{"id":23415,"date":"2023-11-17T14:32:05","date_gmt":"2023-11-17T22:32:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/11\/17\/news-17145\/"},"modified":"2023-11-17T14:32:05","modified_gmt":"2023-11-17T22:32:05","slug":"news-17145","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/11\/17\/news-17145\/","title":{"rendered":"Critical zero-day flaws in Windows, Office mean it&#039;s time to patch"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/idge\/imported\/imageapi\/2023\/07\/27\/14\/update2-100943955-small.jpg\"\/><\/p>\n<p>We are now in the third decade of Microsoft&#8217;s monthly Patch Tuesday releases, which deliver fewer critical updates to browsers and Windows platforms \u2014 and much more reliable updates to Microsoft Office \u2014 than in the early days of patching. But this month, the company rolled out 63 updates (including fixes for three zero-days in Windows and Office).<\/p>\n<p>Updates to Microsoft Exchange and Visual Studio can be included in standard patch release cycles, while Adobe needs to be included in your &#8220;Patch Now&#8221; releases for third-party applications.\u00a0<\/p>\n<p>The team at<a href=\"https:\/\/applicationreadiness.com\/\" rel=\"noopener nofollow\" target=\"_blank\"> Readiness<\/a> has provided a\u00a0<a href=\"https:\/\/applicationreadiness.com\/assurance-security-dashboard-november-2023\/\" rel=\"noopener nofollow\" target=\"_blank\">detailed\u00a0infographic<\/a> that outlines the risks associated with each of the updates for November.<\/p>\n<p>Microsoft publishes a list of known issues that relate to the operating system and platforms are included in each update. This month, that list includes:<\/p>\n<p>If you&#8217;re lucky enough to receive access to Microsoft&#8217;s<a href=\"https:\/\/www.microsoft.com\/en-us\/windows\/copilot-ai-features?r=1\" rel=\"noopener nofollow\" target=\"_blank\"> Windows AI Copilot<\/a> this month, you might experience a display issue with your desktop icons unexpectedly moving from one display to another \u2014 and then moving back to the original display. Don&#8217;t worry, there is no<a href=\"https:\/\/en.wikipedia.org\/wiki\/Ghost_in_the_machine\" rel=\"noopener nofollow\" target=\"_blank\"> ghost in the machine<\/a>. Oh, wait&#8230;.<\/p>\n<p>At this point, Microsoft has published three major revisions that require attention for this cycle, including:<\/p>\n<p>All of these revisions were for informational purposes only, and do not require additional action.<\/p>\n<p>Microsoft published the following vulnerability-related mitigations for this Patch Tuesday release:<\/p>\n<p>Each month, the team at Readiness\u00a0provides detailed, actionable testing guidance based on assessing a large application portfolio and a detailed analysis of the Microsoft patches and their potential impact on the Windows platforms and application installations.<\/p>\n<p>Microsoft has made a major update to a minor file system management feature this month, with changes to how<a href=\"https:\/\/support.microsoft.com\/en-us\/windows\/manage-drive-space-with-storage-sense-654f6ada-7bfc-45e5-966b-e24aded96ad5\" rel=\"noopener nofollow\" target=\"_blank\"> Storage Sense<\/a> updates and removes old and temporary files. There is an <a href=\"https:\/\/marketingsites-prod.microsoft.com\/en-us\/videoplayer\/embed\/RWAn5f?pid=ocpVideo1-innerdiv-oneplayer&amp;postJsllMsg=true&amp;maskLevel=20&amp;reporting=true&amp;market=en-us\" rel=\"noopener nofollow\" target=\"_blank\">excellent\u00a0video explainer<\/a>, and as Microsoft explains:\u00a0<i>&#8220;(Storage Sense) will run when your device is low on disk space and will clean up unnecessary temporary files. Content from the Recycle Bin will be deleted by default after some time, but items in your Downloads folder and OneDrive (or any other cloud provider) will not be touched unless you set up Storage Sense to do so.<\/i><\/p>\n<p>Our testing process raises a few concerns when the Windows file system has been updated, so we have included a few additional steps to validate this month&#8217;s changes:<\/p>\n<p>The following changes in this month&#8217;s update are not seen as high risk (for unexpected outcomes) and do not include functional changes:<\/p>\n<p>There has also been a major update to how Windows\u00a0<a href=\"https:\/\/applicationreadiness.com\/windows-11-support-for-compression-extensions-a-moral-imperative\/\" rel=\"noopener nofollow\" target=\"_blank\">handles file\u00a0compression<\/a>. Following last month\u2019s WinRAR security issues, Microsoft now supports archive formats that include tar, .7zip,. rar,.tar.gz. Readiness strongly suggests removing (a full, validated uninstall) WinRAR and other third-party compression utilities.<\/p>\n<p>Automated testing will help with these scenarios (especially a testing platform that offers a &#8220;delta&#8221; or comparison between builds). However, for your line of business apps, getting the application owner (doing<a href=\"https:\/\/en.wikipedia.org\/wiki\/Acceptance_testing\" rel=\"noopener nofollow\" target=\"_blank\"> UAT<\/a>) to test and approve the testing results is still absolutely essential.<\/p>\n<p>This section contains important changes to servicing (and most security updates) to Windows desktop and server platforms.<\/p>\n<p>You can read more about the recent changes at the<a href=\"about:blank\" rel=\"noopener nofollow\" target=\"_blank\"> Lifecycle\u00a0update page<\/a>.<\/p>\n<p>Each month, we break down the update cycle into product families (as defined by Microsoft) with the following basic groupings:<\/p>\n<p>Microsoft has adopted the<a href=\"https:\/\/www.chromium.org\/developers\/calendar\/\" rel=\"noopener nofollow\" target=\"_blank\"> Chromium release schedule<\/a> and no longer specifically publishes updates on Patch Tuesday. That said, 14 updates to the Chromium project Edge browser were released this month (none critical, and no zero-days for Microsoft or Chromium). For more information on Microsoft Edge security updates refer to the weekly updated\u00a0<a href=\"https:\/\/learn.microsoft.com\/en-us\/DeployEdge\/microsoft-edge-relnotes-security\" rel=\"nofollow\">Microsoft support\u00a0page<\/a>. Add these updates to your standard patch release schedule.