The latest ‘Patch Tuesday’ batch of security fixes for Microsoft users has just dropped, and it’s a big one. Among the 75 security issues being addressed there are eight which get a critical severity rating and three zero-day vulnerabilities. Windows 10 and Server users are warned that one of these is being exploited in the wild, already under attack in other words.
For a full listing of all 75 vulnerabilities, along with their respective severity ratings and platforms affected, visit the Microsoft Security Update Guide. However, here’s what we know about the one for which attacks are already underway.
CVE-2022-26925 is the zero-day vulnerability that Microsoft confirms as already being exploited. Perhaps surprisingly, despite being an exploited zero-day, it only gets an important rating from Microsoft unless, and this is where things get a little complicated, it is chained with New Technology LAN Manager (NTLM) relay attacks.
These PetitPotam attacks as they are known, can be used to attack Windows domain controllers and other servers. If combined, the zero-day severity rating is boosted to a 9.8 criticality. Luckily, this is far from a simple attack to pull off, although obviously possible as the ‘actively exploited’ label demonstrates. Windows users (Server, 7, 8.1, 10) should ensure the update is applied as soon as is possible as a result.
What the security experts say
Chris Hass, director of security at Automox, says that what this Patch Tuesday lacks in numbers (in April more than 100 vulnerabilities were disclosed) it makes up for in severity and infrastructure headaches. “CVE-2022-26925, a Windows LSA Spoofing Vulnerability, could allow an attacker to intercept or man-in-the-middle network traffic. Considering Microsoft has confirmed exploitation of this CVE in the wild, system administrators should put this patch near the top of their list” he says. More broadly, Hass says that Automox recommends all critical and exploited vulnerabilities are patched within a 72-hour window.
Satya Gupta, co-founder at Virsec, says that while this Patch Tuesday update includes “highly concerning vulnerabilities” on an individual threat basis, when looked at in a broader context that concern remains. “Consider that in April-May 2022, more than one-in-three vulnerabilities Microsoft identified (1,330 or 36%) are remote code execution vulnerabilities,” he says, “this of course represents a massive opportunity for malicious actors to compromise nearly any customer.”