• November 30, 2022

New Galaxy S23 Ultra Leak Reveals Samsung’s Significant Upgrades

Samsung’s forthcoming Galaxy S23 Ultra will gain some significant improvements over the current Galaxy S22 Ultra, according to the latest leaked info. Taking to Twitter, persistent leaker Ice Universe has revealed …

Organizations That Maintain Trust In 2023 Will Thrive

The 2020s are off to a tumultuous start. Individuals have experienced extraordinary political and social upheaval, war on the European continent, the reemergence of infectious diseases, financial instability, scandals, and extreme …

Former Spectrum Strikers Sue Union

Nearly six years ago, around 1800 cable technicians based in the New York City area went on strike against Charter-Spectrum, who they accused of union-busting in the years following Charter Communications’ …

The latest ‘Patch Tuesday’ batch of security fixes for Microsoft users has just dropped, and it’s a big one. Among the 75 security issues being addressed there are eight which get a critical severity rating and three zero-day vulnerabilities. Windows 10 and Server users are warned that one of these is being exploited in the wild, already under attack in other words.

For a full listing of all 75 vulnerabilities, along with their respective severity ratings and platforms affected, visit the Microsoft Security Update Guide. However, here’s what we know about the one for which attacks are already underway.


CVE-2022-26925 is the zero-day vulnerability that Microsoft confirms as already being exploited. Perhaps surprisingly, despite being an exploited zero-day, it only gets an important rating from Microsoft unless, and this is where things get a little complicated, it is chained with New Technology LAN Manager (NTLM) relay attacks.


These PetitPotam attacks as they are known, can be used to attack Windows domain controllers and other servers. If combined, the zero-day severity rating is boosted to a 9.8 criticality. Luckily, this is far from a simple attack to pull off, although obviously possible as the ‘actively exploited’ label demonstrates. Windows users (Server, 7, 8.1, 10) should ensure the update is applied as soon as is possible as a result.

What the security experts say

Chris Hass, director of security at Automox, says that what this Patch Tuesday lacks in numbers (in April more than 100 vulnerabilities were disclosed) it makes up for in severity and infrastructure headaches. “CVE-2022-26925, a Windows LSA Spoofing Vulnerability, could allow an attacker to intercept or man-in-the-middle network traffic. Considering Microsoft has confirmed exploitation of this CVE in the wild, system administrators should put this patch near the top of their list” he says. More broadly, Hass says that Automox recommends all critical and exploited vulnerabilities are patched within a 72-hour window.

Satya Gupta, co-founder at Virsec, says that while this Patch Tuesday update includes “highly concerning vulnerabilities” on an individual threat basis, when looked at in a broader context that concern remains. “Consider that in April-May 2022, more than one-in-three vulnerabilities Microsoft identified (1,330 or 36%) are remote code execution vulnerabilities,” he says, “this of course represents a massive opportunity for malicious actors to compromise nearly any customer.”


Leave a Reply

Your email address will not be published.