Diamond Member Pelican Press 0 Posted August 14, 2024 Diamond Member Share Posted August 14, 2024 This is the hidden content, please Sign In or Sign Up August Patch Tuesday proves busy with six zero-days to fix IT administrators and security teams hoping for a quiet summer have been left disappointed after This is the hidden content, please Sign In or Sign Up patched six actively exploited zero-day vulnerabilities and four additional issues that have been made public, This is the hidden content, please Sign In or Sign Up . Also in the crosshairs of malicious actors this month are no fewer than nine flaws, two of them third-party issues coming from Red Hat, that carry critical severity ratings. None of these critical flaws make the list of zero-days, but coming amid one of the larger Patch Tuesday updates so far this year, comprising over 100 fixes once third-party issues are accounted for, they will doubtless occupy a lot of time over the next few days. “ This is the hidden content, please Sign In or Sign Up has evidence of in-the-wild exploitation … or public disclosure for 10 of the vulnerabilities published today, which is significantly more than usual,” said This is the hidden content, please Sign In or Sign Up lead software engineer, Adam Barnett. “At time of writing, all six of the known exploited vulnerabilities patched today are listed on [the] This is the hidden content, please Sign In or Sign Up [database]. This is the hidden content, please Sign In or Sign Up is also patching five critical remote code ********** (RCE) vulnerabilities today. “Patch Tuesday watchers will know that today’s haul of four publicly-disclosed vulnerabilities and six further exploited-in-the-wild vulnerabilities is a much larger batch than usual,” he said. Barnett added: “As something of an olive branch for defenders who may now be eyeing their to-do list with concern, This is the hidden content, please Sign In or Sign Up has not published any SharePoint or Exchange vulnerabilities this month.” The six zero-days – for which no public exploit code is yet circulating – comprise the following bugs: This is the hidden content, please Sign In or Sign Up , an elevation of privilege (EoP) vulnerability in Windows Kernel; This is the hidden content, please Sign In or Sign Up , an EoP vulnerability in Windows Power Dependency Coordinator; This is the hidden content, please Sign In or Sign Up a remote code ********** vulnerability in Scripting Engine; This is the hidden content, please Sign In or Sign Up , an RCE vulnerability in This is the hidden content, please Sign In or Sign Up Project; This is the hidden content, please Sign In or Sign Up , an EoP vulnerability in Windows Ancillary Function Driver for WinSock; This is the hidden content, please Sign In or Sign Up , a security feature bypass vulnerability in Windows Mark-of-the-Web. The good news, as Chris Goettl, This is the hidden content, please Sign In or Sign Up vice president of security products was quick to observe, is that updating the Windows operating system and Office will “knock out most of the risk pretty quick”. Running the rule over the list of zero-days, Goettl said CVE-2024-38189 was likely to be the most impactful as it allows an attacker to socially engineer their way into executing arbitrary code on their victim’s system. But, he added, there were mitigating factors, such as policies to block macros from running in Office files from the internet, and VBA macro notification settings. “If these are enabled, the ******* could be thwarted. Somewhere out there these policy settings were obviously disabled allowing an attacker to exploit the CVE in the wild. Risk-based guidance would be to get your Office installs update this month. If you have limited control over the mitigating policy settings or have an open BYOD [bring your own device] policy then updating Office could be more urgent to reduce your exposure,” he said. For CVE-2024-38107, Goettl observed that although the exploit requires an attacker to win a race condition, given it has been detected in attacks already this should not be cause to defer remediating it. He urged users to consider risk-based guidance and treat this update as of higher severity than This is the hidden content, please Sign In or Sign Up says it is, adding that the same goes for all of the four other zero-days listed. The flaws that have been made public, but are not yet seen as exploited in the wild, are as follows: Reviewing these four issues, Scott Caveza, staff research engineer at This is the hidden content, please Sign In or Sign Up , said CVE-2024-38202 and CVE-2024-21302 warranted particular attention. “Both of [these] were disclosed by SafeBreach Labs researcher Alon Leviev. If chained together, an attacker could downgrade or roll back software updates without the need for interaction from a victim with elevated privileges,” said Caveza. “As a result, previous remediation efforts are essentially erased as target devices could be made susceptible to previously patched vulnerabilities, thus increasing the ******* surface of the device.” CVE-2024-38200 also warrants close attention, said Caveza. “An attacker could leverage this vulnerability by enticing a victim to access a specially crafted file, likely via a phishing email. Successful exploitation of the vulnerability could result in the victim exposing New Technology Lan Manager (NTLM) hashes to a remote attacker,” he explained. “NTLM hashes could be abused in NTLM relay or pass-the-hash attacks to further an attacker’s foothold into an organisation. NTLM relay attacks have been observed by a Russian-based threat actor, APT28 [Fancy Bear], who leveraged a similar vulnerability to carry out attacks – CVE-2023-23397, an EoP vulnerability in This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up patched in March 2023.” This is the hidden content, please Sign In or Sign Up #August #Patch #Tuesday #proves #busy #zerodays #fix This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up 0 Quote Link to comment https://hopzone.eu/forums/topic/99215-august-patch-tuesday-proves-busy-with-six-zero-days-to-fix/ Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.