IT NEWS

Adobe patches actively exploited Magento/Adobe Commerce zero-day

Adobe has released an emergency advisory for users of its Commerce and Magento platforms. It explains that a critical zero-day vulnerability is actively being exploited in attacks against sites that use these two content management system (CMSs). Users should apply the patch as soon as possible.

The vulnerability

Publicly disclosed computer security flaws are listed in the Common Vulnerabilities and Exposures (CVE) database. Its goal is to make it easier to share data across separate vulnerability capabilities (tools, databases, and services). This vulnerability has been assigned CVE-2022-24086.

The flaw is described as an improper input validation vulnerability which could lead to arbitrary code execution. The vulnerability is exploitable without credentials and is rated as critical. It has been rated with a CVSS score of 9.8 out of 10.

A remote and unauthorized attacker can send a malicious request to the application and execute arbitrary code on the target server. Successful exploitation of this vulnerability may result in complete compromise of the affected system.

Adobe says its own security team discovered the flaw but it is aware that CVE-2022-24086 has been exploited in the wild in very limited attacks. No other information has been provided about the vulnerability to limit the possibility of further exploitation.

Needless to say, if you operate one of the affected products, patch now.

Affected products

Magento is an Adobe company that offers a hosted and self-hosted CMS for web shops. The free version of Magento is open source which offers users the option to make their own changes and allows developers to create extensions for the CMS.

The vulnerability affects Adobe Commerce and Magento Open Source 2.4.3-p1 and earlier versions, as well as 2.3.7-p2 and earlier versions.

Magecart

Only recently we published a blog about a new Magecart campaign which was aimed at Magento sites, but that campaign primarily targeted the Magento 1 version of the CMS which has reached end-of-life (EOL) and has not been supported since June 30, 2020. Were Magecart to get its hands on this vulnerability, that would raise the number of potential targets by hundreds of thousands.

Keeping your site safe

We have written an extensive post about how to defend your website against skimmers, but in summary, here’s what you need to do to keep your site safe:

  • Make sure that the systems used to administer the site are clean of malware.
  • Use strong passwords and do not reuse them.
  • Limit the number of administrators.
  • Keep your site’s software updated.
  • Use a Web Application Firewall (WAF).
  • Know that each dependency is a potential backdoor into your web pages.
  • Use a Content Security Policy (CSP).
  • Make sure you are made aware in case of problems, either by checking yourself or by having it done for you.

How to apply a patch

Unzip the relevant file which you can select here and follow the instructions in how to apply a composer patch provided by Adobe.

Stay safe, everyone!

The post Adobe patches actively exploited Magento/Adobe Commerce zero-day appeared first on Malwarebytes Labs.

Twitter cans 2FA service provider over surveillance claims

Twitter is transitioning away from from its two-factor authentication (2FA) provider, Mitto AG, a Swiss communications company.

The social media giant broke the news to US Senator Ron Wyden of Oregon. It is noted that Twitter’s decision to move away from Mitto AG came after allegations that its co-founder and Chief Operating Officer, Ilja Gorelik, sold access to Mitto’s networks to surveillance technology firms. Talking to Bloomberg, an aide close to Wyden said that Twitter cited media reports as a significant factor for its decision.

In December, Bloomberg reported that Gorelik had sold access to Mitto’s networks between 2017 and 2018. The companies that bought the access reportedly used it to help governments conduct secret surveillance against users through their phones.

Mitto AG is a top provider in its industry and boasts a roster of big-named clients like Alibaba, Google, LinkedIn, Telegram, Tencent, TikTok, and WhatsApp. Representatives of the company have told its clients that Gorelik departed the company after these allegations arose. It isn’t clear if Gorelik left of his own accord or was pressured.

As of this writing, Twitter has yet to name a new 2FA provider.

So where does that leave Twitter users who use SMS 2FA? Although Twitter hasn’t hinted at temporarily suspending this particular option, users may opt to use two other forms of 2FA on offer: An authentication app or a security key. Twitter has a ready help page here on how to sign up.

The curious case of Mitto AG

While many may have been shocked by events involving Mitto, critics argue that the mobile industry has been known for such abuses for years.

