Microsoft has just released its Microsoft Patch Tuesday updates for July 2023, and this time it’s a significant one. With a staggering 130 vulnerabilities addressed, including nine critical ones, it’s crucial that users take immediate action to secure their systems. In addition to the vulnerabilities, we’ll also explore other vendor updates that have been synchronized with Microsoft’s release.
What do you need to do?
You need to update your Windows on your machine. Here are the steps to follow:
- Click the “Start” button (Windows logo) at the bottom left corner of the screen.
- Click the “Settings” gear icon in the Start menu.
- In the Settings app, click “Update & Security.”
- Select the “Windows Update” tab on the left sidebar.
- Click “Check for updates.”
- If updates are available, click “Download” or “Download and install.”
- If prompted, restart your computer to complete the update process.
Remember, these steps may vary slightly depending on your Windows version. If you would like assistance please call our workshop at (07) 3893 4003 or drop in. Always happy to help.
Microsoft’s Patch Highlights
Among the 130 vulnerabilities patched by Microsoft, four are particularly concerning as they are actively being exploited. These vulnerabilities, along with their Common Vulnerabilities and Exposures (CVE) identification numbers and severity ratings, are as follows:
1. CVE-2023-32049 with CVSS score 8.8
A security issue called a “Windows SmartScreen Security Feature Bypass.” It involves a specially crafted URL that, when clicked by a user, allows an attacker to bypass the Open File – Security Warning prompt.
2. CVE-2023-35311 with CVSS score 8.8
A vulnerability called “Microsoft Outlook security Feature Bypass”. An attacker can bypass the Microsoft Outlook Security Notice prompt by luring a user to click on a specific URL. This can be done by utilizing the Preview Pane, but it requires additional user interaction.
3. CVE-2023-32046 with CVSS score 7.8
A security issue called “Windows MSHTML Platform Elevation of Privilege“. To exploit this vulnerability, users need to open a carefully crafted file. Attackers can trick users into clicking a link, often sent via email or instant messages, to gain the same privileges as the user of the affected application.
4. CVE-2023-36874 with CVSS score 7.8
A vulnerability called “Windows Error Reporting Service Elevation of Privilege”. An attacker with local access to the targeted machine can exploit this vulnerability to gain administrator privileges. The user should have basic permissions to create folders and performance traces on the machine, which are typically enabled for regular users by default.
Learn more about Backup Solutions
Another noteworthy advisory released by Microsoft is titled “Guidance on Microsoft Signed Drivers Being Used Maliciously.” This advisory addresses the misuse of drivers certified by Microsoft’s Windows Hardware Developer Program (MWHDP) in post-exploitation activities. Microsoft has taken action by suspending seller accounts involved in these malicious activities and implementing detections for reported malicious drivers. However, the persistence of digitally signed malicious drivers remains a concern due to publicly available tools for driver signing.
Other Top Vendors
Several other major vendors have synchronized their updates with Microsoft’s Patch. Here are some highlights:
Adobe: Updates have been made available to address security vulnerabilities that impact ColdFusion and InDesign.
Apple: An RSR update has been issued to address a potentially actively exploited vulnerability.
Cisco: Security updates have been released for various products.
Fortinet: A security update has been made available to address a critical vulnerability in FortiOS and FortiProxy.
Google: Recent updates have patched three actively exploited Android zero-day vulnerabilities.
MOVEit: Three new vulnerabilities in the Transfer software have been fixed.
Mozilla: A security patch has been issued to fix a vulnerability found in both Firefox and Firefox ESR.
SAP: July 2023 Patch Day updates have been released.
VMware: VMware SD-WAN updates have been issued to fix a vulnerability.
In light of Microsoft’s recent Patch release, users should update their systems quickly in response to Microsoft’s recent patch release to minimize the risk of possible vulnerabilities being exploited. With 130 vulnerabilities addressed, including actively exploited ones, vigilance in applying these updates is paramount. Additionally, It’s important to keep up with updates and security patches from other vendors to maintain a strong and secure environment. Don’t delay—update now to ensure the safety and stability of your systems.
Remember, working on network security today means safeguarding against tomorrow’s threats. Stay proactive and protect your digital assets!
Recent Comments