{"id":20815,"date":"2022-12-14T16:11:02","date_gmt":"2022-12-15T00:11:02","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/12\/14\/news-14548\/"},"modified":"2022-12-14T16:11:02","modified_gmt":"2022-12-15T00:11:02","slug":"news-14548","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/12\/14\/news-14548\/","title":{"rendered":"Update now! Two zero-days fixed in 2022&#8217;s last patch Tuesday"},"content":{"rendered":"<p>In numbers, the patch Tuesday of December 2022 is a relatively light one for Windows users. Microsoft patched 48 vulnerabilities with only six considered critical. But numbers are only half the story. Two of the updates are zero-days with one of them known to be actively exploited.<\/p>\n<h2>Windows SmartScreen<\/h2>\n<p>Publicly disclosed computer security flaws are listed in the Common Vulnerabilities and Exposures (CVE) database. Its goal is to make it easier to share data across separate vulnerability capabilities (tools, databases, and services).<\/p>\n<p>The vulnerability that is <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/11\/qbot-uses-zero-day-motw-bypass-in-phishing-campaign\">exploited in the wild<\/a> is listed under <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-44698\" target=\"_blank\">CVE-2022-44698<\/a> and described as a Windows SmartScreen Security Feature bypass vulnerability. To understand how this works, you need to understand that files can be cryptographically signed in order to confirm who created them, and to confirm that they have not been changed since they were signed. <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/10\/malware-authors-use-malformed-signature-trick-to-bypass-mark-of-the-web\">Mark-of-the-Web (MOTW)<\/a> is the name for the Windows technology that warns users of potential harm when downloading and opening a file from the internet or an email attachment. In other words, it&#8217;s a safety precaution in the form of a reminder that the user is about to use a risky file that might harm their computer. The problem is that a malformed signature bypasses all the warnings you should get, so you are bound to assume everything is dandy while it&rsquo;s not.<\/p>\n<h2>DirectX Graphics Kernel<\/h2>\n<p>The other zero-day is labeled as &ldquo;Exploitation Less Likely&rdquo; but information about the vulnerability has been made public. The vulnerability is listed as <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-44710\" target=\"_blank\">CVE-2022-44710<\/a> and described as a DirectX Graphics Kernel Elevation of Privilege (EoP) vulnerability. To successfully exploit it the attacker would need to win a race condition. But if they succeed they could gain SYSTEM privileges.<\/p>\n<p>A race condition, or race hazard, is the behavior of a system where the output depends on the sequence or timing of other uncontrollable events. It becomes a bug when events do not happen in the order the programmer intended. Sometimes these bugs can be exploited when the outcome is predictable and works to the attackers&rsquo; advantage.<\/p>\n<h2>Windows Secure Socket Tunneling Protocol<\/h2>\n<p>Two critical vulnerabilities we want to highlight were found in the Windows Secure Socket Tunneling Protocol (SSTP). <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-44670\" target=\"_blank\">CVE-2022-44670&nbsp;<\/a>and&nbsp;<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-44676\" target=\"_blank\">CVE-2022-44676&nbsp;<\/a>are remote code execution (RCE) vulnerabilities. Successful exploitation of these vulnerabilities requires an attacker to win a race condition but when successful could enable an attacker to remotely execute code on a remote access server (RAS).<\/p>\n<p>A RAS is a type of server that provides a suite of services to remotely connected users over a network or the Internet. It operates as a remote gateway or central server that connects remote users with an organization&#8217;s internal local area network (LAN).<\/p>\n<h2>PowerShell<\/h2>\n<p>One more vulnerability we want to highlight because exploitation is more likely is listed as <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-41076\" target=\"_blank\">CVE-2022-41076<\/a> and described as a PowerShell RCE vulnerability. Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment and to be authenticated. If these conditions are met, the attacker could escape the PowerShell Remoting Session Configuration and run unapproved commands on the target system. This seems a very likely candidate to be chained or exploited in combination with leaked or stolen login credentials.<\/p>\n<h2>Other vendors<\/h2>\n<p>As per usual, other vendors also released important updates:<\/p>\n<p>Adobe released updates for <a href=\"https:\/\/helpx.adobe.com\/security\/products\/campaign\/apsb22-58.html\" target=\"_blank\">Adobe Campaign Classic<\/a>, <a href=\"https:\/\/helpx.adobe.com\/security\/products\/experience-manager\/apsb22-59.html\" target=\"_blank\">Adobe Experience Manager<\/a>, and <a href=\"https:\/\/helpx.adobe.com\/security\/products\/illustrator\/apsb22-60.html\" target=\"_blank\">Adobe Illustrator<\/a>.