{"id":22476,"date":"2023-07-14T12:30:17","date_gmt":"2023-07-14T20:30:17","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/07\/14\/news-16206\/"},"modified":"2023-07-14T12:30:17","modified_gmt":"2023-07-14T20:30:17","slug":"news-16206","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/07\/14\/news-16206\/","title":{"rendered":"Four zero-days make July &#039;s Patch Tuesday a &#039;patch now&#039; update"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/07\/microsoft_windows_updates_cycle_arrows_laptop_mobile_phone_3x2_1200x800-100851684-small.jpg\"\/><\/p>\n<p>With this month&#8217;s Patch Tuesday update, Microsoft addressed 130 security vulnerabilities, published two advisories, and included four major CVE revisions. We also have four zero-days to manage for Windows (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-32046\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2023-32046<\/a>,<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-32049\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2023-32049<\/a>,<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36874\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2023-36874<\/a> and<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36884\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2023-36884<\/a>), bringing the Windows platform into a &#8220;patch now&#8221; schedule.<\/p>\n<p>It should be easier to focus on Microsoft Office and Windows testing this month, as we do not have any Adobe, Exchange, or browser updates. Be sure to carefully review Microsoft&#8217;s<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/07\/11\/storm-0978-attacks-reveal-financial-and-espionage-motives\/\" rel=\"noopener nofollow\" target=\"_blank\"> Storm 0978<\/a> as it provides specific, actionable guidance on managing the serious HTML vulnerability in Microsoft Office (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-38023\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2022-38023<\/a>).<\/p>\n<p>The\u00a0<a href=\"https:\/\/applicationreadiness.com\/\" rel=\"noopener nofollow\" target=\"_blank\">Readiness<\/a>\u00a0team has crafted <a href=\"https:\/\/applicationreadiness.com\/assurance-security-dashboard-july-2023\/\" rel=\"noopener nofollow\" target=\"_blank\">this helpful infographic<\/a> to outline the risks associated with each of the updates.<\/p>\n<p>Microsoft each month lists known issues that relate to the operating system and platforms included in the latest update cycle.<\/p>\n<p>Microsoft has published two major revisions:<\/p>\n<p>Microsoft published the following vulnerability-related mitigations for this release:<\/p>\n<p>Each month, the Readiness team\u00a0provides detailed, actionable testing guidance for the latest updates. This guidance is based on assessing a large application portfolio and a detailed analysis of the Microsoft patches and their potential impact on the Windows platforms and application installations.<\/p>\n<p>If you have employed internal web or application servers, it will be worth testing the<a href=\"https:\/\/techcommunity.microsoft.com\/t5\/networking-blog\/enabling-http-3-support-on-windows-server-2022\/ba-p\/2676880\" rel=\"noopener nofollow\" target=\"_blank\"> HTTP3 protocol<\/a>\u00a0\u2014 especially using Microsoft Edge. In addition to this protocol handling update, Microsoft made a significant number of changes and updates to the networking stack requiring the following testing:<\/p>\n<p>Given the large number of system-level changes this month, I have divided the testing scenarios into standard and high-risk profiles.<\/p>\n<p>Given that this update includes fixes for four (some say five) zero-day flaws, we have two main drivers of change this month: key functionality changes in core systems and an urgent need to deliver updates. Microsoft has documented that two core areas have been updated with significant functionality changes, including printing and the local network stack (with a focus on routing). As a result, the following testing should be included before general deployment:<\/p>\n<p>The following changes have been included this month and have not been raised as either high risk (with unexpected outcomes) and do not include functional changes.\u00a0<\/p>\n<p>All these testing scenarios will require significant application-level testing before a general deployment. Given the changes included in this month&#8217;s patches, the Readiness team recommends that the followings tests be performed before general deployment:<\/p>\n<p>This month may be a little tough to test your Microsoft Office automation\/scripts and integration with third-party applications due to the change in OLE and how Microsoft has addressed<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36884\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2023-36884<\/a>. We recommend a full test of Excel macros (if they use OLE\/COM\/DCOM) and any VBS scripts that include Word.<\/p>\n<p>Here are the important changes to servicing (and most security updates) to Windows desktop and server platforms.