“For years mobile industry organizations such as the GSMA have been aware of operators selling network access resulting in targeted surveillance,” Gary Miller, a mobile security researcher at Citizen Lab, told Bloomberg. “The lack of regulation and accountability has brought unnecessary privacy and security risks to mobile users across the globe.”

The GSMA is an organization that represents the interests of the mobile industry with groups/chapters all around the globe. When interviewed about the Mitto case, a spokesperson from the group said that GSMA “takes network security and privacy very seriously and plays a leading role in creating a safer experience for mobile subscribers.”

Dario Betti, CEO of the Mobile Ecosystem Forum, of which Mitto is a member, didn’t comment on the Mitto case but said in a broader context that abuses pose “a threat to the market and the market has to close down all these bad behaviors.”

“This is an industry built on trust, and we need to maintain that trust,” he added.

The post Twitter cans 2FA service provider over surveillance claims appeared first on Malwarebytes Labs.

The world’s most coveted spyware, Pegasus: Lock and Code S03E04

Two years ago, the FBI reportedly purchased a copy of the world’s most coveted spyware, a tool that can remotely and silently crack into Androids and iPhones without leaving a trace, spilling device contents onto a console possibly thousands of miles away, with little more effort than entering a phone number.

This tool is Pegasus, and, according to recent reporting from The New York Times, the FBI purchased the tool for examination, but deferred from using it for any real investigations. Remarkably, at the same time, the US government was also considering a version of Pegasus that could allow for domestic spying on Americans—a new, upgraded Pegasus called “Phantom.”

Pegasus and Phantom were reportedly never deployed by the US government, but that doesn’t mean that these invasive hacking powers are rarely used. In fact, Pegasus has been sold to the governments of India, Saudi Arabia, Bahrain, Azerbaijan, Mexico, the United Arab Emirates, Morocco, Hungary, and Rwanda.

In the hands of those and many other countries, surveillance abuses abound.

On Lock and Code today, host David Ruiz provides an in-depth look at Pegasus: Who makes it, how much information can steal from mobile devices, how does it get onto those devices, and who has been provably harmed by its surveillance capabilities? Despite being billed as a tool to help curb criminal organizations and terrorist threats, Pegasus, through forensic analyses, has been found on the phones of journalists, human rights activists, and political dissidents. It is believed to have been used to target several heads of state, including presidents and prime ministers, along with nonprofit directors, lawyers, and at least one government scientist.

“These aren’t stories of investigating, or preventing, or solving, or addressing criminal activities. These are stories of the everyday people, with names, with careers, with families, who did something—who spoke up in a way, who lived in a way—that someone else didn’t like.”

David Ruiz, Lock and Code host, Malwarebytes online privacy advocate

This video cannot be displayed because your Functional Cookies are currently disabled.

To enable them, please visit our privacy policy and search for the Cookies section. Select “Click Here” to open the Privacy Preference Center and select “Functional Cookies” in the menu. You can switch the tab back to “Active” or disable by moving the tab to “Inactive.” Click “Save Settings.”

You can also find us on Apple PodcastsSpotify, and Google Podcasts, plus whatever preferred podcast platform you use.

The post The world’s most coveted spyware, Pegasus: Lock and Code S03E04 appeared first on Malwarebytes Labs.

Online Safety Bill will legally require porn sites to verify users’ age

When Ioannis Dekas, a father of four boys, found that one of his sons had access to pornography, he and his wife became concerned.

“In two weeks leading up to this moment, we’d noticed a drastic change in his behavior,” Dekas said in a BBC interview, “Withdrawal, a sense of anger towards his siblings, we could sense frustration in his life.” And when the couple talked to their son, they found that his peers were pressuring him to be familiar with the language of porn.

Since then, he has been campaigning for the UK government to implement the “proof of age” access to pornography, covered by the Digital Economy Act (DEA) 2017. However, DEA 2017 suffered from a series of delays and amendments, before being abandoned entirely in October 2019. According to then Culture Secretary Nicky Morgan, the government wanted to focus on a new bill that would protect children in a broader scheme of regulations based on the government’s Online Harms White Paper.

“This course of action will give the regulator discretion on the most effective means for companies to meet their duty of care,” Morgan was quoted saying. She also stressed that the government was still open to using age verification tools in the future. “The government’s commitment to protecting children online is unwavering. Adult content is too easily accessed online, and more needs to be done to protect children from harm.”

