{"id":23387,"date":"2023-11-14T16:17:23","date_gmt":"2023-11-15T00:17:23","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/11\/14\/news-17117\/"},"modified":"2023-11-14T16:17:23","modified_gmt":"2023-11-15T00:17:23","slug":"news-17117","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/11\/14\/news-17117\/","title":{"rendered":"Microsoft Patch Tuesday, November 2023 Edition"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Tue, 14 Nov 2023 23:00:59 +0000<\/strong><\/p>\n<p><strong>Microsoft<\/strong> today released updates to fix more than five dozen security holes in its <strong>Windows<\/strong> operating systems and related software, including three &#8220;zero day&#8221; vulnerabilities that Microsoft warns are already being exploited in active attacks.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-56287\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png\" alt=\"\" width=\"841\" height=\"592\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png 841w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate-768x541.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate-782x550.png 782w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate-100x70.png 100w\" sizes=\"auto, (max-width: 841px) 100vw, 841px\" \/><\/p>\n<p>The zero-day threats targeting Microsoft this month include <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36025\" target=\"_blank\" rel=\"noopener\">CVE-2023-36025<\/a>, a weakness that allows malicious content to bypass the Windows SmartScreen Security feature. SmartScreen is a built-in Windows component that tries to detect and block malicious websites and files. Microsoft&#8217;s security advisory for this flaw says attackers could exploit it by getting a Windows user to click on a booby-trapped link to a shortcut file.<\/p>\n<p><strong>Kevin Breen<\/strong>, senior director of threat research at <strong>Immersive Labs<\/strong>, said emails with .url attachments or logs with processes spawning from .url files &#8220;should be a high priority for threat hunters given the active exploitation of this vulnerability in the wild.&#8221;<span id=\"more-65633\"><\/span><\/p>\n<p>The second zero day this month is <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36033\" target=\"_blank\" rel=\"noopener\">CVE-2023-36033<\/a>, which is a vulnerability in the &#8220;DWM Core Library&#8221; in Microsoft Windows that was exploited in the wild as a zero day and publicly disclosed prior to patches being available. It affects Microsoft Windows 10 and later, as well as Microsoft Windows Server 2019 and subsequent versions.<\/p>\n<p>&#8220;This vulnerability can be exploited locally, with low complexity and without needing high-level privileges or user interaction,&#8221; said <strong>Mike Walters<\/strong>, president and co-founder of the security firm <strong>Action1<\/strong>. &#8220;Attackers exploiting this flaw could gain SYSTEM privileges, making it an efficient method for escalating privileges, especially after initial access through methods like phishing.&#8221;<\/p>\n<p>The final zero day in this month&#8217;s Patch Tuesday is a problem in the &#8220;Windows Cloud Files Mini Filter Driver&#8221; tracked as <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36036\" target=\"_blank\" rel=\"noopener\">CVE-2023-36036<\/a> that affects Windows 10 and later, as well as Windows Server 2008 at later. Microsoft says it is relatively straightforward for attackers to exploit CVE-2023-36036 as a way to elevate their privileges on a compromised PC.<\/p>\n<p>Beyond the zero day flaws, Breen said organizations running <strong>Microsoft Exchange Server<\/strong> should prioritize several new Exchange patches, including <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36439\" target=\"_blank\" rel=\"noopener\">CVE-2023-36439<\/a>, which is a bug that would allow attackers to install malicious software on an Exchange server. This weakness technically requires the attacker to be authenticated to the target&#8217;s local network, but Breen notes that a pair of phished Exchange credentials will provide that access nicely.<\/p>\n<p>&#8220;This is typically achieved through social engineering attacks with spear phishing to gain initial access to a host before searching for other vulnerable internal targets \u2013 just because your Exchange Server doesn&#8217;t have internet-facing authentication doesn\u2019t mean it&#8217;s protected,&#8221; Breen said.<\/p>\n<p>Breen said this vulnerability goes hand in hand with three other Exchange bugs that Microsoft designated as &#8220;exploitation more likely:&#8221; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36050\" target=\"_blank\" rel=\"noopener\">CVE-2023-36050<\/a>, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36039\" target=\"_blank\" rel=\"noopener\">CVE-2023-36039<\/a> and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36035\" target=\"_blank\" rel=\"noopener\">CVE-2023-36035<\/a>.<\/p>\n<p>Finally, the <strong>SANS Internet Storm Center<\/strong> <a href=\"https:\/\/isc.sans.edu\/forums\/diary\/Microsoft%20Patch%20Tuesday%20November%202023\/30400\/\" target=\"_blank\" rel=\"noopener\">points to<\/a> two additional bugs patched by Microsoft this month that aren&#8217;t yet showing signs of active exploitation but that were made public prior to today and thus deserve prioritization. Those include: <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36038\" target=\"_blank\" rel=\"noopener\">CVE-2023-36038<\/a>, a denial of service vulnerability in <strong>ASP.NET Core<\/strong>, with a CVSS score of 8.2; and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36413\" target=\"_blank\" rel=\"noopener\">CVE-2023-36413<\/a>: A <strong>Microsoft Office<\/strong> security feature bypass. Exploiting this vulnerability will bypass the protected mode when opening a file received via the web.<\/p>\n<p>Windows users, please consider backing up your data and\/or imaging your system before applying any updates. And feel free to sound off in the comments if you experience any difficulties as a result of these patches.<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2023\/11\/microsoft-patch-tuesday-november-2023-edition\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Tue, 14 Nov 2023 23:00:59 +0000<\/strong><\/p>\n<p>Microsoft today released updates to fix more than five dozen security holes in its Windows operating systems and related software, including three &#8220;zero day&#8221; vulnerabilities that Microsoft warns are already being exploited in active attacks.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[30496,30497,30498,30499,30500,30501,30502,30503,15801,17220,16936],"class_list":["post-23387","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-cve-2023-36025","tag-cve-2023-36033","tag-cve-2023-36036","tag-cve-2023-36038","tag-cve-2023-36050","tag-cve-2023-36413","tag-cve-2023-36439","tag-microsoft-patch-tuesday-november-2023","tag-sans-internet-storm-center","tag-security-tools","tag-time-to-patch"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23387","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23387"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23387\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23387"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23387"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23387"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}