<\/p>\n<p>Each month, we break down the update cycle into product families (as defined by Microsoft) with the following basic groupings:<\/p>\n<p>Hard to believe, but there are no browser updates in this update cycle. And we don&#8217;t see anything coming down the pipeline for a mid-cycle release either. This is a big change and a huge improvement from the days of large, complex, and urgent browser updates. Go Microsoft!<\/p>\n<p>Microsoft released eight critical updates and 95 patches rated as important to the Windows platform, covering these key components:<\/p>\n<p>As mentioned in the Microsoft Office section above, we feel the focus this month should be on the immediate resolution of<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36884\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2023-36884<\/a>. Though rated as important by Microsoft (sorry to be contrarian), we feel that since it has been both publicly disclosed and exploited it should be treated as urgent. Coupled with the other Windows zero-day (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-32046\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2023-32046<\/a>) this brings the entire Windows update group into the &#8220;Patch Now&#8221; schedule for our clients. Once the screaming stops, you can take some time to check out the<a href=\"https:\/\/www.microsoft.com\/en-us\/videoplayer\/embed\/RW17ngm?pid=ocpVideo1-innerdiv-oneplayer&amp;postJsllMsg=true&amp;maskLevel=20&amp;reporting=true&amp;market=en-us\" rel=\"noopener nofollow\" target=\"_blank\"> Windows 11 release<\/a> video; we find it calming.<\/p>\n<p>We need to talk about Microsoft Office. Though there are two critical rated updates for SharePoint (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-33157\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2023-33157<\/a> and<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-33160\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2023-33160<\/a>) and 14 updates rated important by Microsoft, the elephant in the room is<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36884\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2023-36884<\/a> (Office and HTML RCE Vulnerability). This vulnerability has been both publicly disclosed and documented as exploited. Officially, this update belongs in the Windows group, but we believe that the true impact lies in how Microsoft Office deals with HTML data (transmit\/store\/compute).<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36884\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2023-36884<\/a> directly affects Office and your testing regime should reflect this.<\/p>\n<p>Add these Office updates to your standard release schedule, noting that your Office patch testing regime will need to be paired with your Windows update release schedule.<\/p>\n<p>Much to all our good fortune, there are no updates for Microsoft Exchange Server this month.<\/p>\n<p>Compared to the very serious (and numerous) exploits in Office and Windows this month, there are only five updates affecting Visual Studio, ASP.NET and a minor component of<a href=\"https:\/\/github.com\/mono\/mono\/blob\/main\/mcs\/class\/Mono.Security\/Mono.Security.Authenticode\/AuthenticodeDeformatter.cs\" rel=\"noopener nofollow\" target=\"_blank\"> Mono<\/a> (the cross platform C# implementation). All these patches are rated important by Microsoft and should be added to your standard developer release schedule.<\/p>\n<p>More good news: there are no updates from Adobe or other third-party vendors in this update.<\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3702731\/four-zero-days-make-july-s-patch-tuesday-a-patch-now-update.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/07\/microsoft_windows_updates_cycle_arrows_laptop_mobile_phone_3x2_1200x800-100851684-small.jpg\"\/><\/p>\n<article>\n<section class=\"page\">\n<p>With this month&#8217;s Patch Tuesday update, Microsoft addressed 130 security vulnerabilities, published two advisories, and included four major CVE revisions. We also have four zero-days to manage for Windows (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-32046\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2023-32046<\/a>,<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-32049\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2023-32049<\/a>,<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36874\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2023-36874<\/a> and<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36884\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2023-36884<\/a>), bringing the Windows platform into a &#8220;patch now&#8221; schedule.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3702731\/four-zero-days-make-july-s-patch-tuesday-a-patch-now-update.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10516,10909,714,24580,10525],"class_list":["post-22476","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-microsoft","tag-microsoft-office","tag-security","tag-small-and-medium-business","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22476","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=22476"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22476\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=22476"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=22476"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=22476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}