Enter the Online Safety Bill

The Online Safety Bill, which is touted as one of the UK government’s landmark bills, is poised, essentially, to regulate online content in the UK—global implications notwithstanding. It contains legislation that revives the plan to age-lock access to pornography by legally requiring porn sites to carry out age checks. This means that online porn users in the UK—estimated to be around 20-25 million people—would have to prove they are of legal age to view pornographic material by sharing their credit card to porn sites, or by having a third-party service confirm their legal age.

Ofcom, the regulator chosen by the UK government, will be able to fine porn sites up to 10% of their global earnings or block them from being accessed by anyone in the UK. The Online Safety Bill could also hold pornography site owners criminally liable for failing to follow the legislation.

As of this writing, the bill is in draft but is expected to be turned over to parliament in the coming months.

Many children’s safety groups have been asking for regulation surrounding age verification on porn sites, fueled by fear that minors could easily access it. And they have reason to be afraid. According to research by the British Board of Film Classification in 2020, half of children (51 percent) aged 11 to 13 years have seen porn. The report also reveals that children as young as seven sometimes stumble upon porn by accident.

“It is easy for children to access pornography online,” says Digital Minister Chris Philip, “Parents deserve peace of mind that their children are protected online from seeing things no child should see.”

Andy Burrows, head of child safety online policy at the NSPCC (National Society for the Prevention of Cruelty to Children), is quoted saying: “It’s right the government has listened to calls to fix one of the gaps in the Online Safety Bill and protect children from pornography wherever it’s hosted.”

“Crucially, they have also acted on our concerns and closed the ‘OnlyFans loophole’ that would have let some of the riskiest sites off the hook despite allowing children access to extremely damaging material.”

“But the legislation still falls short of giving children comprehensive protection from preventable abuse and harmful content and needs significant strengthening to match the government’s rhetoric and focus minds at the very top of tech companies on child safety.”

As of this writing, the bill already has in scope most destinations where children might be exposed to pornography. These include search engines, popular adult sites, social media platforms, and video-sharing platforms. Previously, only commercial sites with provisions for user-generated content—those that allow users to upload their content—were in the scope of the bill.

Protecting children from harmful content online is a noble cause; however, not everyone is rallying behind the idea of age verification measures.

The harm to privacy

Many see the act of sharing sensitive information with pornography sites as a security and privacy risk. Age verification requires a database of who has asked for permission to view what porn (and possibly credit card details). The complexities invovled may also encourage pornographic websites to outsource age verification to third-parties, resulting in fewer, larger, more comprehensive databases, which are of great potential value to criminal hackers or unscrupulous operators.

Jim Killock, the Open Rights Group executive director, said that age verification companies would benefit from this bill, but that it offers “little practical benefit for child safety, and much harm to people’s privacy.”

“There is no indication that this proposal will protect people from tracking and profiling porn viewing,” Killock said in a BBC interview.

Alec Muffet, a widely known internet security evangelist, penned a response to the drafts of Guidance on Age-Verification Arrangements and Guidance on Ancillary Service Providers back in 2018. These drafts proposed a similar age-verification process. Muffet expressed deep concern over “the lack of regulatory oversight, and the lack of standards regarding the operational and functional aspects of data and information security,” further stating that these will inevitably cause irreparable damage to UK users’ privacy.

“This does not appear to offer proportionate protection for this character of data, especially at the scale of millions of Britons in a handful of weakly-regulated, ‘homebrew’-secured, databases; we are thereby setting the stage for another ‘Ashley Madison’-like data breach, which in that case led to the suicide of several people because of the nature and sensitivity of the information leaked,” Muffet further noted. You can read more about the other concerns he raised in his Medium post.

The Society for Computers and Law (SCL) highlighed another high risk that comes with introducing age verification in pornography sites before the Digital Economy Act 2017 was abandoned: “It’s not only public figures who stand to suffer in the event of a large-scale porn data breach. The most marginalised members of society also have a lot to fear. The kind of sex we like to have, and fantasise about having, can have extraordinarily high stakes for those experiencing homophobia and transphobia. LGBTQ people who are not out to their families stand to lose their homes and their relationships; in the case of young or vulnerable people, this poses a very real risk to their survival. Being outed is also dangerous for members of the BDSM community—there are no laws protecting the rights of people into BDSM from discrimination, and in this country your private sexual practices can get you fired.”

