{"id":19916,"date":"2022-08-22T16:10:39","date_gmt":"2022-08-23T00:10:39","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/08\/22\/news-13649\/"},"modified":"2022-08-22T16:10:39","modified_gmt":"2022-08-23T00:10:39","slug":"news-13649","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/08\/22\/news-13649\/","title":{"rendered":"CISA wants you to patch these actively exploited vulnerabilities before September 8"},"content":{"rendered":"<p>On Thursday, CISA (the US Cybersecurity and Infrastructure Security Agency) updated&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" target=\"_blank\">its catalog of actively exploited vulnerabilities<\/a>&nbsp;by adding seven new entries. These flaws were found in Apple, Google, Microsoft, Palo Alto Networks, and SAP products. CISA set the due date for everyone to patch the weaknesses&nbsp;by September 8, 2022.<\/p>\n<p>CVE-2022-22536, an SAP flaw with the highest risk score of 10, is one of the seven. We wrote about it in February, and thankfully, SAP addressed the issue fairly quickly, too, by issuing a patch. CISA even mentioned that if customers fail to patch CVE-2022-22536, they&nbsp;could be exposed to ransomware attacks, data theft, financial fraud, and other business disruptions that&#8217;d cost them millions.<\/p>\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/cve.report\/CVE-2022-32893\" target=\"_blank\"><strong>CVE-2022-32893<\/strong><\/a>&nbsp;and&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/cve.report\/CVE-2022-32894\" target=\"_blank\"><strong>CVE-2022-32894<\/strong><\/a>, the two zero-day, out-of-bounds write vulnerabilities affecting iOS, iPadOS, and macOS, continue to&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/08\/urgent-update-for-macos-and-ios-two-actively-exploited-zero-days-fixed\">headline<\/a>&nbsp;as of this writing. These are serious flaws that, if left unpatched, could allow anyone&nbsp;to take control of vulnerable Apple systems. Apple already released fixes for these from the following support pages:<\/p>\n<ul>\n<li><a rel=\"noreferrer noopener\" href=\"https:\/\/support.apple.com\/en-gb\/HT213412\" target=\"_blank\">About the security content of iOS 15.6.1 and iPadOS 15.6.1<\/a><\/li>\n<li><a rel=\"noreferrer noopener\" href=\"https:\/\/support.apple.com\/en-gb\/HT213413\" target=\"_blank\">About the security content of macOS Monterey 12.5.1<\/a><\/li>\n<li><a rel=\"noreferrer noopener\" href=\"https:\/\/support.apple.com\/en-us\/HT213414\" target=\"_blank\">About the security content of Safari 15.6.1<\/a><\/li>\n<\/ul>\n<p>The Google Chrome flaw with high severity,&nbsp;<strong><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/08\/update-chrome-now-google-issues-patch-for-zero-day-spotted-in-the-wild\">CVE-2022-2856<\/a><\/strong>, is also&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2022\/08\/20\/google-confirms-chrome-zero-day-5-as-attacks-begin-update-now\/\" target=\"_blank\">confirmed<\/a>&nbsp;to be targeted by hackers. As with other zero-days, technical details about it are light, but the&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/chromereleases.googleblog.com\/2022\/08\/stable-channel-update-for-desktop_16.html\" target=\"_blank\">advisory<\/a>&nbsp;states that the flaw is an &#8220;insufficient validation of untrusted input in Intents.&#8221; The&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/developers.google.com\/assistant\/conversational\/intents\" target=\"_blank\">Intents<\/a>&nbsp;technology works in the background and is involved in processing user input or handling a system event. If this flaw is exploited, anyone&nbsp;could create a malicious input that Chrome may validate incorrectly, leading to arbitrary code execution or system takeover.<\/p>\n<p>Google already patched this. While Chrome should&#8217;ve updated automatically, it is recommended to force an update check to ensure the patch is applied.<\/p>\n<p>Microsoft also has patches available for&nbsp;<strong><a rel=\"noreferrer noopener\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21971\" target=\"_blank\">CVE-2022-21971<\/a><\/strong>&nbsp;and&nbsp;<strong><a rel=\"noreferrer noopener\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-26923\" target=\"_blank\">CVE-2022-26923<\/a><\/strong>&nbsp;in February and May, respectively. The former was given an &#8220;exploitation less likely&#8221; probability, but that has already changed&mdash;a&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/glossary\/proof-of-concept\">proof-of-concept (PoC)<\/a>&nbsp;has been available since March. PoC exploits were also made public for the latter Microsoft flaw. However, these were released after Microsoft had already pushed out a patch.<\/p>\n<p>Palo Alto Networks&#8217;s is the oldest among the new vulnerabilities added to the catalog. Discovered in 2017,&nbsp;<strong><a rel=\"noreferrer noopener\" href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-15944\" target=\"_blank\">CVE-2017-15944<\/a><\/strong>&nbsp;has a severity rating of 9.8 (Critical). Once exploited, attackers could perform remote code execution on affected systems. You can read more about this flaw on&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/security.paloaltonetworks.com\/CVE-2017-15944\" target=\"_blank\">Palo Alto&#8217;s advisory page<\/a>.<\/p>\n<p>Malwarebytes advises readers to apply patches to these flaws if they use products of the companies we mentioned. You don&#8217;t have to wait for the due date before you act.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/08\/cisa-wants-you-to-patch-these-actively-exploited-vulnerabilities-before-september-8\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding='10'>\n<tr>\n<td valign='top' align='left'>\n<p>Categories: <a href='https:\/\/www.malwarebytes.com\/blog\/category\/exploits-and-vulnerabilities' rel='category tag'>Exploits and vulnerabilities<\/a><\/p>\n<p>Categories: <a href='https:\/\/www.malwarebytes.com\/blog\/category\/news' rel='category tag'>News<\/a><\/p>\n<p>CISA updated its catalog of actively exploited vulnerabilities. Make sure you update your software before the due date!<\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/www.malwarebytes.com\/blog\/news\/2022\/08\/cisa-wants-you-to-patch-these-actively-exploited-vulnerabilities-before-september-8' title='CISA wants you to patch these actively exploited vulnerabilities before September 8'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel='nofollow' href='https:\/\/www.malwarebytes.com\/blog\/news\/2022\/08\/cisa-wants-you-to-patch-these-actively-exploited-vulnerabilities-before-september-8'>CISA wants you to patch these actively exploited vulnerabilities before September 8<\/a> appeared first on <a rel='nofollow' href='https:\/\/www.malwarebytes.com'>Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[22783,32],"class_list":["post-19916","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-exploits-and-vulnerabilities","tag-news"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19916","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19916"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19916\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19916"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19916"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19916"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}