{"id":21480,"date":"2023-03-15T10:17:02","date_gmt":"2023-03-15T18:17:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/03\/15\/news-15211\/"},"modified":"2023-03-15T10:17:02","modified_gmt":"2023-03-15T18:17:02","slug":"news-15211","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2023\/03\/15\/news-15211\/","title":{"rendered":"Microsoft Patch Tuesday, March 2023 Edition"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Wed, 15 Mar 2023 15:19:32 +0000<\/strong><\/p>\n<p><strong>Microsoft <\/strong>on Tuesday released updates to quash at least 74 security bugs in its <strong>Windows<\/strong> operating systems and software. Two of those flaws are already being actively attacked, including an especially severe weakness in <strong>Microsoft Outlook<\/strong> that can be exploited without any user interaction.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-60331\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/winupdatedate.png\" alt=\"\" width=\"749\" height=\"496\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/winupdatedate.png 923w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/winupdatedate-768x508.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/winupdatedate-782x518.png 782w\" sizes=\"auto, (max-width: 749px) 100vw, 749px\" \/><\/p>\n<p>The Outlook vulnerability (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23397\" target=\"_blank\" rel=\"noopener\">CVE-2023-23397<\/a>) affects all versions of Microsoft Outlook from 2013 to the newest. Microsoft said it has seen evidence that attackers are exploiting this flaw, which can be done without any user interaction by sending a booby-trapped email that triggers automatically when retrieved by the email server &#8212; <em>before the email is even viewed in the Preview Pane<\/em>.<\/p>\n<p>While CVE-2023-23397 is labeled as an &#8220;Elevation of Privilege&#8221; vulnerability, that label doesn\u2019t accurately reflect its severity, said <strong>Kevin Breen<\/strong>, director of cyber threat research at <strong>Immersive Labs<\/strong>.<\/p>\n<p>Known as an NTLM relay attack, it allows an attacker to get someone\u2019s NTLM hash [Windows account password] and use it in an attack commonly referred to as &#8220;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Pass_the_hash\" target=\"_blank\" rel=\"noopener\">Pass The Hash<\/a>.&#8221;<\/p>\n<p>&#8220;The vulnerability effectively lets the attacker authenticate as a trusted individual without having to know the person\u2019s password,&#8221; Breen said. &#8220;This is on par with an attacker having a valid password with access to an organization\u2019s systems.&#8221;<\/p>\n<p>Security firm <strong>Rapid7<\/strong> points out that this bug affects self-hosted versions of Outlook like <strong>Microsoft 365 Apps for Enterprise<\/strong>, but Microsoft-hosted online services like <strong>Microsoft 365<\/strong> are <em>not<\/em> vulnerable.<span id=\"more-63082\"><\/span><\/p>\n<p>The other zero-day flaw being actively exploited in the wild &#8212; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24880\" target=\"_blank\" rel=\"noopener\">CVE-2023-24800<\/a> &#8212; is a &#8220;Security Feature Bypass&#8221; in <strong>Windows SmartScreen<\/strong>, part of Microsoft&#8217;s slate of endpoint protection tools.<\/p>\n<p>Patch management vendor <strong>Action1<\/strong> notes that the exploit for this bug is low in complexity and requires no special privileges. But it does require some user interaction, and can&#8217;t be used to gain access to private information or privileges. However, the flaw can allow other malicious code to run without being detected by SmartScreen reputation checks.<\/p>\n<p><strong>Dustin Childs<\/strong>, head of threat awareness at Trend Micro&#8217;s <strong>Zero Day Initiative<\/strong>, said CVE-2023-24800 allows attackers to create files that would bypass Mark of the Web (MOTW) defenses.<\/p>\n<p>&#8220;Protective measures like SmartScreen and Protected View in Microsoft Office rely on MOTW, so bypassing these makes it easier for threat actors to spread malware via crafted documents and other infected files that would otherwise be stopped by SmartScreen,&#8221; Childs said.<\/p>\n<p>Seven other vulnerabilities Microsoft patched this week earned its most-dire &#8220;critical&#8221; severity label, meaning the updates address security holes that could be exploited to give the attacker full, remote control over a Windows host with little or no interaction from the user.<\/p>\n<p>Also this week, Adobe released eight patches addressing a whopping 105 security holes across a variety of products, including <strong>Adobe Photoshop<\/strong>, <strong>Cold Fusion<\/strong>, <strong>Experience Manager<\/strong>, <strong>Dimension<\/strong>, <strong>Commerce<\/strong>, <strong>Magento<\/strong>, <strong>Substance 3D Stager<\/strong>, <strong>Cloud Desktop Applicatio<\/strong>n, and <strong>Illustrator<\/strong>.<\/p>\n<p>For a more granular rundown on the updates released today, see the <a href=\"https:\/\/isc.sans.edu\/diary\/Microsoft%20March%202023%20Patch%20Tuesday\/29634\" target=\"_blank\" rel=\"noopener\">SANS Internet Storm Center roundup<\/a>. If today\u2019s updates cause any stability or usability issues in Windows, <a href=\"https:\/\/www.askwoody.com\/2023\/march-madness-here-we-come\/\" target=\"_blank\" rel=\"noopener\">AskWoody.com<\/a> will likely have the lowdown on that.<\/p>\n<p>Please consider backing up your data and\/or imaging your system before applying any updates. And feel free to sound off in the comments if you experience any problems as a result of these patches.<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2023\/03\/microsoft-patch-tuesday-march-2023-edition\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/winupdatedate.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Wed, 15 Mar 2023 15:19:32 +0000<\/strong><\/p>\n<p>Microsoft on Tuesday released updates to quash at least 74 security bugs in its Windows operating systems and software. Two of those flaws are already being actively attacked, including an especially severe weakness in Microsoft Outlook that can be exploited without any user interaction.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[28848,28861,24602,24626,24627,28862,28863,15086,17220,17061,16936,20482,10415],"class_list":["post-21480","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-cve-2023-23397","tag-cve-2023-24800","tag-dustin-childs","tag-immersive-labs","tag-kevin-breen","tag-microsoft-365-apps-for-enterprise","tag-microsoft-patch-tuesday-march-2023","tag-rapid7","tag-security-tools","tag-the-coming-storm","tag-time-to-patch","tag-windows-smartscreen","tag-zero-day-initiative"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21480","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=21480"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21480\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=21480"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=21480"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=21480"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}