The post Online Safety Bill will legally require porn sites to verify users’ age appeared first on Malwarebytes Labs.

Update now! Apple fixes actively exploited zero-day

Apple has released a security fix for a zero-day vulnerability (CVE-2022-22620) that it says “may have been actively exploited.” According to the security update information provided by Apple the vulnerability exists in WebKit—the HTML rendering engine component of its Safari browser—and can be used by an attacker to create web content that may lead to arbitrary code execution.

Apple says it has addressed this vulnerability with improved memory management in iOS 15.3.1, iPadOS 15.3.1, macOS Monterey 12.2.1, and Safari 15.3.

Vulnerability

The vulnerability is a use-after-free (UAF) issue in WebKit that could lead to OS crashes and code execution on compromised devices. Use after free (UAF) is a type of vulnerability that results from the incorrect use of dynamic memory during a program’s operation. If, after freeing a memory location, a program does not clear the pointer to that memory, an attacker can use the error to manipulate the program. Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

This issue can be exploited when WebKit processes HTML content. The attacker can exploit this vulnerability by luring users to visit a specially crafted web page. Once the user opens the malicious web page, an attacker can remotely execute malicious code on the targeted system. The vulnerability has been reported publicly as being exploited in the wild and was reported by an anonymous researcher.

WebKit is the browser engine that powers Safari on Macs as well as all browsers on iOS and iPadOS (browsers on iOS and iPadOS are obliged to use it). It is also the web browser engine used by Mail, App Store, and many other apps on macOS, iOS, and Linux.

Affected devices

Users owning the following devices should install the update as soon as possible:

  • iOS 15.3.1 and iPadOS 15.3.1 can be found on iPhone 6s and later, iPad Pro (all models), iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and iPod touch (7th generation).
  • macOS Monterey 12.2.1 for all systems running macOS Monterey (MacBooks, iMacs, Mac minis, and Mac Pros)
  • All devices running macOS Big Sur and macOS Catalina which are using Safari.

Stay safe, everyone!

The post Update now! Apple fixes actively exploited zero-day appeared first on Malwarebytes Labs.

SAP customers are urged to patch critical vulnerabilities in multiple products

German enterprise software maker SAP has patched three critical vulnerabilities affecting Internet Communication Manager (ICM), a core component of SAP business applications. Customers are urged by both SAP and CISA to address these critical vulnerabilities as soon as possible.

On February 8, SAP released 14 new security notes and security researchers from Onapsis, in coordination with SAP, released a Threat Report describing SAP ICM critical vulnerabilities, CVE-2022-22536, CVE-2022-22532, and CVE-2022-22533. Onapsis also provides an open source tool to identify if a system is vulnerable and needs to be patched.

CVE-2022-22536

The most important vulnerability in this report is CVE-2022-22536, one of the ICMAD vulnerabilities. The ICMAD vulnerabilities are particularly critical because the issues exist by default in the SAP Internet Communication Manager (ICM). The ICM is one of the most important components of a SAP NetWeaver application server and is present in most SAP products. It is a critical part of the overall SAP technology stack, connecting SAP applications with the Internet.

CVE-2022-22536 is a request smuggling and request concatenation in SAP NetWeaver, SAP Content Server and SAP Web Dispatcher. This vulnerability scored a CVSS rating of 10 out of 10. The high score is easy to explain. A simple HTTP request, indistinguishable from any other valid message and without any kind of authentication, is enough for a successful exploitation of the vulnerability.

Other vulnerabilities

Some of the other “high scorers” are Log4j related vulnerabilities, and a security update for the browser control Google Chromium delivered with SAP Business Client. The other two ICMAD vulnerabilities identified as CVE-2022-22532 and CVE-2022-22533 received scores of 8.1 and 7.5, respectively.

Scan tool

On GitHub Onapsis published a Python script that can be used to check if a SAP system is affected by CVE-2022-22536.

A Shodan scan shows there are more than 5,000 SAP NetWeaver servers currently connected to the Internet and exposed to attacks until the patch is applied.