<\/p>\n<p>Microsoft released two critical updates and 30 patches rated important to the Windows platform that cover the following key components:<\/p>\n<p>The real concern this month are the two publicly reported (and exploited) vulnerabilities:<\/p>\n<p>Here is this month&#8217;s\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/videoplayer\/embed\/RW1eN19?pid=ocpVideo1-innerdiv-oneplayer&amp;postJsllMsg=true&amp;maskLevel=20&amp;reporting=true&amp;market=en-us\" rel=\"nofollow noopener\" target=\"_blank\">Windows 11\u00a0release\u00a0video<\/a>. Otherwise, add this update to your &#8220;Patch Now&#8221; release schedule.<\/p>\n<p>Microsoft published five low-profile updates rated as important. That said,<a href=\"http:\/\/cve-2023-36413\/\" rel=\"nofollow\"> CVE-2023-36413<\/a> (a publicly reported security bypass vulnerability) is a distinctly dangerous security issue that only affects recent versions of Microsoft Office (Office 365 and Office 2019\/2021) and will require immediate attention. If you are using older versions of Office, add these updates to your standard release schedule. If you are up to date, then add these Office updates to your &#8220;Patch Now&#8221; timeline. And, yes \u2014 we think that this should be the<a href=\"https:\/\/www.merriam-webster.com\/dictionary\/ass%20over%20teakettle\" rel=\"nofollow noopener\" target=\"_blank\"> other way\u00a0around<\/a>\u00a0as well.<\/p>\n<p>Microsoft released four updates to the now-venerable\u00a0Exchange Server (we wanted to say \u201cvulnerable\u201d) this month. Though these updates may be a pain for Exchange administrators (no special instructions, but a reboot will be required), but these are fully confirmed fixes for difficult to exploit, non-&#8220;wormable&#8221; issues. All four issues (<a href=\"http:\/\/cve-2023-36035\/\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2023-36439<\/a>,<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36050\" rel=\"nofollow noopener\" target=\"_blank\"> CVE-2023-36050<\/a>,<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36039\" rel=\"nofollow noopener\" target=\"_blank\"> CVE-2023-36039<\/a> and<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36035\" rel=\"nofollow noopener\" target=\"_blank\"> CVE-2023-36035<\/a>) require full administrator access and as of now have not been reported as exploited or publicly reported. Add these low-profile updates to your standard server release schedule.<\/p>\n<p>Microsoft released six updates, all rated important, that affect Visual Studio and .NET\/ASP.NET. All currently supported versions of both product groups are affected. These issues could lead to elevation-of-privilege and spoofing attacks. With no critical-rated or remote code execution scenarios to manage, add these developer updates to your standard developer release schedule.<\/p>\n<p>We&#8217;re starting to get the hang of Adobe&#8217;s release schedule with this month&#8217;s anticipated year-end update to their core products \u2014 including Adobe Reader \u2014 with the release of<a href=\"https:\/\/helpx.adobe.com\/security\/products\/after_effects\/apsb23-02.html\" rel=\"nofollow noopener\" target=\"_blank\"> APSB23-02<\/a>. This is a critical-rated update for Reader and will require immediate attention. Given the recent changes to Microsoft&#8217;s enthusiasm for third-party tools , you have to wonder how long Adobe Reader has before Microsoft decides<a href=\"https:\/\/www.youtube.com\/watch?v=QsY066wa08E\" rel=\"nofollow noopener\" target=\"_blank\"> enough is enough<\/a>.<\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3710990\/critical-zero-day-flaws-in-windows-office-mean-its-time-to-patch.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/idge\/imported\/imageapi\/2023\/07\/27\/14\/update2-100943955-small.jpg\"\/><\/p>\n<article>\n<section class=\"page\">\n<p>We are now in the third decade of Microsoft&#8217;s monthly Patch Tuesday releases, which deliver fewer critical updates to browsers and Windows platforms \u2014 and much more reliable updates to Microsoft Office \u2014 than in the early days of patching. But this month, the company rolled out 63 updates (including fixes for three zero-days in Windows and Office).<\/p>\n<p>Updates to Microsoft Exchange and Visual Studio can be included in standard patch release cycles, while Adobe needs to be included in your &#8220;Patch Now&#8221; releases for third-party applications.\u00a0<\/p>\n<p>The team at<a href=\"https:\/\/applicationreadiness.com\/\" rel=\"noopener nofollow\" target=\"_blank\"> Readiness<\/a> has provided a\u00a0<a href=\"https:\/\/applicationreadiness.com\/assurance-security-dashboard-november-2023\/\" rel=\"noopener nofollow\" target=\"_blank\">detailed\u00a0infographic<\/a> that outlines the risks associated with each of the updates for November.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3710990\/critical-zero-day-flaws-in-windows-office-mean-its-time-to-patch.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10516,10909,714,24580,10525],"class_list":["post-23415","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-microsoft","tag-microsoft-office","tag-security","tag-small-and-medium-business","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23415","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23415"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23415\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23415"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23415"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23415"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}