{"id":20369,"date":"2022-10-14T12:30:12","date_gmt":"2022-10-14T20:30:12","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/10\/14\/news-14102\/"},"modified":"2022-10-14T12:30:12","modified_gmt":"2022-10-14T20:30:12","slug":"news-14102","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/10\/14\/news-14102\/","title":{"rendered":"Zero-days flaws mean it&#039;s time to patch Exchange and Windows"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/07\/conceptual_representation_of_technical_support_fixes_service_maintenance_updates_digital_sign_wrench_screwdriver_branching_circuits_throughout_system_by_traitov_gettyimages-1199145131_cw_2400x1600-100853239-small.jpg\"\/><\/p>\n<p><span style=\"font-weight: 400;\">This month&#8217;s Patch Tuesday update from Microsoft deals with 84 flaws and a zero-day affecting Microsoft Exchange that at the moment remains unresolved. The Windows updates focus on Microsoft security and networking components with a difficult-to-test update to<\/span><a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/win32\/com\/the-component-object-model\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">COM<\/span><\/a><span style=\"font-weight: 400;\"> and<\/span><a href=\"https:\/\/learn.microsoft.com\/en-us\/sql\/connect\/oledb\/oledb-driver-for-sql-server?view=sql-server-ver16\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">OLE db<\/span><\/a><span style=\"font-weight: 400;\">. And Microsoft browsers get 18 updates\u2014nothing critical or urgent. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">That leaves the focus this month on Microsoft Exchange and deploying mitigation efforts, rather than server updates, for the next week. More information about the risks of deploying these Patch Tuesday updates are <a href=\"https:\/\/applicationreadiness.com\/assurance-security-dashboard-october-2022\/\" rel=\"noopener nofollow\" target=\"_blank\">available in this infographic<\/a><\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft continues to improve both its vulnerability reporting and notifications with a new<\/span><a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-adds-new-rss-feed-for-security-update-notifications\/\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">RSS\u00a0feed<\/span><\/a><span style=\"font-weight: 400;\">, and Adobe has followed suit with improved reporting and release documentation. As a gentle reminder,<\/span><a href=\"https:\/\/learn.microsoft.com\/en-US\/lifecycle\/announcements\/windows-10-21h1-end-of-servicing\" rel=\"noopener nofollow\" target=\"_blank\">\u00a0<span style=\"font-weight: 400;\">support for Windows 10 21H1<\/span><\/a><span style=\"font-weight: 400;\"> ends in December.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Given the large number of changes included this month, I have broken down the testing scenarios into high-risk and standard-risk groups:<\/span><\/p>\n<p><strong>High Risk:<\/strong><span style=\"font-weight: 400;\"> For October, Microsoft has not recorded any high-risk functionality changes. This means it has not made major changes to core APIs or to the functionality to any of the core components or applications included in the Windows desktop and server ecosystems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">More generally, given the broad nature of this update (Office and Windows), we suggest testing the following Windows features and components:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition to these changes and testing requirements, I have included some of the more difficult testing scenarios:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Unless otherwise specified, we should now assume each Patch Tuesday update will require testing core printing functions, including:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Each month, Microsoft includes a list of known issues that relate to the operating system and platforms included in this update cycle.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One reported issue with the latest Microsoft Servicing Stack Update (<\/span><a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/deployment\/update\/servicing-stack-updates\" rel=\"noopener nofollow\" target=\"_blank\"><span style=\"font-weight: 400;\">SSU<\/span><\/a><span style=\"font-weight: 400;\">)<\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/october-11-2022-kb5018410-os-builds-19042-2130-19043-2130-and-19044-2130-6390f057-28ca-43d3-92ce-f4b79a8378fd\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">KB5018410<\/span><\/a><span style=\"font-weight: 400;\"> is that<\/span><a href=\"https:\/\/learn.microsoft.com\/en-us\/previous-versions\/windows\/it-pro\/windows-server-2012-R2-and-2012\/dn581922(v=ws.11)\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">Group Policy preferences<\/span><\/a><span style=\"font-weight: 400;\"> may fail. Microsoft is working on a solution; in the meantime, the company posted the following mitigations:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So far, Microsoft has not published any major revisions to its security advisories.