Mitigation

SAP and Onapsis are currently unaware of any customer breaches that relate to these vulnerabilities, but strongly advise impacted organizations to immediately apply Security Note 3123396 (which covers CVE-2022-22536) to their affected SAP applications as soon as possible.

The Cybersecurity & Infrastructure Security Agency (CISA) warned that customers who fail to do so will be exposing themselves to ransomware attacks, the theft of sensitive data, financial fraud, and disruption or halt of business operations.

The post SAP customers are urged to patch critical vulnerabilities in multiple products appeared first on Malwarebytes Labs.

A new Magecart campaign is making waves

Malwarebytes’ researchers are closely monitoring web skimmers and have noticed that one of the infamous Magecart groups is causing a rise in the number of attacks while gobbling up over a quarter of the total number of attacks in one campaign.

What all these attacks have in common is the domain where the malicious javascript is hosted: naturalfreshmall.com. Additional research by Sansec shows a mass breach of stores running the Magento 1 ecommerce platform that can be tied to this campaign.

Magento

Magento is an Adobe company that offers a hosted and self-hosted content management system (CMS) for web shops. The free version of Magento is open source which offers users the option to make their own changes and allows specialists to create extensions for the CMS.

Magento 1 has reached end-of-life (EOL) and has not been supported since June 30, 2020. However, the platform is still in use by thousands of online stores. And because there’s a lack of security patches from Adobe, some are using community-provided patches. As you can imagine, the lack of vendor provided patches makes stores running Magento 1 popular victims for skimmers like Magecart.

Magecart

Magecart was originally one group that was partly named after the platform they concentrated on (Magento). But Magecart is no longer just one threat actor. We’ve seen several groups that are all specialized in cyberattacks involving digital credit card theft by skimming online payment forms. Magecart mainly targets e-commerce websites, aiming to inject JavaScript skimmers on checkout pages.

From a research standpoint, we have observed certain shifts in the scope of attacks. For instance, different threat actors are continuing to expand and diversify their methods and infrastructure. In a blog post about Magecart Group 8, we documented some of the web properties used to serve skimmers and exfiltrate stolen data.

In recent news we reported about the Segway online store that was compromised by Magecart group 12 who embedded the skimmer code inside a favicon.ico file.

The attack

According to the Sansec research the skimmers abused a known leak in the Quickview plugin that is typically used to inject rogue Magento admin users. In this case, the skimmers used it to add a validation rule that they could later trigger by registering as a customer. In investigated cases the attacker left no less than 19 backdoors on the system.

Keeping your site safe

We have written an extensive post about how to defend your website against skimmers, but in summary, here’s what you need to do to keep your site safe:

  • Make sure that the systems from where the site is administered are clean of malware.
  • Use strong passwords and do not reuse them.
  • Limit the number of administrators.
  • Keep your site’s software updated.
  • Use a Web Application Firewall (WAF).
  • Know that each dependency is a potential backdoor into your web pages.
  • Use a Content Security Policy (CSP).
  • Make sure you are made aware in case of problems, either by checking yourself or by having it done for you.

Stay safe, everyone!

The post A new Magecart campaign is making waves appeared first on Malwarebytes Labs.

Ransomware author releases decryption keys, says goodbye forever

If you’re unfortunate enough to be caught out by ransomware, the consequences can be devastating. You may be able to get rid of the infection, but the all-important files affected by such an attack will still be under lock and key. Without backups, which is more common than you may think, the files may be gone forever.

A tiny slice of good fortune

Occasionally, we all catch the proverbial break. Files can sometimes be recovered in the following ways:

  • A ransomware author makes some sort of mistake, or their files are just simply coded badly. Researchers figure out a way to recover the decryption key, and publish it so victims can recover their files.
  • Authors offer up the keys themselves. This can be for a variety of reasons. They may have generated a bit too much heat, and are looking to retreat into the shadows with the suggestion of some good deed done. Other times, they decide “party’s over” with the release of a new variant and hand out a “Get out of jail free” pass to former victims.

This is where our current story picks up.

What a maze

Back in 2019, Maze Ransomware came to light:

Initially, it grabbed victims via fake Cryptocurrency site traffic bounced to exploit kit landing pages. It also claimed to vary ransom amounts depending on if the compromised machine was a workstation, home computer, or server.

