36 RCE bugs, 3 zero-days, 75 CVEs – Naked Security

0
173
36 RCE bugs, 3 zero-days, 75 CVEs – Naked Security


Deciphering Microsoft’s official Update Guide internet pages will not be for the faint-hearted.

Most of the knowledge you want, if not every thing you’d actually prefer to know, is there, however there’s such a dizzing variety of methods to view it, and so many generated-on-the-fly pages are wanted to show it, that it may be difficult to seek out out what’s actually new, and what’s actually necessary.

Should you search by the working system platforms affected?

By the severity of the vulnerabilies? By the probability of exploitation?

Should you type the zero-days to the highest?

(We don’t suppose you’ll be able to – we expect there are three zero-days on this month’ record, however we needed to drill into particular person CVE pages and seek for the textual content “Exploitation detected” in an effort to make certain that a selected bug was already identified to cybercriminals.)

What’s worse, an EoP or an RCE?

Is a Critical elevation of privilege (EoP) bug extra alarming than an Important distant code execution (RCE)?

The former sort of bug requires cybercriminals to interrupt in first, however in all probability provides them a option to take over fully, sometimes getting them the equal of sysadmin powers or working system-level management.

The second sort of bug may solely get the crooks in with the lowly entry privileges of little previous you, nevertheless it however will get them onto the community within the first place.

Of course, whereas everybody else may breathe a sigh of reduction if an attacker wasn’t in a position to get entry to their stuff, that’s chilly consolation for you, in the event you’re the one who did get attacked.

We counted 75 CVE-numbered bugs dated 2023-02-14, on condition that this 12 months’s February updates arrived on Valentine’s Day.

(Actually, we discovered 76, however we ignored one bug that didn’t have a severity ranking, was tagged CVE-2019-15126, and appears to boil all the way down to a report about unsupported Broadcom Wi-Fi chips in Microsoft Hololens gadgets – in case you have a Hololens and have any recommendation for different readers, please tell us within the feedback beneath.)

We extracted an inventory and included it beneath, sorted in order that the bugs dubbed Critical are on the high (there are seven of them, all RCE-class bugs).

You also can learn the SophosLabs evaluation of Patch Tuesday for extra particulars.



Security bug lessons defined

If you’re not aware of the bug abbreviations proven beneath, right here’s a high-speed information to safety flaws:

  • RCE means Remote Code Execution. Attackers who aren’t at present logged on to your laptop might trick it into operating a fraction of program code, or perhaps a full-blown program, as if that they had authenticated entry. Typically, on desktops or servers, the criminals use this kind of bug to implant code that permits them to get again in at will in future, thus establishing a beachhead from which to kick off a network-wide assault. On cellular gadgets reminiscent of telephones, the crooks could use RCE bugs to go away behind adware that can monitor you from then on, in order that they don’t want to interrupt in over and over to maintain their evil eyes on you.
  • EoP means Elevation of Privilege. As talked about above, this implies crooks can enhance their entry rights, sometimes buying the identical kind of powers that an official sysadmin or the working itself would normally take pleasure in. Once they’ve system-level powers, they’re typically in a position to roam freely in your community, steal safe information even from restricted-access servers, create hidden person accounts for getting again in later, or map out your total IT property in preparation for a ransomware assault.
  • Leak signifies that security-related or non-public information may escape from safe storage. Sometimes, even apparently minor leaks, reminiscent of the placement of particular working system code in reminiscence, which an attacker isn’t supposed to have the ability to predict, may give criminals the knowledge they should flip an in all probability unsuccessful assault into an nearly definitely profitable one.
  • Bypass signifies that a safety safety you’d normally count on to maintain you protected could be skirted. Crooks sometimes exploit bypass vulnerabilities to trick you into trusting distant content material reminiscent of e-mail attachments, for instance by discovering a option to keep away from the “content warnings” or to bypass the malware detection which might be supposed to maintain you protected.
  • Spoof signifies that content material could be made to look extra reliable than it truly is. For instance, attackers who lure you to a faux web site that reveals up in your browser with an official server title within the handle bar (or what seems just like the handle bar)are a lot more likely to trick you into handing over private information than in the event that they’re compelled to place their faux content material on a website that clearly isn’t the one you’d count on.
  • DoS means Denial of Service. Bugs that permit community or server companies to be knocked offline briefly are sometimes thought of low-grade flaws, assuming that the bug doesn’t then permit attackers to interrupt in, steal information or entry something they shouldn’t. But attackers who can reliably take down components of your community might be able to achieve this over and over in a co-ordinated manner, for instance by timing their DoS probes to occur each time your crashed servers restart. This could be extraordinarily disruptive, esepcially if you’re operating a web based enterprise, and will also be used as a distraction to attract consideration away from different unlawful actions that the crooks are doing in your community on the similar time.

