{"id":20995,"date":"2023-01-13T14:30:11","date_gmt":"2023-01-13T22:30:11","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/01\/13\/news-14728\/"},"modified":"2023-01-13T14:30:11","modified_gmt":"2023-01-13T22:30:11","slug":"news-14728","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2023\/01\/13\/news-14728\/","title":{"rendered":"Patch now to address critical Windows zero-day flaw"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2018\/08\/3_patch-training_update-software_band-aid_laptop-with-virus_binary-100768644-small.jpg\"\/><\/p>\n<p>The first Patch Tuesday of the year from Microsoft addresses 98 security vulnerabilities, with 10 classified as critical for Windows. One vulnerability (<a href=\"http:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21674\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2023-21674<\/a>) in a core section of Windows code is a zero-day that requires immediate attention. And Adobe has returned with a critical update, paired with a few low-profile patches for the Microsoft Edge browser.<\/p>\n<p>We have added the Windows and Adobe updates to our \u201cPatch Now\u201d list, recognizing that this month\u2019s patch deployments will require significant testing and engineering effort. The team at <a href=\"https:\/\/applicationreadiness.com\/\" rel=\"nofollow noopener\" target=\"_blank\">Application Readiness<\/a> has provided a <a href=\"https:\/\/applicationreadiness.com\/assurance-security-dashboard-january-2023\/\" rel=\"nofollow noopener\" target=\"_blank\">helpful infographic<\/a> that outlines the risks associated with each of the updates for this January update cycle.<\/p>\n<p>Each month, Microsoft includes a list of known issues that relate to the operating system and platforms that are included in this update cycle.<\/p>\n<p>There are still quite a few known issues outstanding for <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/january-10-2023-kb5022338-monthly-rollup-6b406e1d-69b2-4e6a-b13e-053d22268e13\" rel=\"nofollow noopener\" target=\"_blank\">Windows 7<\/a>, <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/january-10-2023-kb5022346-security-only-update-c383bc69-8e56-450b-9f8f-90b0dce871e0\" rel=\"nofollow noopener\" target=\"_blank\">Windows 8.x<\/a> and <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/january-10-2023-kb5022353-security-only-update-45e27d78-6c81-4568-8d3e-091b07cb11f6\" rel=\"nofollow noopener\" target=\"_blank\">Windows Server 2008<\/a>, but as with these rapidly aging (and not very secure) operating systems, <a href=\"https:\/\/www.computerworld.com\/article\/3685369\/microsoft-finally-ends-windows-7-windows-8-support.html\">it is time to move on<\/a>.<\/p>\n<p>Microsoft has not published any major revisions this month. There were several updates to previous patches, but only for documentation purposes. No other actions required here.<\/p>\n<p>Microsoft has not published any mitigations or workarounds that are specific to this month\u2019s January Patch Tuesday release cycle.<\/p>\n<p>Each month, the Readiness team analyses the latest Patch Tuesday updates from Microsoft and provides detailed, actionable testing guidance. This guidance is based on assessing a large application portfolio and a detailed analysis of the Microsoft patches and their potential impact on the Windows platforms and application installations.<\/p>\n<p>Given the large number of changes included in this January patch cycle, I have broken down the testing scenarios into high risk and standard risk groups:<\/p>\n<p><strong>High risk<\/strong>: This January update from Microsoft delivers a significant number of high-risk changes to the system kernel and printing subsystems within Windows. Unfortunately, these changes include critical system files such as win32base.sys, sqlsrv32.dll and win32k.sys, further broadening the testing profile for this patch cycle.<\/p>\n<p>As all the high-risk changes affect the Microsoft Windows printing subsystem (though we have not seen any published functionality changes), we strongly recommend the following printing-focused testing:<\/p>\n<p>All these scenarios will require significant application-level testing before a general deployment of this month\u2019s update. In addition to these specific testing requirements, we suggest a general test of the following printing features:<\/p>\n<p>More generally, given the broad nature of this update, we suggest testing the following Windows features and components:<\/p>\n<p>In addition to these changes and subsequent testing requirements, I have included some of the more difficult testing scenarios for this January update:<\/p>\n<p>With all of these more difficult testing scenarios, we recommend that you scan your application portfolio for updated application components or system-level dependencies. This scan should then provide a shortlist of affected applications, which should reduce your testing and subsequent deployment effort.<\/p>\n<p>This section will contain important changes to servicing (and most security updates) to Windows desktop and server platforms. With Windows 10 21H2 now out of mainstream support, we have the following Microsoft applications that will reach end of mainstream support in 2023:<\/p>\n<p>Each month, we break down the update cycle into product families (as defined by Microsoft) with the following basic groupings:<\/p>\n<p>Microsoft has released five updates to its Chromium browser this month, all addressing \u201cUse after free\u201d memory-related vulnerabilities in the Chromium engine. You can find Microsoft\u2019s version of these release notes <a href=\"https:\/\/learn.microsoft.com\/en-us\/DeployEdge\/microsoft-edge-relnotes-security\" rel=\"nofollow noopener\" target=\"_blank\">here<\/a> and the Google Desktop channel release notes <a href=\"https:\/\/chromium.googlesource.com\/chromium\/src\/+log\/108.0.5359.125..108.0.5359.179?pretty=fuller&amp;n=10000\" rel=\"nofollow noopener\" target=\"_blank\">here<\/a>. There were no other updates to Microsoft browsers (or rendering engines) this month. Add these updates to your standard patch release schedule.