Tactics changed a little later on, with threats of exfiltrated data being published if ransom demands were not met. The group behind Maze eventually announced retirement, and infection numbers tailed off after one final flourish in August 2020. Maze affiliates quickly moved over to Egregor, which was then mired in the mud of several arrests.

Now we’re at the beginning of 2022, and there’s yet more developments in Maze land.

We’re finished…again

Someone has posted to the Bleeping Computer forums, claiming to be the developer of not only Maze, but also Egregor and Sekhmet ransomware families. The post reads as follows:

Hello, It’s developer. It was decided to release keys to the public for Egregor, Maze, Sekhmet ransomware families.

also there is a little bit harmless source code of polymorphic x86/x64 modular EPO file infector m0yv detected in the wild as Win64/Expiro virus, but it is not expiro actually, but AV engines detect it like this, so no single thing in common with gazavat. Each archive with keys have corresponding keys inside the numeric folders which equal to advert id in the config.

In the “OLD” folder of maze leak is keys for it’s old version with e-mail based. Consider to make decryptor first for this one, because there were too many regular PC users for this version.

There is, once more, a claim that anyone involved is now definitely out of the Ransomware game for good. All the “source code of tools” are also supposedly gone forever.

The forum poster included a zip containing decryption keys for the ransomware, and also some source code for malware used by the Maze gang.

What’s the real reason for this farewell to arms?

An interesting gesture, but more so from a “making an announcement” point of view than “fixing my ransomware-laden PC point of view”. Decryption tools already exist for the 3 groups mentioned, so adding these keys to the post is perhaps not that necessary. Indeed, the zip file has already been removed due to the inclusion of the malware source code.

The author claims this forum post and announcement is not related to any arrest or takedown, but even so this feels more important as an announcement of leaving the malware realm than being particularly helpful to victims.

Are they gone for good, or will they return once more with a new set of Ransomware files? Only time will tell…

The post Ransomware author releases decryption keys, says goodbye forever appeared first on Malwarebytes Labs.

Microsoft: Slow MFA adoption presents “dangerous mismatch” in security

Multi-factor authentication (MFA) has been around for many years now, but few enterprises have fully embraced it. In fact, according to Microsoft’s inaugural “Cyber Signals” report, only 22 percent of all its Azure Active Directory (AD) enterprise clients have adopted two-factor authentication (2FA), a form of MFA. That leaves 78 percent that only require usernames and passwords to authenticate account users.

A 22 percent adoption rate is meager, especially in the face of the multiple online threats that enterprises face daily. For example, from January to December 2021, Microsoft detected a jaw-dropping 25.6 billion account hijacking attempts using brute-forced stolen passwords. Other cybercrimes that specifically target accounts are spear phishing, social engineering attacks, and password sprays—basic password attack tactics that nation-states carry out against target companies and governments.

There’s low MFA adoption elsewhere, too

Microsoft is not the only company to reveal that internet users have been reluctant to adopt MFA.

In July 2021, Twitter disclosed in its transparency report that only 2.5 percent of its active users have “at least one 2FA method enabled”. Most of those using 2FA have at least SMS authentication (77.7 percent) enabled, and a portion has enabled the option of using an authentication app (30.1 percent). Although that’s an improvement on the previous report, MFA adoption remains low overall.

Google introduced 2FA to Gmail in 2011. Seven years later, in the words of The Register, “virtually no one is using it.” This claim was backed up by Grzegorz Milka, a Google software engineer who presented at the Usenix’s Enigma 2018 security conference. Milka revealed that, at the time of his talk, less than 10 percent of Google accounts used 2FA.

Low MFA adoption is also common for developers. Npm stands for Node Package Manager. It’s a widely used JavaScript package manager and the largest repository of computer programming packages on the Internet. According to ZDNet, only 9.27 percent of npm developers use 2FA to secure their accounts. So, if attackers successfully compromise the accounts of these developers, they could freely plant malicious code into packages primarily used by other software developers worldwide.

MFA adoption struggles are real

Whenever we ask why there’s low MFA adoption, the overall reason is that change is hard and it’s inconvenient.

