{"id":19484,"date":"2022-06-30T10:45:03","date_gmt":"2022-06-30T18:45:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/06\/30\/news-13217\/"},"modified":"2022-06-30T10:45:03","modified_gmt":"2022-06-30T18:45:03","slug":"news-13217","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/06\/30\/news-13217\/","title":{"rendered":"You Need to Update Windows and Chrome Right Now"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/62bce4ecb3e9d5fb1d49e1dd\/master\/pass\/critical-update-security-june.jpg\"\/><\/p>\n<p><strong>Credit to Author: Kate O&#8217;Flaherty| Date: Thu, 30 Jun 2022 11:00:00 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-iiTsTb hAGfXd byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb UCAzg byline__name\"><a class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA BylineLink-eZnyPI eTiIvU mEZDb fNdcwQ bKZMMS byline__name-link button\" href=\"\/author\/kate-oflaherty\">Kate O&#x27;Flaherty<\/a><\/span><\/span><\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p><span class=\"lead-in-text-callout\">June has seen<\/span> the release of multiple security updates, with important patches issued for the likes of Google&#x27;s Chrome and Android as well as dozens of patches for Microsoft products, including fixes for <a href=\"https:\/\/www.wired.com\/story\/microsoft-follina-vulnerability-windows-office-365\/\">a Windows zero-day vulnerability that attackers had already exploited<\/a>. <a href=\"https:\/\/www.wired.co.uk\/article\/ios-chrome-android-windows-update-may-2022\">Apple updates<\/a> were absent at the time of writing, but the month also included some major enterprise-focused patches for Citrix, SAP, and Cisco products.<\/p>\n<p class=\"paywall\">Here\u2019s what you need to know about the major patches released in the past month.<\/p>\n<p class=\"paywall\">Microsoft\u2019s Patch Tuesday release was pretty hefty in June, including fixes for 55 flaws in the tech giant\u2019s products. This Patch Tuesday was particularly important because it addressed an <a href=\"https:\/\/www.wired.com\/story\/microsoft-follina-vulnerability-windows-office-365\/\">already exploited remote code execution (RCE) issue in Windows dubbed Follina<\/a>, which Microsoft has been aware of since at least May.<\/p>\n<p class=\"paywall\">Tracked as CVE-2022-30190, Follina\u2014which takes advantage of vulnerabilities in the Windows Support Diagnostic tool and can execute without the need to open a document\u2014has already been used by multiple criminal groups and state-sponsored attackers.<\/p>\n<p class=\"paywall\">Three of the vulnerabilities addressed in Patch Tuesday affecting Windows Server are RCE flaws and rated as critical. However, the patches seem to be <a data-offer-url=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/recent-windows-server-updates-break-vpn-rdp-rras-connections\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.bleepingcomputer.com\/news\/microsoft\/recent-windows-server-updates-break-vpn-rdp-rras-connections\/&quot;}\" href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/recent-windows-server-updates-break-vpn-rdp-rras-connections\/\" rel=\"nofollow noopener\" target=\"_blank\">breaking<\/a> some VPN and RDP connections, so be careful.<\/p>\n<p class=\"paywall\">Google Chrome updates continue to come thick and fast. That\u2019s no bad thing, as the world\u2019s most popular browser is by default one of the biggest targets for hackers. In June, Google <a data-offer-url=\"https:\/\/chromereleases.googleblog.com\/2022\/06\/stable-channel-update-for-desktop_21.html\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/chromereleases.googleblog.com\/2022\/06\/stable-channel-update-for-desktop_21.html&quot;}\" href=\"https:\/\/chromereleases.googleblog.com\/2022\/06\/stable-channel-update-for-desktop_21.html\" rel=\"nofollow noopener\" target=\"_blank\">released<\/a> Chrome 103 with patches for 14 vulnerabilities, some of which are serious.<\/p>\n<p class=\"paywall\">Tracked as CVE-2022-2156, the biggest flaw is a use-after-free issue in Base reported by Google\u2019s Project Zero bug-hunting team that could lead to arbitrary code execution, denial of service, or corruption of data. Worse, when chained with other vulnerabilities the flaw could lead to full system compromise.<\/p>\n<p class=\"paywall\">Other issues patched in Chrome include vulnerabilities in Interest Groups, WebApp Provider, and a flaw in the V8 Javascript and WebAssembly engine.<\/p>\n<p class=\"paywall\">Of the multiple Android security issues Google patched in June, the most severe is a critical security vulnerability in the System component that could lead to remote code execution with no additional execution privileges needed, Google said in its <a data-offer-url=\"https:\/\/source.android.com\/security\/bulletin\/2022-06-01\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/source.android.com\/security\/bulletin\/2022-06-01&quot;}\" href=\"https:\/\/source.android.com\/security\/bulletin\/2022-06-01\" rel=\"nofollow noopener\" target=\"_blank\">Android Security Bulletin<\/a>.