SK-CERT Bezpečnostné varovanie V20230720-03

Dôležitosť Kritická
Klasifikácia Neutajované/TLP:CLEAR
CVSS Skóre
9.8
Identifikátor
Microsoft produkty – viacero kritických bezpečnostných zraniteľností
Popis
Spoločnosť Microsoft vydala bezpečnostné aktualizácie na svoje portfólio produktov, ktoré opravujú viacero kritických bezpečnostných zraniteľností.
Najzávažnejšia kritická bezpečnostná zraniteľnosť sa nachádza v produkte Routing and Remote Access Service, spočíva v nedostatočnej implementácii bezpečnostných mechanizmov a umožňuje vzdialenému, neautentifikovanému útočníkovi vykonať škodlivý kód s následkom úplného narušenia dôvernosti, integrity a dostupnosti systému.
Dátum prvého zverejnenia varovania
11.07.2023
CVE
CVE-2023-21526, CVE-2023-21756, CVE-2023-29347, CVE-2023-32033, CVE-2023-32034, CVE-2023-32035, CVE-2023-32037, CVE-2023-32038, CVE-2023-32039, CVE-2023-32040, CVE-2023-32041, CVE-2023-32042, CVE-2023-32043, CVE-2023-32044, CVE-2023-32045, CVE-2023-32046, CVE-2023-32047, CVE-2023-32049, CVE-2023-32050, CVE-2023-32051, CVE-2023-32052, CVE-2023-32053, CVE-2023-32054, CVE-2023-32055, CVE-2023-32056, CVE-2023-32057, CVE-2023-32083, CVE-2023-32084, CVE-2023-32085, CVE-2023-33127, CVE-2023-33134, CVE-2023-33148, CVE-2023-33149, CVE-2023-33150, CVE-2023-33151, CVE-2023-33152, CVE-2023-33153, CVE-2023-33154, CVE-2023-33155, CVE-2023-33156, CVE-2023-33157, CVE-2023-33158, CVE-2023-33159, CVE-2023-33160, CVE-2023-33161, CVE-2023-33162, CVE-2023-33163, CVE-2023-33164, CVE-2023-33165, CVE-2023-33166, CVE-2023-33167, CVE-2023-33168, CVE-2023-33169, CVE-2023-33170, CVE-2023-33171, CVE-2023-33172, CVE-2023-33173, CVE-2023-33174, CVE-2023-35296, CVE-2023-35297, CVE-2023-35298, CVE-2023-35299, CVE-2023-35300, CVE-2023-35302, CVE-2023-35303, CVE-2023-35304, CVE-2023-35305, CVE-2023-35306, CVE-2023-35308, CVE-2023-35309, CVE-2023-35310, CVE-2023-35311, CVE-2023-35312, CVE-2023-35313, CVE-2023-35314, CVE-2023-35315, CVE-2023-35316, CVE-2023-35317, CVE-2023-35318, CVE-2023-35319, CVE-2023-35320, CVE-2023-35321, CVE-2023-35322, CVE-2023-35323, CVE-2023-35324, CVE-2023-35325, CVE-2023-35326, CVE-2023-35328, CVE-2023-35329, CVE-2023-35330, CVE-2023-35331, CVE-2023-35332, CVE-2023-35333, CVE-2023-35335, CVE-2023-35336, CVE-2023-35337, CVE-2023-35338, CVE-2023-35339, CVE-2023-35340, CVE-2023-35341, CVE-2023-35342, CVE-2023-35343, CVE-2023-35344, CVE-2023-35345, CVE-2023-35346, CVE-2023-35347, CVE-2023-35348, CVE-2023-35350, CVE-2023-35351, CVE-2023-35352, CVE-2023-35353, CVE-2023-35356, CVE-2023-35357, CVE-2023-35358, CVE-2023-35360, CVE-2023-35361, CVE-2023-35362, CVE-2023-35363, CVE-2023-35364, CVE-2023-35365, CVE-2023-35366, CVE-2023-35367, CVE-2023-35373, CVE-2023-35374, CVE-2023-36867, CVE-2023-36868, CVE-2023-36871, CVE-2023-36872, CVE-2023-36874, CVE-2023-36884
IOC
Zasiahnuté systémy
Windows Certificates
Windows EFI Partition
Windows Netlogon
Microsoft Graphics Component
Windows Admin Center
Windows Cluster Server
Windows Remote Procedure Call
Windows Remote Procedure Call
Windows Layer 2 Tunneling Protocol
Windows ODBC Driver
Microsoft Printer Drivers
Microsoft Printer Drivers
Windows Update Orchestrator Service
Windows OLE
Windows Remote Desktop
Windows Message Queuing
Windows Message Queuing
Windows MSHTML Platform
Paint 3D
Windows SmartScreen
Windows Installer
Microsoft Windows Codecs Library
Microsoft Power Apps
Windows Installer
Windows Volume Shadow Copy
Windows Active Template Library
Windows Server Update Service
Windows Message Queuing
Windows Failover Cluster
Windows HTTP.sys