To encourage users to enable MFA on their accounts, making it easy for them is key. Google and Twitter have already changed their MFA features to make them more straightforward and user-friendly. And while this is a great move, we expect (and encourage) these big organizations to make it mandatory for all users to have MFA enabled.

The risks are just too high for a little bit of inconvenience.

The post Microsoft: Slow MFA adoption presents “dangerous mismatch” in security appeared first on Malwarebytes Labs.

Update now! Firefox and Adobe updates are more critical than Microsoft’s

The most critical updates for this “Patch Tuesday” come from Firefox and Adobe. While Microsoft addresses 70 vulnerabilities in its February 2022 Patch Tuesday release, none of them are ranked as critical. Firefox and Adobe however have fixed a few issues that could be qualified as critical.

Publicly disclosed computer security flaws are listed in the Common Vulnerabilities and Exposures (CVE) database. Its goal is to make it easier to share data across separate vulnerability capabilities (tools, databases, and services). Let’s have a look at the ones that jumped out at us.

Firefox

Mozilla fixed a dozen security vulnerabilities in its Firefox browser. The two most important ones are both permissions issues:

  • CVE-2022-22753 A Time-of-Check Time-of-Use bug existed in the Maintenance (Updater) Service that could be abused to grant users write access to an arbitrary directory. This could have been used to escalate to SYSTEM access. This bug only affects Firefox on Windows. Other operating systems are unaffected.
  • CVE-2022-22754 If a user installs an extension of a particular type, the extension could have auto-updated itself and, while doing so, bypass the prompt which grants the new version the new requested permissions.

Two other vulnerabilities were classified as high. Those two are both memory safety bugs that with enough effort could have been exploited to run arbitrary code. These vulnerabilities were found by Mozilla developers.

Adobe

Adobe released updates to fix 17 CVEs affecting Premiere Rush, Illustrator, Photoshop, After Effects, and Creative Cloud Desktop. Of these 17 vulnerabilities, five are rated as critical.

  • CVE-2022-23203 A buffer overflow vulnerability that could lead to arbitrary code execution in Photoshop 2021 and Photoshop 2022 for Windows and macOS.
  • CVE-2022-23186 An out-of-bounds write vulnerability that could lead to arbitrary code execution in Illustrator 2021 and Illustrator 2022 for Windows and macOS.
  • CVE-2022-23188 A buffer overflow vulnerability that could lead to arbitrary code execution in Illustrator 2021 and Illustrator 2022 for Windows and macOS.
  • CVE-2022-23200 An out-of-bounds write vulnerability that could lead to arbitrary code execution in Adobe After Effects 18.4.3, 22.1.1 and earlier versions for Windows and macOS.
  • CVE-2022-23202 Uncontrolled search path element vulnerability that could lead to arbitrary code execution in the Creative Cloud Desktop Application installer 2.7.0.13 and earlier versions on Windows.

Microsoft

Even though no Microsoft vulnerabilities were listed as critical, there are a few that deserve some attention.

  • CVE-2022-21989 a Windows Kernel elevation-of-privilege vulnerability. According to the Microsoft advisory, successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment. But in such a case, a successful attack could be performed from a low privilege AppContainer. The attacker could elevate their privileges and execute code or access resources at a higher integrity level than that of the AppContainer execution environment.
  • CVE-2022-21996 a Win32k elevation of privilege vulnerability listed as more likely to be exploited. The exploitation is known to be easy. The attack may be initiated remotely, but requires simple authentication for exploitation.
  • CVE-2022-22005 a Microsoft SharePoint Server Remote Code Execution vulnerability. The attacker must be authenticated and possess the permissions for page creation to be able to exploit this vulnerability. This permission however is often present for an authenticated user.
  • CVE-2022-21984 a Windows DNS Server Remote Code Execution vulnerability. The server is only affected if dynamic updates are enabled, but this is a relatively common configuration. An attacker might take control of your DNS and execute code with elevated privileges if you have this set up in your environment.

Given the amount of available stolen login credentials, organizations shouldn’t disregard the vulnerabilities that require authentication, especially where it concerns public-facing servers. We hope this quick summary makes it easier for you to prioritize your updating jobs.

Stay safe, everyone!

The post Update now! Firefox and Adobe updates are more critical than Microsoft’s appeared first on Malwarebytes Labs.