{"id":20839,"date":"2022-12-16T14:30:05","date_gmt":"2022-12-16T22:30:05","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/12\/16\/news-14572\/"},"modified":"2022-12-16T14:30:05","modified_gmt":"2022-12-16T22:30:05","slug":"news-14572","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/12\/16\/news-14572\/","title":{"rendered":"Patch Tuesday: Two zero-day flaws in Windows need immediate attention"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/07\/microsoft_windows_updates_cycle_arrows_laptop_mobile_phone_3x2_1200x800-100851684-small.jpg\"\/><\/p>\n<p>Microsoft&#8217;s December Patch Tuesday updated delivers 59 fixes, including\u00a0two zero-days (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-44698\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2022-44698<\/a> and<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-44710\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2022-44710<\/a>) that require immediate attention on the Windows platform. This is a network focused update (TCP\/IP and RDP) that will require significant testing with an emphasis on ODBC connections, Hyper-V systems, Kerberos authentication, and printing (both local and remote).<\/p>\n<p>Microsoft also published an urgent out-of-band update (<a href=\"https:\/\/emails.azure.microsoft.com\/redirect\/?destination=https%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2Fvulnerability%2FCVE-2022-37966&amp;p=bT02OTVhYmI3My02MWE3LTQyZDgtYjJhOS1hZmQwMDE5MWMzOWUmcz0wMDAwMDAwMC0wMDAwLTAwMDAtMDAwMC0wMDAwMDAwMDAwMDAmdT1hZW8mbD1DVkUtMjAyMi0zNzk2Ng%3D%3D\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2022-37966<\/a>) to address serious Kerberos authentication issues. (The team at Readiness has provided a\u00a0<a href=\"https:\/\/applicationreadiness.com\/blog\/\" rel=\"noopener nofollow\" target=\"_blank\">helpful\u00a0infographic<\/a> that outlines the risks associated with each of these updates.)<\/p>\n<p>And Windows Hot-Patching for Azure Virtual Machines (VMs) is\u00a0<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/automanage\/automanage-hotpatch?WT.mc_id=modinfra-18529-thmaure\" rel=\"noopener nofollow\" target=\"_blank\">now\u00a0available<\/a>.<\/p>\n<p>Each month, Microsoft includes a list of known issues that relate to the OS and platforms included in this update cycle.<\/p>\n<p>In preparation for the month&#8217;s update to Windows 10 and 11 systems, we recommend runningan assessment on all application packages and look for a dependency on the system file SQLSRV32.DLL. If you need to inspect a specific system, open a command prompt and run the command &#8220;tasklist \/m sqlsrv32.dll.&#8221; This should list any processes that depend on this file.<\/p>\n<p>Microsoft published just one revision this month, with no other revisions to previous patches or updates released.<\/p>\n<p>While there were several documentation updates and FAQs added to this release, Microsoft published a single mitigation:<\/p>\n<p>Each month, the team at <a href=\"https:\/\/applicationreadiness.com\/\" rel=\"nofollow\">Readiness<\/a> analyzes the latest updates and provides testing guidance. This guidance is based on assessing a large application portfolio and a detailed analysis of the Microsoft patches and their potential impact on the Windows platforms and application installations.<\/p>\n<p>Given the large number of changes included this cycle, I have broken down the testing scenarios into high-risk and standard-risk groups.<\/p>\n<p><strong>High Risk<\/strong>: This month, Microsoft has not recorded any high-risk functionality changes. This means it has not made major changes to core APIs or functionality to any of the core components or applications included in the Windows desktop and server ecosystems.<\/p>\n<p>More generally, given the broad nature of this update (Office and Windows) we suggest testing the following Windows features and components:<\/p>\n<p>In addition to these changes and testing requirements, I have included some of the more difficult testing scenarios for this update:<\/p>\n<p>Following last month&#8217;s update to Kerberos authentication, there were several reported issues related to authenticating, especially across remote-desktop connections. Microsoft<a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/release-health\/resolved-issues-windows-10-21h1#2953msgdesc\" rel=\"noopener nofollow\" target=\"_blank\">\u00a0detailed\u00a0the following scenarios and related issues<\/a>\u00a0addressed this month:\u00a0<\/p>\n<p>All these scenarios require significant testing before a general deployment of the December update.<\/p>\n<p>Unless otherwise specified, we should now assume that each Patch Tuesday update will require testing of core printing functions including:<\/p>\n<p>This section includes important changes to servicing (and most security updates) to Windows desktop and server platforms. As this is an end-of-year update, there are quite a few &#8220;End of Service&#8221; changes, including:\u00a0<\/p>\n<p>Each month, we break down the update cycle into product families (as defined by Microsoft) with the following basic groupings:<\/p>\n<p>Following a welcome trend of no critical updates to Microsoft&#8217;s browsers, this update delivers just three (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-44688\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2022-44668<\/a>,<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-44708\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2022-44708<\/a> and<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-41115\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2022-41115<\/a>) all rated important. These updates affect the Microsoft Chromium browser and should have marginal to low impact on your applications. Add these updates to your standard patch release schedule.