{"id":21977,"date":"2023-05-11T09:47:29","date_gmt":"2023-05-11T17:47:29","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/05\/11\/news-15708\/"},"modified":"2023-05-11T09:47:29","modified_gmt":"2023-05-11T17:47:29","slug":"news-15708","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/05\/11\/news-15708\/","title":{"rendered":"Microsoft Patch Tuesday, May 2023 Edition"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Wed, 10 May 2023 01:19:58 +0000<\/strong><\/p>\n<p><strong>Microsoft<\/strong> today released software updates to fix at least four dozen security holes in its<strong> Windows<\/strong> operating systems and other software, including patches for two zero-day vulnerabilities that are already being exploited in active attacks. <\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/winupdatedate.png\" alt=\"\" width=\"923\" height=\"611\" class=\"aligncenter size-full wp-image-60331\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/winupdatedate.png 923w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/winupdatedate-768x508.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/winupdatedate-782x518.png 782w\" sizes=\"auto, (max-width: 923px) 100vw, 923px\" \/><\/p>\n<p>First up in May&#8217;s zero-day flaws is <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29336\" rel=\"noopener\" target=\"_blank\">CVE-2023-29336<\/a>, which is an &#8220;elevation of privilege&#8221; weakness in Windows which has a low attack complexity, requires low privileges, and no user interaction. However, as the <strong>SANS Internet Storm Center<\/strong> <a href=\"https:\/\/isc.sans.edu\/diary\/Microsoft%20May%202023%20Patch%20Tuesday\/29826\" rel=\"noopener\" target=\"_blank\">points out<\/a>, the attack vector for this bug is local.<\/p>\n<p>&#8220;Local Privilege escalation vulnerabilities are a key part of attackers\u2019 objectives,&#8221; said <strong>Kevin Breen<\/strong>, director of cyber threat research at <strong>Immersive Labs<\/strong>. &#8220;Once they gain initial access they will seek administrative or SYSTEM-level permissions. This can allow the attacker to disable security tooling and deploy more attacker tools like Mimikatz that lets them move across the network and gain persistence.&#8221; <\/p>\n<p>The zero-day patch that has received the most attention so far is <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24932\" rel=\"noopener\" target=\"_blank\">CVE-2023-24932<\/a>, which is a <strong>Secure Boot Security Feature Bypass<\/strong> flaw that is being actively exploited by &#8220;bootkit&#8221; malware known as &#8220;<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/blacklotus-bootkit-bypasses-uefi-secure-boot-on-patched-windows-11\/\" rel=\"noopener\" target=\"_blank\">BlackLotus<\/a>.&#8221; A bootkit is dangerous because it allows the attacker to load malicious software before the operating system even starts up.<span id=\"more-63652\"><\/span><\/p>\n<p>According to Microsoft&#8217;s advisory, an attacker would need physical access or administrative rights to a target device, and could then install an affected boot policy. Microsoft gives this flaw a CVSS score of just 6.7, rating it as &#8220;Important.&#8221;<\/p>\n<p><strong>Adam Barnett<\/strong>, lead software engineer at <strong>Rapid7<\/strong>, said CVE-2023-24932 deserves a considerably higher threat score. <\/p>\n<p>&#8220;Microsoft warns that an attacker who already has Administrator access to an unpatched asset could exploit CVE-2023-24932 without necessarily having physical access,&#8221; Barnett said. &#8220;Therefore, the relatively low CVSSv3 base score of 6.7 isn\u2019t necessarily a reliable metric in this case.&#8221;<\/p>\n<p>Barnett said Microsoft has provided <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/11\/guidance-for-investigating-attacks-using-cve-2022-21894-the-blacklotus-campaign\/\" rel=\"noopener\" target=\"_blank\">a supplementary guidance article<\/a> specifically calling out the threat posed by BlackLotus malware, which loads ahead of the operating system on compromised assets, and provides attackers with an array of powerful evasion, persistence, and Command &#038; Control (C2) techniques, including deploying malicious kernel drivers, and disabling Microsoft Defender or Bitlocker. <\/p>\n<p>&#8220;Administrators should be aware that additional actions are required beyond simply applying the patches,&#8221; Barnett advised. &#8220;The patch enables the configuration options necessary for protection, but administrators must apply changes to UEFI config after patching. The attack surface is not limited to physical assets, either; Windows assets running on some VMs, including Azure assets with Secure Boot enabled, also require these extra remediation steps for protection. Rapid7 has noted in the past that enabling Secure Boot is a foundational protection against driver-based attacks. Defenders ignore this vulnerability at their peril.