{"id":23590,"date":"2023-12-13T09:10:30","date_gmt":"2023-12-13T17:10:30","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/12\/13\/news-17320\/"},"modified":"2023-12-13T09:10:30","modified_gmt":"2023-12-13T17:10:30","slug":"news-17320","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/12\/13\/news-17320\/","title":{"rendered":"Microsoft patches 34 vulnerabilities, including one zero-day"},"content":{"rendered":"\n<p>December\u2019s Patch Tuesday is a relatively quiet one on the Microsoft front. Redmond has patched 34 vulnerabilities with only four rated as critical. One vulnerability, a previously disclosed unpatched vulnerability in AMD central processing units (CPUs), was shifted by AMD to software developers.<\/p>\n<p>The <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-20588\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">AMD vulnerability<\/a> sounds like something from back in the eighties:<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>\u201cA division by zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality.\u201d<\/p>\n<\/blockquote>\n<p>And AMD\u2019s <a href=\"https:\/\/www.amd.com\/en\/resources\/product-security\/bulletin\/amd-sb-7007.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">mitigation advice<\/a> basically boils down to \u201cso don\u2019t divide by zero,\u201d which as many programmers can tell you, is not as easy as it sounds. Then ensure that no privileged data is used in division operations prior to changing privilege boundaries, AMD adds, which is about as hard as it sounds. We&#8217;re not sure how Microsoft solved it, but the company noted that the latest builds of Windows enable the mitigation and provide protection against the vulnerability.<\/p>\n<p>The other vulnerability we wanted to highlight is listed as <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-35628\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2023-35628<\/a>, a Windows MSHTML platform remote code execution (RCE) vulnerability with a <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2020\/05\/how-cvss-works-characterizing-and-scoring-vulnerabilities\">CVSS score<\/a> of 8.1 out of 10 and in severity listed as \u201cCritical.\u201d<\/p>\n<p>MSHTML is a core component of Windows that is used to render browser-based content. This vulnerability can be used in emails. An attacker could exploit this vulnerability by sending a specially crafted email which triggers automatically when it is retrieved and processed by the Outlook client. This could lead to exploitation even before the email is viewed in the Preview Pane. This could result in the attacker executing remote code on the victim&#8217;s machine. In other words, they could install or trigger malware on the target\u2019s machine.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-other-vendors\">Other vendors<\/h2>\n<p>Other vendors have synchronized their periodic updates with Microsoft. Here are few major ones that you may find in your environment.<\/p>\n<p><strong>Adobe<\/strong> has released security updates to address multiple vulnerabilities in Adobe software.<\/p>\n<ul>\n<li><a href=\"https:\/\/helpx.adobe.com\/security\/products\/prelude\/apsb23-67.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Adobe Prelude<\/a><\/li>\n<li><a href=\"https:\/\/helpx.adobe.com\/security\/products\/illustrator\/apsb23-68.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Adobe Illustrator<\/a><\/li>\n<li><a href=\"https:\/\/helpx.adobe.com\/security\/products\/indesign\/apsb23-70.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Adobe InDesign<\/a><\/li>\n<li><a href=\"https:\/\/helpx.adobe.com\/security\/products\/dimension\/apsb23-71.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Adobe Dimension<\/a><\/li>\n<li><a href=\"https:\/\/helpx.adobe.com\/security\/products\/experience-manager\/apsb23-72.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Adobe Experience Manager<\/a><\/li>\n<li><a href=\"https:\/\/helpx.adobe.com\/security\/products\/substance3d_stager\/apsb23-73.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Adobe Substance3D Stager<\/a><\/li>\n<li><a href=\"https:\/\/helpx.adobe.com\/security\/products\/substance3d-sampler\/apsb23-74.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Adobe Substance3D Sampler<\/a><\/li>\n<li><a href=\"https:\/\/helpx.adobe.com\/security\/products\/after_effects\/apsb23-75.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Adobe Substance3D After Effects<\/a><\/li>\n<li><a href=\"https:\/\/helpx.adobe.com\/security\/products\/substance3d_designer\/apsb23-76.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Adobe Substance3D Designer<\/a><\/li>\n<\/ul>\n<p><strong>Android<\/strong>: Google released the <a href=\"https:\/\/source.android.com\/docs\/security\/bulletin\/2023-12-01\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Android December 2023 security updates<\/a> with a fix for a <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/12\/android-phones-can-be-taken-over-remotely-update-when-you-can\">critical zero-day<\/a>.<\/p>\n<p><strong>Apache<\/strong> released security updates to address a vulnerability (<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-50164\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2023-50164<\/a>) in Struts 2. A remote attacker could exploit this vulnerability to take control of an affected system.<\/p>\n<p><strong>Apple<\/strong> <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/12\/update-now-apple-issues-patches-for-older-iphones-and-other-devices\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">issued emergency updates<\/a> including patches for older iOS devices concerning two actively used zero-day vulnerabilities.<\/p>\n<p><strong>SAP<\/strong> released its\u00a0<a href=\"https:\/\/dam.sap.com\/mac\/app\/e\/pdf\/preview\/embed\/ucQrx6G?ltr=a&amp;rc=10\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">December\u00a02023 Patch Day<\/a>\u00a0updates.<\/p>\n<p><strong>WordPress<\/strong> released version 6.4.2 that addresses a <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/wordpress-fixes-pop-chain-exposing-websites-to-rce-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">remote code execution (RCE) vulnerability<\/a>.<\/p>\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\" \/>\n<p><strong>We don\u2019t just report on vulnerabilities\u2014we identify them, and prioritize action.<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep vulnerabilities in tow by using\u00a0<a href=\"https:\/\/www.malwarebytes.com\/business\/vulnerability-patch-management\">ThreatDown Vulnerability and Patch Management<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/12\/microsoft-patches-34-vulnerabilities-including-one-zero-day\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Microsoft and other vendors have released their rounds of December updates on or before patch Tuesday. Update now! <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[17086,30602,30614,22783,10516,30615,32],"class_list":["post-23590","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-amd","tag-cve-2023-35628","tag-cve-2023-50164","tag-exploits-and-vulnerabilities","tag-microsoft","tag-mshtml","tag-news"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23590","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23590"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23590\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23590"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23590"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23590"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}