<\/span><strong>\u00a0<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">There are two mitigations and four work-arounds for this October Patch Tuesday, including:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft has also noted that for the following reported network vulnerabilities, those systems are not affected if IPv6 is disabled and can be mitigated with the following PowerShell command: &#8220;Get-Service Ikeext:&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Each month, we break down the update cycle into product families (as defined by Microsoft) with the following basic groupings:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft released 18 updates to Edge (Chromium). Only<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-41035\" rel=\"noopener nofollow\" target=\"_blank\">\u00a0<span style=\"font-weight: 400;\">CVE-2022-41035<\/span><\/a> <span style=\"font-weight: 400;\">specifically applies to the browser, while the rest are Chromium related. You can find\u00a0<\/span><a href=\"https:\/\/learn.microsoft.com\/en-us\/DeployEdge\/microsoft-edge-relnotes-security\" rel=\"noopener nofollow\" target=\"_blank\"><span style=\"font-weight: 400;\">this month&#8217;s release note<\/span>\u00a0<span style=\"font-weight: 400;\">here<\/span><\/a><span style=\"font-weight: 400;\">. These are low profile, non-critical patches to Microsoft\u2019s latest browser; they can be added to your standard release schedule.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft delivers patches for 10 critical and 57 important vulnerabilities that cover the following feature groups in the Windows platform:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One COM+ object-related vulnerability (<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-41033\" rel=\"noopener nofollow\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2022-41033<\/span><\/a><span style=\"font-weight: 400;\">) has been reported as exploited in the wild. This makes things tough for patch and update deployment teams. Testing COM objects is generally difficult due to the business logic required and contained within the application. Also, determining which applications depend on this feature is not straightforward. This is especially the case for in-house developed or line-of-business applications due to business criticality. We recommend assessing, isolating, and testing core business apps that have COM and OLE dB dependencies before a general deployment of the October update. Add this Windows update to your &#8220;Patch Now&#8221; schedule. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">On the lighter side of things, Microsoft has released another\u00a0<\/span><a href=\"https:\/\/www.microsoft.com\/en-us\/videoplayer\/embed\/RE59eNG?pid=ocpVideo1-innerdiv-oneplayer&amp;maskLevel=20&amp;market=en-us\" rel=\"noopener nofollow\" target=\"_blank\"><span style=\"font-weight: 400;\">Windows 11 update<\/span>\u00a0<span style=\"font-weight: 400;\">video<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This month we get two critical updates (<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-41038\" rel=\"noopener nofollow\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2022-41038<\/span><\/a><span style=\"font-weight: 400;\"> and<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-38048\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">CVE-2022-38048<\/span><\/a><span style=\"font-weight: 400;\">) and four updates rated as important to the Microsoft Office platform. Unless you are managing multiple SharePoint servers, this is a relatively low-profile update, with no Preview Pane-based attack vectors and no reports of exploits in the wild. If you or your team experienced issues with Microsoft Outlook<\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/outlook-closes-shortly-after-it-is-opened-2d32d880-70a0-4ee0-b1e9-9e920721abdd\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">crashing<\/span><\/a><span style=\"font-weight: 400;\"> (sorry, \u201cclosing\u201d) last month, Microsoft has offers the following advice:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Given these changes and low-profile updates, we suggest that you add these Office patches to your standard release schedule.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We should have started with the Microsoft Exchange updates this month. The critical remote-pcode execution vulnerabilities (<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-41082\" rel=\"noopener nofollow\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2022-41082<\/span><\/a><span style=\"font-weight: 400;\"> and<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-41040\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">CVE-2022-41040<\/span><\/a><span style=\"font-weight: 400;\">) in Exchange have been reported as exploited in the wild and have <em>not<\/em> been resolved with this security update. There are patches available, and they are official from Microsoft. However, these two updates to Microsoft Exchange Server do not fully fix the vulnerabilities.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The<\/span><a href=\"https:\/\/techcommunity.microsoft.com\/t5\/exchange-team-blog\/released-october-2022-exchange-server-security-updates\/ba-p\/3646263\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">Microsoft Exchange Team blog<\/span><\/a><span style=\"font-weight: 400;\"> makes this point explicitly in the middle of a release note:<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">&#8220;The October 2022 SUs do not contain fixes for the zero-day vulnerabilities reported publicly on September 29, 2022 (CVE-2022-41040 and CVE-2022-41082). Please see this blog post to apply mitigations for those vulnerabilities. We will release updates for CVE-2022-41040 and CVE-2022-41082 when they are ready.&#8221;<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft has published<\/span><a href=\"https:\/\/msrc-blog.microsoft.com\/2022\/09\/29\/customer-guidance-for-reported-zero-day-vulnerabilities-in-microsoft-exchange-server\/\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">mitigation\u00a0advice<\/span><\/a><span style=\"font-weight: 400;\">\u00a0for these serious Exchange security issues, covering:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We recommend implementing both the URL and PowerShell mitigations for all your Exchange servers. Watch this space, as we will see an update from Microsoft in the upcoming week.