{"id":23965,"date":"2024-02-16T14:30:20","date_gmt":"2024-02-16T22:30:20","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/02\/16\/news-17695\/"},"modified":"2024-02-16T14:30:20","modified_gmt":"2024-02-16T22:30:20","slug":"news-17695","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/02\/16\/news-17695\/","title":{"rendered":"Microsoft fixes two zero-days with Patch Tuesday release"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/08\/hand_flicks_on_update_switch_software_update_fix_patch_by_stadtratte_gettyimages-1140137377_2400x1600-100854510-small.jpg\"\/><\/p>\n<p>Microsoft on Tuesday released 73 updates in its monthly Patch Tuesday release, addressing issues in Microsoft Exchange Server and Adobe and two zero-day flaws being actively exploited in Microsoft Outlook (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-21410\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21410<\/a>) and Microsoft Exchange (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-21413\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21413<\/a>).<\/p>\n<p>Including the recent reports that the Windows SmartScreen vulnerability (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-21351\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21351<\/a>) is under active exploitation, we have added \u201cPatch Now\u201d schedules to Microsoft Office, Windows and Exchange Server. The team at<a href=\"https:\/\/applicationreadiness.com\/\" rel=\"nofollow noopener\" target=\"_blank\"> Readiness<\/a> has provided this\u00a0<a href=\"https:\/\/applicationreadiness.com\/assurance-security-dashboard-feb-2024\/\" rel=\"nofollow noopener\" target=\"_blank\">detailed\u00a0infographic\u00a0outlining the risks<\/a>\u00a0associated with each of the updates for this cycle.<\/p>\n<p>Microsoft publishes a list of known issues related to the operating system and platforms included each month.<\/p>\n<p>There is a significant issue with the current release of Microsoft Exchange Server, which is detailed below in the Exchange Server section.<\/p>\n<p>We have seen three waves of CVE vulnerability revisions from Microsoft (so far) this month \u2014 which in itself is unusual \u2014 made all the more so by the volume of updates in such a short time. That said, all the revisions were due to mistakes in the publication process; no additional action is required for the following:<\/p>\n<p>Contrary to current documentation from Microsoft, there are two revisions that <em>do<\/em> require attention:<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-21410\" rel=\"nofollow noopener\" target=\"_blank\"> CVE-2024-21410<\/a> and<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-21413\" rel=\"nofollow noopener\" target=\"_blank\"> CVE-2024-21413<\/a>. Both reported vulnerabilities are \u201cPreview Pane\u201d critical updates from Microsoft that affect Microsoft Outlook and Exchange Server. Though the Microsoft Security Response Center (<a href=\"https:\/\/msrc.microsoft.com\/\" rel=\"nofollow\">MSRC<\/a>) says these vulnerabilities are not under active exploitation, there are<a href=\"https:\/\/thehackernews.com\/2024\/02\/critical-exchange-server-flaw-cve-2024.html\" rel=\"nofollow noopener\" target=\"_blank\"> severalpublished reports<\/a>\u00a0of<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-new-critical-exchange-bug-exploited-as-zero-day\/\" rel=\"nofollow noopener\" target=\"_blank\"> active exploitation<\/a>.<\/p>\n<p>Note: this is a serious combination of Microsoft Exchange and Outlook security issues.<\/p>\n<p>Microsoft published the following vulnerability-related mitigations for this month&#8217;s release cycle:<\/p>\n<p>We have placed the GPO setting AllowAllTrustedAppToInstall in quotes, as we don\u2019t believe it exists (or the documentation has been removed\/deleted). This may be (another) documentation issue.<\/p>\n<p>Each month, the team at<a href=\"https:\/\/applicationreadiness.com\/\" rel=\"nofollow\"> Readiness<\/a>\u00a0provides detailed, actionable testing guidance based on assessing a large application portfolio and a detailed analysis of the Microsoft patches and their potential impact on the Windows platforms and application installations. For this February release, we have grouped the critical updates and required testing efforts into functional areas, including:<\/p>\n<p><strong>Security<\/strong><\/p>\n<p><strong>Networking<\/strong><\/p>\n<p><strong>Developers and development tools<\/strong><\/p>\n<p><strong>Microsoft Office<\/strong><\/p>\n<p>Also, this month, Microsoft added a new feature to the Microsoft .NET CORE offering with<a href=\"https:\/\/learn.microsoft.com\/en-us\/aspnet\/core\/tutorials\/signalr?view=aspnetcore-7.0&amp;tabs=visual-studio\" rel=\"nofollow\"> SignalR<\/a>. Microsoft explains:\u00a0<\/p>\n<p style=\"padding-left: 30px;\">\u201cASP.NET SignalR is a library for ASP.NET developers that simplifies the process of adding real-time web functionality to applications. Real-time web functionality is the ability to have server code push content to connected clients instantly as it becomes available, rather than having the server wait for a client to request new data.\u201d<\/p>\n<p>You can find documentation on getting started with SignalR<a href=\"https:\/\/learn.microsoft.com\/en-us\/aspnet\/core\/tutorials\/signalr?view=aspnetcore-7.0&amp;tabs=visual-studio\" rel=\"nofollow noopener\" target=\"_blank\"> here<\/a>.<\/p>\n<p>Automated testing will help with these scenarios (especially a testing platform that offers a &#8220;delta&#8221; or comparison between builds). However, for line-of-business apps, getting the application owner (doing<a href=\"https:\/\/en.wikipedia.org\/wiki\/Acceptance_testing\" rel=\"nofollow noopener\" target=\"_blank\"> UAT<\/a>) to test and approve the results is still essential.<\/p>\n<p><strong>Windows lifecycle update <\/strong><\/p>\n<p>This section contains important changes to servicing (and most security updates) to Windows desktop and server platforms.<\/p>\n<p>Each month, we break down the update cycle into product families (as defined by Microsoft) with the following basic groupings:<\/p>\n<p>Microsoft released three minor updates to the Chromium-based Edge (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-1283\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-1283<\/a>,<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-1284\" rel=\"nofollow noopener\" target=\"_blank\"> CVE-2024-1284<\/a>, and<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-1059\" rel=\"nofollow noopener\" target=\"_blank\"> CVE-2024-1059<\/a>) and updated the following reported vulnerabilities:<\/p>\n<p>All these updates should have minor to negligible impact on applications that integrate and operate on Chromium. Add them to your standard patch release schedule.