Adobe, Apple, Google & Microsoft Patch 0-Day Bugs – Krebs on Security

0
602

[ad_1]

Microsoft in the present day issued software program updates to repair a minimum of 5 dozen safety holes in Windows and supported software program, together with patches for 2 zero-day vulnerabilities which might be already being exploited. Also, Adobe, Google Chrome and Apple iOS customers could have their very own zero-day patching to do.

On Sept. 7, researchers at Citizen Lab warned they had been seeing lively exploitation of a “zero-click,” zero-day flaw to put in adware on iOS gadgets with none interplay from the sufferer.

“The exploit chain was capable of compromising iPhones running the latest version of iOS (16.6) without any interaction from the victim,” the researchers wrote.

According to Citizen Lab, the exploit makes use of malicious photos despatched by way of iMessage, an embedded part of Apple’s iOS that has been the supply of earlier zero-click flaws in iPhones and iPads.

Apple says the iOS flaw (CVE-2023-41064) doesn’t appear to work in opposition to gadgets which have its ultra-paranoid “Lockdown Mode” enabled. This function restricts non-essential iOS options to cut back the gadget’s total assault floor, and it was designed for customers involved that they could be topic to focused assaults. Citizen Lab says the bug it found was being exploited to put in adware made by the Israeli cyber surveillance firm NSO Group.

This vulnerability is mounted in iOS 16.6.1 and iPadOS 16.6.1. To activate Lockdown Mode in iOS 16, go to Settings, then Privacy and Security, then Lockdown Mode.

Not to be not noted of the zero-day enjoyable, Google acknowledged on Sept. 11 that an exploit for a heap overflow bug in Chrome is being exploited within the wild. Google says it’s releasing updates to repair the flaw, and that restarting Chrome is the best way to use any pending updates. Interestingly, Google says this bug was reported by Apple and Citizen Lab.

On the Microsoft entrance, a zero-day in Microsoft Word is among the many extra regarding bugs mounted in the present day. Tracked as CVE-2023-36761, it’s flagged as an “information disclosure” vulnerability. But that description hardly grasps on the sensitivity of the knowledge doubtlessly uncovered right here.

Tom Bowyer, supervisor of product safety at Automox, stated exploiting this vulnerability may result in the disclosure of Net-NTLMv2 hashes, that are used for authentication in Windows environments.

“If a malicious actor gains access to these hashes, they can potentially impersonate the user, gaining unauthorized access to sensitive data and systems,” Bowyer stated, noting that CVE-2023-36761 may be exploited simply by viewing a malicious doc within the Windows preview pane. “They could also conduct pass-the-hash attacks, where the attacker uses the hashed version of a password to authenticate themselves without needing to decrypt it.”

The different Windows zero-day mounted this month is CVE-2023-36802. This is an “elevation of privilege” flaw within the “Microsoft Streaming Service Proxy,” which is constructed into Windows 10, 11 and Windows Server variations. Microsoft says an attacker who efficiently exploits the bug can achieve SYSTEM stage privileges on a Windows pc.

Five of the failings Microsoft mounted this month earned its “critical” ranking, which the software program large reserves for vulnerabilities that may be exploited by malware or malcontents with little or no interplay by Windows customers.

According to the SANS Internet Storm Center, probably the most critical important bug in September’s Patch Tuesday is CVE-2023-38148, which is a weak point within the Internet Connection Sharing service on Windows. Microsoft says an unauthenticated attacker may leverage the flaw to put in malware simply sending a specifically crafted information packet to a weak Windows system.

Finally, Adobe has launched important safety updates for its Adobe Reader and Acrobat software program that additionally fixes a zero-day vulnerability (CVE-2023-26369). More particulars are at Adobe’s advisory.

For a extra granular breakdown of the Windows updates pushed out in the present day, try Microsoft Patch Tuesday by Morphus Labs. In the meantime, take into account backing up your information earlier than updating Windows, and keep watch over AskWoody.com for stories of any widespread issues with any of the updates launched as a part of September’s Patch Tuesday.

LEAVE A REPLY

Please enter your comment!
Please enter your name here