Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

Patch Tuesday: Microsoft Warns of New Zero-Day Being Exploited

Microsoft on Tuesday released critical software updates to fix at least 73 documented security flaws in the Windows ecosystem and warned that unknown attackers are already launching zero-day man-in-the-middle attacks.

Microsoft on Tuesday released critical software updates to fix at least 73 documented security flaws in the Windows ecosystem and warned that unknown attackers are already launching zero-day man-in-the-middle attacks.

The zero-day, flagged as CVE-2022-26925, is described as a Windows LSA spoofing vulnerability that provides a path for attackers to authenticate to domain controllers.

“An unauthenticated attacker could call a method on the LSARPC interface and coerce the domain controller to authenticate to the attacker using NTLM,” Microsoft warned in a barebones advisory that acknowledged the zero-day exploitation. 

“This security update detects anonymous connection attempts in LSARPC and disallows it,” Microsoft added.

As is customary, the company did not provide any additional details on the exploits seen in the wild or any IOCs (indicators of compromise) to help defenders hunt for signs of compromise.

[ READ: Adobe Warns of ‘Critical’ Security Flaws in Enterprise Products ]

Even as it confirms zero-day exploitation of the Windows LSA spoofing bug, Microsoft noted that attackers must first inject themselves into the logical network path between the target and the resource requested by the victim in order to read or modify network communications. 

Although the attack scenario is complex, security experts caution against downplaying the risk. “While the flaw is rated as important and was assigned a CVSSv3 score of 8.1, if this vulnerability is chained with other NTLM Relay attacks like PetitPotam, the CVSSv3 score would increase to 9.8, elevating the severity of this flaw to critical,” said Satnam Narang, a staff research engineer at Tenable.

Advertisement. Scroll to continue reading.

In addition to patching the zero-day bug, Narang recommended organizations refer to KB5005413 for ways to mitigate NTLM relay attacks against Active Directory Certificate Services.

Windows fleet administrators are also urged to pay attention to multiple Print Spooler vulnerabilities patched this month, including two information disclosure flaws (CVE-2022-29114, CVE-2022-29140) and two elevation of privilege flaws (CVE-2022-29104, CVE-2022-29132).

[ READ: Microsoft Azure Vulnerability Allowed Code Execution, Data Theft ]

The Print Spooler bugs are rated “important,” and two of the three are considered more likely to be exploited. “Windows Print Spooler continues to remain a valuable target for attackers since PrintNightmare was disclosed nearly a year ago. Elevation of Privilege flaws in particular should be carefully prioritized,” Narang added.

This month’s patch batch also addresses vulnerabilities in .NET and Visual Studio, Microsoft Exchange Server, Microsoft Office, Windows Hyper-V, BitLocker, Remote Desktop Client, Windows Network File System, NTFS, and Windows Point-to-Point Tunneling Protocol. 

Separately, software maker Adobe shipped patches to cover at least 18 serious security defects in multiple enterprise-facing products and warned that unpatched systems are at risk of remote code execution attacks.

As part of its planned ‘Patch Tuesday’ release cycle, Adobe warned of critical vulnerabilities found and fixed in the FrameMaker document processor, the InDesign page layout tool, the Character Animator motion capture tool and the Adobe ColdFusion platform. 

Related: Microsoft Azure Vulnerability Allowed Code Execution, Data Theft

Related: Patch Tuesday: Microsoft Calls Attention to ‘Wormable’ Windows Flaw

Related: Adobe Joins Security Patch Tuesday Frenzy

Related: Adobe Warns of ‘Critical’ Security Flaws in Enterprise Products

Written By

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...