{"id":22227,"date":"2023-06-13T13:17:19","date_gmt":"2023-06-13T21:17:19","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/06\/13\/news-15957\/"},"modified":"2023-06-13T13:17:19","modified_gmt":"2023-06-13T21:17:19","slug":"news-15957","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2023\/06\/13\/news-15957\/","title":{"rendered":"Microsoft Patch Tuesday, June 2023 Edition"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Tue, 13 Jun 2023 20:44:28 +0000<\/strong><\/p>\n<p><strong>Microsoft Corp. <\/strong>today released software updates to fix dozens of security vulnerabilities in its <strong>Windows<\/strong> operating systems and other software. This month&#8217;s relatively light patch load has another added bonus for system administrators everywhere: It appears to be the first Patch Tuesday since March 2022 that isn&#8217;t marred by the active exploitation of a zero-day vulnerability in Microsoft&#8217;s products.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-56287\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png\" alt=\"\" width=\"750\" height=\"528\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png 841w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate-768x541.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate-782x550.png 782w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate-100x70.png 100w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/p>\n<p>June&#8217;s Patch Tuesday features updates to plug at least 70 security holes, and while none of these are reported by Microsoft as exploited in-the-wild yet, Redmond has flagged several in particular as &#8220;more likely to be exploited.&#8221;<\/p>\n<p>Top of the list on that front is <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-29357\" target=\"_blank\" rel=\"noopener\">CVE-2023-29357<\/a>, which is a &#8220;critical&#8221; bug in <strong>Microsoft SharePoint Server<\/strong> that can be exploited by an unauthenticated attacker on the same network. This SharePoint flaw earned a CVSS rating of 9.8 (10.0 is the most dangerous).<\/p>\n<p>&#8220;An attacker able to gain admin access to an internal SharePoint server could do a lot of harm to an organization,&#8221; said <strong>Kevin Breen<\/strong>, director of cyber threat research at <strong>Immersive Labs<\/strong>. &#8220;Gaining access to sensitive and privileged documents, stealing and deleting documents as part of a ransomware attack or replacing real documents with malicious copies to further infect users in the organization.&#8221;<\/p>\n<p>There are at least three other vulnerabilities fixed this month that earned a collective 9.8 CVSS score, and they all concern a widely-deployed component called the <strong>Windows Pragmatic General Multicast<\/strong> (PGM), which is used for delivering multicast data &#8212; such as video streaming or online gaming.<\/p>\n<p>Security firm <strong>Action1<\/strong> says all three bugs (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-32015\" target=\"_blank\" rel=\"noopener\">CVE-2023-32015<\/a>, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-32014\" target=\"_blank\" rel=\"noopener\">CVE-2023-32014<\/a>, and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-29363\" target=\"_blank\" rel=\"noopener\">CVE-2023-29363<\/a>) can be exploited over the network without requiring any privileges or user interaction, and affected systems include all versions of Windows Server 2008 and later, as well as Windows 10 and later.<span id=\"more-63949\"><\/span><\/p>\n<p>It wouldn&#8217;t be a proper Patch Tuesday if we also didn&#8217;t also have scary security updates for organizations still using <strong>Microsoft Exchange<\/strong> for email. Breen said this month&#8217;s Exchange bugs (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-32031\" target=\"_blank\" rel=\"noopener\">CVE-2023-32031<\/a> and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-28310\" target=\"_blank\" rel=\"noopener\">CVE-2023-28310<\/a>) closely mirror the vulnerabilities identified as part of <a href=\"https:\/\/krebsonsecurity.com\/2022\/10\/microsoft-patch-tuesday-october-2022-edition\/\" target=\"_blank\" rel=\"noopener\">ProxyNotShell exploits<\/a>, where an authenticated user in the network could exploit a vulnerability in the Exchange to gain code execution on the server.<\/p>\n<p>Breen said while Microsoft&#8217;s patch notes indicate that an attacker must already have gained access to a vulnerable host in the network, this is typically achieved through social engineering attacks with spear phishing to gain initial access to a host before searching for other internal targets.<\/p>\n<p>&#8220;Just because your Exchange server doesn&#8217;t have internet-facing authentication doesn\u2019t mean it&#8217;s protected,&#8221; Breen said, noting that Microsoft says the Exchange flaws are not difficult for attackers to exploit.<\/p>\n<p>For a closer look at the patches released by Microsoft today and indexed by severity and other metrics, check out the\u00a0<a href=\"https:\/\/isc.sans.edu\/diary\/June%202023%20Microsoft%20Patch%20Tuesday\/29942\" target=\"_blank\" rel=\"noopener\">always-useful Patch Tuesday roundup<\/a>\u00a0from the\u00a0<strong>SANS Internet Storm Center<\/strong>. And it\u2019s not a bad idea to hold off updating for a few days until Microsoft works out any kinks in the updates: <a href=\"https:\/\/www.askwoody.com\/\" target=\"_blank\" rel=\"noopener\">AskWoody.com<\/a>\u00a0usually has the lowdown on any patches that may be causing problems for Windows users.<\/p>\n<p>As always, please consider backing up your system or at least your important documents and data before applying system updates. And if you run into any problems with these updates, please drop a note about it here in the comments.<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2023\/06\/microsoft-patch-tuesday-june-2023-edition\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Tue, 13 Jun 2023 20:44:28 +0000<\/strong><\/p>\n<p>Microsoft Corp. today released software updates to fix dozens of security vulnerabilities in its Windows operating systems and other software. This month&#8217;s relatively light patch load has another added bonus for system administrators everywhere: It appears to be the first Patch Tuesday since March 2022 that isn&#8217;t marred by the active exploitation of a zero-day vulnerability in Microsoft&#8217;s products.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[29556,29557,29558,29559,29560,29561,29562,24626,24627,29563,17220,16936],"class_list":["post-22227","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-action1","tag-cve-2023-28310","tag-cve-2023-29357","tag-cve-2023-29363","tag-cve-2023-32014","tag-cve-2023-32015","tag-cve-2023-32031","tag-immersive-labs","tag-kevin-breen","tag-microsoft-patch-tuesday-june-2023","tag-security-tools","tag-time-to-patch"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22227","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=22227"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22227\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=22227"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=22227"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=22227"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}