{"id":22457,"date":"2023-07-12T16:10:43","date_gmt":"2023-07-13T00:10:43","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/07\/12\/news-16187\/"},"modified":"2023-07-12T16:10:43","modified_gmt":"2023-07-13T00:10:43","slug":"news-16187","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/07\/12\/news-16187\/","title":{"rendered":"Update now! Microsoft patches a whopping 130 vulnerabilities"},"content":{"rendered":"<p>It&rsquo;s that time of the month again. For the July 2023 Patch Tuesday, Microsoft has issued security updates for 130 vulnerabilities. Nine of the vulnerabilities are rated as critical and four of them are known to be actively exploited.<\/p>\n<p>The Cybersecurity &amp; Infrastructure Security Agency (CISA) has already added these <a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2023\/07\/11\/cisa-adds-five-known-vulnerabilities-catalog\" target=\"_blank\" rel=\"nofollow\">four vulnerabilities to the catalog of known to be exploited vulnerabilities<\/a>.<\/p>\n<p>The Common Vulnerabilities and Exposures (CVE) database lists publicly disclosed computer security flaws. The actively exploited vulnerabilities are listed as:<\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-32049\" target=\"_blank\" rel=\"nofollow\">CVE-2023-32049<\/a> (<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2020\/05\/how-cvss-works-characterizing-and-scoring-vulnerabilities\">CVSS score<\/a> 8.8 out of 10): a Windows SmartScreen Security Feature Bypass vulnerability. The user would have to click on a specially crafted URL to be compromised by the attacker in which case the attacker would be able to bypass the Open File &#8211; Security Warning prompt.<\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-35311\" target=\"_blank\" rel=\"nofollow\">CVE-2023-35311<\/a> (CVSS score 8.8 out of 10): a Microsoft Outlook Security Feature Bypass vulnerability. The user would have to click on a specially crafted URL to be compromised by the attacker in which case the attacker would be able to bypass the Microsoft Outlook Security Notice prompt. The Preview Pane is an attack vector, but additional user interaction is required.<\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-32046\" target=\"_blank\" rel=\"nofollow\">CVE-2023-32046<\/a> (CVSS score 7.8 out of 10): a Windows MSHTML Platform Elevation of Privilege (EoP) vulnerability. Exploitation of the vulnerability requires that a user open a specially crafted file. An attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file in which case the attacker would gain the rights of the user that is running the affected application.<\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-36874\" target=\"_blank\" rel=\"nofollow\">CVE-2023-36874<\/a> (CVSS score 7.8.out of 10): a Windows Error Reporting Service Elevation of Privilege vulnerability. An attacker who successfully exploited this vulnerability could gain administrator privileges but the attacker must have local access to the targeted machine and the user must be able to create folders and performance traces on the machine, with restricted privileges that normal users have by default.<\/p>\n<p>The CVE below is under investigation and we will tell you more about it in a separate blogpost.<\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-36884\" target=\"_blank\" rel=\"nofollow\">CVE-2023-36884<\/a> (CVSS score 8.3 out of 10): an Office and Windows HTML Remote Code Execution (RCE) vulnerability. An attacker could create a specially crafted Microsoft Office document that enables them to perform remote code execution in the context of the victim. However, an attacker would have to convince the victim to open the malicious file.<\/p>\n<p>Additionally, Microsoft issued an advisory titled <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/ADV230001\" target=\"_blank\" rel=\"nofollow\">Guidance on Microsoft Signed Drivers Being Used Maliciously<\/a>. The advisory warns about drivers certified by Microsoft&rsquo;s Windows Hardware Developer Program (MWHDP) which were being used maliciously in post-exploitation activity. In these attacks, the attacker gained administrative privileges on compromised systems before using the drivers. As a result of a Microsoft investigation, the partners&#8217; seller accounts were suspended and detections for all the reported malicious drivers were added. Whether this really solves the problem of digitally signed malicious drivers is doubtful since there are publicly available tools to sign drivers.<\/p>\n<h2>Other vendors<\/h2>\n<p>Other vendors have synchronized their periodic updates with Microsoft. Here are few major ones that you may find in your environment.