<\/p>\n<p class=\"paywall\">Google also <a data-offer-url=\"https:\/\/source.android.com\/security\/bulletin\/pixel\/2022-06-01\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/source.android.com\/security\/bulletin\/pixel\/2022-06-01&quot;}\" href=\"https:\/\/source.android.com\/security\/bulletin\/pixel\/2022-06-01\" rel=\"nofollow noopener\" target=\"_blank\">released<\/a> updates for its Pixel devices to patch issues in the Android Framework, Media Framework, and System Components.<\/p>\n<p class=\"paywall\">Samsung users seem to have gotten lucky with Android updates of late, with the device maker rolling out its patches very quickly. The June security update is no different, reaching the Samsung Galaxy Tab S7 series, Galaxy S21 series, Galaxy S22 series, and the Galaxy Z Fold 2 straightaway.<\/p>\n<p class=\"paywall\">Software maker Cisco <a data-offer-url=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-sma-esa-auth-bypass-66kEcxQD\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-sma-esa-auth-bypass-66kEcxQD&quot;}\" href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-sma-esa-auth-bypass-66kEcxQD\" rel=\"nofollow noopener\" target=\"_blank\">released<\/a> a patch in June to fix a critical vulnerability in Cisco Secure Email and Web Manager and Cisco Email Security Appliance that could allow a remote attacker to bypass authentication and log in to the web management interface of an affected device.<\/p>\n<p class=\"paywall\">The issue, tracked as CVE-2022-20798, could be exploited if an attacker enters something specific on the login page of the affected device, which would provide access to the web-based management interface, Cisco said.<\/p>\n<p class=\"paywall\">Citrix has issued a warning urging users to patch some major vulnerabilities that could let attackers reset admin passwords. The vulnerabilities in Citrix Application Delivery Management could result in corruption of the system by a remote, unauthenticated user, Citrix said in a <a data-offer-url=\"https:\/\/support.citrix.com\/article\/CTX460016\/citrix-application-delivery-management-security-bulletin-for-cve202227511-and-cve202227512\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/support.citrix.com\/article\/CTX460016\/citrix-application-delivery-management-security-bulletin-for-cve202227511-and-cve202227512&quot;}\" href=\"https:\/\/support.citrix.com\/article\/CTX460016\/citrix-application-delivery-management-security-bulletin-for-cve202227511-and-cve202227512\" rel=\"nofollow noopener\" target=\"_blank\">security bulletin<\/a>. \u201cThe impact of this can include the reset of the administrator password at the next device reboot, allowing an attacker with ssh access to connect with the default administrator credentials after the device has rebooted,\u201d the company wrote.<\/p>\n<p class=\"paywall\">Citrix recommends that traffic to the Citrix ADM\u2019s IP address be segmented from standard network traffic. This diminishes\u202fthe risk\u202fof\u202fexploitation, it said. However, the vendor also urged customers to install the updated versions of Citrix ADM server and Citrix ADM agent \u201cas soon as possible.\u201d<\/p>\n<p class=\"paywall\">Software firm SAP has released 12 security patches as part of its <a data-offer-url=\"https:\/\/dam.sap.com\/mac\/app\/e\/pdf\/preview\/embed\/ucQrx6G?ltr=a&amp;rc=10\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/dam.sap.com\/mac\/app\/e\/pdf\/preview\/embed\/ucQrx6G?ltr=a&amp;rc=10&quot;}\" href=\"https:\/\/dam.sap.com\/mac\/app\/e\/pdf\/preview\/embed\/ucQrx6G?ltr=a&amp;rc=10\" rel=\"nofollow noopener\" target=\"_blank\">June Patch Day<\/a>, three of which are serious. The first listed by SAP relates to an update released on April 2018 Patch Day and applies to the browser control Google Chromium used by the firm\u2019s business clients. Details of this vulnerability aren\u2019t available, but it has a severity score of 10, so the patch should be applied straightaway.<\/p>\n<p class=\"paywall\">Another major fix concerns an issue in the SAProuter proxy in NetWeaver and ABAP Platform, which could allow an attacker to execute SAProuter administration commands from a remote client. The third major patch fixes a privilege escalation bug in SAP PowerDesigner Proxy 16.7.