{"id":22661,"date":"2023-08-08T19:17:11","date_gmt":"2023-08-09T03:17:11","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/08\/08\/news-16391\/"},"modified":"2023-08-08T19:17:11","modified_gmt":"2023-08-09T03:17:11","slug":"news-16391","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/08\/08\/news-16391\/","title":{"rendered":"Microsoft Patch Tuesday, August 2023 Edition"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Wed, 09 Aug 2023 02:22:57 +0000<\/strong><\/p>\n<p><strong>Microsoft Corp.<\/strong> today issued software updates to plug more than 70 security holes in its <strong>Windows<\/strong> operating systems and related products, including multiple zero-day vulnerabilities currently being exploited in the wild.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-60331\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/winupdatedate.png\" alt=\"\" width=\"749\" height=\"496\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/winupdatedate.png 923w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/winupdatedate-768x508.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/winupdatedate-782x518.png 782w\" sizes=\"auto, (max-width: 749px) 100vw, 749px\" \/><\/p>\n<p>Six of the flaws fixed today earned Microsoft&#8217;s &#8220;critical&#8221; rating, meaning malware or miscreants could use them to install software on a vulnerable Windows system without any help from users.<\/p>\n<p>Last month, Microsoft acknowledged a series of zero-day vulnerabilities in a variety of Microsoft products that were discovered and exploited in-the-wild attacks. They were assigned a single placeholder designation of <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36884\" target=\"_blank\" rel=\"noopener\">CVE-2023-36884<\/a>.<\/p>\n<p><strong>Satnam Narang<\/strong>, senior staff research engineer at Tenable, said the August patch batch addresses <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36884\" target=\"_blank\" rel=\"noopener\">CVE-2023-36884<\/a>, which involves bypassing the <strong>Windows Search Security<\/strong> feature.<\/p>\n<p>&#8220;Microsoft also released ADV230003, a defense-in-depth update designed to stop the attack chain associated that leads to the exploitation of this CVE,&#8221; Narang said. &#8220;Given that this has already been successfully exploited in the wild as a zero-day, organizations should prioritize patching this vulnerability and applying the defense-in-depth update as soon as possible.&#8221;<\/p>\n<p>Redmond patched another flaw that is already seeing active attacks &#8212; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-38180\" target=\"_blank\" rel=\"noopener\">CVE-2023-38180<\/a> &#8212; a weakness in <strong>.NET<\/strong> and <strong>Visual Studio<\/strong> that leads to a denial-of-service condition on vulnerable servers.<\/p>\n<p>&#8220;Although the attacker would need to be on the same network as the target system, this vulnerability does not require the attacker to have acquired user privileges,&#8221; on the target system, wrote <strong>Nikolas Cemerikic<\/strong>, cyber security engineer at Immersive Labs.<span id=\"more-64549\"><\/span><\/p>\n<p>Narang said the software giant also patched six vulnerabilities in <strong>Microsoft Exchange Server<\/strong>, including <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-21709\" target=\"_blank\" rel=\"noopener\">CVE-2023-21709<\/a>, an elevation of privilege flaw that was assigned a CVSSv3 (threat) score of 9.8 out of a possible 10, even though Microsoft rates it as an important flaw, not critical.<\/p>\n<p>&#8220;An unauthenticated attacker could exploit this vulnerability by conducting a brute-force attack against valid user accounts,&#8221; Narang said. &#8220;Despite the high rating, the belief is that brute-force attacks won\u2019t be successful against accounts with strong passwords. However, if weak passwords are in use, this would make brute-force attempts more successful. The remaining five vulnerabilities range from a spoofing flaw and multiple remote code execution bugs, though the most severe of the bunch also require credentials for a valid account.&#8221;<\/p>\n<p>Experts at security firm <strong>Automox<\/strong> called attention to <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36910\" target=\"_blank\" rel=\"noopener\">CVE-2023-36910<\/a>, a remote code execution bug in the Microsoft Message Queuing service that can be exploited remotely and without privileges to execute code on vulnerable Windows 10, 11 and Server 2008-2022 systems. Microsoft says it considers this vulnerability &#8220;less likely&#8221; to be exploited, and Automox says while the message queuing service is not enabled by default in Windows and is less common today, any device with it enabled is at critical risk.<\/p>\n<p>Separately, <strong>Adobe<\/strong> has issued <a href=\"https:\/\/helpx.adobe.com\/security\/products\/acrobat\/apsb23-30.html\" target=\"_blank\" rel=\"noopener\">a critical security update<\/a> for Acrobat and Reader that resolves at least 30 security vulnerabilities in those products. Adobe said it is not aware of any exploits in the wild targeting these flaws. The company also issued security updates for <strong>Adobe Commerce<\/strong> and <strong>Adobe Dimension<\/strong>.<\/p>\n<p>If you experience glitches or problems installing any of these patches this month, please consider leaving a comment about it below; there\u2019s a fair chance other readers have experienced the same and may chime in here with useful tips.<\/p>\n<p>Additional reading:<\/p>\n<p><strong>-SANS Internet Storm Center<\/strong> <a href=\"https:\/\/isc.sans.edu\/diary\/Microsoft%20August%202023%20Patch%20Tuesday\/30106\" target=\"_blank\" rel=\"noopener\">listing<\/a> of each Microsoft vulnerability patched today, indexed by severity and affected component.<\/p>\n<p>&#8211;<a href=\"https:\/\/www.askwoody.com\/\" rel=\"noopener\" target=\"_blank\">AskWoody.com<\/a>, which keeps tabs on any developing problems related to the availability or installation of these updates.<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2023\/08\/microsoft-patch-tuesday-august-2023-edition\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/winupdatedate.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Wed, 09 Aug 2023 02:22:57 +0000<\/strong><\/p>\n<p>Microsoft Corp. today issued software updates to plug more than 70 security holes in its Windows operating systems and related products, including a patch that addresses multiple zero-day vulnerabilities currently being exploited in the wild.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[11414,29931,29786,29932,29933,24626,10516,29934,29935,20501,17220,20502,16936],"class_list":["post-22661","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-adobe","tag-cve-2023-21709","tag-cve-2023-36884","tag-cve-2023-36910","tag-cve-2023-38180","tag-immersive-labs","tag-microsoft","tag-microsoft-patch-tuesday-august-2023","tag-nikolas-cemerikic","tag-satnam-narang","tag-security-tools","tag-tenable","tag-time-to-patch"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22661","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=22661"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22661\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=22661"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=22661"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=22661"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}