{"id":23585,"date":"2023-12-12T16:17:04","date_gmt":"2023-12-13T00:17:04","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/12\/12\/news-17315\/"},"modified":"2023-12-12T16:17:04","modified_gmt":"2023-12-13T00:17:04","slug":"news-17315","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/12\/12\/news-17315\/","title":{"rendered":"Microsoft Patch Tuesday, December 2023 Edition"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Tue, 12 Dec 2023 22:21:00 +0000<\/strong><\/p>\n<p>The final Patch Tuesday of 2023 is upon us, with <strong>Microsoft Corp.<\/strong> today releasing fixes for a relatively small number of security holes in its <strong>Windows<\/strong> operating systems and other software. Even more unusual, there are no known &#8220;zero-day&#8221; threats targeting any of the vulnerabilities in December&#8217;s patch batch. Still, four of the updates pushed out today address &#8220;critical&#8221; vulnerabilities that Microsoft says can be exploited by malware or malcontents to seize complete control over a vulnerable Windows device with little or no help from users.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-60331\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/winupdatedate.png\" alt=\"\" width=\"748\" height=\"495\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/winupdatedate.png 923w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/winupdatedate-768x508.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/winupdatedate-782x518.png 782w\" sizes=\"auto, (max-width: 748px) 100vw, 748px\" \/><\/p>\n<p>Among the critical bugs quashed this month is <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-35628\" target=\"_blank\" rel=\"noopener\">CVE-2023-35628<\/a>, a weakness present in <strong>Windows 10<\/strong> and later versions, as well as <strong>Microsoft Server 2008<\/strong> and later. <strong>Kevin Breen<\/strong>, senior director of threat research at <strong>Immersive Labs<\/strong>, said the flaw affects <strong>MSHTML<\/strong>, a core component of Windows that is used to render browser-based content. Breen notes that MSHTML also can be found in a number of Microsoft applications, including <strong>Office<\/strong>, <strong>Outlook<\/strong>, <strong>Skype<\/strong> and <strong>Teams<\/strong>.<\/p>\n<p>&#8220;In the worst-case scenario, Microsoft suggests that simply receiving an email would be enough to trigger the vulnerability and give an attacker code execution on the target machine without any user interaction like opening or interacting with the contents,&#8221; Breen said.<span id=\"more-65686\"><\/span><\/p>\n<p>Another critical flaw that probably deserves priority patching is <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-35641\" target=\"_blank\" rel=\"noopener\">CVE-2023-35641<\/a>, a remote code execution weakness in a built-in Windows feature called the <strong>Internet Connection Sharing<\/strong> (ICS) service that lets multiple devices share an Internet connection. While CVE-2023-35641 earned a high vulnerability severity score (a CVSS rating of 8.8), the threat from this flaw may be limited somewhat because an attacker would need to be on the same network as the target. Also, while ICS is present in all versions of Windows since Windows 7, it is not on by default (although some applications may turn it on).<\/p>\n<p><strong>Satnam Narang<\/strong>, senior staff research engineer at <strong>Tenable<\/strong>, notes that a number of the non-critical patches released today were identified by Microsoft as \u201cmore likely to be exploited.\u201d For example, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-35636\">CVE-2023-35636<\/a>, which Microsoft says is an information disclosure vulnerability in Outlook. An attacker could exploit this flaw by convincing a potential victim to open a specially crafted file delivered via email or hosted on a malicious website.<\/p>\n<p>Narang said what makes this one stand out is that exploitation of this flaw would lead to <a href=\"https:\/\/www.netwrix.com\/pass_the_hash_attack_explained.html\" target=\"_blank\" rel=\"noopener\">the disclosure of NTLM hashes<\/a>, which could be leveraged as part of an NTLM relay or &#8220;pass the hash&#8221; attack, which lets an attacker masquerade as a legitimate user without ever having to log in.<\/p>\n<p>&#8221;It is reminiscent of <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-23397\" target=\"_blank\" rel=\"noopener\">CVE-2023-23397<\/a>, an elevation of privilege vulnerability in Microsoft Outlook that was exploited in the wild as a zero day and patched in the <a href=\"https:\/\/krebsonsecurity.com\/2023\/03\/microsoft-patch-tuesday-march-2023-edition\/\" target=\"_blank\" rel=\"noopener\">March 2023 Patch Tuesday<\/a> release,&#8221; Narang said. &#8220;However, unlike CVE-2023-23397, CVE-2023-35636 is not exploitable via Microsoft\u2019s Preview Pane, which lowers the severity of this flaw.&#8221;<\/p>\n<p>As usual, the <a href=\"https:\/\/isc.sans.edu\/diary\/Microsoft%20Patch%20Tuesday%20December%202023\/30480\" target=\"_blank\" rel=\"noopener\">SANS Internet Storm Center<\/a> has a good roundup on all of the patches released today and indexed by severity. Windows users, please consider backing up your data and\/or imaging your system before applying any updates. And feel free to sound off in the comments if you experience any difficulties as a result of these patches.<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2023\/12\/microsoft-patch-tuesday-december-2023-edition\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/winupdatedate.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Tue, 12 Dec 2023 22:21:00 +0000<\/strong><\/p>\n<p>The final Patch Tuesday of 2023 is upon us, with Microsoft Corp. today releasing fixes for a relatively small number of security holes in its Windows operating systems and other software. Even more unusual, there are no known &#8220;zero-day&#8221; threats targeting any of the vulnerabilities in December&#8217;s patch batch. Still, four of the updates pushed out today address &#8220;critical&#8221; vulnerabilities that Microsoft says can be exploited by malware or malcontents to seize complete control over a vulnerable Windows device with little or no help from users.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[30602,30603,30604,24626,24627,16888,30605,20501,20502,17061,16936],"class_list":["post-23585","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-cve-2023-35628","tag-cve-2023-35636","tag-cve-2023-35641","tag-immersive-labs","tag-kevin-breen","tag-latest-warnings","tag-microsoft-patch-tuesday-december-2023","tag-satnam-narang","tag-tenable","tag-the-coming-storm","tag-time-to-patch"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23585","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23585"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23585\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23585"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23585"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23585"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}