<\/p>\n<p class=\"paywall\">Splunk has <a data-offer-url=\"https:\/\/www.splunk.com\/en_us\/product-security\/announcements\/svd-2022-0608.html\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.splunk.com\/en_us\/product-security\/announcements\/svd-2022-0608.html&quot;}\" href=\"https:\/\/www.splunk.com\/en_us\/product-security\/announcements\/svd-2022-0608.html\" rel=\"nofollow noopener\" target=\"_blank\">released<\/a> some out-of-band patches for its Enterprise product, fixing issues including a critical-rated vulnerability that could lead to arbitrary code execution.<\/p>\n<p class=\"paywall\">Labeled CVE-2022-32158, the flaw could allow an adversary to compromise a Universal Forwarder endpoint and execute code on other endpoints connected to the deployment server. Thankfully, there\u2019s no indication that the vulnerability has been used in any real-world attacks.<\/p>\n<p class=\"paywall\">Ninja Forms, a WordPress plug-in with over a million active installations, has patched a serious issue that\u2019s probably being used by attackers in the wild. \u201cWe uncovered a code injection vulnerability that made it possible for unauthenticated attackers to call a limited number of methods in various Ninja Forms classes, including a method that unserialized user-supplied content, resulting in Object Injection,\u201d security analysts at the WordPress Wordfence Threat Intelligence team said in an <a data-offer-url=\"https:\/\/www.wordfence.com\/blog\/2022\/06\/psa-critical-vulnerability-patched-in-ninja-forms-wordpress-plugin\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.wordfence.com\/blog\/2022\/06\/psa-critical-vulnerability-patched-in-ninja-forms-wordpress-plugin\/&quot;}\" href=\"https:\/\/www.wordfence.com\/blog\/2022\/06\/psa-critical-vulnerability-patched-in-ninja-forms-wordpress-plugin\/\" rel=\"nofollow noopener\" target=\"_blank\">update<\/a>.<\/p>\n<p class=\"paywall\">This could allow attackers to execute arbitrary code or delete arbitrary files on sites where a separate <a data-offer-url=\"https:\/\/vickieli.medium.com\/diving-into-unserialize-pop-chains-35bc1141b69a\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/vickieli.medium.com\/diving-into-unserialize-pop-chains-35bc1141b69a&quot;}\" href=\"https:\/\/vickieli.medium.com\/diving-into-unserialize-pop-chains-35bc1141b69a\" rel=\"nofollow noopener\" target=\"_blank\">POP chain<\/a> was present, researchers said.<\/p>\n<p class=\"paywall\">The flaw has been fully patched in versions 3.0.34.2, 3.1.10, 3.2.28, 3.3.21.4, 3.4.34.2, 3.5.8.4, and 3.6.11. WordPress appears to have performed a forced automatic update for the plug-in, so your site may already be using one of the patched versions.<\/p>\n<p class=\"paywall\">Australian software company Atlassian has released a patch to fix a zero-day flaw that\u2019s already being exploited by attackers. Tracked as <a data-offer-url=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog&quot;}\" href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2022-26134<\/a>, the RCE vulnerability in the Confluence Server and Data Center can be used to backdoor internet-exposed servers.<\/p>\n<p class=\"paywall\">GitLab has <a data-offer-url=\"https:\/\/about.gitlab.com\/releases\/2022\/06\/01\/critical-security-release-gitlab-15-0-1-released\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/about.gitlab.com\/releases\/2022\/06\/01\/critical-security-release-gitlab-15-0-1-released\/&quot;}\" href=\"https:\/\/about.gitlab.com\/releases\/2022\/06\/01\/critical-security-release-gitlab-15-0-1-released\/\" rel=\"nofollow noopener\" target=\"_blank\">issued<\/a> patches for versions 15.0.1, 14.10.4, and 14.9.5 for GitLab Community Edition and Enterprise Edition.\u00a0The updates contain important security fixes for eight vulnerabilities, one of which could allow for account takeover.<\/p>\n<p class=\"paywall\">With this in mind, the firm \u201cstrongly recommends\u201d that all GitLab installations be upgraded to the latest version \u201cas soon as possible.\u201d GitLab.com is already running the patched version.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/you-need-to-update-windows-and-chrome-right-now\/\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/62bce4ecb3e9d5fb1d49e1dd\/master\/pass\/critical-update-security-june.jpg\"\/><\/p>\n<p><strong>Credit to Author: Kate O&#8217;Flaherty| Date: Thu, 30 Jun 2022 11:00:00 +0000<\/strong><\/p>\n<p>Plus: Google issues fixes for Android bugs. And Cisco, Citrix, SAP, WordPress, and more issue major patches for enterprise systems.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358],"class_list":["post-19484","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19484","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19484"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19484\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19484"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19484"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19484"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}