{"id":18756,"date":"2022-04-13T07:17:10","date_gmt":"2022-04-13T15:17:10","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/04\/13\/news-12489\/"},"modified":"2022-04-13T07:17:10","modified_gmt":"2022-04-13T15:17:10","slug":"news-12489","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/04\/13\/news-12489\/","title":{"rendered":"Microsoft Patch Tuesday, April 2022 Edition"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Wed, 13 Apr 2022 15:01:24 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-56287\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png\" alt=\"\" width=\"752\" height=\"529\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png 841w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate-768x541.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate-782x550.png 782w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate-100x70.png 100w\" sizes=\"auto, (max-width: 752px) 100vw, 752px\" \/><\/p>\n<p><strong>Microsoft<\/strong> on Tuesday released updates to fix roughly 120 security vulnerabilities in its <strong>Windows<\/strong> operating systems and other software. Two of the flaws have been publicly detailed prior to this week, and one is already seeing active exploitation, according to a report from the <strong>U.S. National Security Agency<\/strong> (NSA).<\/p>\n<p>Of particular concern this month is <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-24521\" target=\"_blank\" rel=\"noopener\">CVE-2022-24521<\/a>, which is a &#8220;privilege escalation&#8221; vulnerability in the Windows common log file system driver. In its advisory, Microsoft said it received a report from the NSA that the flaw is under active attack.<\/p>\n<p>\u201cIt\u2019s not stated how widely the exploit is being used in the wild, but it\u2019s likely still targeted at this point and not broadly available,&#8221; assessed <strong>Dustin Childs<\/strong> with Trend Micro&#8217;s Zero Day Initiative. &#8220;Go patch your systems before that situation changes.\u201d<\/p>\n<p>Nine of the updates pushed this week address problems Microsoft considers &#8220;critical,&#8221; meaning the flaws they fix could be abused by malware or malcontents to seize total, remote access to a Windows system without any help from the user.<\/p>\n<p>Among the scariest critical bugs is <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-26809\" target=\"_blank\" rel=\"noopener\">CVE-2022-26809,<\/a> a potentially &#8220;wormable&#8221; weakness in a core Windows component (<strong>RPC<\/strong>) that earned a CVSS score of 9.8 (10 being the worst). Microsoft said it believes exploitation of this flaw is more likely than not.<\/p>\n<p>Other potentially wormable threats this month include <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-24491\" target=\"_blank\" rel=\"noopener\">CVE-2022-24491<\/a> and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-24497\" target=\"_blank\" rel=\"noopener\">CVE-2022-24497<\/a>, Windows <strong>Network File System<\/strong> (NFS) vulnerabilities that also clock in at 9.8 CVSS scores and are listed as &#8220;exploitation more likely by Microsoft.&#8221;<\/p>\n<p>&#8220;These could be the kind of vulnerabilities which appeal to ransomware operators as they provide the potential to expose critical data,&#8221; said <strong>Kevin Breen<\/strong>, director of cyber threat research at <strong>Immersive Labs<\/strong>. &#8220;It is also important for security teams to note that NFS Role is not a default configuration for Windows devices.&#8221;<span id=\"more-59439\"><\/span><\/p>\n<p>Speaking of wormable flaws, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-24500\" target=\"_blank\" rel=\"noopener\">CVE-2022-24500<\/a> is a critical bug in the <strong>Windows Server Message Block<\/strong> (SMB).<\/p>\n<p>&#8220;This is especially poignant as we approach the anniversary of WannaCry, which famously used the EternalBlue SMB vulnerability to propagate at great pace,&#8221; Breen added. &#8220;Microsoft advises blocking TCP port 445 at the perimeter firewall, which is strong advice regardless of this specific vulnerability. While this won&#8217;t stop exploitation from attackers inside the local network, it will prevent new attacks originating from the Internet.&#8221;<\/p>\n<p>In addition, this month&#8217;s patch batch from Redmond brings updates for <strong>Exchange Server<\/strong>, <strong>Office<\/strong>, <strong>SharePoint Server<\/strong>, <strong>Windows Hyper-V<\/strong>, <strong>DNS Server<\/strong>, <strong>Skype for Business<\/strong>, <strong>.NET<\/strong> and <strong>Visual Studio<\/strong>, <strong>Windows App Store<\/strong>, and <strong>Windows Print Spooler<\/strong> components.<\/p>\n<p>As it generally does on the second Tuesday of each month, <strong>Adobe<\/strong> released four patches addressing 70 vulnerabilities in <strong>Acrobat<\/strong> and <strong>Reader,<\/strong> <strong>Photoshop<\/strong>, <strong>After Effects<\/strong>, and <strong>Adobe Commerce<\/strong>. More information on those updates is available <a href=\"https:\/\/helpx.adobe.com\/security.html\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p>For a complete rundown of all patches released by Microsoft today and indexed by severity and other metrics, check out the\u00a0<a href=\"https:\/\/isc.sans.edu\/forums\/diary\/Microsoft+April+2022+Patch+Tuesday\/28542\/\" target=\"_blank\" rel=\"noopener\">always-useful Patch Tuesday roundup<\/a>\u00a0from the\u00a0<strong>SANS Internet Storm Center<\/strong>. And it\u2019s not a bad idea to hold off updating for a few days until Microsoft works out any kinks in the updates:\u00a0<a href=\"https:\/\/www.askwoody.com\/2022\/march-madness-patching-begins\/\" target=\"_blank\" rel=\"noopener\">AskWoody.com<\/a>\u00a0usually has the lowdown on any patches that may be causing problems for Windows users.<\/p>\n<p>As always, please consider backing up your system or at least your important documents and data before applying system updates. And if you run into any problems with these patches, please drop a note about it here in the comments.<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2022\/04\/microsoft-patch-tuesday-april-2022-edition\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Wed, 13 Apr 2022 15:01:24 +0000<\/strong><\/p>\n<p>Microsoft on Tuesday released updates to fix roughly 120 security vulnerabilities in its Windows operating systems and other software. Two of the flaws have been publicly detailed prior to this week, and one is already seeing active exploitation, according to a report from the U.S. National Security Agency (NSA).<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[16888,17220,16936],"class_list":["post-18756","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-latest-warnings","tag-security-tools","tag-time-to-patch"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18756","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18756"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18756\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18756"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18756"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18756"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}