• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Microsoft silent patches called “a grossly irresponsible policy”

You are here: Home / General Cyber Security News / Microsoft silent patches called “a grossly irresponsible policy”
June 15, 2022

The entrance to one of Microsoft's offices

Shutterstock

Cyber security corporation Tenable Security reported it uncovered two bugs in Microsoft Azure analytics software package and complained the tech huge didn’t follow sector standards in declaring the patch to other customers.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Tenable claimed that Microsoft patched one bug in its Synapse Analytics platform with no telling customers, and still left the other unpatched, according to the company’s weblog. Synapse Analytics is a equipment discovering and info aggregation system that runs on Apache Spark with restricted permissions.

The security organization observed a privilege escalation flaw that authorized a person to escalate privileges to that of the root user inside the context of a Spark VM. The other flaw allowed a consumer to poison the hosts file on all nodes in their Spark pool which allows a consumer to redirect subsets of website traffic and snoop on expert services people typically really do not have obtain to. The comprehensive privilege escalation flaw has been dealt with, claimed Tenable, but the hosts file poisoning flaw remained unpatched when the web site article was revealed.

Tenable underlined that lots of of the keys, insider secrets, and services available through these attacks have historically permitted further more lateral movement and prospective compromise of Microsoft-owned infrastructure. This could direct to a compromise of other customers’ facts, it added. Having said that, for Synapse Analytics, root user obtain is restricted to their individual Spark pool so accessibility to sources outside of this would require additional vulnerabilities to be chained and exploited.

The cyber security business rated the issue as critical severity, although stated that Microsoft regarded the issue a minimal severity defence-in-depth enhancement. 

Tenable complained that there was some sort of disconnect amongst the Microsoft Security Reaction Heart (MSRC) and the development crew at the rear of Synapse Analytics. The organization experienced to arrive at out via Twitter to get a reaction even with requesting status updates through email messages and the researcher portal.

“During the disclosure course of action, Microsoft representatives originally seemed to agree that these have been critical issues,” comprehensive Tenable’s website publish. “A patch for the privilege escalation issue was developed and executed without the need of more information and facts or clarification staying necessary from Tenable Analysis. This patch was also built silently and no notification was offered to Tenable. We experienced to explore this details for ourselves.”

The cyber security enterprise extra that MSRC commenced trying to downplay the issue and classified it as a ideal exercise suggestion as a substitute of a security issue. It was not until eventually Tenable notified MSRC of its intent to publish its conclusions that the Microsoft teams acknowledged that issues had been security connected. 

“It was only immediately after remaining advised that we have been likely to go general public, that their story changed…89 days soon after the preliminary vulnerability notification…when they privately acknowledged the severity of the security issue,” stated Amit Yoran, chairman and CEO of Tenable, in a LinkedIn article. “To day, Microsoft prospects have not been notified.”

Yoran named it a recurring sample of behaviour, pointing to how other security companies have composed about their vulnerability notification interactions with Microsoft, and the tech giant’s dismissive attitude about the risk that vulnerabilities existing to their buyers. He highlighted how Orca Security, Wiz, Good Security and Fortinet posted key illustrations, with the latter masking the security disaster recognized as “Follina”. 

“For an IT infrastructure supplier or a cloud provider company that is not getting transparent, the stakes are lifted exponentially,” mentioned Yoran. “Without timely and in-depth disclosures, clients have no idea if they had been, or are, susceptible to attack…or if they fell victim to attack prior to a vulnerability being patched. And not notifying customers denies them the prospect to glimpse for proof that they have been or had been not compromised, a grossly irresponsible policy.”

IT Pro has contacted Microsoft for remark.


Some sections of this article are sourced from:
www.itpro.co.uk

Previous Post: «Cyber Security News BNPL Fraud Alert as Account Takeovers Surge

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Microsoft silent patches called “a grossly irresponsible policy”
  • BNPL Fraud Alert as Account Takeovers Surge
  • New Hertzbleed Side-Channel Attack Affects All Modern AMD and Intel CPUs
  • Privacy Watchdog Boosts Legal Funds by Keeping Millions in Fines
  • Microsoft’s Final Patch Tuesday Fixes Follina Bug
  • Businesses need to be more aggressive with their cyber security, Cisco warns
  • The rise of phishing as a service (PhaaS) and how to tackle it
  • Cloudflare Saw Record-Breaking DDoS Attack Peaking at 26 Million Request Per Second
  • Patch Tuesday: Microsoft Issues Fix for Actively Exploited ‘Follina’ Vulnerability
  • New Syslogk Linux Kernel Rootkit Uses “Magic Packets” to Trigger Remote Backdoor Access

Copyright © TheCyberSecurity.News, All Rights Reserved.