{"id":22251,"date":"2023-06-16T12:30:15","date_gmt":"2023-06-16T20:30:15","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/06\/16\/news-15981\/"},"modified":"2023-06-16T12:30:15","modified_gmt":"2023-06-16T20:30:15","slug":"news-15981","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2023\/06\/16\/news-15981\/","title":{"rendered":"June&#039;s Patch Tuesday updates focus on Windows, Office"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/07\/conceptual_representation_of_technical_support_fixes_service_maintenance_updates_digital_sign_wrench_screwdriver_branching_circuits_throughout_system_by_traitov_gettyimages-1199145131_cw_2400x1600-100853239-small.jpg\"\/><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft released 73 updates to its Windows, Office, and Visual Studio platforms on Patch Tuesday, with many of them dealing with core, but not urgent, security vulnerabilities. That&#8217;s a welcome respite from the previous six months of urgent zero-days and public disclosures. With that in mind, the <a href=\"https:\/\/applicationreadiness.com\/\" rel=\"noopener nofollow\" target=\"_blank\">Readiness<\/a> testing team suggests a focus on printing and backup\/recovery processes to make sure they&#8217;re not affected by this update cycle.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For the first time, we see a (non-Adobe) third-party vendor added to a Patch Tuesday release, with three minor plugin updates to Visual Studio for AutoDesk. Expect to see more such vendors added to Microsoft&#8217;s updates in the near future. The team at<\/span> <span style=\"font-weight: 400;\">Readiness<\/span><span style=\"font-weight: 400;\"> has created a useful<\/span><a href=\"https:\/\/applicationreadiness.com\/assurance-security-dashboard-june-2023\/\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">infographic<\/span><\/a><span style=\"font-weight: 400;\"> that outlines the risks associated with each of the updates.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Each month, Microsoft includes a list of known issues that relate to the operating system and platforms in the current update cycle.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At present, we do not have any insights into an out-of-bounds or early update schedule from Microsoft for both the Server 20222\/VMWare and the third-party UI issues. These issues are serious, so we expect a response from Microsoft soon.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The following common vulnerabilities and exposures (CVEs) were recently revised in the Microsoft Security Update Guide:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft published these vulnerability related mitigations for this month&#8217;s release:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Each month, the team at<\/span> <span style=\"font-weight: 400;\">Readiness<\/span><span style=\"font-weight: 400;\"> analyses the latest Patch Tuesday updates to develop detailed, actionable testing guidance. This guidance is based on assessing a large application portfolio and a detailed analysis of the Microsoft patches and their potential impact on the Windows platforms and application installations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Given the large number of system-level changes included in this cycle, the testing scenarios are divided into standard and high-risk profiles.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Very much like the core security changes related to the waySQL queries are handled on desktop systems, Microsoft has made a fundamental update to how certain rendering APIs are handled with a new set of security restrictions. This is a key requirement to<\/span><a href=\"https:\/\/learn.microsoft.com\/en-us\/windows-hardware\/drivers\/print\/choosing-user-mode-or-kernel-mode\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">separate user mode and kernel printer driver requests<\/span><\/a><span style=\"font-weight: 400;\">. These are not new APIs or new features, but a hardening of existing API callback routines. This is a big change and will require a full printer testing regime, including:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The following changes included in this month&#8217;s update are not seen as at high risk for \u00a0unexpected outcomes and do not include functional changes:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft is now disallowing avoidlowmemory and<\/span><a href=\"https:\/\/learn.microsoft.com\/en-us\/windows-hardware\/drivers\/devtest\/boot-parameters-to-manipulate-memory\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">truncatememory<\/span><\/a><span style=\"font-weight: 400;\"> BCD options when<\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/windows\/windows-11-and-secure-boot-a8ff1202-c0d9-42f5-940f-843abef64fad\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">Secureboot<\/span><\/a><span style=\"font-weight: 400;\"> is on. In addition, Microsoft is blocking boot loaders that have <em>not<\/em> been updated with the May 2023 update.<\/span><\/p>\n<p>Note<span style=\"font-weight: 400;\">: Your recovery options will be severely limited unless your recovery images have this vital May 2023 update applied as well. For this specific boot process change, the Readiness team recommends the following testing regime.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Do update your recovery media as soon your testing regime is complete.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">All these (both standard and high-risk) testing scenarios will require significant app-level testing before general deployment. Given the nature of changes included in this month&#8217;s patches, the Readiness team recommends the following tests before deployment:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Automated testing will help with these scenarios (especially a testing platform that offers a &#8220;delta&#8221; or comparison between builds. However, for line-of-business applications, getting the application owner (doing<\/span><a href=\"https:\/\/en.wikipedia.org\/wiki\/Acceptance_testing\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">UAT<\/span><\/a><span style=\"font-weight: 400;\">) to test and approve the results is absolutely essential.<\/span><\/p>\n<p><strong>Windows lifecycle update<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">This section will contain important changes to servicing (and most security updates) to Windows desktop and server platforms.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Each month, we break down the update cycle into product families (as defined by Microsoft) with the following basic groupings:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft released four low-priority updates for Edge with a further 14 patches released to the<\/span><a href=\"https:\/\/chromereleases.googleblog.com\/2023\/06\/stable-channel-update-for-desktop_13.html\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">Chromium platform<\/span><\/a><span style=\"font-weight: 400;\"> (on which Edge is built). We have not seen reports of public disclosures or exploits. That said, there are several outstanding security fixes that have not been fully addressed and published. So, we may see an update for the Chromium\/Edge project later this month. Add these updates to your standard patch release schedule.