Microsoft has launched fixes for 48 new vulnerabilities throughout its merchandise, together with one which attackers are actively exploiting and one other that has been publicly disclosed however will not be underneath energetic exploit now.
Six of the vulnerabilities that the corporate patched in its ultimate month-to-month safety replace for the yr are listed as crucial. It assigned an essential severity ranking to 43 vulnerabilities and gave three flaws a reasonable severity evaluation.
Microsoft’s replace contains patches for out-of-band CVEs it addressed over the previous month, plus 23 vulnerabilities in Google’s Chromium browser know-how, on which Microsoft’s Edge browser relies.
Actively Exploited Safety Bug
The flaw that attackers are actively exploiting (CVE-2022-44698) will not be among the many extra crucial of the bugs for which Microsoft launched patches at present. The flaw offers attackers a option to bypass the Home windows SmartScreen safety characteristic for shielding customers in opposition to malicious recordsdata downloaded from the Web.
“An attacker can craft a malicious file that may evade Mark of the Net (MOTW) defenses, leading to a restricted lack of integrity and availability of safety features reminiscent of Protected View in Microsoft Workplace, which depend on MOTW tagging,” Microsoft stated.
CVE-2022-44698 presents solely a comparatively small danger for organizations, says Kevin Breen, director of cyber-threat analysis at Immersive Labs. “It needs to be utilized in partnership with an executable file or different malicious code like a doc or script file,” Breen says. “In these conditions, this CVE bypasses a few of Microsoft’s built-in fame scanning and detection — specifically SmartScreen, which might usually pop as much as inform a consumer the file is probably not secure.”
On the identical time, customers mustn’t underestimate the menace and will patch the difficulty rapidly, Breen recommends.
Microsoft described one other flaw — an elevation of privilege problem within the DirectX Graphics kernel — as a publicly identified zero-day however not underneath energetic exploit. The corporate assessed the vulnerability (CVE-2022-44710) as being “Vital” in severity and one that may enable an attacker to achieve system-level privileges if exploited. Nevertheless, the corporate described the flaw as one which attackers are much less more likely to exploit.
Vulnerabilities to Patch Now
Development Micro’s ZDI flagged three different vulnerabilities within the December Patch Tuesday safety replace as being important: CVE-2022-44713, CVE-2022-41076, and CVE-2022-44699.
CVE-2022-44713 is a spoofing vulnerability in Microsoft Outlook for Mac. The vulnerability permits an attacker to seem as a trusted consumer and trigger a sufferer to mistake an electronic mail message as if it got here from a reliable consumer.
“We do not usually spotlight spoofing bugs, however anytime you are coping with a spoofing bug in an electronic mail consumer, you must take discover,” ZDI’s head of menace consciousness Dustin Childs stated in a weblog put up. The vulnerability may show particularly troublesome when mixed with the aforementioned SmartScreen MoTW bypass flaw that attackers are actively exploiting, he stated.
CVE-2022-41076 is a PowerShell distant code execution (RCE) vulnerability that permits an authenticated attacker to flee the PowerShell Remoting Session Configuration and run arbitrary instructions on an affected system, Microsoft stated.
The corporate assessed the vulnerability as one thing that attackers are extra doubtless compromise, though assault complexity itself is excessive. In line with Childs, organizations ought to concentrate the vulnerability as a result of it’s the kind of flaw that attackers usually exploit when trying to “dwell off the land” after gaining preliminary entry on a community.
“Undoubtedly don’t ignore this patch,” Childs wrote.
And at last, CVE-2022-44699 is one other safety bypass vulnerability — this time in Azure Community Watcher Agent — that, if exploited, may have an effect on a company’s means to seize logs wanted for incident response.
“There may not be many enterprises counting on this instrument, however for these utilizing this [Azure Network Watcher] VM extension, this repair needs to be handled as crucial and deployed rapidly,’ Childs stated.
Researchers with Cisco Talos recognized three different vulnerabilities as crucial and points that organizations want to deal with instantly. One among them is CVE-2022-41127, an RCE vulnerability that impacts Microsoft Dynamics NAV and on-premises variations of Microsoft Dynamics 365 Enterprise Central. A profitable exploit may enable an attacker to execute arbitrary code on servers operating Microsoft’s Dynamics NAV ERP utility, Talos researchers stated in a weblog put up.
The opposite two vulnerabilities that the seller considers to be of excessive significance are CVE-2022-44670 and CVE-2022-44676, each of that are RCE flaws within the Home windows Safe Socket Tunneling Protocol (SSTP).
“Profitable exploitation of those vulnerabilities requires an attacker to win a race situation however may allow an attacker to remotely execute code on RAS servers,” based on Microsoft’s advisory.
Among the many vulnerabilities that the SANS Web Storm Middle recognized as essential are (CVE-2022-41089), an RCE within the .NET Framework, and (CVE-2022-44690) in Microsoft SharePoint Server.
In a weblog put up, Mike Walters, vice chairman of vulnerability and menace analysis at Action1 Corp., additionally pointed to a Home windows Print Spooler elevation of privilege vulnerability (CVE-2022-44678), as one other problem to look at.
“The newly resolved CVE-2022-44678 is almost definitely to be exploited, which might be true as a result of Microsoft mounted one other zero-day vulnerability associated to Print Spooler final month,” Walters stated. “The danger from CVE-2022-44678 is identical: an attacker can get SYSTEM privileges after profitable exploitation — however solely regionally.”
A Complicated Bug Rely
Apparently, a number of distributors had completely different takes on the variety of vulnerabilities that Microsoft patched this month. ZDI, as an example, assessed that Microsoft patched 52 vulnerabilities; Talos pegged the quantity at 48, SANS at 74, and Action1 initially had Microsoft patching 74, earlier than revising it all the way down to 52.
Johannes Ullrich, dean of analysis for the SANS Know-how Institute, says the difficulty has to do with the other ways one can depend the vulnerabilities. Some, as an example, embrace Chromium vulnerabilities of their depend whereas others don’t.
Others, like SANS, additionally embrace safety advisories that generally accompany Microsoft updates as vulnerabilities. Microsoft additionally generally releases patches throughout the month, which it additionally contains within the following Patch Tuesday replace, and a few researchers do not depend these.
“The patch depend can generally be complicated, because the Patch Tuesday cycle is technically November to December, so this can even embrace patches that had been launched out of band earlier within the month, and also can embrace updates from third occasion distributors,” Breen says. “Probably the most notable of those are patches from Google from Chromium, which is the bottom for Microsoft’s Edge browser.”
Breen says by his depend there are 74 vulnerabilities patched because the final Patch Tuesday in November. This contains 51 from Microsoft and 23 from Google for the Edge browser.
“If we exclude each the out-of-band and Google Chromium [patches], 49 patches for vulnerabilities had been launched at present,” he says.
A Microsoft spokesman says the variety of new CVEs for which the corporate issued patches at present was 48.