CIO News Hubb
Advertisement
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
CIO News Hubb
No Result
View All Result
Home Visionary CIO

Microsoft patches two zero-days, 10 critical bugs

admin by admin
April 13, 2022
in Visionary CIO
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter


Two zero-day vulnerabilities – one of which has been previously disclosed and supposedly fixed twice – are among a total of 119 flaws fixed by Microsoft in its April 2022 Patch Tuesday update, alongside more than 20 Chromium vulnerabilities in the Edge browser.

The vulnerabilities in question are CVE-2022-24521, an elevation of privilege vulnerability in the Windows Common Log File System Driver, which is exploited but not public; and CVE-2022-26904, an elevation of privilege vulnerability in the Windows User Profile Service, which is public but not exploited. Both vulnerabilities carry CVSS scores of between seven and eight, rated as important.

As noted above, CVE-2022-26904 is of particular interest this month as it was supposed to have been fixed in the August 2021 update, when it was tracked as CVE-2021-34484. However, the researcher who discovered it later discovered a bypass, and then when that was fixed again in January, he went and bypassed it a second time. It is known to be tricky to exploit as it requires a malicious actor to perfectly time their attack to win what is known as a “race condition”.

Out of the other vulnerabilities, 10 are rated as critical, 115 important and three moderate, making the April update the largest seen so far in 2022. More details on some of the other more impactful vulnerabilities this month can be found here.

Although large in its scope, the April drop may ultimately prove more noteworthy for being one of the last Patch Tuesday updates from Microsoft – at least in its current form. Earlier in April, Redmond revealed plans to roll out a new service called Windows Autopatch as a feature of Windows Enterprise E3 licences, covering Windows 10, 11 and Windows 365. This will become available in July 2022.

“This service will keep Windows and Office software on enrolled endpoints up to date automatically, at no additional cost. IT admins can gain time and resources to drive value. The second Tuesday of every month will be ‘just another Tuesday’,” said Microsoft’s Lior Bela.

Bela said the development of the service was prompted by the growing complexity of enterprise IT environments, which has vastly increased the number of potential vulnerabilities to patch, leading to security gaps when patches are not applied in a timely manner.

“Autopatch, by automating the management of updates, can provide timely response to changes and confidence around introducing new changes, and close the protection and productivity gaps,” said Bela.

“The value should be felt immediately by IT admins who won’t have to plan update roll-out and sequencing, and over the long term as increased bandwidth allows them more time to focus on driving value. Quality updates should enhance device performance and reduce help-desk tickets – feature updates should give users an optimal experience, with increased uptime and new tools to create and collaborate.”

At its core, the service will rely on a progressive roll-out of patches through a series of so-called Rings. In the future, the patch process will begin with a small core of devices used for test and validation purposes before cascading down into the rest of the enterprise estate more widely, with additional features dubbed Halt, Rollback and Selectivity that will come into play should something break.

Microsoft believes this will help it to improve the Autopatch service and provide peace of mind for end-user security teams.

“Keeping software up to date is one of the most effective preventative measures that an organisation can take. Cyber attacks aren’t magic, and by patching systems quickly, organisations can reduce the available attack surface,” said Tim Erlin, strategy vice-president at Tripwire. 

“Microsoft has long supported automatic updates, but that basic capability never addressed the myriad of potential issues of patching at scale. Autopatch aims to implement a more robust process for delivering updates, including testing and staged roll-outs.

“For organisations that were already using automatic updates, Autopatch should make their lives easier. And for organisations that didn’t apply updates automatically, Autopatch should make it possible for them to do so.”

More information on the Windows Autopatch service is available in an FAQ compiled by Microsoft.



Source link

Previous Post

Criminals researched hacking TTPs post-breach in ‘messy’ cyber attack

Next Post

WatchGuard firewall users urged to patch Cyclops Blink vulnerability

Related Posts

Visionary CIO

Healthcare through the crisis: The accelerating pace of digital transformation at the NHS

by admin
May 20, 2022
Visionary CIO

CEOs name environmental sustainability a top business focus

by admin
May 19, 2022
Visionary CIO

What is multiprogramming?

by admin
May 19, 2022
Visionary CIO

Defensive cyber attacks may be justified, says attorney general

by admin
May 19, 2022
Visionary CIO

Top cyber criminal earnings outpace those of business leaders

by admin
May 19, 2022
Next Post

WatchGuard firewall users urged to patch Cyclops Blink vulnerability

Leave Comment

Recommended

Healthcare through the crisis: The accelerating pace of digital transformation at the NHS

May 20, 2022

New Bluetooth Hack Could Let Attackers Remotely Unlock Smart Locks and Cars

May 19, 2022

When Your Smart ID Card Reader Comes With Malware – Krebs on Security

May 19, 2022

Critical Vulnerability in Premium WordPress Themes Allows for Site Takeover

May 19, 2022

Just because an iPhone is powered off doesn’t mean it’s safe

May 19, 2022

How ML can Resolve Multicloud Complexity

May 19, 2022

© 2022 CIO News Hubb All rights reserved.

Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Privacy Policy.

Navigate Site

  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

Newsletter Sign Up

No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

© 2022 JNews - Premium WordPress news & magazine theme by Jegtheme.