{"id":20127,"date":"2022-09-16T12:30:05","date_gmt":"2022-09-16T20:30:05","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/09\/16\/news-13860\/"},"modified":"2022-09-16T12:30:05","modified_gmt":"2022-09-16T20:30:05","slug":"news-13860","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/09\/16\/news-13860\/","title":{"rendered":"Critical zero-days make September&#039;s Patch Tuesday a &#039;Patch Now&#039; release"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/07\/conceptual_representation_of_technical_support_fixes_service_maintenance_updates_digital_sign_wrench_screwdriver_branching_circuits_throughout_system_by_traitov_gettyimages-1199145131_cso_nw_2400x1600-100853236-small.jpg?auto=webp&amp;quality=85,70\"\/><\/p>\n<p>With 63 updates affecting Windows, Microsoft Office and the Visual Studio and .NET platforms \u2014 and reports of three publicly exploited vulnerabilities (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-37969\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2022-37969<\/a>,<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-34713\" rel=\"nofollow noopener\" target=\"_blank\"> CVE-2022-34713<\/a>,<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-40444\" rel=\"nofollow noopener\" target=\"_blank\"> CVE-2021-40444<\/a>) \u2014 this month&#8217;s Patch Tuesday release gets a &#8220;Patch Now&#8221; priority. Key testing areas include printing, Microsoft Word, and in general application un-installations. (The Microsoft Office, .NET and browser updates can be added to your standard release schedules.)<\/p>\n<p>You can find more information on the risk of deploying these Patch Tuesday updates <a href=\"https:\/\/applicationreadiness.com\/assurance-security-dashboard-september-2022\/\" rel=\"noopener nofollow\" target=\"_blank\">with this helpful infographic<\/a>.<\/p>\n<p>Given the large number of changes included in the September patch cycle, I have broken down the testing scenarios into high-risk and standard-risk groups:<\/p>\n<p><strong>High Risk:<\/strong> These changes are likely to include functionality changes, may deprecate existing functionality, and will likely require the creation of new testing plans:<\/p>\n<p>The following updates are not documented as functional changes, but still require a full test cycle:<\/p>\n<p>In addition to these changes and testing requirements, I have included some of the more difficult testing scenarios for this update:<\/p>\n<p>Testing these important and often updated features is now a fact of life for most IT departments, requiring dedicated time, personal and specialised processes to ensure repeatable consistent results.<\/p>\n<p>Each month, Microsoft includes a list of known issues that relate to the operating system and platforms included in this update cycle.<\/p>\n<p>Starting at 12 a.m. Saturday, Sept.10, the<a href=\"https:\/\/en.wikipedia.org\/wiki\/Time_in_Chile'\" rel=\"nofollow noopener\" target=\"_blank\">\u00a0official time in Chile<\/a>\u00a0advanced 60 minutes in accordance with the Aug. 9 announcement by the Chilean government of a daylight-saving time (DST) time zone change. This moved the DST shift from Sept. 4 to Sept. 10; the<a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/release-health\/status-windows-11-21h2#2892msgdesc\" rel=\"nofollow noopener\" target=\"_blank\">\u00a0time change<\/a> will affect Windows apps, timestamps, automation, workflows, and scheduled tasks. (Authentication processes that rely on<a href=\"https:\/\/web.mit.edu\/kerberos\/\" rel=\"nofollow\"> Kerberos<\/a> may also be affected.)<\/p>\n<p>As of Sept. 16, Microsoft has not published any major revisions to its security advisories.<\/p>\n<p>There are four mitigations and workarounds included in this Patch Tuesday release, including:<\/p>\n<p>Each month, we break down the update cycle into product families (as defined by Microsoft) with the following basic groupings:<\/p>\n<p>Microsoft has released a single update to the Edge browser (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-38012\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2022-38012<\/a>) that has been rated as low ,even though it could lead to remote code execution scenario due to its difficult exploitation chain. In addition, there are 15 updates to the Chromium project. Slightly out of sync with Patch Tuesday, Microsoft released the latest version of the Edge Stable channel on Sept. 15 that contains a fix for<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-3075\" rel=\"nofollow noopener\" target=\"_blank\"> CVE-2022-3075<\/a>. You can <a href=\"https:\/\/docs.microsoft.com\/en-us\/DeployEdge\/microsoft-edge-relnotes-security\" rel=\"noopener nofollow\" target=\"_blank\">read more about this update&#8217;s release notes<\/a> and can <a href=\"https:\/\/chromereleases.googleblog.com\/2022\/\" rel=\"noopener nofollow\" target=\"_blank\">find out more about Chromium updates<\/a>. Add these low-profile browser updates to your standard release schedule.<\/p>\n<p>Note: you will have to deploy a separate application update to Edge \u2014 this may require additional application packaging, testing, and deployment.