{"id":20973,"date":"2023-01-10T19:20:55","date_gmt":"2023-01-11T03:20:55","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/01\/10\/news-14706\/"},"modified":"2023-01-10T19:20:55","modified_gmt":"2023-01-11T03:20:55","slug":"news-14706","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/01\/10\/news-14706\/","title":{"rendered":"January 2023 patch roundup: Microsoft tees up 98 updates"},"content":{"rendered":"<p><strong>Credit to Author: Angela Gunn| Date: Wed, 11 Jan 2023 02:05:40 +0000<\/strong><\/p>\n<div class=\"entry-content lg:prose-lg mx-auto prose max-w-4xl\">\n<p><span data-contrast=\"auto\">Microsoft on Tuesday released patches for 98 vulnerabilities in nine Microsoft product families. This includes 11 Critical-severity issues affecting SharePoint and Windows. Once again the majority of CVEs affect Windows; the operating system accounts for 66 CVEs. It\u2019s followed by 3D Builder, a less-common Patch Tuesday target, with 14 Important-severity RCE issues. (3D Builder was installed by default on Windows 10, but not on earlier or later versions of the OS.)\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">As for the rest, Office and Exchange pick up six and five patches respectively (all Important-severity), SharePoint receives three fixes, and Azure, Microsoft\u2019s Malware protection Engine, .NET, and Visual Studio each pick up one.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Microsoft also announced one previously issued patch addressing a Moderate-severity RCE sandbox escape affecting that Chromium-based Edge browser; as is customary with Patch Tuesday releases, this issue is not counted among the 98 and requires no action as part of the release itself.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Despite a high total number of patches, so far the 98 issues addressed have apparently flown under the radar for the most part. Just one issue addressed this month (CVE-2022-21674, an Important-severity Windows EoP) has been discovered to be under exploit, and even then there appears to be no disclosed code addressing this ALPC (Advanced Local Procedure Call) bug. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">That said, Microsoft\u2019s own severity ratings may not tell the entire tale. Five of this month\u2019s Windows patches garnered a Critical-severity 9.8 CVSS (Common Vulnerability Scoring System) base score, a consideration for many administrators looking to prioritize their task lists. Four of those five patches touch Windows Layer 2 Tunnelling Protocol (L2TP); all five involve remote code execution issues, and all five require neither user interaction nor privileged access to exploit. L2TP is also at the heart of two additional patches in this month\u2019s set, and users of Microsoft\u2019s VPN services are encouraged to regard those L2TP patches seriously. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Today is <\/span><a href=\"https:\/\/learn.microsoft.com\/en-us\/lifecycle\/products\/windows-7\"><span data-contrast=\"none\">also<\/span><\/a><span data-contrast=\"auto\"> the final day of Patch Tuesday activity for Windows 7, as the end of Extended Security Update support brings the long life of that version of the operating system to a close. (Mainstream support for Win 7 ended in 2020; the end of ESU means that even crucial security updates will no longer be regularly issued.) Support is also concluding for Windows 8, 8.1, and RT, which were not granted an ESU of their own. Of this month\u2019s patches, 42 apply to Win7, and 48 apply to at least one version of Win8.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span class=\"TextRun SCXW64246035 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun CommentStart SCXW64246035 BCX0\">Elsewhere <\/span><span class=\"NormalTextRun SCXW64246035 BCX0\">in patching news, Microsoft also relayed information on 15 issues addressed today by <\/span><a href=\"https:\/\/helpx.adobe.com\/security\/products\/acrobat\/apsb23-01.html\"><span class=\"NormalTextRun CommentStart SCXW64246035 BCX0\">patches<\/span><\/a><span class=\"NormalTextRun SCXW64246035 BCX0\"> for Adobe <\/span><span class=\"NormalTextRun SCXW64246035 BCX0\">Acrobat and <\/span><span class=\"NormalTextRun SCXW64246035 BCX0\">Reader<\/span><span class=\"NormalTextRun SCXW64246035 BCX0\"> for Windows and MacOS<\/span><span class=\"NormalTextRun SCXW64246035 BCX0\"> \u2013 the first Reader patches released since October 2021. All 15 affect Reader versions 22.003.20282<\/span><span class=\"NormalTextRun SCXW64246035 BCX0\"> (Windows)<\/span><span class=\"NormalTextRun SCXW64246035 BCX0\">, 22.003.20281<\/span><span class=\"NormalTextRun SCXW64246035 BCX0\"> (Mac)<\/span><span class=\"NormalTextRun SCXW64246035 BCX0\">,<\/span><span class=\"NormalTextRun SCXW64246035 BCX0\"> and earlier, and Acrobat versions<\/span><span class=\"NormalTextRun SCXW64246035 BCX0\"> 20.005.30418 and earlier<\/span><span class=\"NormalTextRun SCXW64246035 BCX0\">. N<\/span><span class=\"NormalTextRun SCXW64246035 BCX0\">one of the 15 are known to be under active <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW64246035 BCX0\">exploit<\/span><span class=\"NormalTextRun SCXW64246035 BCX0\"> in the wild. The specifics of the vulnerabilities do, however, vary somewhat, with 4 out-of-<\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW64246035 BCX0\">bounds<\/span><span class=\"NormalTextRun SCXW64246035 BCX0\"> reads, 2 out-of-<\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW64246035 BCX0\">bounds<\/span><span class=\"NormalTextRun SCXW64246035 BCX0\"> writes, and a pair of violations of secure design principles among the issues addressed.