{"id":21986,"date":"2023-05-11T10:31:13","date_gmt":"2023-05-11T18:31:13","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/05\/11\/news-15717\/"},"modified":"2023-05-11T10:31:13","modified_gmt":"2023-05-11T18:31:13","slug":"news-15717","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2023\/05\/11\/news-15717\/","title":{"rendered":"May&#039;s Patch Tuesday update includes 3 zero-day flaws; fix them ASAP"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/07\/microsoft_windows_updates_cycle_arrows_laptop_mobile_phone_3x2_1200x800-100851684-small.jpg\"\/><\/p>\n<p>In it&#8217;s May update, Microsoft addressed 51 vulnerabilities in Windows, Microsoft Office, and Visual Studio. And with three zero-day flaws to urgently address in Windows (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24932\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2023-24932<\/a>,<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29325\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2023-29325<\/a> and<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29336\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2023-29336<\/a>), the focus this month needs to be on rapidly updating both Windows and Microsoft Office. Both platforms get our \u201cPatch Now\u201d recommendation.<\/p>\n<p>Testing for this patch cycle must include validating Windows secure boot, remote desktop and VPN transfers, and ensuring that Microsoft Outlook handles document (RTF and DOC) files correctly. The team at\u00a0<a href=\"https:\/\/applicationreadiness.com\/\" rel=\"noopener nofollow\" target=\"_blank\">Application\u00a0Readiness<\/a> has crafted\u00a0<a href=\"https:\/\/applicationreadiness.com\/assurance-security-dashboard-may-2023\/\" rel=\"noopener nofollow\" target=\"_blank\">this helpful\u00a0infographic<\/a> to outline the risks associated with each of the updates for this cycle.<\/p>\n<p>Each month, Microsoft includes a list of known issues that relate to the operating system and platforms included in the latest updates. For May, these include:<\/p>\n<p>One issue that still affects all versions of Windows 10 (as it hasfor the past three months) is that kiosk device profiles are still not signing in automatically. Microsoft is working on a fix. And for those looking for some redeeming value in gaming updates (who isn&#8217;t these days?) <em>Red Dead Redemption 2<\/em> is now<a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/april-11-2023-kb5025224-os-build-22000-1817-ebc75372-608d-4a77-a6e0-cb1e15f117fc\" rel=\"nofollow\"> reported to be able to start up<\/a>. Well done.<\/p>\n<p>This month, there have not been any CVEs updated or major revisions to previous patches.<\/p>\n<p>Microsoft has not published any further mitigations or workarounds for this month&#8217;s patches.<\/p>\n<p>Each month, the team at<a href=\"https:\/\/applicationreadiness.com\/\" rel=\"nofollow\"> Readiness<\/a> analyzes the latest Patch Tuesday updates and provides detailed, actionable testing guidance. The guidance is based on assessing a large application portfolio and a detailed analysis of the Microsoft patches and their potential impact on Windows and application installations.)<\/p>\n<p>Given the large number of system-level changes included this cycle, I have broken down the testing scenarios into standard and high-risk profiles.<\/p>\n<p>Microsoft made significant changes this month to the<a href=\"https:\/\/learn.microsoft.com\/en-us\/previous-versions\/windows\/it-pro\/windows-8.1-and-8\/jj131725(v=ws.11)?redirectedfrom=MSDN\" rel=\"noopener nofollow\" target=\"_blank\"> TPM Module<\/a>, in particular, Secure Boot and BitLocker. The Readiness team suggests the following basic tests for this update:<\/p>\n<p>We are unsure about the validity of recovery media once this May Patch Tuesday update has been applied. Your boot recovery media might\/will fail if made on systems prior to this update. Once you have performed this update you will need to ensure full backups are completed and tested. This scenario affects both Windows 11 (22H2) desktops and Windows Server 2022.<\/p>\n<p>The following changes included in this month&#8217;s update have not been raised as either high risk tweaks and do not include functional changes.<\/p>\n<p>All these testing scenarios require significant application-level testing before general deployment. Given the nature of changes included in these patches, the Readiness team recommends that you:<\/p>\n<p>Automated testing will help with these scenarios (especially using a testing platform that offers a &#8220;delta&#8221; or comparison between builds). For line-of-business applications that involve getting the application owner (doing<a href=\"https:\/\/en.wikipedia.org\/wiki\/Acceptance_testing\" rel=\"noopener nofollow\" target=\"_blank\"> UAT<\/a>) to test and approve the testing results, this is still essential.<\/p>\n<p>This section includes important changes to servicing (and most security updates) to Windows desktop and server platforms.<\/p>\n<p>Each month, we break down the update cycle into product families (as defined by Microsoft) with the following basic groupings:<\/p>\n<p>Microsoft released 11 low-profile updates to its browser portfolio, all of which have been rated important. For those still using the older code base (IE), the retired out-of-support Internet<a href=\"https:\/\/techcommunity.microsoft.com\/t5\/windows-it-pro-blog\/internet-explorer-11-desktop-app-retirement-faq\/ba-p\/2366549\" rel=\"noopener nofollow\" target=\"_blank\"> Explorer 11 desktop application was permanently turned off<\/a> as part of the February Windows security update (&#8220;B&#8221; release). Add these updates to your standard patch release schedule.