Tune in as our team of security experts dive into critical information you need to know. We're unpacking critical vulnerabilities, recapping Microsoft patch Tuesday, highlighting zero-days and other patch information, and much more.
Microsoft (MS) announces Office users will no longer be able to enable VBA (Visual Basic for Applications, a programming language used to create macros) macros with a click of a button after the change rolls out in April 2022. A huge win for organizations and home users alike, a new Security Risk banner will inform users that MS has blocked macros downloaded from the Internet. MS provides further information about the security risks of macros, safe practices, and instructions on a support page. (NOTE that the support page link will appear as the actual Microsoft warning landing page that reads, “A potentially dangerous macro has been blocked”). VBA macros embedded in malicious Office documents are very popular among phishing and malware attacks.
The February 2022 Patch Tuesday released by Microsoft includes 48 security fixes (not to include 22 MS Edge vulnerabilities) and one (1) zero-day vulnerabilities, with none of them classified as 'Critical'. Although none of the disclosed vulnerabilities are being actively exploited in the wild, they likely will be exploited by threat actors soon. The following types of vulnerabilities are listed below:
The lone zero-day vulnerability (CVE-2022-21989) has a base Common Vulnerability Scoring System (CVSS) of 7.8 and can be exploited to escalate privileges in the kernel. It is not rated 'Critical' because MS says the exploit requires an attacker to take further actions prior to exploitation to prep the environment.
The following common vulnerability and exploits (CVEs) are notable from this month's patching:
In January 2022 Patch Tuesday, MS released a series of out-of-band (OOB) updates to address multiple issues related to an Active Directory bug, Domain Controllers restarting, VPN connectivity issues, Virtual Machines failing to start, and ReFS media failures. The Knowledge Base (KB)s can be found here for further information and fixes.
Additional vendors have released security advisories as well and are listed below:
Despite the lack of 'Critical' rated vulnerabilities, Cyber Advisors strongly recommends applying patches as soon as possible and advises considering backups prior to testing and deploying patches. Best practices are to test and deploy patches in non-production environments before pushing patches to Production.
Resources: