{"id":21274,"date":"2023-02-17T06:30:04","date_gmt":"2023-02-17T14:30:04","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/02\/17\/news-15006\/"},"modified":"2023-02-17T06:30:04","modified_gmt":"2023-02-17T14:30:04","slug":"news-15006","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/02\/17\/news-15006\/","title":{"rendered":"Three zero-days require urgent attention for Windows, Exchange"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/07\/microsoft_windows_updates_cycle_arrows_laptop_mobile_phone_3x2_1200x800-100851684-small.jpg\"\/><\/p>\n<p>Microsoft&#8217;s February Patch Tuesday update deals with 76 vulnerabilities that affect Windows, Exchange, Office, and Microsoft development tools \u2014 and three Windows vulnerabilities (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21823\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2023-21823,<\/a><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21715\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2023-21715<\/a> and<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23376\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2023-23376<\/a>) have been reported as exploited in the wild and require immediate attention.<\/p>\n<p>Though it gets a lower rating from Microsoft, the Exchange issues also warrant a rapid response. Meanwhile, the Microsoft Office and development platform updates can be added to your regular release schedule.<\/p>\n<p>The team at <a href=\"https:\/\/applicationreadiness.com\/\" rel=\"noopener nofollow\" target=\"_blank\">Readiness<\/a> has provided\u00a0<a href=\"https:\/\/applicationreadiness.com\/assurance-security-dashboard-february-2023\/\" rel=\"noopener nofollow\" target=\"_blank\">this\u00a0infographic<\/a> that outlines the risks associated with each of the updates in this month&#8217;s update.<\/p>\n<p>Microsoft includes a list of known issues that relate to the operating system and platforms in the latest updates:<\/p>\n<p>If you are still using Microsoft&#8217;s Windows Server 2012 for domain authentication, you may experience the following known issue: domain join operations might be unsuccessful and error &#8220;0xaac (2732): NERR_AccountReuseBlockedByPolicy&#8221; occurs. Additionally, text saying, &#8220;An account with the same name exists in Active Directory. Re-using the account was blocked by security policy&#8221; might be displayed. Microsoft has provided additional guidance (<a href=\"https:\/\/support.microsoft.com\/help\/5020276\" rel=\"noopener nofollow\" target=\"_blank\">KB5020276<\/a>) on managing this issue as part of the<a href=\"https:\/\/learn.microsoft.com\/en-us\/lifecycle\/faq\/extended-security-updates#what-is-the-extended-security-update--esu--program-\" rel=\"noopener nofollow\" target=\"_blank\"> ESU<\/a> program.<\/p>\n<p>Microsoft published three major revisions this month:<\/p>\n<p>Microsoft has published the following vulnerability-related mitigations for this release:<\/p>\n<p>Each month, the team at Readiness analyses the latest Patch Tuesday updates and provides detailed, actionable testing guidance. This is based on assessing a large application portfolio and a detailed analysis of the Microsoft patches and their potential impact on Windows and application installations.<\/p>\n<p>Given the large number of changes included this month, I have broken down the testing scenarios into high-risk and standard-risk groups:<\/p>\n<p>As all the high-risk changes affect the Windows printing subsystem again this month, we have not seen any published functionality changes. We strongly recommend the following printing focused testing:<\/p>\n<p>All these scenarios will require significant application-level testing before a general deployment of the update. In addition, we suggest a general test of the following printing features:<\/p>\n<p>Though you won&#8217;t have to conduct large file transfer testing this month, we highly recommend testing (very) long UNC paths from different machines. Our focus was on network paths accessing multiple machines across different versions of Windows. In addition to these scenarios, Microsoft updated the <a href=\"https:\/\/learn.microsoft.com\/en-us\/windows-hardware\/drivers\/kernel\/windows-kernel-mode-kernel-library\" rel=\"noopener nofollow\" target=\"_blank\">system\u00a0kernel<\/a> and core graphics components (<a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/win32\/gdi\/windows-gdi'\" rel=\"noopener nofollow\" target=\"_blank\">GDI<\/a>). Definitely &#8220;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Smoke_testing_(software)\" rel=\"noopener nofollow\" target=\"_blank\">smoke test<\/a>&#8221; your core or line-of-business apps and pay attention to graphics-intensive applications.<\/p>\n<p>Given the rapid changes and frequent updates to applications (and their dependencies) in a modern application portfolio, ensure that your systems are &#8220;cleanly&#8221; uninstalling previous application versions. Leaving legacy applications or remnant components could expose your system to patched vulnerabilities.<\/p>\n<p>This section contains important changes to servicing (and most security updates) to Windows desktop and server platforms. With Windows 10 21H2 now out of mainstream support, the following Microsoft applications will reach end of mainstream support or servicing in 2023:<\/p>\n<p>Each month, we break down the update cycle into product families (as defined by Microsoft) with the following basic groupings:<\/p>\n<p>Microsoft released three updates to its (Chromium) Edge browser:<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21794\" rel=\"noopener nofollow\" target=\"_blank\">\u00a0CVE-2023-21794<\/a>,<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23374\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2023-23374<\/a> and<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21720\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2023-21720<\/a> . You can find Microsoft&#8217;s version of\u00a0<a href=\"https:\/\/learn.microsoft.com\/en-us\/DeployEdge\/microsoft-edge-relnotes-security\" rel=\"noopener nofollow\" target=\"_blank\">these release notes\u00a0here<\/a> and the\u00a0<a href=\"https:\/\/chromium.googlesource.com\/chromium\/src\/+log\/108.0.5359.125..108.0.5359.179?pretty=fuller&amp;n=10000\" rel=\"noopener nofollow\" target=\"_blank\">Google Desktop channel release notes\u00a0here<\/a>. There were no other updates to Microsoft browser (or rendering engines) this month. Add these updates to your standard patch release schedule.