{"id":23943,"date":"2024-02-14T06:10:05","date_gmt":"2024-02-14T14:10:05","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2024\/02\/14\/news-17673\/"},"modified":"2024-02-14T06:10:05","modified_gmt":"2024-02-14T14:10:05","slug":"news-17673","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2024\/02\/14\/news-17673\/","title":{"rendered":"Update now! Microsoft fixes two zero-days on February Patch Tuesday"},"content":{"rendered":"\n<p>Microsoft has issued patches for 73 security vulnerabilities in its February 2024 Patch Tuesday. Among these vulnerabilities are two zero-days that are reportedly being used in the wild.<\/p>\n<p>The two zero-day vulnerabilities have already been added to the Cybersecurity &amp; Infrastructure Security Agency\u2019s <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">catalog of \u00a0Known Exploited Vulnerabilities<\/a>, based on evidence of active exploitation. This means that Federal Civilian Executive Branch (FCEB) agencies need to remediate these vulnerabilities by March 5, 2024, in order to protect their devices.<\/p>\n<p>The Common Vulnerabilities and Exposures (CVE) database lists publicly disclosed computer security flaws. The zero-days patched in this round of updates are:<\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-21351\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2024-21351<\/a> (<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2020\/05\/how-cvss-works-characterizing-and-scoring-vulnerabilities\">CVSS score<\/a> 7.6 out of 10): a Windows SmartScreen security feature bypass vulnerability. The vulnerability allows a malicious actor to inject code into SmartScreen and potentially gain code execution, which could potentially lead to some data exposure, lack of system availability, or both. An authorized attacker must send the user a malicious file and convince the user to open it.<\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-21412\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2024-21412<\/a> (CVSS score 8.1 out of 10): an Internet Shortcut Files security feature bypass vulnerability. An unauthenticated attacker could send the targeted user a specially crafted file that is designed to bypass displayed security checks. However, the attacker would have no way to force a user to view the attacker-controlled content. Instead, the attacker would have to convince them to take action by clicking on the file link.<\/p>\n<p>The bypassed security feature in both cases is the Mark of the Web (MOTW), the technology that ensures Windows pops a warning message when trying to open a file downloaded from the Internet. When a file is downloaded, Windows adds a ZoneId in the form of an <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2015\/07\/introduction-to-alternate-data-streams\">Alternate Data Stream<\/a> to the file which is responsible for the warning message(s).<\/p>\n<p>Another vulnerability worth keeping an eye on is <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-21413\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2024-21413<\/a> (CVSS score 9.8 out of 10): a Microsoft Outlook remote code execution (RCE) vulnerability. Successful exploitation of this vulnerability would allow an attacker to bypass the Office Protected View and to gain high privileges, which include read, write, and delete functionality. Microsoft notes that the Preview Pane is an attack vector. The <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21413\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">update guide for this vulnerability<\/a> lists a number of required updates before protection is achieved.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-other-vendors\">Other vendors<\/h2>\n<p>Other vendors have synchronized their periodic updates with Microsoft. Here are few major ones that you may find in your environment.<\/p>\n<p><strong>Adobe<\/strong> has released security updates to address vulnerabilities in several products:<\/p>\n<ul>\n<li><a href=\"https:\/\/urldefense.com\/v3\/__https:\/helpx.adobe.com\/security\/products\/magento\/apsb24-03.html__;!!KVBT61rP3Xqj4A!7oBi57CLUj5y8kQWHOxU3chYqQJQcv2mKtTc2hpBFpYthLMsmZ6OJ_qb1M0zbki09UiHNy9GPyi0I2PnfbBLaKs$\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Adobe Commerce and Magento<\/a><\/li>\n<li><a href=\"https:\/\/urldefense.com\/v3\/__https:\/helpx.adobe.com\/security\/products\/substance3d_painter\/apsb24-04.html__;!!KVBT61rP3Xqj4A!7oBi57CLUj5y8kQWHOxU3chYqQJQcv2mKtTc2hpBFpYthLMsmZ6OJ_qb1M0zbki09UiHNy9GPyi0I2PnBBHAjq4$\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Adobe Substance 3D Painter<\/a><\/li>\n<li><a href=\"https:\/\/urldefense.com\/v3\/__https:\/helpx.adobe.com\/security\/products\/acrobat\/apsb24-07.html__;!!KVBT61rP3Xqj4A!7oBi57CLUj5y8kQWHOxU3chYqQJQcv2mKtTc2hpBFpYthLMsmZ6OJ_qb1M0zbki09UiHNy9GPyi0I2Pnl6fjLNQ$\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Adobe Acrobat and Reader<\/a><\/li>\n<li><a href=\"https:\/\/urldefense.com\/v3\/__https:\/helpx.adobe.com\/security\/products\/framemaker-publishing-server\/apsb24-10.html__;!!KVBT61rP3Xqj4A!7oBi57CLUj5y8kQWHOxU3chYqQJQcv2mKtTc2hpBFpYthLMsmZ6OJ_qb1M0zbki09UiHNy9GPyi0I2PnLbnFLEU$\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Adobe FrameMaker Publishing Server<\/a><\/li>\n<li><a href=\"https:\/\/urldefense.com\/v3\/__https:\/helpx.adobe.com\/security\/products\/audition\/apsb24-11.html__;!!KVBT61rP3Xqj4A!7oBi57CLUj5y8kQWHOxU3chYqQJQcv2mKtTc2hpBFpYthLMsmZ6OJ_qb1M0zbki09UiHNy9GPyi0I2PnHECU1yo$\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Adobe Audition&nbsp;<\/a><\/li>\n<li><a href=\"https:\/\/urldefense.com\/v3\/__https:\/helpx.adobe.com\/security\/products\/substance3d_designer\/apsb24-13.html__;!!KVBT61rP3Xqj4A!7oBi57CLUj5y8kQWHOxU3chYqQJQcv2mKtTc2hpBFpYthLMsmZ6OJ_qb1M0zbki09UiHNy9GPyi0I2PnqbX8i5U$\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Adobe Substance 3D Designer<\/a><\/li>\n<\/ul>\n<p>The <strong>Android<\/strong> Security Bulletin for February contains details of <a href=\"https:\/\/source.android.com\/docs\/security\/bulletin\/2024-02-01\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">security vulnerabilities<\/a> for patch level 2024-02-05 or later.<\/p>\n<p><strong>Ivanti<\/strong> has urged customers to patch yet another <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/02\/ivanti-urges-customer-to-patch-yet-another-critical-vulnerability\">critical vulnerability<\/a>.<\/p>\n<p><strong>SAP<\/strong> has released its <a href=\"https:\/\/support.sap.com\/en\/my-support\/knowledge-base\/security-notes-news\/february-2024.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">February 2024<\/a> Patch Day updates.<\/p>\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\" \/>\n<p><strong>We don\u2019t just report on vulnerabilities\u2014we identify them, and prioritize action.<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep vulnerabilities in tow by using\u00a0<a href=\"https:\/\/www.malwarebytes.com\/business\/vulnerability-patch-management\">ThreatDown Vulnerability and Patch Management<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/02\/update-now-microsoft-fixes-two-zero-days-on-february-patch-tuesday\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Microsoft has issued patches for 73 security vulnerabilities in its February 2024 Patch Tuesday. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[30873,30875,30876,22783,30886,32,19245],"class_list":["post-23943","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cve-2024-21351","tag-cve-2024-21412","tag-cve-2024-21413","tag-exploits-and-vulnerabilities","tag-february-2024","tag-news","tag-patch-tuesday"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23943","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23943"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23943\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23943"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23943"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23943"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}