HomeCyber BalkansMicrosoft Resolves Five Zero-days during July Patch Tuesday

Microsoft Resolves Five Zero-days during July Patch Tuesday

Published on

spot_img

Microsoft made a significant security update release on July Patch Tuesday, addressing a total of 130 new vulnerabilities, including five zero-day exploits. This release poses a significant challenge for IT departments due to the high number of vulnerabilities and the complexity of some of the required mitigations.

Among the vulnerabilities addressed in this release, nine were rated as critical. This means that they have the potential to cause severe damage if exploited by threat actors. Chris Goettl, Vice President of Security Product Management at Ivanti, expressed concern about the potential impact of these vulnerabilities, stating, “I have a feeling July is going to have a lot of collateral damage, a lot of operational impact and a lot of deferred updates for a period of time.”

One of the zero-day vulnerabilities addressed in this release is a Secure Boot security feature bypass vulnerability (CVE-2023-24932). Microsoft had previously released a fix for this vulnerability in May, but the July revision makes it easier to deploy the necessary files to revoke system boot managers and audit this action through the event log. Microsoft has provided instructions for this deployment and urges customers to follow through to enhance the security of their systems.

Another important zero-day exploit addressed in this release is a Microsoft Outlook vulnerability (CVE-2023-35311), which allows for a security feature bypass. This vulnerability has a high CVSS rating of 8.8, indicating its potential severity. An attacker could target a user with a specially crafted URL using the Outlook preview pane as an attack vector. However, the user would need to click the link for the attacker to exploit the vulnerability.

In addition to the zero-days, Microsoft also addressed several other vulnerabilities that pose potential risks. One of these is a Windows Error Reporting Service elevation-of-privilege vulnerability (CVE-2023-36874) that affects Windows desktop and server systems. To exploit this vulnerability and gain administrator privileges, the attacker needs local access to the target machine with permissions to create folders and performance traces.

Microsoft also released two advisories as part of this update. The first advisory (ADV230001) highlights the exploitation of drivers certified by Microsoft’s Windows Hardware Developer Program to gain administrator privileges. The company has taken steps to prevent further damage by revoking trust in these drivers and driver signing certificates.

The second advisory (ADV230002) relates to additional protections provided by Microsoft to supplement a fix released by Trend Micro for a security feature bypass vulnerability in one of its products. These measures aim to strengthen security and prevent further exploitation.

Finally, this update includes advancements in two key authentication protocols, Kerberos and Netlogon. Microsoft issued patches in November 2022 to address vulnerabilities in these protocols, and the July Patch Tuesday marks the next steps in their remediation. These updates aim to strengthen the protocols and allow administrators to test any impact on their infrastructure before implementing more stringent configurations.

Overall, the July Patch Tuesday from Microsoft includes a significant number of vulnerabilities and updates. IT departments will face a challenging task in addressing these vulnerabilities and implementing the necessary mitigations. Microsoft advises organizations to promptly patch their systems to minimize exposure to potential threats.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...