Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.
The operating system update, released as part of Microsoft’s scheduled Patch Tuesday, addresses a flaw that lets malicious attackers use rigged files to evade MOTW (Mart of the Web) defenses.
“An attacker can craft a malicious file that would evade Mark of the Web (MOTW) defenses, resulting in a limited loss of integrity and availability of security features such as Protected View in Microsoft Office, which rely on MOTW tagging,” according to Microsoft’s barebones documentation of the issue.
The security defect, tracked as CVE-2022-44698, is marked as publicly disclosed and exploited, adding to the urgency for Windows fleet administrators to prioritize this month’s patches.
SecurityWeek understands that hackers linked to the the notorious Magniber ransomware group have exploited the security feature bypass bug in data-theft and extortion attacks.
Microsoft is also calling special attention to CVE-2022-44710, a privilege escalation flaw affecting the DirectX graphics kernel. Microsoft described the bug as a race condition issue that’s already been publicly disclosed. “An attacker who successfully exploited this vulnerability could gain SYSTEM privileges,” Redmond said.
In all, Microsoft documented at least 52 vulnerabilities in a wide range of operating system components and software products. Six of the 52 bulletins are rated critical, Microsoft’s highest severity rating.