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This month, Microsoft released four critical updates and 33 patches rated important to the Windows platform; they cover these key components:\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is a moderate update for the Windows desktop and server platform and should be seen as a welcome break from the recent serious exploits (both publicly disclosed and exploited). As noted in May and included in this month&#8217;s guidance, the focus should be on testing<\/span><a href=\"https:\/\/msrc.microsoft.com\/blog\/2023\/05\/guidance-related-to-secure-boot-manager-changes-associated-with-cve-2023-24932\/\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">backup and recovery processes<\/span><\/a><span style=\"font-weight: 400;\">. Add this update to your &#8220;Patch Now&#8221; release schedule.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft delivers one critical update to its Office platform with a patch to SharePoint Enterprise server. The remaining 11 updates affect Microsoft Outlook, Excel, and OneNote. These are all relatively low-profile vulnerabilities that might affect Mac users more than Windows users. Add these Office updates to your standard release schedule.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft released two updates for Microsoft Exchange Server (<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-28310\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2023-28310<\/span><\/a><span style=\"font-weight: 400;\"> and<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-32031\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">CVE-2023-32031<\/span><\/a><span style=\"font-weight: 400;\">) both rated important. These security vulnerabilities require internal authentication and have official\/confirmed fixes from Microsoft. There have been no reports of exploits or public disclosures for either issue. Even though updating Exchange Server is a bit of a pain, you can add these two updates to your standard release schedule for this month.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">June delivers a cornucopia of patches to the Microsoft development platform, with a single critical update to .NET, a healthy helping of 22 updates rated as important to Visual Studio, one (low rated) update to a Sysinternals tool, and a moderate (how unusual!) update to older non-supported versions of .NET. At first glance, our team thought this would be a big update with a large testing profile. After some examination, this is more of a &#8220;corporate hygiene&#8221; exercise for Microsoft with a clean-up of small patches to their core development tools. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Add these updates to your standard developer release schedule.<\/span><\/p>\n<p><strong>Adobe Reader (we have a guest: AutoDesk)<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">No updates from Adobe for Reader or Acrobat this month. But, as luck (or bad luck) would have it, we have another &#8220;A&#8221; to worry about. The introduction of Microsoft&#8217;s support for external CNA&#8217;s (<\/span><a href=\"https:\/\/nvd.nist.gov\/general\/cna-counting\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE Numbering Authority<\/span><\/a><span style=\"font-weight: 400;\">) in January allowed for third-party applications to be included in Microsoft updates. Microsoft has previously only included Adobe. This month changes all that, with the introduction of three CVE&#8217;s for AutoDesk. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">These three reported vulnerabilities (<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-27911\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2023-27911<\/span><\/a><span style=\"font-weight: 400;\">,<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-27910\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">CVE-2023-27910<\/span><\/a><span style=\"font-weight: 400;\"> and<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-27909\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">CVE-2023-27909<\/span><\/a><span style=\"font-weight: 400;\">), though developed by Autodesk, are actually plugins for (an older, non-supported) version of Microsoft Visual Studio. That&#8217;s why these three issues have been included in this month&#8217;s Patch Tuesday release. Add these updates to your standard &#8220;third-party&#8221; update release schedule. If you didn&#8217;t have one before, now you do.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Happy Patching.<\/span><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3699673\/junes-patch-tuesday-updates-focus-on-windows-office.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/07\/conceptual_representation_of_technical_support_fixes_service_maintenance_updates_digital_sign_wrench_screwdriver_branching_circuits_throughout_system_by_traitov_gettyimages-1199145131_cw_2400x1600-100853239-small.jpg\"\/><\/p>\n<article>\n<section class=\"page\">\n<p><span style=\"font-weight: 400;\">Microsoft released 73 updates to its Windows, Office, and Visual Studio platforms on Patch Tuesday, with many of them dealing with core, but not urgent, security vulnerabilities. That&#8217;s a welcome respite from the previous six months of urgent zero-days and public disclosures. With that in mind, the <a href=\"https:\/\/applicationreadiness.com\/\" rel=\"noopener nofollow\" target=\"_blank\">Readiness<\/a> testing team suggests a focus on printing and backup\/recovery processes to make sure they&#8217;re not affected by this update cycle.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For the first time, we see a (non-Adobe) third-party vendor added to a Patch Tuesday release, with three minor plugin updates to Visual Studio for AutoDesk. Expect to see more such vendors added to Microsoft&#8217;s updates in the near future. The team at<\/span> <span style=\"font-weight: 400;\">Readiness<\/span><span style=\"font-weight: 400;\"> has created a useful<\/span><a href=\"https:\/\/applicationreadiness.com\/assurance-security-dashboard-june-2023\/\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">infographic<\/span><\/a><span style=\"font-weight: 400;\"> that outlines the risks associated with each of the updates.<\/span><\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3699673\/junes-patch-tuesday-updates-focus-on-windows-office.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10516,10909,714,24580,10525],"class_list":["post-22251","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-microsoft","tag-microsoft-office","tag-security","tag-small-and-medium-business","tag-windows"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22251","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=22251"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22251\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=22251"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=22251"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=22251"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}