• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Microsoft Patches Two Zero Days This Month

You are here: Home / General Cyber Security News / Microsoft Patches Two Zero Days This Month
March 15, 2023

Microsoft has set in excess of 80 vulnerabilities in this month’s Patch Tuesday update spherical, which include two zero days staying actively exploited in the wild.

Just one of these is CVE-2023-23397, a critical elevation of privilege bug in Outlook with a CVSS rating of 9.8.

“The attack can be executed with out any consumer interaction by sending a specially crafted email which triggers automatically when retrieved by the email server. This can direct to exploitation in advance of the email is even considered in the Preview Pane,” defined Action1 VP of vulnerability and menace investigate, Mike Walters.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“If exploited effectively, an attacker can access a user’s Net-NTLMv2 hash, which can be used to execute a pass-the-hash attack on yet another service and authenticate as the user.”

The bug was noted by the Personal computer Crisis Response Team for Ukraine (CERT-UA), hinting that it was staying actively exploited by Russian danger actors.

Read through far more about Russia’s cyber-offensive in Ukraine: Microsoft: Russia Has Launched Hundreds of Cyber Functions in Ukraine

The second zero working day, CVE-2023-24880, is a security attribute bypass in Windows SmartScreen.

It permits attackers to craft a malicious file capable of circumventing Mark-of-the-Web (MOTW) defenses in characteristics like Protected View in Place of work, according to Microsoft.

“This CVE has an effect on all at this time supported versions of the Windows OS,” explained Ivanti VP of security products, Chris Goettl. “The CVSS score is only 5.4, which may prevent notice by several businesses and on its individual this CVE may not be all that threatening, but it was likely used in an attack chain with added exploits. Prioritizing this month’s OS update would lessen the risk to your business.”

Of the nine critical CVEs stated this month, CVE-2023-21708 need to also be a precedence for security groups, argued Gal Sadeh, head of information and security analysis at Silverfort. It refers to a remote code execution bug in Remote Technique Contact Runtime that enables unauthenticated attackers to run distant commands on a goal equipment.

“Threat actors could use this to attack area controllers, which are open up by default,” he included. “To mitigate, we suggest area controllers only permit RPC from licensed networks and RPC website traffic to needless endpoints and servers is minimal.”


Some components of this post are sourced from:
www.infosecurity-journal.com

Previous Post: «the different methods and stages of penetration testing The Different Methods and Stages of Penetration Testing
Next Post: New Cryptojacking Operation Targeting Kubernetes Clusters for Dero Mining new cryptojacking operation targeting kubernetes clusters for dero mining»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
  • Some GitHub users must take action after RSA SSH host key exposed
  • THN Webinar: Inside the High Risk of 3rd-Party SaaS Apps
  • Pension Protection Fund confirms employee data exposed in GoAnywhere breach
  • GitHub Swiftly Replaces Exposed RSA SSH Key to Protect Git Operations
  • Now UK Parliament Bans TikTok from its Network and Devices
  • IRS Phishing Emails Used to Distribute Emotet
  • Researchers Uncover Chinese Nation State Hackers’ Deceptive Attack Strategies
  • Fifth of Execs Admit Security Flaws Cost Them New Biz
  • Online Safety Bill: Why is Ofcom being thrown under the bus?

Copyright © TheCyberSecurity.News, All Rights Reserved.