<\/p>\n<p><strong>Adobe<\/strong> has released security updates to address vulnerabilities affecting&nbsp;<a href=\"https:\/\/helpx.adobe.com\/security\/products\/coldfusion\/apsb23-40.html\" target=\"_blank\" rel=\"nofollow\">ColdFusion<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/helpx.adobe.com\/security\/products\/indesign\/apsb23-38.html\" target=\"_blank\" rel=\"nofollow\">InDesign<\/a>.&nbsp;<\/p>\n<p><strong>Apple<\/strong> has issued an <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/07\/apple-issues-rapid-security-response-for-zero-day-vulnerability\">RSR update<\/a> for a vulnerability which it says may have been actively exploited.<\/p>\n<p><strong>Cisco <\/strong>has <a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/publicationListing.x\" target=\"_blank\" rel=\"nofollow\">released security updates<\/a>&nbsp;for several products.<\/p>\n<p><strong>Fortinet<\/strong> has released a security update to address a critical vulnerability (CVE-2023-33308) affecting&nbsp;<a href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-23-183\" target=\"_blank\" rel=\"nofollow\">FortiOS and FortiProxy<\/a>.<\/p>\n<p>Last week, <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/07\/update-android-now-google-patches-three-actively-exploited-zero-days\"><strong>Google<\/strong> patched three actively exploited Android zero-days<\/a>.<\/p>\n<p><strong>MOVEit<\/strong> has <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/07\/moveit-transfer-fixes-three-new-vulnerabilities\">fixed 3 new vulnerabilities<\/a> in the Transfer software.<\/p>\n<p><strong>Mozilla<\/strong> has released a <a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2023-26\/\" target=\"_blank\" rel=\"nofollow\">security update<\/a> to address a vulnerability in Firefox and Firefox ESR.<\/p>\n<p><strong>SAP<\/strong> has released its&nbsp;<a href=\"https:\/\/dam.sap.com\/mac\/app\/e\/pdf\/preview\/embed\/ucQrx6G?ltr=a&amp;rc=10\" target=\"_blank\" rel=\"nofollow\">July 2023 Patch Day<\/a>&nbsp;updates.<\/p>\n<p><strong>VMware<\/strong>&nbsp;<a href=\"https:\/\/www.vmware.com\/security\/advisories\/VMSA-2023-0015.html\" target=\"_blank\" rel=\"nofollow\">released VMware SD-WAN updates<\/a>&nbsp;to fix a vulnerability.<\/p>\n<hr \/>\n<p><strong>We don&rsquo;t just report on vulnerabilities&mdash;we identify them, and prioritize action.<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep vulnerabilities in tow by using <a href=\"https:\/\/www.malwarebytes.com\/business\/vulnerability-patch-management\">Malwarebytes Vulnerability and Patch Management<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/07\/update-now-microsoft-patches-a-whopping-130-vulnerabilities\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding=\"10\">\n<tr>\n<td valign=\"top\" align=\"left\">\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/exploits-and-vulnerabilities\" rel=\"category tag\">Exploits and vulnerabilities<\/a><\/p>\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/news\" rel=\"category tag\">News<\/a><\/p>\n<p>Tags: Microsoft<\/p>\n<p>Tags:  Adobe<\/p>\n<p>Tags:  Apple<\/p>\n<p>Tags:  Android<\/p>\n<p>Tags:  Cisco<\/p>\n<p>Tags:  Fortinet<\/p>\n<p>Tags:  MOVEit<\/p>\n<p>Tags:  Mozilla<\/p>\n<p>Tags:  SAP<\/p>\n<p>Tags:  VMware<\/p>\n<p>Tags:  CVE-2023-32049<\/p>\n<p>Tags:  CVE-2023-35311<\/p>\n<p>Tags:  CVE-2023-32046<\/p>\n<p>Tags:  CVE-2023-36874<\/p>\n<p>Tags:  CVE-2023-36844<\/p>\n<p>For the July 2023 Patch Tuesday, Microsoft has issued security updates for 130 vulnerabilities, four of which are known to have been actively exploited.<\/p>\n<table width=\"100%\">\n<tr>\n<td align=\"right\">\n<p><b>(<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/07\/update-now-microsoft-patches-a-whopping-130-vulnerabilities\" title=\"Update now! Microsoft patches a whopping 130 vulnerabilities\">Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/07\/update-now-microsoft-patches-a-whopping-130-vulnerabilities\">Update now! Microsoft patches a whopping 130 vulnerabilities<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[11414,10462,2211,11560,29784,29768,29785,29799,29798,22783,24812,10516,29502,13271,32,21748,14138],"class_list":["post-22457","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-adobe","tag-android","tag-apple","tag-cisco","tag-cve-2023-32046","tag-cve-2023-32049","tag-cve-2023-35311","tag-cve-2023-36844","tag-cve-2023-36874","tag-exploits-and-vulnerabilities","tag-fortinet","tag-microsoft","tag-moveit","tag-mozilla","tag-news","tag-sap","tag-vmware"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22457","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=22457"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22457\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=22457"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=22457"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=22457"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}