EDR / MDRIdentify, contain, respond, and stop malicious activity on endpoints
SIEMCentralize threat visibility and analysis, backed by cutting-edge threat intelligence
Risk Assessment & Vulnerability ManagementIdentify unknown cyber risks and routinely scan for vulnerabilities
Identity ManagementSecure and streamline client access to devices and applications with strong authentication and SSO
Cloud App SecurityMonitor and manage security risk for SaaS apps
SASEZero trust secure access for users, locations, and devices
SOC ServicesProvide 24/7 threat monitoring and response backed by ConnectWise SOC experts
Policy ManagementCreate, deploy, and manage client security policies and profiles
Incident Response ServiceOn-tap cyber experts to address critical security incidents
Cybersecurity GlossaryGuide to the most common, important terms in the industry
Patch Tuesday – November 2022
November 8, 2022 by Bryson Medlock
Today is once again Patch Tuesday, the second Tuesday of the month when Microsoft and other vendors push out security updates to their products. This month, Microsoft has released 63 security updates for their products. Of the 63 released by Microsoft, 8 are rated with a severity of Critical, and 54 as Important. One of the Important vulnerabilities has already been publicly disclosed and four have been observed being exploited in the wild, also known as zero-day vulnerabilities. Of the eight Critical vulnerabilities patched this month, three are for Elevation of Privileges (two for Kerberos and one for Exchange), four are all Remote Code Execution (RCE) vulnerabilities (three for the Windows Point-to-Point Tunneling protocol and one that effects the Jscript scripting language), and the last is Denial-of-Service (DoS) in Windows Hyper-V.
CVE-2022-41073 is a privilege escalation vulnerability in the Windows Print Spooler. An attacker who already has access to a system can use this vulnerability to gain SYSTEM privileges on the target. This is the latest in a long list of vulnerabilities targeting the Windows Print Spooler starting last summer with Print Nightmare (CVE-2021-34527).
CVE-2022-41125 is a privilege escalation vulnerability in the Windows CNG Key Isolation Service. The Windows CNG Key Isolation Service is a service in windows that securely stores and uses long-lived keys that are used by the Winlogon service to authenticate users. For Example, this service may store a wireless network key. If successfully exploited, this vulnerability can be used by an attacker to gain SYSTEM level privileges on a target system.
Microsoft describes CVE-2022-41128 and CVE-2022-41118 as “Windows Scripting Languages Remote Code Execution” vulnerabilities. These effect the scripting engine that handles processing the Jscript scripting language. Exploiting this vulnerability requires an attack to have a malicious server in place hosting malicious Jscript and convincing a user to access the malicious URL.
In February, Microsoft announced a new security feature in Microsoft Office that disables the ability to run macros on files downloaded from the Internet. This feature uses another feature built into Windows known as the Mark of the Web (MoTW). The MoTW is a file attribute automatically set for each file downloaded from the Internet. For years, threat actors have used malicious VBA macros embedded in Office documents as a means for initial access via phishing campaigns. The update to Office made earlier this year requires a user remove the MoTW if they wish to run macros, rather than simply clicking on “Enable Content” after the file is opened which was the previous behavior. We quickly saw threat actors looking for methods of bypassing this feature using file formats that allow you to package other files inside such as ZIP or ISO files, such as the Parcel RAT sample we examined earlier this year. Microsoft released info on and patched two CVEs relevant to these MoTW bypasses, CVE-2022-41091 and CVE-2022-41049. These patches should force Windows to preserve the MoTW attribute on files extracted from packaged files when it wasn’t being preserved before.
For a full break down of all the patches released this month, we recommend you check out the Patch Tuesday Dashboard by Morphus Labs. Also refer to the table below for all the relevant Microsoft KB articles.
|KB Article||Applies To|
|5002258||Microsoft SharePoint Server 2019|
|5002267||Microsoft SharePoint Server 2013|
|5002269||Microsoft SharePoint Server 2016|
|5002271||Microsoft SharePoint Server Subscription Edition|
|5019959||Windows 10 Version 21H1|
|5019966||Windows 10 Version 1809, Windows Server 2019|
|5019980||Windows 11 version 22H2|
|5020000||Windows 7, Windows Server 2008 R2 (Monthly Rollup)|
|5020005||Windows Server 2008 (Security Only)|
|5020013||Windows 7, Windows Server 2008 R2 (Security Only)|
|5020019||Windows Server 2008 (Monthly Rollup)|