{"id":21489,"date":"2023-03-15T16:10:23","date_gmt":"2023-03-16T00:10:23","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/03\/15\/news-15220\/"},"modified":"2023-03-15T16:10:23","modified_gmt":"2023-03-16T00:10:23","slug":"news-15220","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2023\/03\/15\/news-15220\/","title":{"rendered":"Update now! Microsoft fixes two zero-day bugs"},"content":{"rendered":"<p>Microsoft, and other vendors, have released their monthly updates. In total Microsoft has fixed a total of 101 vulnerabilities for several titles (including Edge), with two of them being actively exploited zero-days. On top of that, Adobe has fixed an actively exploited vulnerability in ColdFusion.<\/p>\n<p>The Common Vulnerabilities and Exposures (CVE) database lists publicly disclosed computer security flaws. The CVEs of the actively exploited vulnerabilities patched in these updates are:<\/p>\n<p><strong><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-23397\" target=\"_blank\">CVE-2023-23397<\/a><\/strong>: a critical <strong>Microsoft Outlook<\/strong> Elevation of Privilege (EoP) vulnerability. External attackers could send specially crafted emails&nbsp;to cause a connection from the victim to an external UNC location of attackers&#8217; control. This would leak the Net-NTLMv2 hash of the victim to the attacker who could then relay this to another service and authenticate as the victim. The mail would be triggered automatically when retrieved and processed by the Outlook client, which could result in exploitation even before the email is viewed in the Preview Pane.<\/p>\n<p>This means this vulnerability could be used to obtain a hashed token, which could then be used in a so-called &ldquo;pass-the-hash&rdquo; attack.&nbsp; Windows NT LAN Manager (NTLM) is a challenge-response authentication protocol used to authenticate a client to a resource on an Active Directory domain. When the client requests access to a service associated with the domain, the service sends a challenge to the client, requiring the client to perform a mathematical operation using its authentication token, and then returns the result of this operation to the service. The service may validate the result or send it to the Domain Controller (DC) for validation. If the service or DC confirm that the client&rsquo;s response is correct, the service allows access to the client. Sounds secure, right? Well, the fun part is that with the hash you have enough information to perform that mathematical operation required to gain access. The authentication process does not require the plaintext password. The hash is enough.<\/p>\n<p><strong><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-24880\" target=\"_blank\">CVE-2023-24880<\/a><\/strong>: a moderate <strong>Windows SmartScreen<\/strong> Security Feature Bypass vulnerability. An attacker could craft a malicious file that would evade Mark of the Web (MOTW) defenses, resulting in a limited loss of integrity and availability of security features such as Protected View in Microsoft Office, which rely on MOTW tagging. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-fixes-windows-zero-day-exploited-in-ransomware-attacks\/\" target=\"_blank\">Reportedly<\/a>, this vulnerability was used in ransomware related attacks.<\/p>\n<p>MOTW, the technology that ensures Windows pops a warning message when trying to open a file downloaded from the Internet makes another <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/11\/qbot-uses-zero-day-motw-bypass-in-phishing-campaign\">comeback<\/a>. The MOTW is an attribute added to files by Windows when they have been sourced from an untrusted location, like the internet or a Restricted Zone. When you download a file from the internet, Windows adds the zone identifier or Mark of the Web as an NTFS stream to the file. And, when you run the file, Windows SmartScreen checks if there is a zone identifier <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2015\/07\/introduction-to-alternate-data-streams\">Alternate Data Stream (ADS)<\/a> attached to the file. If the ADS indicates <code>ZoneId=3<\/code>, which means that the file was downloaded from the internet, the SmartScreen does a reputation check.<\/p>\n<p><strong><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-26360\" target=\"_blank\">CVE-2023-26360<\/a><\/strong>: classified as a priority 1 vulnerability in <strong>Adobe ColdFusion<\/strong> due to critical deserialization of untrusted data. This flaw can lead to arbitrary code execution, making it a high-priority target for attackers.<\/p>\n<p>Adobe <a href=\"https:\/\/helpx.adobe.com\/security\/products\/coldfusion\/apsb23-25.html\" target=\"_blank\">says<\/a> it is aware that CVE-2023-26360 has been exploited in the wild in very limited attacks targeting Adobe ColdFusion.<\/p>\n<p>Adobe recommends updating your ColdFusion versions\u202f2021 and\u202f2018 JDK\/JRE to the latest version of the LTS releases for JDK 11. Applying the ColdFusion update without a corresponding JDK update will NOT secure the server.<\/p>\n<p>Adobe\u202f also\u202frecommends customers apply the security configuration settings as outlined on the\u202fColdFusion Security page as well as\u202freview the\u202frespective Lockdown guides.