<\/p>\n<p>This month, Microsoft released five critical updates and 22 patches rated important to the Windows platform; they cover the following key components:<\/p>\n<p>At first glance, the<a href=\"https:\/\/www.microsoft.com\/en-us\/videoplayer\/embed\/RW11wVP?pid=ocpVideo1-innerdiv-oneplayer&amp;postJsllMsg=true&amp;maskLevel=20&amp;reporting=true&amp;market=en-us\" rel=\"noopener nofollow\" target=\"_blank\"> May Windows release<\/a> seemed to be pretty light, with a lower-than-normal number of critical updates. However, Microsoft identified and addressed a vulnerability in the Windows secure boot process so complex that a<a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/kb5025885-how-to-manage-the-windows-boot-manager-revocations-for-secure-boot-changes-associated-with-cve-2023-24932-41a975df-beb2-40c1-99a3-b3ff139f832d\" rel=\"noopener nofollow\" target=\"_blank\"> staged release<\/a> is required. Identified as<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24932\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2023-24932<\/a>, Microsoft warns that this vulnerability allows an &#8220;attacker to execute self-signed code at the Unified Extensible Firmware Interface (UEFI) level while Secure Boot is enabled.&#8221;<\/p>\n<p>Yep \u2014 you heard that right \u2014 your secure boot process has been compromised (brought to you by<a href=\"https:\/\/en.wikipedia.org\/wiki\/UEFI\" rel=\"noopener nofollow\" target=\"_blank\"> Black Lotus<\/a>). As mentioned in the testing guidance section above, boot media must be carefully analyzed; otherwise, &#8220;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Brick_(electronics)\" rel=\"noopener nofollow\" target=\"_blank\">bricked<\/a>&#8221; servers are a real possibility. Before proceeding, read this <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/kb5025885-how-to-manage-the-windows-boot-manager-revocations-for-secure-boot-changes-associated-with-cve-2023-24932-41a975df-beb2-40c1-99a3-b3ff139f832d\" rel=\"noopener nofollow\" target=\"_blank\">updated guidance for CVE-2023-24932<\/a>, with some further reading on the Black Lotus campaign\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/11\/guidance-for-investigating-attacks-using-cve-2022-21894-the-blacklotus-campaign\/\" rel=\"noopener nofollow\" target=\"_blank\">available here<\/a>.<\/p>\n<p>Add this update to your &#8220;Patch Now&#8221; release schedule.<\/p>\n<p>Microsoft released one critical update to SharePoint Server this month. In addition to this, six other updates rated important affecting Word, Excel and Teams arrived. The focus needs to be on Microsoft Outlook (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29324\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2023-29324<\/a>) with an updated patch (to a previous mitigation) to resolve a serious elevation of privilege (<a href=\"https:\/\/learn.microsoft.com\/en-us\/dotnet\/framework\/wcf\/feature-details\/elevation-of-privilege\" rel=\"noopener nofollow\" target=\"_blank\">EOP<\/a>) vulnerability. Microsoft published an update(d)<a href=\"https:\/\/msrc.microsoft.com\/blog\/2023\/03\/microsoft-mitigates-outlook-elevation-of-privilege-vulnerability\/\" rel=\"noopener nofollow\" target=\"_blank\"> mitigation document<\/a> to explain this serious security issue.<\/p>\n<p>Though the Windows OLE related vulnerability (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29325\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2023-29325<\/a>) should be included in this month&#8217;s Windows section, the real problem with this core system library involves how Microsoft Outlook handles<a href=\"https:\/\/en.wikipedia.org\/wiki\/Rich_Text_Format\" rel=\"noopener nofollow\" target=\"_blank\"> RTF<\/a> and Word Doc &#8220;open&#8221; requests. We have not had any reports of these other Microsoft Office related vulnerabilities being exploited in the wild nor any public disclosures for Excel. Given the urgency of these Microsoft Outlook and core Microsoft Office (OLE) patches, add these Office updates to your &#8220;Patch Now&#8221; release schedule.<\/p>\n<p>Great news: no Exchange Server updates this cycle.<\/p>\n<p>Microsoft released just two updates this month (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29338\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2023-29338<\/a> and<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29343\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2023-29343<\/a>), both rated important. Affecting only Visual Studio and<a href=\"https:\/\/learn.microsoft.com\/en-us\/sysinternals\/downloads\/sysmon\" rel=\"noopener nofollow\" target=\"_blank\"> Sysmon<\/a> (thank you,<a href=\"https:\/\/en.wikipedia.org\/wiki\/Mark_Russinovich)\" rel=\"noopener nofollow\" target=\"_blank\"> Mark<\/a>) there is a very low testing profile for either update. Add these updates to your standard developer release schedule.<\/p>\n<p><strong>Adobe Reader (still here, but not this month)<\/strong><\/p>\n<p>Happy Days! No Adobe Reader updates from Microsoft for May.<\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3696272\/mays-patch-tuesday-update-includes-3-zero-day-flaws-fix-them-asap.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/07\/microsoft_windows_updates_cycle_arrows_laptop_mobile_phone_3x2_1200x800-100851684-small.jpg\"\/><\/p>\n<article>\n<section class=\"page\">\n<p>In it&#8217;s May update, Microsoft addressed 51 vulnerabilities in Windows, Microsoft Office, and Visual Studio. And with three zero-day flaws to urgently address in Windows (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24932\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2023-24932<\/a>,<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29325\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2023-29325<\/a> and<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29336\" rel=\"noopener nofollow\" target=\"_blank\"> CVE-2023-29336<\/a>), the focus this month needs to be on rapidly updating both Windows and Microsoft Office. Both platforms get our \u201cPatch Now\u201d recommendation.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3696272\/mays-patch-tuesday-update-includes-3-zero-day-flaws-fix-them-asap.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10516,10909,714,24580,10525],"class_list":["post-21986","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-microsoft","tag-microsoft-office","tag-security","tag-small-and-medium-business","tag-windows"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21986","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=21986"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21986\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=21986"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=21986"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=21986"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}