&#8221;<\/p>\n<p>In addition to the two zero-days fixed this month, Microsoft also patched five remote code execution (RCE) flaws in Windows, two of which have notably high CVSS scores. <\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24941\" rel=\"noopener\" target=\"_blank\">CVE-2023-24941<\/a> affects the Windows Network File System, and can be exploited over the network by making an unauthenticated, specially crafted request. Microsoft&#8217;s advisory also includes mitigation advice. The CVSS for this vulnerability is 9.8 \u2013 the highest of all the flaws addressed this month.<\/p>\n<p>Meanwhile, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-28283\" rel=\"noopener\" target=\"_blank\">CVE-2023-28283<\/a> is a critical bug in the Windows Lightweight Directory Access Protocol (LDAP) that allows an unauthenticated attacker to execute malicious code on the vulnerable device. The CVSS for this vulnerability is 8.1, but Microsoft says exploiting the flaw may be tricky and unreliable for attackers.<\/p>\n<p>Another vulnerability patched this month that was disclosed publicly before today (but not yet seen exploited in the wild) is <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29325\" rel=\"noopener\" target=\"_blank\">CVE-2023-29325<\/a>, a weakness in <strong>Microsoft Outlook<\/strong> and <strong>Explorer<\/strong> that can be exploited by attackers to remotely install malware. Microsoft says this vulnerability can be exploited merely by viewing a specially-crafted email in the Outlook Preview Pane.<\/p>\n<p>&#8220;To help protect against this vulnerability, we recommend users read email messages in plain text format,&#8221; Microsoft&#8217;s writeup on CVE-2023-29325 advises.<\/p>\n<p>&#8220;If an attacker were able to exploit this vulnerability, they would gain remote access to the victim&#8217;s account, where they could deploy additional malware,&#8221; Immersive&#8217;s Breen said. &#8220;This kind of exploit will be highly sought after by e-crime and ransomware groups where, if successfully weaponized, could be used to target hundreds of organizations with very little effort.&#8221; <\/p>\n<p>For more details on the updates released today, check out roundups by <a href=\"https:\/\/www.action1.com\/patch-tuesday-may-2023\/?vyj\" rel=\"noopener\" target=\"_blank\">Action1<\/a>, <a href=\"https:\/\/www.automox.com\/blog\/patch-tuesday-may-2023\" rel=\"noopener\" target=\"_blank\">Automox<\/a> and <a href=\"https:\/\/blog.qualys.com\/vulnerabilities-threat-research\/patch-tuesday\/2023\/05\/09\/microsoft-patch-tuesday-may-2023-security-update-review\" rel=\"noopener\" target=\"_blank\">Qualys<\/a>,  If today\u2019s updates cause any stability or usability issues in Windows, <a href=\"https:\/\/www.askwoody.com\" rel=\"noopener\" target=\"_blank\">AskWoody.com<\/a> will likely have the lowdown on that.<\/p>\n<p>Please consider backing up your data and\/or imaging your system before applying any updates. And feel free to sound off in the comments if you experience any problems as a result of these patches.<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2023\/05\/microsoft-patch-tuesday-may-2023-edition\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/winupdatedate.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Wed, 10 May 2023 01:19:58 +0000<\/strong><\/p>\n<p>Microsoft today released software updates to fix at least four dozen security holes in its Windows operating systems and other software, including patches for two zero-day vulnerabilities that are already being exploited in active attacks.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[29353,29060,29343,29346,29354,29344,29342,24626,24627,15086,15801,16936],"class_list":["post-21977","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-adam-barnett","tag-blacklotus","tag-cve-2023-24932","tag-cve-2023-24941","tag-cve-2023-28283","tag-cve-2023-29325","tag-cve-2023-29336","tag-immersive-labs","tag-kevin-breen","tag-rapid7","tag-sans-internet-storm-center","tag-time-to-patch"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21977","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=21977"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21977\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=21977"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=21977"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=21977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}