<\/p>\n<p>Microsoft released two critical updates (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-21357\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21357<\/a> and<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-20684\" rel=\"nofollow noopener\" target=\"_blank\"> CVE-2024-20684<\/a>) and 41 patches rated as important for Windows that cover the following components:<\/p>\n<p>The real worry this month is the Windows SmartScreen (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-21351\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21351<\/a>) update, which has been reportedly exploited in the wild. Due to this rapidly emerging threat, add this update to your Windows \u201cPatch Now\u201d release schedule.<\/p>\n<p>Microsoft released a single critical update (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-21413\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21413<\/a>) and seven patches rated as important for the Microsoft Office productivity suite. The real concern is older versions of Microsoft Office (2016, in particular). If you are running these older versions, you will need to add these updates to your Patch Now schedule.<\/p>\n<p>All modern versions of Microsoft Office can add these February updates to their standard release schedule.<\/p>\n<p>Microsoft released a single update for Microsoft Exchange server, with<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-21410\" rel=\"nofollow noopener\" target=\"_blank\"> CVE-2024-21410<\/a> rated critical. This update will require a reboot to the target server(s). In addition, Microsoft offered this advice when patching your servers:<\/p>\n<p style=\"padding-left: 30px;\">\u201cWhen Setup.exe is used to run \/PrepareAD, \/PrepareSchema or \/PrepareDomain, the installer reports that Extended Protection was configured by the installer, and it displays the following error message: &#8216;Exchange Setup has enabled Extended Protection on all the virtual directories on this machine.'&#8221;<\/p>\n<p>Microsoft offers \u201cExtended Protection&#8221; as a series of documents and<a href=\"https:\/\/aka.ms\/ExchangeEPScript\" rel=\"nofollow noopener\" target=\"_blank\"> scripts<\/a> to help secure your Exchange server. In addition, Microsoft published<a href=\"https:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=36036\" rel=\"nofollow noopener\" target=\"_blank\"> Mitigating Pass the Hash (PtH) Attacks and Other Credential Theft, Version 1 and 2<\/a> to help with managing the attack service of this serious vulnerability. Add this to your \u201cPatch Now\u201d schedule.<\/p>\n<p>Microsoft released three updates (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-20667\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-20667<\/a>,<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-21386\" rel=\"nofollow noopener\" target=\"_blank\"> CVE-2024-21386<\/a> and<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-21404\" rel=\"nofollow noopener\" target=\"_blank\"> CVE-2024-21404<\/a>) affecting the\u00a0.NET platform as well as Visual Studio 2022. These updates are expected to have minimal impact on app deployments. Add them to your standard developer release schedule.<\/p>\n<p>Adobe Reader updates are back this month (year) with the release of<a href=\"https:\/\/helpx.adobe.com\/security\/products\/acrobat\/apsb24-07.html\" rel=\"nofollow noopener\" target=\"_blank\"> APSB 24-07<\/a>, a priority three update for both Adobe Reader and Reader DC. Adobe notes that this vulnerability could lead to remote code execution, denial of service, and memory leaks. There are also some <a href=\"https:\/\/helpx.adobe.com\/security\/products\/acrobat\/apsb24-07.html\" rel=\"nofollow noopener\" target=\"_blank\">documented\u00a0uninstall\u00a0issues<\/a>\u00a0with Adobe Reader, which might cause deployment headaches. All this is enough to add this Adobe to our \u201cPatch Now\u201d schedule.<\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3712925\/microsoft-fixes-two-zero-days-with-patch-tuesday-release.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/08\/hand_flicks_on_update_switch_software_update_fix_patch_by_stadtratte_gettyimages-1140137377_2400x1600-100854510-small.jpg\"\/><\/p>\n<article>\n<section class=\"page\">\n<p>Microsoft on Tuesday released 73 updates in its monthly Patch Tuesday release, addressing issues in Microsoft Exchange Server and Adobe and two zero-day flaws being actively exploited in Microsoft Outlook (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-21410\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21410<\/a>) and Microsoft Exchange (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-21413\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21413<\/a>).<\/p>\n<p>Including the recent reports that the Windows SmartScreen vulnerability (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-21351\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21351<\/a>) is under active exploitation, we have added \u201cPatch Now\u201d schedules to Microsoft Office, Windows and Exchange Server. The team at<a href=\"https:\/\/applicationreadiness.com\/\" rel=\"nofollow noopener\" target=\"_blank\"> Readiness<\/a> has provided this\u00a0<a href=\"https:\/\/applicationreadiness.com\/assurance-security-dashboard-feb-2024\/\" rel=\"nofollow noopener\" target=\"_blank\">detailed\u00a0infographic\u00a0outlining the risks<\/a>\u00a0associated with each of the updates for this cycle.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3712925\/microsoft-fixes-two-zero-days-with-patch-tuesday-release.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10516,10909,714,24580,10525],"class_list":["post-23965","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-microsoft","tag-microsoft-office","tag-security","tag-small-and-medium-business","tag-windows"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23965","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23965"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23965\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23965"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23965"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23965"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}