk-vulnerability-patch-Tuesday-08-2022-Featured.jpg\"\/><\/p>\n<p><strong>Credit to Author: Editorial Team| Date: Wed, 10 Aug 2022 17:05:08 +0000<\/strong><\/p>\n<p>With this August patch Tuesday Microsoft fixed more than a hundred vulnerabilities. Some of the vulnerabilities require special attention from corporate cybersecurity personal. Among them there are 17 critical ones, two of which are zero-days. At least one vulnerability has already been actively exploited in the wild, so it would be wise not to delay the patch implementation. It is no coincidence that the US Cybersecurity and Infrastructure security agency <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/current-activity\/2022\/08\/09\/microsoft-releases-august-2022-security-updates\" target=\"_blank\" rel=\"nofollow noopener\">recommends<\/a> paying attention to this update.<\/p>\n<h2>DogWalk (aka CVE-2022-34713) \u2014 RCE vulnerability in MSDT<\/h2>\n<p>The most dangerous of the newly closed vulnerabilities is <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-34713\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2022-34713<\/a>. Potentially it allows remote execution of malicious code (belongs to the <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/remote-code-execution-rce\/\" target=\"_blank\" rel=\"nofollow noopener\">RCE<\/a> type). CVE-2022-34713, dubbed DogWalk, is a vulnerability in the Microsoft Windows Support Diagnostic Tool (MSDT), like <a href=\"https:\/\/www.kaspersky.ru\/blog\/follina-cve-2022-30190-msdt\/33255\/\" target=\"_blank\" rel=\"nofollow noopener\">Follina<\/a>, which made some hype in May of this year.<\/p>\n<p>The problem lies in how the system handles Cabinet (.cab) archives. To exploit the vulnerability, attacker needs to lure the user to open a malicious file that saves the .diagcab archive to the Windows Startup folder so that its contents will be executed the next time the user restarts his computer and logs in.<\/p>\n<p>Actually DogWalk was discovered <a href=\"https:\/\/irsl.medium.com\/the-trouble-with-microsofts-troubleshooters-6e32fc80b8bd\" target=\"_blank\" rel=\"nofollow noopener\">two years<\/a> ago, but then the system developers for some reason did not pay enough attention to this problem. Now the vulnerability is fixed, but Microsoft has already detected its exploitation.<\/p>\n<h2>Other vulnerabilities to watch out for<\/h2>\n<p>The second zero-day vulnerability closed last Tuesday is <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-30134\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2022-30134<\/a>. It is contained in Microsoft Exchange. Information about it was published before Microsoft was able to create the patch, but so far this vulnerability has not been exploited in the wild. Theoretically if an attacker manages to use CVE-2022-30134, he will be able to read the victim&#8217;s email correspondence. This is not the only flaw in Exchange that was fixed by the new patch. It also closes the <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-24516\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2022-24516<\/a>, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21980\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2022-21980<\/a> and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-24477\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2022-24477<\/a> vulnerabilities that allow attackers to elevate their privileges.<\/p>\n<p>As for the CVSS rating, two related vulnerabilities are conditional champions: <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-30133\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2022-30133<\/a> and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-35744\">CVE-2022-35744<\/a>. Both are found in the Point-to-Point Protocol (PPP). Both allow attackers to send requests to the remote access server, which can lead to the execution of malicious code on the machine. And both have the same CVSS score: 9.8.<\/p>\n<p>For those who for some reasons cannot immediately install patches, Microsoft recommends closing port 1723 (vulnerabilities can only be exploited through it). However, be aware that this may disrupt the stability of communications on your network.<\/p>\n<h2>How to stay safe<\/h2>\n<p>We advise to install fresh Microsoft updates as soon as possible, and do not forget to check all the information in the FAQs, Mitigations, and Workarounds section on the <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2022-Aug\" target=\"_blank\" rel=\"nofollow noopener\">update guide<\/a> that is relevant to your infrastructure.<\/p>\n<p>In addition, it should be remembered that all computers in the company with Internet access (whether they are workstations or servers) must be equipped with <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\">a reliable cybersecurity solution<\/a>, capable to protect them against exploitation of even yet undetected vulnerabilities.<\/p>\n<p> <input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\" \/> <br \/><a href=\"https:\/\/www.kaspersky.com\/blog\/dogwalk-vulnerability-patch-tuesday-08-2022\/45127\/\" target=\"bwo\" >https:\/\/blog.kaspersky.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/08\/10125801\/dogwalk-vulnerability-patch-Tuesday-08-2022-Featured.jpg\"\/><\/p>\n<p><strong>Credit to Author: Editorial Team| Date: Wed, 10 Aug 2022 17:05:08 +0000<\/strong><\/p>\n<p>This Tuesday Microsoft released new patches that fixe DogWalk vulnerability (CVE-2022-34713) and several dangerous bugs in Exchange.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10425,10378],"tags":[24586,1001,12177,15616,10516,18364,12321,10752,10525],"class_list":["post-19815","post","type-post","status-publish","format-standard","hentry","category-kaspersky","category-security","tag-0days","tag-business","tag-enterprise","tag-exchange","tag-microsoft","tag-rce","tag-smb","tag-vulnerabilities","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19815","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19815"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19815\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19815"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19815"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19815"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}