Article Details

Scrape Timestamp (UTC): 2023-12-13 05:55:31.124

Source: https://thehackernews.com/2023/12/microsofts-final-2023-patch-tuesday-33.html

Original Article Text

Click to Toggle View

Microsoft's Final 2023 Patch Tuesday: 33 Flaws Fixed, Including 4 Critical. Microsoft released its final set of Patch Tuesday updates for 2023, closing out 33 flaws in its software, making it one of the lightest releases in recent years. Of the 36 shortcomings, four are rated Critical and 29 are rated Important in severity. The fixes are in addition to 18 flaws Microsoft addressed in its Chromium-based Edge browser since the release of Patch Tuesday updates for November 2023. According to data from the Zero Day Initiative, the software giant has patched more than 900 flaws this year, making it one of the busiest years for Microsoft patches. While none of the vulnerabilities are listed as publicly known or under active attack at the time of release, some of the notable ones are listed below - CVE-2023-36019 is also significant because it allows the attacker to send a specially crafted URL to the target, resulting in the execution of malicious scripts in the victim's browser on their machine. Ever wondered why social engineering is so effective? Dive deep into the psychology of cyber attackers in our upcoming webinar. "An attacker could manipulate a malicious link, application, or file to disguise it as a legitimate link or file to trick the victim," Microsoft said in an advisory. Microsoft's Patch Tuesday update also plugs three flaws in the Dynamic Host Configuration Protocol (DHCP) server service that could lead to a denial-of-service or information disclosure - The disclosure also comes as Akamai discovered a new set of attacks against Active Directory domains that use Microsoft Dynamic Host Configuration Protocol (DHCP) servers. "These attacks could allow attackers to spoof sensitive DNS records, resulting in varying consequences from credential theft to full Active Directory domain compromise," Ori David said in a report last week. "The attacks don't require any credentials, and work with the default configuration of Microsoft DHCP server." The web infrastructure and security company further noted the impact of the flaws can be significant as they can be exploited to spoof DNS records on Microsoft DNS servers, including an unauthenticated arbitrary DNS record overwrite, thereby enabling an actor to gain a machine-in-the-middle position on hosts in the domain and access sensitive data. Microsoft, in response to the findings, said the "problems are either by design, or not severe enough to receive a fix," necessitating that users Disable DHCP DNS Dynamic Updates if not required and refrain from using DNSUpdateProxy. Software Patches from Other Vendors Other than Microsoft, security updates have also been released by other vendors since the start of the month to rectify several vulnerabilities, including —

Daily Brief Summary

CYBERCRIME // Microsoft Seals 33 Software Vulnerabilities in Year-End Update

Microsoft's final Patch Tuesday for 2023 addressed 33 software vulnerabilities, with 4 rated Critical and 29 deemed Important.

The company has patched over 900 flaws throughout the year, reflecting a busy period for their cybersecurity efforts.

Among the fixes were CVE-2023-36019, which prevented the execution of malicious scripts via crafted URLs in victims' browsers.

Added security measures were implemented for Dynamic Host Configuration Protocol (DHCP) servers to prevent denial-of-service and information disclosure.

A report by Akamai highlighted new attacks against Active Directory domains via Microsoft DHCP servers, capable of leading to full domain compromises.

Microsoft suggests disabling DHCP DNS Dynamic Updates when unnecessary and avoiding DNSUpdateProxy to mitigate certain risks.

Other vendors have also issued security updates for various vulnerabilities since the beginning of the month.