<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><strong>Microsoft development platforms<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft has released four updates (all rated important) for Visual Studio and .NET. Though all four vulnerabilities (<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-41032\" rel=\"noopener nofollow\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2022-41032<\/span><\/a><span style=\"font-weight: 400;\">,<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-41083\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">CVE-2022-41032<\/span><\/a><span style=\"font-weight: 400;\">,<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-41034\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">CVE-2022-41034<\/span><\/a><span style=\"font-weight: 400;\"> and<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-41083\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">CVE-2022-41083<\/span><\/a><span style=\"font-weight: 400;\">) have standard entries in the Microsoft Security Update Guide (<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2022-Oct\" rel=\"noopener nofollow\" target=\"_blank\"><span style=\"font-weight: 400;\">MSUG<\/span><\/a><span style=\"font-weight: 400;\">), the Visual Studio team has also published these<\/span><a href=\"https:\/\/devblogs.microsoft.com\/visualstudio\/visual-studio-2022-17-3-is-now-available\/\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">17.3 Release notes<\/span><\/a><span style=\"font-weight: 400;\">. (And, just like Windows 11, we even get a<\/span><a href=\"https:\/\/devblogs.microsoft.com\/visualstudio\/visual-studio-2022-17-3-is-now-available\/\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">video<\/span><\/a><span style=\"font-weight: 400;\">.) All four of these updates are low-risk, low-profile updates to the development platform. Add these to your standard developer release schedule.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Adobe Reader has been updated (<\/span><a href=\"https:\/\/helpx.adobe.com\/security\/products\/acrobat\/apsb22-46.html\" rel=\"noopener nofollow\" target=\"_blank\"><span style=\"font-weight: 400;\">APSB22-46<\/span><\/a><span style=\"font-weight: 400;\">) to resolve six<\/span><a href=\"https:\/\/www.adobe.com\/devnet-docs\/acrobatetk\/tools\/ReleaseNotesDC\/continuous\/dccontinuousoct2022.html#dccontinuousocttwentytwentytwo\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">memory related vulnerabilities<\/span><\/a><span style=\"font-weight: 400;\">. With this release, Adobe has also updated release documentation to include<\/span><a href=\"https:\/\/helpx.adobe.com\/acrobat\/kb\/known-issues-acrobat-dc-reader.html\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">Known Issues<\/span><\/a><span style=\"font-weight: 400;\"> and planned<\/span><a href=\"https:\/\/www.adobe.com\/devnet-docs\/acrobatetk\/tools\/ReleaseNotesDC\/continuous\/dccontinuousoct2022.html#dccontinuousocttwentytwentytwo\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">Release Notes<\/span><\/a><span style=\"font-weight: 400;\">. These notes cover both Windows and MacOS and both versions of Reader (DC and Continuous). All six reported vulnerabilities have the lowest Adobe rating, 3, which Adobe helpfully offers the following patch advice for: &#8220;<\/span><span style=\"font-weight: 400;\">Adobe recommends administrators install the update at their discretion.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\"> We agree \u2014 add these Adobe Reader updates to your standard patch deployment schedule.<\/span><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3676636\/zero-days-flaws-mean-its-time-to-patch-exchange-and-windows.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/07\/conceptual_representation_of_technical_support_fixes_service_maintenance_updates_digital_sign_wrench_screwdriver_branching_circuits_throughout_system_by_traitov_gettyimages-1199145131_cw_2400x1600-100853239-small.jpg\"\/><\/p>\n<article>\n<section class=\"page\">\n<p><span style=\"font-weight: 400;\">This month&#8217;s Patch Tuesday update from Microsoft deals with 84 flaws and a zero-day affecting Microsoft Exchange that at the moment remains unresolved. The Windows updates focus on Microsoft security and networking components with a difficult-to-test update to<\/span><a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/win32\/com\/the-component-object-model\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">COM<\/span><\/a><span style=\"font-weight: 400;\"> and<\/span><a href=\"https:\/\/learn.microsoft.com\/en-us\/sql\/connect\/oledb\/oledb-driver-for-sql-server?view=sql-server-ver16\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">OLE db<\/span><\/a><span style=\"font-weight: 400;\">. And Microsoft browsers get 18 updates\u2014nothing critical or urgent. <\/span><\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3676636\/zero-days-flaws-mean-its-time-to-patch-exchange-and-windows.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10516,10909,714,24580,10525],"class_list":["post-20369","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-microsoft","tag-microsoft-office","tag-security","tag-small-and-medium-business","tag-windows"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20369","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=20369"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20369\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=20369"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=20369"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=20369"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}