{"id":23699,"date":"2024-01-13T13:10:06","date_gmt":"2024-01-13T21:10:06","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2024\/01\/13\/news-17429\/"},"modified":"2024-01-13T13:10:06","modified_gmt":"2024-01-13T21:10:06","slug":"news-17429","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2024\/01\/13\/news-17429\/","title":{"rendered":"Patch now! First patch Tuesday of 2024 is here"},"content":{"rendered":"\n<p>Microsoft has issued patches for 48 security vulnerabilities in the first Patch Tuesday of 2024. With a relatively low number of patches\u2014and only two of them critical\u2014this makes it a relatively quiet month, which is certainly not the norm in January.<\/p>\n<p>The Common Vulnerabilities and Exposures (CVE) database lists publicly disclosed computer security flaws. The CVE IDs for the two critical vulnerabilities are:<\/p>\n<p><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-20674\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2024-20674<\/a> is a Windows Kerberos security feature bypass vulnerability with a <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2020\/05\/how-cvss-works-characterizing-and-scoring-vulnerabilities\">CVSS score<\/a> of 9.0 out of 10. An authenticated attacker could exploit this vulnerability by establishing a <a href=\"https:\/\/www.malwarebytes.com\/glossary\/man-in-the-middle-mitm\">machine-in-the-middle (MITM)<\/a> attack or other local network spoofing technique, then sending a malicious Kerberos message to the client victim machine to spoof itself as the Kerberos authentication server.<\/p>\n<p>Kerberos is an authentication protocol that is used to verify the identity of a user or host. To make use of this vulnerability the attacker will need to gain access to the restricted network before being able to run an attack. Nevertheless Microsoft thinks exploitation is \u201cmore likely,\u201d which means the vulnerability could be exploited as part of an attack chain.<\/p>\n<p><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-20700\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2024-20700<\/a> is a Windows Hyper-V Remote Code Execution (RCE) vulnerability with a CVSS score of 7.5 out of 10. Successful exploitation of this vulnerability might be hard because it requires an attacker to win a race condition and they will need to first gain access to the restricted network before running an attack.<\/p>\n<p>Hyper-V is the Windows hardware virtualization service. It enables users to create and run a software version of a computer, called a <a href=\"https:\/\/www.malwarebytes.com\/glossary\/virtual-machine\">virtual machine<\/a>. Sometimes these virtual machines are attractive targets for cybercriminals. But the advisory is not very clear on the exact circumstances or context that would allow the RCE.<\/p>\n<p>One other vulnerability, classified as important, that might turn out to be of interest, at least for some users, is:<\/p>\n<p><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-20677\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2024-20677<\/a> is a Microsoft Office Remote Code Execution (RCE) vulnerability with a CVSS score of 7.8 out of 10. The security vulnerability exists in FBX that could lead to remote code execution. To mitigate this vulnerability, the ability to insert FBX files has been disabled in Word, Excel, PowerPoint and Outlook for Windows and Mac. Versions of Office that had this feature enabled will no longer have access to it. This includes Office 2019, Office 2021, Office LTSC for Mac 2021, and Microsoft 365.<\/p>\n<p>FBX files are a type of 3D model file created using the Autodesk FBX software. When you try to insert an FBX file into Word, Excel, PowerPoint, and Outlook, you will see the following error: \u201cAn error occurred while importing this file.\u201d If you\u2019d like to re-enable this ability, you can find the reasons why you shouldn\u2019t and the method how to do it on this <a href=\"https:\/\/support.microsoft.com\/en-au\/topic\/support-for-fbx-files-has-been-turned-off-in-office-9f2387f1-84ec-496a-a288-2c6f774db219\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Microsoft Support page<\/a>.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-other-vendors\">Other vendors<\/h3>\n<p>Other vendors have synchronized their periodic updates with Microsoft. Here are few major ones that you may find in your environment.<\/p>\n<ul>\n<li>Adobe <a href=\"https:\/\/helpx.adobe.com\/security\/products\/substance3d_stager\/apsb24-06.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">released a patch<\/a> addressing six CVEs in Substance 3D Stager.<\/li>\n<li>Google published the <a href=\"https:\/\/source.android.com\/docs\/security\/bulletin\/2024-01-01\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Android Security Bulletin for January 2024<\/a>.<\/li>\n<li>Fortinet has <a href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-23-315\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">released a security update<\/a> to address a vulnerability in FortiOS and FortiProxy software.<\/li>\n<li>SAP has released its\u00a0<a href=\"https:\/\/dam.sap.com\/mac\/app\/e\/pdf\/preview\/embed\/ucQrx6G?ltr=a&amp;rc=10\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">January 2024 Patch Day<\/a>\u00a0updates.<\/li>\n<\/ul>\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\" \/>\n<p><strong>We don\u2019t just report on vulnerabilities\u2014we identify them, and prioritize action.<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep vulnerabilities in tow by using\u00a0<a href=\"https:\/\/www.malwarebytes.com\/business\/vulnerability-patch-management\">ThreatDown Vulnerability and Patch Management<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/01\/patch-now-first-patch-tuesday-of-2024-is-here\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Microsoft&#8217;s patch Tuesday roundup looks like a relatively quiet one. Unless your organization uses FBX files. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[30705,30706,30707,22783,30708,20790,30680,10516,32,19245],"class_list":["post-23699","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cve-2024-20674","tag-cve-2024-20677","tag-cve-2024-20700","tag-exploits-and-vulnerabilities","tag-fbx","tag-hyper-v","tag-kerberos","tag-microsoft","tag-news","tag-patch-tuesday"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23699","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23699"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23699\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23699"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23699"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23699"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}