\u202f\u202f\u202f&nbsp;<\/p>\n<ul type=\"disc\">\n<li><a href=\"https:\/\/helpx.adobe.com\/coldfusion\/using\/server-lockdown.html\" target=\"_blank\">ColdFusion 2018&nbsp;Auto-Lockdown guide<\/a><\/li>\n<li><a href=\"https:\/\/www.adobe.com\/content\/dam\/cc\/us\/en\/products\/coldfusion\/pdfs\/cf-starter-kits\/coldfusion-2021-lockdown-guide-1.1.pdf\" target=\"_blank\">ColdFusion 2021 Lockdown Guide<\/a><\/li>\n<\/ul>\n<h2>Other vendors<\/h2>\n<p>Other vendors have synchronized their periodic updates with Microsoft. Here are few major ones that you may find in your environment.<\/p>\n<ul type=\"square\">\n<li><strong>Adobe<\/strong> has released security updates to address vulnerabilities in other products. Commerce&nbsp;<a href=\"https:\/\/helpx.adobe.com\/security\/products\/magento\/apsb23-17.html\" title=\"Security\u202fupdate\u202favailable\u202ffor\u202fAdobe Commerce\u202f|\u202fAPSB23-17\" target=\"_blank\">APSB23-17<\/a>, Experience Manager&nbsp;<a href=\"https:\/\/helpx.adobe.com\/security\/products\/experience-manager\/apsb23-18.html\" title=\"Security updates available for Adobe Experience Manager | APSB23-18\" target=\"_blank\">APSB23-18<\/a>, Illustrator&nbsp;<a href=\"https:\/\/helpx.adobe.com\/security\/products\/illustrator\/apsb23-19.html\" title=\"Security Updates Available for Adobe Illustrator | APSB23-19\" target=\"_blank\">APSB23-19<\/a>, Dimension&nbsp;<a href=\"https:\/\/helpx.adobe.com\/security\/products\/dimension\/apsb23-20.html\" title=\"Security updates available for Dimension | APSB23-20\" target=\"_blank\">APSB23-20<\/a>, Creative Cloud Desktop Application&nbsp;<a href=\"https:\/\/helpx.adobe.com\/security\/products\/creative-cloud\/apsb23-21.html\" title=\"Security update available for Adobe Creative Cloud Desktop Application | APSB23-21\" target=\"_blank\">APSB23-21<\/a>, Substance 3D Stager&nbsp;<a href=\"https:\/\/helpx.adobe.com\/security\/products\/substance3d_stager\/apsb23-22.html\" title=\"Security updates available for Substance 3D Stager | APSB23-22\" target=\"_blank\">APSB23-22<\/a>, and Photoshop&nbsp;<a href=\"https:\/\/helpx.adobe.com\/security\/products\/photoshop\/apsb23-23.html\" title=\"Security update available for Adobe Photoshop | APSB23-23\" target=\"_blank\">APSB23-23<\/a>.<\/li>\n<\/ul>\n<ul type=\"square\">\n<li><strong>Fortinet<\/strong> published&nbsp;its&nbsp;<a href=\"https:\/\/www.fortiguard.com\/psirt-monthly-advisory\/march-2023-vulnerability-advisories\" target=\"_blank\">March 2023 security advisories<\/a> which address a high-severity security vulnerability (<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-41328\" target=\"_blank\">CVE-2022-41328<\/a>) in FortiOS, that allowed threat actors to execute unauthorized code or commands.<\/li>\n<\/ul>\n<ul type=\"square\">\n<li><strong>SAP<\/strong> has released <a href=\"https:\/\/dam.sap.com\/mac\/app\/e\/pdf\/preview\/embed\/ucQrx6G?ltr=a&amp;rc=10\" target=\"_blank\">security updates<\/a> for 19 vulnerabilities, five of which were rated as critical.<\/li>\n<\/ul>\n<hr \/>\n<p>Malwarebytes removes all remnants of ransomware and prevents you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.<\/p>\n<p style=\"text-align: center;\"><span class=\"blue-cta-bttn\" style=\"background-color: #0d3ecc; line-height: 50px; padding: 0 20px;\">TRY NOW<\/span><\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/03\/update-now-microsoft-fixes-two-zero-day-bugs\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding=\"10\">\n<tr>\n<td valign=\"top\" align=\"left\">\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/exploits-and-vulnerabilities\" rel=\"category tag\">Exploits and vulnerabilities<\/a><\/p>\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/news\" rel=\"category tag\">News<\/a><\/p>\n<p>Tags: patch Tuesday<\/p>\n<p>Tags:  March<\/p>\n<p>Tags:  2023<\/p>\n<p>Tags:  Microsoft<\/p>\n<p>Tags:  Adobe<\/p>\n<p>Tags:  Fortinet<\/p>\n<p>Tags:  Android<\/p>\n<p>Tags:  SAP<\/p>\n<p>Tags:  CVE-2023-23397<\/p>\n<p>Tags:  CVE-2023-24880<\/p>\n<p>Tags:  CVE-2023-26360<\/p>\n<p>Tags:  CVE-2022-41328<\/p>\n<p>This Patch Tuesday, Microsoft has released fixes for two actively exploited zero-days and Adobe has fixed one.<\/p>\n<table width=\"100%\">\n<tr>\n<td align=\"right\">\n<p><b>(<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/03\/update-now-microsoft-fixes-two-zero-day-bugs\" title=\"Update now! Microsoft fixes two zero-day bugs\">Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/03\/update-now-microsoft-fixes-two-zero-day-bugs\">Update now! Microsoft fixes two zero-day bugs<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[28876,11414,10462,28878,28848,28850,28877,22783,24812,4258,10516,32,19245,21748],"class_list":["post-21489","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-28876","tag-adobe","tag-android","tag-cve-2022-41328","tag-cve-2023-23397","tag-cve-2023-24880","tag-cve-2023-26360","tag-exploits-and-vulnerabilities","tag-fortinet","tag-march","tag-microsoft","tag-news","tag-patch-tuesday","tag-sap"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21489","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=21489"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21489\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=21489"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=21489"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=21489"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}