Microsoft Patch Tuesday, July 2022 Version – Krebs on Safety

Microsoft as we speak launched updates to repair not less than 86 safety vulnerabilities in its Home windows working programs and different software program, together with a weak point in all supported variations of Home windows that Microsoft warns is actively being exploited. The software program large additionally has made a controversial resolution to place the brakes on a plan to dam macros in Workplace paperwork downloaded from the Web.

In February, safety consultants hailed Microsoft’s resolution to dam VBA macros in all paperwork downloaded from the Web. The corporate mentioned it could roll out the adjustments in phases between April and June 2022.

Macros have lengthy been a trusted method for cybercrooks to trick individuals into working malicious code. Microsoft Workplace by default warns customers that enabling macros in untrusted paperwork is a safety danger, however these warnings could be simply disabled with the press of button. Beneath Microsoft’s plan, the brand new warnings offered no such approach to allow the macros.

As Ars Technica veteran reporter Dan Goodin put it, “safety professionals—some who’ve spent the previous 20 years watching purchasers and staff get contaminated with ransomware, wipers, and espionage with irritating regularity—cheered the change.”

However final week, Microsoft abruptly modified course. As first reported by BleepingComputer, Redmond mentioned it could roll again the adjustments primarily based on suggestions from customers.

“Whereas Microsoft has not shared the damaging suggestions that led to the rollback of this alteration, customers have reported that they’re unable to search out the Unblock button to take away the Mark-of-the-Net from downloaded recordsdata, making it not possible to allow macros,” Bleeping’s Sergiu Gatlan wrote.

Microsoft later mentioned the choice to roll again turning off macros by default was non permanent, though it has not indicated when this necessary change is likely to be made for good.

The zero-day Home windows vulnerability already seeing energetic assaults is CVE-2022-22047, which is an elevation of privilege vulnerability in all supported variations of Home windows. Pattern Micro’s Zero Day Initiative notes that whereas this bug is listed as being underneath energetic assault, there’s no info from Microsoft on the place or how broadly it’s being exploited.

“The vulnerability permits an attacker to execute code as SYSTEM, offered they will execute different code on the goal,” ZDI’s Dustin Childs wrote. “Bugs of this kind are usually paired with a code execution bug, normally a specifically crafted Workplace or Adobe doc, to take over a system. These assaults typically depend on macros, which is why so many have been disheartened to listen to Microsoft’s delay in blocking all Workplace macros by default.”

Kevin Breen, director of cyber menace analysis at Immersive Labs, mentioned CVE-2022-22047 is the form of vulnerability that’s usually seen abused after a goal has already been compromised.

“Crucially, it permits the attacker to escalate their permissions from that of a standard consumer to the identical permissions because the SYSTEM,” he mentioned. “With this stage of entry, the attackers are in a position to disable native providers akin to Endpoint Detection and Safety instruments. With SYSTEM entry they will additionally deploy instruments like Mimikatz which can be utilized to get better much more admin and area stage accounts, spreading the menace shortly.”

After a short reprieve from patching critical safety issues within the Home windows Print Spooler service, we’re again to enterprise as traditional. July’s patch batch comprises fixes for 4 separate elevation of privilege vulnerabilities in Home windows Print Spooler, recognized as CVE-2022-22022, CVE-2022-22041, CVE-2022-30206, and CVE-2022-30226. Consultants at safety agency Tenable notice that these 4 flaws present attackers with the flexibility to delete recordsdata or achieve SYSTEM stage privileges on a weak system.

Roughly a 3rd of the patches issued as we speak contain weaknesses in Microsoft’s Azure Website Restoration providing. Different parts seeing updates this month embrace Microsoft Defender for Endpoint; Microsoft Edge (Chromium-based); Workplace; Home windows BitLocker; Home windows Hyper-V; Skype for Enterprise and Microsoft Lync; and Xbox.

4 of the issues mounted this month tackle vulnerabilities Microsoft charges “essential,” that means they might be utilized by malware or malcontents to imagine distant management over unpatched Home windows programs, normally with none assist from customers. CVE-2022-22029 and CVE-2022-22039 have an effect on Community File System (NFS) servers, and CVE-2022-22038 impacts the Distant Process Name (RPC) runtime.

“Though all three of those will likely be comparatively difficult for attackers to take advantage of as a result of quantity of sustained knowledge that must be transmitted, directors ought to patch sooner relatively than later,” mentioned Greg Wiseman, product supervisor at Rapid7. “CVE-2022-30221 supposedly impacts the Home windows Graphics Part, although Microsoft’s FAQ signifies that exploitation requires customers to entry a malicious RDP server.”

Individually, Adobe as we speak issued patches to deal with not less than 27 vulnerabilities throughout a number of merchandise, together with Acrobat and Reader, Photoshop, RoboHelp, and Adobe Character Animator.

For a better take a look at the patches launched by Microsoft as we speak and listed by severity and different metrics, try the always-useful Patch Tuesday roundup from the SANS Web Storm Heart. And it’s not a nasty thought to carry off updating for a number of days till Microsoft works out any kinks within the updates: normally has the lowdown on any patches that could be inflicting issues for Home windows customers.

As at all times, please contemplate backing up your system or not less than your necessary paperwork and knowledge earlier than making use of system updates. And for those who run into any issues with these updates, please drop a notice about it right here within the feedback.

Leave a Comment