Microsoft Patch Tuesday, June 2023 Edition – Krebs on Security

0
146
Microsoft Patch Tuesday, June 2023 Edition – Krebs on Security


Microsoft Corp. in the present day launched software program updates to repair dozens of safety vulnerabilities in its Windows working methods and different software program. This month’s comparatively gentle patch load has one other added bonus for system directors in all places: It seems to be the primary Patch Tuesday since March 2022 that isn’t marred by the energetic exploitation of a zero-day vulnerability in Microsoft’s merchandise.

Microsoft Patch Tuesday, June 2023 Edition – Krebs on Security

June’s Patch Tuesday options updates to plug a minimum of 70 safety holes, and whereas none of those are reported by Microsoft as exploited in-the-wild but, Redmond has flagged a number of particularly as “more likely to be exploited.”

Top of the checklist on that entrance is CVE-2023-29357, which is a “critical” bug in Microsoft SharePoint Server that may be exploited by an unauthenticated attacker on the identical community. This SharePoint flaw earned a CVSS ranking of 9.8 (10.0 is probably the most harmful).

“An attacker able to gain admin access to an internal SharePoint server could do a lot of harm to an organization,” stated Kevin Breen, director of cyber menace analysis at Immersive Labs. “Gaining access to sensitive and privileged documents, stealing and deleting documents as part of a ransomware attack or replacing real documents with malicious copies to further infect users in the organization.”

There are a minimum of three different vulnerabilities mounted this month that earned a collective 9.8 CVSS rating, and so they all concern a widely-deployed part referred to as the Windows Pragmatic General Multicast (PGM), which is used for delivering multicast information — comparable to video streaming or on-line gaming.

Security agency Action1 says all three bugs (CVE-2023-32015, CVE-2023-32014, and CVE-2023-29363) could be exploited over the community with out requiring any privileges or person interplay, and affected methods embrace all variations of Windows Server 2008 and later, in addition to Windows 10 and later.

It wouldn’t be a correct Patch Tuesday if we additionally didn’t even have scary safety updates for organizations nonetheless utilizing Microsoft Exchange for e mail. Breen stated this month’s Exchange bugs (CVE-2023-32031 and CVE-2023-28310) carefully mirror the vulnerabilities recognized as a part of ProxyNotShell exploits, the place an authenticated person within the community might exploit a vulnerability within the Exchange to realize code execution on the server.

Breen stated whereas Microsoft’s patch notes point out that an attacker should have already got gained entry to a susceptible host within the community, that is sometimes achieved via social engineering assaults with spear phishing to realize preliminary entry to a number earlier than trying to find different inner targets.

“Just because your Exchange server doesn’t have internet-facing authentication doesn’t mean it’s protected,” Breen stated, noting that Microsoft says the Exchange flaws are usually not troublesome for attackers to use.

For a better take a look at the patches launched by Microsoft in the present day and listed by severity and different metrics, try the always-useful Patch Tuesday roundup from the SANS Internet Storm Center. And it’s not a nasty concept to carry off updating for a couple of days till Microsoft works out any kinks within the updates: AskWoody.com normally has the lowdown on any patches which may be inflicting issues for Windows customers.

As all the time, please contemplate backing up your system or a minimum of your vital paperwork and information earlier than making use of system updates. And in case you run into any issues with these updates, please drop a notice about it right here within the feedback.

LEAVE A REPLY

Please enter your comment!
Please enter your name here