<\/p>\n<p>Microsoft addressed three critical issues (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-34718\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2022-34718<\/a>,<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-34721\" rel=\"nofollow noopener\" target=\"_blank\"> CVE-2022-34721<\/a> and<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-34722\" rel=\"nofollow noopener\" target=\"_blank\"> CVE-2022-34722<\/a>) and 50 issues rated important this month. This is another broad update that covers the following key Windows features:<\/p>\n<p>For Windows 11 users, <a href=\"https:\/\/www.microsoft.com\/en-us\/videoplayer\/embed\/RE55RIZ?pid=ocpVideo1-innerdiv-oneplayer&amp;maskLevel=20&amp;market=en-us\" rel=\"nofollow noopener\" target=\"_blank\">here is this month&#8217;s Windows 11 video update<\/a>. The three critical updates all have<a href=\"https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\/v3-calculator\" rel=\"nofollow noopener\" target=\"_blank\"> NIST<\/a> ratings of 9.8 (out of 10). Coupled with the three exploited vulnerabilities (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-37969\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2022-37969<\/a>,<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-34713\" rel=\"nofollow noopener\" target=\"_blank\"> CVE-2022-34713<\/a>,<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-40444\" rel=\"nofollow noopener\" target=\"_blank\"> CVE-2021-40444<\/a>) these make this month&#8217;s Windows update a &#8220;Patch Now&#8221; release.<\/p>\n<p>Microsoft released seven security patches to the Office platform affecting Visio, PowerPoint, SharePoint and SharePoint Server. The Microsoft Visio and PowerPoint updates are low-profile deployments that should be added to your standard Office update schedules. The SharePoint Server updates (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-38008\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2022-38008<\/a> and<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-37961'\" rel=\"nofollow\"> CVE-2022-37961<\/a>) are not rated critical, but they could lead to a remote code execution scenario (though difficult to exploit). We recommend adding these two updates to your server update schedule, noting that all patched SharePoint Servers will require a restart.<\/p>\n<p>Fortunately for us (and all IT admins) Microsoft has not published any security advisories for Microsoft Exchange products this month.<\/p>\n<p>Microsoft published three updates rated important for their developer tools platform (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-26929\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2022-26929<\/a>,<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-38013\" rel=\"nofollow noopener\" target=\"_blank\"> CVE-2022-38013<\/a> and<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-38020\" rel=\"nofollow noopener\" target=\"_blank\"> CVE-2022-38020<\/a>) affecting Microsoft .NET and the Visual Studio platform. These three updates are relatively low risk to deploy and should be added to your standard developer release schedule.<\/p>\n<p>Adobe published<a href=\"https:\/\/helpx.adobe.com\/ca\/security\/security-bulletin.html\" rel=\"nofollow noopener\" target=\"_blank\"> six security bulletins<\/a>\u00a0affecting: Animate, Bridge, Illustrator, InCopy, InDesign and RoboHelp. However, there were no updates to Adobe Reader or other related PDF products. This may be the result of Adobe being otherwise engaged with the <a href=\"https:\/\/www.computerworld.com\/article\/3673934\/adobes-20b-figma-acquisition-highlights-web-based-collaboration-trends.html\">$20 billion purchase of Figma<\/a>.<\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3673944\/critical-zero-days-make-septembers-patch-tuesday-a-patch-now-release.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/07\/conceptual_representation_of_technical_support_fixes_service_maintenance_updates_digital_sign_wrench_screwdriver_branching_circuits_throughout_system_by_traitov_gettyimages-1199145131_cso_nw_2400x1600-100853236-small.jpg?auto=webp&amp;quality=85,70\"\/><\/p>\n<article>\n<section class=\"page\">\n<p>With 63 updates affecting Windows, Microsoft Office and the Visual Studio and .NET platforms \u2014 and reports of three publicly exploited vulnerabilities (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-37969\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2022-37969<\/a>,<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-34713\" rel=\"nofollow noopener\" target=\"_blank\"> CVE-2022-34713<\/a>,<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-40444\" rel=\"nofollow noopener\" target=\"_blank\"> CVE-2021-40444<\/a>) \u2014 this month&#8217;s Patch Tuesday release gets a &#8220;Patch Now&#8221; priority. Key testing areas include printing, Microsoft Word, and in general application un-installations. (The Microsoft Office, .NET and browser updates can be added to your standard release schedules.)<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3673944\/critical-zero-days-make-septembers-patch-tuesday-a-patch-now-release.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10516,714,24580,10525],"class_list":["post-20127","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-microsoft","tag-security","tag-small-and-medium-business","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20127","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=20127"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20127\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=20127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=20127"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=20127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}