<\/p>\n<p>Apple released several updates. More on that later.<\/p>\n<p>Cisco released updates for <a href=\"https:\/\/www.cisco.com\/c\/dam\/global\/en_hk\/solutions\/collaboration\/files\/white-paper-c11-739097.pdf\" target=\"_blank\">Cisco IP Phone 7800 and 8800 phones<\/a>.<\/p>\n<p>Citrix released updates for <a href=\"https:\/\/www.citrix.com\/blogs\/2022\/12\/13\/critical-security-update-now-available-for-citrix-adc-citrix-gateway\/\" target=\"_blank\">Citrix ADC and Citrix Gateway<\/a>.<\/p>\n<p>Fortinet released an update to patch for an actively exploited <a href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-22-398\" target=\"_blank\">FortiOS SSL-VPN vulnerability<\/a>.<\/p>\n<p>Google released an Android security bulletin <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/12\/update-now-google-patches-android-vulnerability-that-allows-remote-code-execution-over-bluetooth\">we discussed last week<\/a>.<\/p>\n<p>Mozilla released updates for for&nbsp;<a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2022-53\/\" target=\"_blank\">Thunderbird 102.6<\/a>,&nbsp;<a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2022-52\/\" target=\"_blank\">Firefox ESR 102.6<\/a>, and&nbsp;<a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2022-51\/\" target=\"_blank\">Firefox 108<\/a>.<\/p>\n<p>SAP has released its round of <a href=\"https:\/\/dam.sap.com\/mac\/app\/e\/pdf\/preview\/embed\/ucQrx6G?ltr=a&amp;rc=10\" target=\"_blank\">December 2022 updates<\/a>.<\/p>\n<p>VMWare has released security updates for multiple products. Users should review the VMware Security Advisories&nbsp;<a href=\"https:\/\/www.vmware.com\/security\/advisories\/VMSA-2022-0031.html\" target=\"_blank\">VMSA-2022-0031<\/a>,&nbsp;<a href=\"https:\/\/www.vmware.com\/security\/advisories\/VMSA-2022-0033.html\" target=\"_blank\">VMSA-2022-0033<\/a>, and apply the necessary updates.<\/p>\n<hr \/>\n<p><strong>We don&rsquo;t just report on threats&mdash;we remove them<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by <a href=\"https:\/\/www.malwarebytes.com\/for-home\">downloading Malwarebytes today<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/12\/update-now-the-last-patch-tuesday-of-2022-fixes-two-zero-days\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding=\"10\">\n<tr>\n<td valign=\"top\" align=\"left\">\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/exploits-and-vulnerabilities\" rel=\"category tag\">Exploits and vulnerabilities<\/a><\/p>\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/news\" rel=\"category tag\">News<\/a><\/p>\n<p>Tags: patch Tuesday<\/p>\n<p>Tags:  Microsoft<\/p>\n<p>Tags:  Android<\/p>\n<p>Tags:  Apple<\/p>\n<p>Tags:  Mozilla<\/p>\n<p>Tags:  Google<\/p>\n<p>Tags:  Sap<\/p>\n<p>Tags:  Citrix<\/p>\n<p>Tags:  Fortinet<\/p>\n<p>Tags:  Cisco<\/p>\n<p>Tags:  CVE-2022-44698<\/p>\n<p>Tags:  MotW<\/p>\n<p>Tags:  CVE-2022-44710<\/p>\n<p>Tags:  race condition<\/p>\n<p>Tags:  CVE-2022-44670<\/p>\n<p>Tags:  CVE-2022-44676<\/p>\n<p>Tags:  CVE-2022-41076<\/p>\n<p>Tags:  remote powershell<\/p>\n<p>The last patch Tuesday of 2022 is here\u2014find out what Microsoft and many others have fixed<\/p>\n<table width=\"100%\">\n<tr>\n<td align=\"right\">\n<p><b>(<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/12\/update-now-the-last-patch-tuesday-of-2022-fixes-two-zero-days\" title=\"Update now! Two zero-days fixed in 2022's last patch Tuesday\">Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/12\/update-now-the-last-patch-tuesday-of-2022-fixes-two-zero-days\">Update now! Two zero-days fixed in 2022&#8217;s last patch Tuesday<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10462,2211,11560,20352,28155,28165,28166,28140,28141,22783,24812,1670,10516,24883,13271,32,19245,25993,27622,21748],"class_list":["post-20815","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-android","tag-apple","tag-cisco","tag-citrix","tag-cve-2022-41076","tag-cve-2022-44670","tag-cve-2022-44676","tag-cve-2022-44698","tag-cve-2022-44710","tag-exploits-and-vulnerabilities","tag-fortinet","tag-google","tag-microsoft","tag-motw","tag-mozilla","tag-news","tag-patch-tuesday","tag-race-condition","tag-remote-powershell","tag-sap"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20815","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=20815"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20815\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=20815"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=20815"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=20815"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}