<\/span> <span class=\"NormalTextRun SCXW64246035 BCX0\">Adobe also today<\/span><span class=\"NormalTextRun SCXW64246035 BCX0\"> released patches for Dimension,\u00a0InDesign, and InCopy<\/span><span class=\"NormalTextRun SCXW64246035 BCX0\">.<\/span><span class=\"NormalTextRun SCXW64246035 BCX0\">\u00a0<\/span><span class=\"NormalTextRun SCXW64246035 BCX0\">More<\/span><span class=\"NormalTextRun SCXW64246035 BCX0\"> information on Adobe patches is <a href=\"https:\/\/helpx.adobe.com\/security\/security-bulletin.html\">available <\/a><\/span><span class=\"NormalTextRun CommentStart SCXW64246035 BCX0\">from the company\u2019s site<\/span><span class=\"NormalTextRun SCXW64246035 BCX0\">.<\/span><\/span><span class=\"EOP SCXW64246035 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><strong>By the Numbers<\/strong><\/p>\n<ul>\n<li>Total Microsoft CVEs: 98<\/li>\n<li>Total advisories shipping in update: 0<\/li>\n<li>Publicly disclosed: 0<\/li>\n<li>Exploitation detected: 1<\/li>\n<li>Exploitation more likely in latest version: 7<\/li>\n<li>Exploitation more likely in older versions: 4<\/li>\n<li>Severity\n<ul>\n<li>Critical: 11<\/li>\n<li>Important: 87<\/li>\n<\/ul>\n<\/li>\n<li>Impact\n<ul>\n<li>Elevation of Privilege: 38<\/li>\n<li>Remote Code Execution: 34<\/li>\n<li>Information Disclosure: 10<\/li>\n<li>Denial of Service: 10<\/li>\n<li>Security Feature Bypass: 4<\/li>\n<li>Spoofing: 2<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/2301-figure-01.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-89159\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/2301-figure-01.png\" alt=\"A bar chart showing the vuln categories addressed in Microsoft's January 2023 Patch Tuesday release; the information is also provided in the list above the chart, but this image also shows that there are Critical-class vulns in the Elevation of Privilege, Remote Code Execution, and Security Feature Bypass categories.\" width=\"640\" height=\"427\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/2301-figure-01.png 850w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/2301-figure-01.png?resize=300,200 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/2301-figure-01.png?resize=768,512 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em><span class=\"TextRun SCXW165969681 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW165969681 BCX0\">F<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW165969681 BCX0\">igure<\/span><span class=\"NormalTextRun SCXW165969681 BCX0\"> 1: <\/span><span class=\"NormalTextRun SCXW165969681 BCX0\">2023 opens <\/span><span class=\"NormalTextRun SCXW165969681 BCX0\">with a higher<\/span><span class=\"NormalTextRun SCXW165969681 BCX0\">&#8211;<\/span><span class=\"NormalTextRun SCXW165969681 BCX0\">than<\/span><span class=\"NormalTextRun SCXW165969681 BCX0\">&#8211;<\/span><span class=\"NormalTextRun SCXW165969681 BCX0\">usual number of Information Disclosure issues<\/span><span class=\"NormalTextRun SCXW165969681 BCX0\">, but Elevation of Privilege and Remote Code Execution still rule the roost<\/span><\/span><span class=\"EOP SCXW165969681 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/em><\/p>\n<p>Products affected:<\/p>\n<ul>\n<li>Microsoft Windows: 66<\/li>\n<li>3D Builder: 14<\/li>\n<li>Microsoft Office: 6<\/li>\n<li>Microsoft Exchange: 5<\/li>\n<li>SharePoint: 3<\/li>\n<li>Azure: 1 (not including 70 Windows patches applicable to Windows Server 2022 Datacenter: Azure Edition)<\/li>\n<li>Malware Protection Engine: 1<\/li>\n<li>.NET: 1<\/li>\n<li>Visual Studio: 1<\/li>\n<\/ul>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/2301-figure-02.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-89160\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/2301-figure-02.png\" alt=\"A bar chart showing the distribution of patches among nine Microsoft product families, as described in text.