<\/p>\n<p>January brings 10 critical updates as well as 67 patches rated as important to the Windows platform. They cover the following key components:<\/p>\n<p>\u00a0Generally, this is an update focused on updating the network and local authentication stack with a few fixes to last month\u2019s patch cycle. Unfortunately, one vulnerability (<a href=\"http:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21674\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2023-21674<\/a>) in a core section of Windows code (<a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/win32\/etw\/alpc\" rel=\"nofollow noopener\" target=\"_blank\">ALPC<\/a>) has been reported publicly. Microsoft describes this scenario as \u201can attacker who successfully exploited this vulnerability could gain SYSTEM privileges.\u201d Thank you, <a href=\"https:\/\/twitter.com\/kupsul\" rel=\"nofollow noopener\" target=\"_blank\">Stiv<\/a>, for your hard work on this one.<\/p>\n<p>Please note: all US federal agencies have been instructed to patch this vulnerability by the end of January as part of <a href=\"https:\/\/www.cisa.gov\/\" rel=\"nofollow noopener\" target=\"_blank\">CISA\u2019s<\/a> \u201cbinding operational order\u201d (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-orders-federal-agencies-to-fix-hundreds-of-exploited-security-flaws\/\" rel=\"nofollow noopener\" target=\"_blank\">BOD<\/a>).<\/p>\n<p>Add this update to your \u201cPatch Now\u201d release schedule.<\/p>\n<p>Microsoft addressed a single critical issue with SharePoint Server (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21743\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2023-21743<\/a>) and eight other security vulnerabilities rated as important by Microsoft affecting Visio and Office 365 Apps. Our testing did not raise any significant issues related to the Patch Tuesday changes, given that most of the changes were included in the Microsoft <a href=\"https:\/\/learn.microsoft.com\/en-us\/office\/troubleshoot\/office-suite-issues\/office-click-to-run-installation\" rel=\"nofollow noopener\" target=\"_blank\">Click-to-Run<\/a> releases \u2014 which has a much lower deployment and testing profile. Add these Microsoft Office updates to your standard deployment schedule.<\/p>\n<p>For this January patch release for Microsoft Exchange Server, Microsoft delivered five updates, all rated as important for versions 2016 and 2019:<\/p>\n<p>None of these vulnerabilities are publicly released, have been reported as exploited in the wild, or have been documented as leading to arbitrary code execution. With these few low-risk security issues, we recommend that you take your time testing and updating each server. One thing to note is that Microsoft has introduced a new feature (<a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/certificate-signing-of-powershell-serialization-payload-in-exchange-server-90fbf219-b0dd-4b2c-8a68-9d73b3309eb1\" rel=\"nofollow noopener\" target=\"_blank\">PowerShell Certificate signing<\/a>) in this \u201cpatch\u201d release, which may require additional testing. Add these Exchange Server updates to your standard server release schedule.<\/p>\n<p>Microsoft has released two updates to its developer platform (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21779\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2023-21779<\/a> and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21538\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2023-21538<\/a>) affecting Visual and Microsoft .NET 6.0. Both of these updates are rated as important by Microsoft and can be added to your standard release schedule.<\/p>\n<p>Updates for Adobe Reader are back this month, though the latest patches have not been published by Microsoft. The latest set of updates (<a href=\"https:\/\/helpx.adobe.com\/security\/products\/acrobat\/apsb23-01.html\" rel=\"nofollow noopener\" target=\"_blank\">APSB 23-01<\/a>) addressed eight critical memory-related issues and seven important updates, the worst of which could lead to the execution of arbitrary code on that unpatched system. With a higher than average <a href=\"https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\" rel=\"nofollow noopener\" target=\"_blank\">CVSS<\/a> rating (7.8), we recommend that you add this update to your \u201cPatch Now\u201d release cycle.<\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3685534\/patch-now-to-address-critical-windows-zero-day-flaw.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2018\/08\/3_patch-training_update-software_band-aid_laptop-with-virus_binary-100768644-small.jpg\"\/><\/p>\n<article>\n<section class=\"page\">\n<p>The first Patch Tuesday of the year from Microsoft addresses 98 security vulnerabilities, with 10 classified as critical for Windows. One vulnerability (<a href=\"http:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21674\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2023-21674<\/a>) in a core section of Windows code is a zero-day that requires immediate attention. And Adobe has returned with a critical update, paired with a few low-profile patches for the Microsoft Edge browser.<\/p>\n<p>We have added the Windows and Adobe updates to our \u201cPatch Now\u201d list, recognizing that this month\u2019s patch deployments will require significant testing and engineering effort. The team at <a href=\"https:\/\/applicationreadiness.com\/\" rel=\"nofollow noopener\" target=\"_blank\">Application Readiness<\/a> has provided a <a href=\"https:\/\/applicationreadiness.com\/assurance-security-dashboard-january-2023\/\" rel=\"nofollow noopener\" target=\"_blank\">helpful infographic<\/a> that outlines the risks associated with each of the updates for this January update cycle.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3685534\/patch-now-to-address-critical-windows-zero-day-flaw.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10516,10909,714,24580,10525],"class_list":["post-20995","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-microsoft","tag-microsoft-office","tag-security","tag-small-and-medium-business","tag-windows"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20995","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=20995"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20995\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=20995"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=20995"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=20995"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}