<\/p>\n<p>Microsoft released patches to the Windows ecosystem this month that address three critical updates (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-44676\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2022-44676<\/a>,<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-44670\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2022-44670<\/a>, and<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-41076\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2022-41076<\/a>), with 24 rated important and two rated moderate. Unfortunately, this month we have those two zero-days affecting Windows with reports of CVE-2022-44698 exploited in the wild and CVE-2022-44710 publicly disclosed. We have crafted specific testing recommendations, noting that there are reported issues with Kerberos, Hyper-V and ODBC connections.<\/p>\n<p>Add this update to your &#8220;Patch Now&#8221; release schedule.<\/p>\n<p>Microsoft addressed two critical vulnerabilities in SharePoint Server (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-44693\" rel=\"noopener nofollow\" target=\"_blank\">CVE-202244693<\/a> and<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-44690\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2022-44690<\/a>) that are relatively easy to exploit and do not require user interaction. The remaining two vulnerabilities affect Microsoft Visio (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-44696\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2022-44696<\/a> and<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-44695\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2022-44695<\/a>) and are low-profile, low impact changes. Unless you&#8217;re hosting your own SharePoint servers (oh, why?), add these Microsoft updates to your standard release schedule.<\/p>\n<p>Microsoft has not released any updates, patches or security mitigations for Microsoft Exchange Server. Phew!<\/p>\n<p>Microsoft addressed two critical vulnerabilities in Microsoft .NET (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-41089\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2022-41089<\/a>) and PowerShell (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-41076\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2022-41076<\/a>) this month. Though both security issues are rated critical, they require local admin access and are considered both difficult and complex to exploit. Mark Russinovich&#8217;s<a href=\"https:\/\/learn.microsoft.com\/en-us\/sysinternals\/downloads\/sysmon\" rel=\"noopener nofollow\" target=\"_blank\"> Sysmon<\/a> also needs an update with the elevation-of-privilege vulnerability<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-44704\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2022-44704<\/a> and all supported versions of Visual Studio will be patched. Add these updates to your standard developer release schedule.<\/p>\n<p>Adobe has released<a href=\"https:\/\/helpx.adobe.com\/ca\/security\/security-bulletin.html\" rel=\"noopener nofollow\" target=\"_blank\"> three\u00a0category 3<\/a>\u00a0(equivalent to Microsoft&#8217;s rating of important) updates to Illustrator, Experience Manager and Campaign (Classic). No updates to Adobe Reader this month.<\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3683593\/patch-tuesday-two-zero-day-flaws-in-windows-need-immediate-attention.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/07\/microsoft_windows_updates_cycle_arrows_laptop_mobile_phone_3x2_1200x800-100851684-small.jpg\"\/><\/p>\n<article>\n<section class=\"page\">\n<p>Microsoft&#8217;s December Patch Tuesday updated delivers 59 fixes, including\u00a0two zero-days (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-44698\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2022-44698<\/a> and<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-44710\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2022-44710<\/a>) that require immediate attention on the Windows platform. This is a network focused update (TCP\/IP and RDP) that will require significant testing with an emphasis on ODBC connections, Hyper-V systems, Kerberos authentication, and printing (both local and remote).<\/p>\n<p>Microsoft also published an urgent out-of-band update (<a href=\"https:\/\/emails.azure.microsoft.com\/redirect\/?destination=https%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2Fvulnerability%2FCVE-2022-37966&amp;p=bT02OTVhYmI3My02MWE3LTQyZDgtYjJhOS1hZmQwMDE5MWMzOWUmcz0wMDAwMDAwMC0wMDAwLTAwMDAtMDAwMC0wMDAwMDAwMDAwMDAmdT1hZW8mbD1DVkUtMjAyMi0zNzk2Ng%3D%3D\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2022-37966<\/a>) to address serious Kerberos authentication issues. (The team at Readiness has provided a\u00a0<a href=\"https:\/\/applicationreadiness.com\/blog\/\" rel=\"noopener nofollow\" target=\"_blank\">helpful\u00a0infographic<\/a> that outlines the risks associated with each of these updates.)<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3683593\/patch-tuesday-two-zero-day-flaws-in-windows-need-immediate-attention.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10516,714,24580,10525],"class_list":["post-20839","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-microsoft","tag-security","tag-small-and-medium-business","tag-windows"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20839","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=20839"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20839\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=20839"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=20839"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=20839"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}