The large bug record

The 75-strong bug record is right here, with the three zero-days we find out about marked with an asterisk (*):

NIST ID          Level        Type    Component affected
---------------  -----------  ------  ----------------------------------------
CVE-2023-21689:  (Critical)   RCE     Windows Protected EAP (PEAP) 	
CVE-2023-21690:  (Critical)   RCE     Windows Protected EAP (PEAP) 	
CVE-2023-21692:  (Critical)   RCE     Windows Protected EAP (PEAP) 	
CVE-2023-21716:  (Critical)   RCE     Microsoft Office Word 	
CVE-2023-21803:  (Critical)   RCE     Windows iSCSI 	
CVE-2023-21815:  (Critical)   RCE     Visual Studio 	
CVE-2023-23381:  (Critical)   RCE     Visual Studio 	
CVE-2023-21528:  (Important)  RCE     SQL Server 	
CVE-2023-21529:  (Important)  RCE     Microsoft Exchange Server 	
CVE-2023-21568:  (Important)  RCE     SQL Server 	
CVE-2023-21684:  (Important)  RCE     Microsoft PostScript Printer Driver 	
CVE-2023-21685:  (Important)  RCE     Microsoft WDAC OLE DB supplier for SQL 	
CVE-2023-21686:  (Important)  RCE     Microsoft WDAC OLE DB supplier for SQL 	
CVE-2023-21694:  (Important)  RCE     Windows Fax and Scan Service 	
CVE-2023-21695:  (Important)  RCE     Windows Protected EAP (PEAP) 	
CVE-2023-21703:  (Important)  RCE     Azure Data Box Gateway 	
CVE-2023-21704:  (Important)  RCE     SQL Server 	
CVE-2023-21705:  (Important)  RCE     SQL Server 	
CVE-2023-21706:  (Important)  RCE     Microsoft Exchange Server 	
CVE-2023-21707:  (Important)  RCE     Microsoft Exchange Server 	
CVE-2023-21710:  (Important)  RCE     Microsoft Exchange Server 	
CVE-2023-21713:  (Important)  RCE     SQL Server 	
CVE-2023-21718:  (Important)  RCE     SQL Server 	
CVE-2023-21778:  (Important)  RCE     Microsoft Dynamics 	
CVE-2023-21797:  (Important)  RCE     Windows ODBC Driver 	
CVE-2023-21798:  (Important)  RCE     Windows ODBC Driver 	
CVE-2023-21799:  (Important)  RCE     Microsoft WDAC OLE DB supplier for SQL 	
CVE-2023-21801:  (Important)  RCE     Microsoft PostScript Printer Driver 	
CVE-2023-21802:  (Important)  RCE     Microsoft Windows Codecs Library 	
CVE-2023-21805:  (Important)  RCE     Windows MSHTML Platform 	
CVE-2023-21808:  (Important)  RCE     .NET and Visual Studio 	
CVE-2023-21820:  (Important)  RCE     Windows Distributed File System (DFS) 	
CVE-2023-21823:  (Important) *RCE     Microsoft Graphics Component
CVE-2023-23377:  (Important)  RCE     3D Builder 	
CVE-2023-23378:  (Important)  RCE     3D Builder 	
CVE-2023-23390:  (Important)  RCE     3D Builder 	
CVE-2023-21566:  (Important)  EoP     Visual Studio 	
CVE-2023-21688:  (Important)  EoP     Windows ALPC 	
CVE-2023-21717:  (Important)  EoP     Microsoft Office SharePoint 	
CVE-2023-21777:  (Important)  EoP     Azure App Service 	
CVE-2023-21800:  (Important)  EoP     Windows Installer 	
CVE-2023-21804:  (Important)  EoP     Microsoft Graphics Component 	
CVE-2023-21812:  (Important)  EoP     Windows Common Log File System Driver 	
CVE-2023-21817:  (Important)  EoP     Windows Kerberos 	
CVE-2023-21822:  (Important)  EoP     Windows Win32K 	
CVE-2023-23376:  (Important) *EoP     Windows Common Log File System Driver 	