\" width=\"640\" height=\"443\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/2301-figure-02.png 817w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/2301-figure-02.png?resize=300,207 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/2301-figure-02.png?resize=768,531 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><i><span data-contrast=\"auto\">Figure 2: Windows gets a variety of patches this month, dwarfing requirements for other product families<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Notable January Updates<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">CVE-2023-21743: Microsoft SharePoint Server Security Feature Bypass Vulnerability<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The only Critical-severity issue among January\u2019s three SharePoint patches, this issue \u2013 which would allow an unauthenticated user to make an anonymous connection to a specific SharePoint server &#8212; is marked by Microsoft as being more likely to be exploited within the first thirty days after Patch Tuesday. This makes implementing this patch a priority for administrators, but Microsoft notes that there are extra manual steps to the patching process: Customers must also trigger a SharePoint upgrade action in conjunction with this patch. This required upgrade action can be triggered by running the SharePoint Products Configuration Wizard, the Upgrade-SPFarm PowerShell cmdlet, or the &#8220;psconfig.exe -cmd upgrade -inplace b2b&#8221; command on each SharePoint server after installing the update.<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/span><\/p>\n<p><b><span data-contrast=\"auto\">CVE-2023-21531, Azure Service Fabric Container Elevation of Privilege Vulnerability<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This Important-class issue is fairly specific in its parameters: Only users who implement the Docker app containers are affected, <\/span><i><span data-contrast=\"auto\">and <\/span><\/i><span data-contrast=\"auto\">an attacker would first have to be present on the system with root access, <\/span><i><span data-contrast=\"auto\">and <\/span><\/i><span data-contrast=\"auto\">the targeted environment would have to be already set up in a specific fashion. If successful, the attacker would gain control over the Service Fabric cluster in question, but not to elevate privileges outside that compromised cluster. All that said, the bulletin does flag that the patch restricts access to a specific internal Azure platform resource (168.63.129.16), and that admins should check to make sure they\u2019re not making calls or requests to that IP address before proceeding with the patch since once the patch is enabled, requests from the cluster to that specific resource will fail.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">CVE-2023-21559, Windows Cryptographic Services Information Disclosure Vulnerability<\/span><\/b><br \/> <b><span data-contrast=\"auto\">CVE-2023-21678, Windows Print Spooler Elevation of Privilege Vulnerability<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Two otherwise unremarkable Important-severity vulnerabilities, these are mainly interesting because of their credited finders; respectively, Canada\u2019s Communications Security Establishment (CSE) and the US\u2019s National Security Agency (NSA).\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><strong>Sophos protections<\/strong><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span class=\"TextRun SCXW12664769 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW12664769 BCX0\">As you can every month, if you don\u2019t want to wait for your system to pull down <\/span><span class=\"NormalTextRun SCXW12664769 BCX0\">Microsoft\u2019s<\/span><span class=\"NormalTextRun SCXW12664769 BCX0\"> updates itself, you can download them manually from the Windows Update Catalog website<\/span><span class=\"NormalTextRun SCXW12664769 BCX0\">.<\/span><span class=\"NormalTextRun SCXW12664769 BCX0\"> Run the winver.exe tool to determine which build of Windows 10 or 11 you\u2019re running, then download the Cumulative Update package for your <\/span><span class=\"NormalTextRun AdvancedProofingIssueV2Themed SCXW12664769 BCX0\">particular system\u2019s<\/span><span class=\"NormalTextRun SCXW12664769 BCX0\"> architecture and build number.<\/span><\/span><span class=\"EOP SCXW12664769 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2023\/01\/10\/january-2023-patch-roundup\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/01\/shutterstock_1244583964.jpg\"\/><\/p>\n<p><strong>Credit to Author: Angela Gunn| Date: Wed, 11 Jan 2023 02:05:40 +0000<\/strong><\/p>\n<p>Adobe greets the new year with patches for 18 vulns in Reader, Acrobat, and others; sun sets on the last of Win7, 8, RT support<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[28339,18424,28340,28341,28342,28333,28334,28335,28343,28344,129,10516,19245,17777,27030,16771,10525,17330,27033],"class_list":["post-20973","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-3d-builder","tag-adobe-reader","tag-cve-2023-21531","tag-cve-2023-21552","tag-cve-2023-21559","tag-cve-2023-21674","tag-cve-2023-21678","tag-cve-2023-21743","tag-exp-2321552-a","tag-exp-2321674-a","tag-featured","tag-microsoft","tag-patch-tuesday","tag-sharepoint","tag-sophos-x-ops","tag-threat-research","tag-windows","tag-windows-7","tag-x-ops"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20973","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=20973"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20973\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=20973"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=20973"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=20973"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}