<\/p>\n<p>Microsoft released four critical updates and 32 &#8220;important&#8221; patches  to the Windows platform that cover the following key components:<\/p>\n<p>While the Microsoft<a href=\"https:\/\/learn.microsoft.com\/en-us\/openspecs\/windows_protocols\/ms-peap\/a128a089-0919-41a5-a0c2-9f25ef28289d\" rel=\"noopener nofollow\" target=\"_blank\"> PEAP<\/a> authentication remote code vulnerabilities (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21689\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2023-21689<\/a> and<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21690\" rel=\"noopener nofollow\" target=\"_blank\"> CVE2023-21690<\/a>) are the most worrisome, the remaining updates that solely affect Windows are not as dangerous as we&#8217;ve seen in the past. Unfortunately, three Windows vulnerabilities (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21823\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2023-21823,<\/a><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21715\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2023-21715<\/a> and<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23376\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2023-23376<\/a>) have been reported as exploited in the wild. As a consequence, add this update to your &#8220;Patch Now&#8221; release schedule.<\/p>\n<p>Microsoft released a patch addressing a critical vulnerability (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21716\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2023-21706<\/a>) in Microsoft Word that could lead to remote code execution. There are five other updates for the Office platform (including SharePoint), all rated important. We have not had any reports of exploits in the wild for the critical Word issue, so we recommend that you add these Office updates to your standard-release schedule.<\/p>\n<p>We are going to have to break some rules this month. Microsoft has released four patches to Microsoft Exchange Server (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21706\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2023-21706<\/a>,<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21707\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2023-21707,<\/a><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21529\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2023-21529<\/a>,<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21710\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2023-21710<\/a>) all of which are rated important. Unfortunately, CVE-2023-21529 could lead to remote code execution and really could be classed as a critical vulnerability.<\/p>\n<p>This vulnerability does not require user interaction, is accessible via remote systems and does not require local privileges on the local system. All supported versions of Exchange are vulnerable. We are seeing reports of Exchange<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-exchange-proxyshell-flaws-exploited-in-new-crypto-mining-attack\/\" rel=\"noopener nofollow\" target=\"_blank\"> crypto-mining attacks<\/a> already. We are going to add<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21529\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2023-21529<\/a> to our &#8220;Patch Now&#8221; schedule.<\/p>\n<p>Microsoft released three critical updates affecting Visual Studio and .NET (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21808\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2023-21808<\/a>,<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21815\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2023-21815<\/a> and<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23381\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2023-23381<\/a>) that could lead to arbitrary code execution. On initial examination, it appears that these were remote accessible, significantly raising the risks, but these developer-related vulnerabilities all require local access. Coupled with five other elevation of privilege vulnerabilities also affecting Microsoft Visual Studio (all rated important) as well, we don&#8217;t see an urgent patch requirement. Add these updates to your standard developer release schedule.<\/p>\n<p>No updates from Adobe for Reader or Acrobat this month. That said, Adobe has released a number of security updates for its other products with<a href=\"https:\/\/helpx.adobe.com\/security\/products\/after_effects\/apsb23-02.html\" rel=\"noopener nofollow\" target=\"_blank\"> APSB23-02<\/a>. I think that we have enough printing and some Microsoft<a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/win32\/printdocs\/microsoft-xps-document-writer\" rel=\"noopener nofollow\" target=\"_blank\"> XPS\u00a0issues<\/a>\u00a0to test and deploy to keep us busy.<\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3688551\/three-zero-days-require-urgent-attention-for-windows-exchange.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/07\/microsoft_windows_updates_cycle_arrows_laptop_mobile_phone_3x2_1200x800-100851684-small.jpg\"\/><\/p>\n<article>\n<section class=\"page\">\n<p>Microsoft&#8217;s February Patch Tuesday update deals with 76 vulnerabilities that affect Windows, Exchange, Office, and Microsoft development tools \u2014 and three Windows vulnerabilities (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21823\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2023-21823,<\/a><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21715\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2023-21715<\/a> and<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23376\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2023-23376<\/a>) have been reported as exploited in the wild and require immediate attention.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3688551\/three-zero-days-require-urgent-attention-for-windows-exchange.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10516,714,24580,10525],"class_list":["post-21274","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-microsoft","tag-security","tag-small-and-medium-business","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21274","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=21274"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21274\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=21274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=21274"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=21274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}