Microsoft Printer Drivers
.NET and Visual Studio
Microsoft Office SharePoint
Microsoft Office
Microsoft Graphics Component
Microsoft Office
Microsoft Office Outlook
Microsoft Office Access
Microsoft Office Outlook
Windows Partition Management Driver
Windows Cloud Files Mini Filter Driver
Windows Defender
Microsoft Office SharePoint
Microsoft Office Excel
Microsoft Office SharePoint
Microsoft Office SharePoint
Microsoft Office Excel
Microsoft Office Excel
Windows Network Load Balancing
Windows Remote Procedure Call
Microsoft Office SharePoint
Windows Remote Procedure Call
Windows Remote Procedure Call
Windows Remote Procedure Call
Windows Remote Procedure Call
ASP.NET and .NET
Microsoft Dynamics
Windows Remote Procedure Call
Windows Remote Procedure Call
Windows Cryptographic Services
Microsoft Printer Drivers
Windows PGM
Windows HTTP.sys
Windows Common Log File System Driver
Windows Remote Procedure Call
Microsoft Printer Drivers
Microsoft Windows Codecs Library
Windows Kernel
Windows Kernel
Microsoft Printer Drivers
Windows MSHTML Platform
Windows Message Queuing
Role: DNS Server
Microsoft Office Outlook
Windows VOLSNAP.SYS
Windows Online Certificate Status Protocol (OCSP) SnapIn
Windows Remote Procedure Call
Windows Layer-2 Bridge Network Driver
Windows Remote Procedure Call
Windows Server Update Service
Windows Remote Procedure Call
Windows Remote Procedure Call
Windows Connected User Experiences and Telemetry
Windows Deployment Services
Windows Deployment Services
Windows Online Certificate Status Protocol (OCSP) SnapIn
Microsoft Printer Drivers
Windows Print Spooler Components
Windows CDP User Components
Windows Transaction Manager
Windows Authentication Methods
Windows SPNEGO Extended Negotiation
Windows Local Security Authority (LSA)
Windows Remote Desktop
Microsoft Media-Wiki Extensions
Microsoft Dynamics
Windows MSHTML Platform
Windows Win32K
Windows Peer Name Resolution Protocol
Windows CryptoAPI
Windows CNG Key Isolation Service
Windows Media
Windows Image Acquisition
Windows Geolocation Service
Role: DNS Server
Role: DNS Server
Role: DNS Server
Windows App Store
Azure Active Directory
Windows Active Directory Certificate Services
Windows Active Directory Certificate Services
Windows Remote Desktop
Windows Connected User Experiences and Telemetry
Windows Kernel
Windows Kernel
Windows Kernel
Windows NT OS Kernel
Windows NT OS Kernel
Windows Clip Service
Windows Kernel
Windows NT OS Kernel
Windows Routing and Remote Access Service (RRAS)
Windows Routing and Remote Access Service (RRAS)
Windows Routing and Remote Access Service (RRAS)
Mono Authenticode
Paint 3D
Visual Studio Code
Service Fabric
Azure Active Directory
Microsoft Windows Codecs Library
Windows Error Reporting
Microsoft Edge (Chromium-based)
Microsoft Office
Microsoft Edge (Chromium-based)
Microsoft Edge (Chromium-based)

Presnú špecifikáciu jednotlivých zasiahnutých produktov nájdete na odkaze v časti ZDROJE.

Následky
Vykonanie škodlivého kódu a úplné narušenie dôvernosti, integrity a dostupnosti systému
Odporúčania
Administrátorom a používateľom odporúčame bezodkladne vykonať aktualizáciu zasiahnutých systémov.
Po odstránení zraniteľností, ktoré mohli spôsobiť vzdialené vykonanie kódu, je dobrou praxou kontrola systému a zmena všetkých hesiel a kľúčov na dotknutom systéme a aj na iných systémoch, kde sa používalo rovnaké heslo či kľúč.
Zdroje
https://msrc.microsoft.com/update-guide/releaseNote/2023-Jul
https://www.securityweek.com/microsoft-warns-of-office-zero-day-attacks-no-patch-available/

« Späť na zoznam