CVE-2023-23379:  (Important)  EoP     Microsoft Defender for IoT 	
CVE-2023-21687:  (Important)  Leak    Windows HTTP.sys 	
CVE-2023-21691:  (Important)  Leak    Windows Protected EAP (PEAP) 	
CVE-2023-21693:  (Important)  Leak    Microsoft PostScript Printer Driver 	
CVE-2023-21697:  (Important)  Leak    Internet Storage Name Service 	
CVE-2023-21699:  (Important)  Leak    Internet Storage Name Service 	
CVE-2023-21714:  (Important)  Leak    Microsoft Office 	
CVE-2023-23382:  (Important)  Leak    Azure Machine Learning 	
CVE-2023-21715:  (Important) *Bypass  Microsoft Office Publisher 
CVE-2023-21809:  (Important)  Bypass  Microsoft Defender for Endpoint 	
CVE-2023-21564:  (Important)  Spoof   Azure DevOps 	
CVE-2023-21570:  (Important)  Spoof   Microsoft Dynamics 	
CVE-2023-21571:  (Important)  Spoof   Microsoft Dynamics 	
CVE-2023-21572:  (Important)  Spoof   Microsoft Dynamics 	
CVE-2023-21573:  (Important)  Spoof   Microsoft Dynamics 	
CVE-2023-21721:  (Important)  Spoof   Microsoft Office OneNote 	
CVE-2023-21806:  (Important)  Spoof   Power BI 	
CVE-2023-21807:  (Important)  Spoof   Microsoft Dynamics 	
CVE-2023-21567:  (Important)  DoS     Visual Studio 	
CVE-2023-21700:  (Important)  DoS     Windows iSCSI 	
CVE-2023-21701:  (Important)  DoS     Windows Protected EAP (PEAP) 	
CVE-2023-21702:  (Important)  DoS     Windows iSCSI 	
CVE-2023-21722:  (Important)  DoS     .NET Framework 	
CVE-2023-21811:  (Important)  DoS     Windows iSCSI 	
CVE-2023-21813:  (Important)  DoS     Windows Cryptographic Services 	
CVE-2023-21816:  (Important)  DoS     Windows Active Directory 	
CVE-2023-21818:  (Important)  DoS     Windows SChannel 	
CVE-2023-21819:  (Important)  DoS     Windows Cryptographic Services 	
CVE-2023-21553:  (Unknown)    RCE     Azure DevOps 	

What to do?

Business customers prefer to prioritise patches, somewhat than doing them abruptly and hoping nothing breaks.

We due to this fact put the Critical bugs on the high, together with the RCE holes, on condition that RCEs are sometimes utilized by crooks to get their preliminary foothold.

In the top, nevertheless, all bugs should be patched, particularly now that the updates can be found and attackers can begin “working backwards” by making an attempt to determine from the patches what kind of holes existed earlier than the updates got here out.

Reverse engineering Windows patches could be time-consuming, not least as a result of Windows is a closed-source working system, nevertheless it’s an terrible lot simpler to determine how bugs work and how one can exploit them in the event you’ve bought a good suggestion the place to start out trying, and what to search for.

The sooner you get forward (or the faster you catch up, within the case of zero-day holes, that are bugs that the crooks discovered first), the much less probably you’ll be the one who will get attacked.

So even in the event you don’t patch every thing directly, we’re however going to say: Don’t delay/Get began right now!


READ THE SOPHOSLABS ANALYSIS OF PATCH TUESDAY FOR MORE DETAILS


LEAVE A REPLY

Please enter your comment!
Please enter your name here