National Cyber Warfare Foundation (NCWF) Forums


Patch Tuesday - January 2024


0 user ratings
2024-01-09 21:29:11
milo
Red Team (CNA)

 - archive -- 
Hyper-V critical RCE. Office FBX 3D model vuln. SharePoint RCE. Critical Kerberos MitM. No zero-days. Smallest January PT for several years.

Patch Tuesday - January 2024

Microsoft is addressing 49 vulnerabilities this January 2024 Patch Tuesday, including a single critical remote code execution vulnerability. Four browser vulnerabilities were published separately this month, and are not included in the total. No zero-day vulnerabilities are published or patched today.

Hyper-V: critical remote code execution

CVE-2024-20700 describes a remote code execution vulnerability in the Windows Hyper-V hardware virtualization service. Microsoft ranks this vulnerability as critical under its own proprietary severity scale. However, the CVSS 3.1 base score of 7.5 equates only to high severity, reflecting the high attack complexity — attackers must win a race condition — and the requirement for the attack to be launched from the restricted network. The advisory is light on detail, so it isn’t clear exactly where the attacker must be located — the LAN on which the hypervisor resides, or a virtual network created and managed by the hypervisor — or in what context the remote code execution would occur. However, since Microsoft ranks the vulnerability as more severe than the CVSS score would suggest, defenders should assume that exploitation is possible from the same subnet as the hypervisor, and that code execution will occur in a SYSTEM context on the Hyper-V host.

FBX 3D models in Office: arbitrary code execution

A patch for Microsoft Office disables the ability to insert 3D models from FBX (Filmbox) files into Office documents to guard against exploitation of CVE-2024-20677, which Microsoft describes as an arbitrary code execution. Exploitation would involve an Office user interacting with a malicious FBX file, and could lead to information disclosure or downtime. Models already present in documents will continue to function as before, unless the “Link to File” option was chosen upon insertion. In a related blog post, Microsoft recommends avoiding FBX and instead making use of the GLB 3D file format from now on. The blog post also provides instructions on a registry modification which re-enables the ability to insert FBX files into Office documents, although Microsoft strongly recommends against this. Silver lining: the Preview Pane is not a vector for CVE-2024-20677. Both the Windows and Mac editions of Office are vulnerable until patched.

SharePoint: remote code execution

SharePoint admins should take note of CVE-2024-21318. Successful exploitation allows an attacker with existing Site Owner permissions to execute code in the context of the SharePoint Server. Many SharePoint RCE vulnerabilities require only Site Member privileges, so the requirement for Site Owner here does provide some small comfort, but the potential remains that CVE-2024-21318 could be abused either by a malicious insider or as part of an exploit chain. The advisory does mention that exploitation requires that an attacker must already be authenticated as “at least a Site Owner,” although it’s not clear what level of privilege above Site Owner is implicated here; a user with SharePoint Administrator or Microsoft 365 Global Administrator role could certainly assign themselves the Site Owner role.

Windows Kerberos: MitM security feature bypass

All current versions of Windows receive a patch for CVE-2024-20674, which describes a flaw in the Windows implementation of Kerberos. By establishing a machine-in-the-middle (MitM), an attacker could trick a client into thinking it is communicating directly with the Kerberos authentication server, and subsequently bypass authentication and impersonate the client user on the network. Although exploitation requires an existing foothold on the local network, both the CVSS 3.1 base score of 9.1 and Microsoft’s proprietary severity ranking of critical reflect that there is no requirement for user interaction or prior authentication. Microsoft also notes that it considers exploitation of this vulnerability more likely.

Exchange: no security patches two months in a row

Exchange admins bracing themselves for extra security patches this month after the lack of Exchange security patches last month are once again given a reprieve: there are no security patches for Exchange released today.

Microsoft products lifecycle update

A number of Microsoft products transition from mainstream support to extended support as of today: Exchange Server 2019, Hyper-V Server 2019, SharePoint Server 2019, Skype for Business 2019 (both client and server), as well as various facets of Windows 10: Enterprise LTSC 2019, IoT Core LTSC, IoT Enterprise LTSC 2019, IoT LTSC 2019 Core, Windows Server 2019, Windows Server IoT 2019, and Windows Server IoT 2019 for Storage. Also moving to extended support: Dynamics SL 2018 and Project Server 2019. During the extended support lifecycle phase, Microsoft continues to provide security updates, but does not typically release new features. Extended support is not available for Microsoft consumer products.

Today marks the end of the road for Microsoft Dynamics CRM 2013, which moves past the end of extended support. No ESU program is available, so admins must move to a newer version of Dynamics CRM to continue receiving security updates.

Summary Charts

Patch Tuesday - January 2024
Hyper-V always worth defender attention.
Patch Tuesday - January 2024
Remote Code Execution reclaims the top spot.
Patch Tuesday - January 2024
WIndows Message Queuing is now a perennial feature of Patch Tuesday.

Summary Tables

Azure vulnerabilities





















CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-20676Azure Storage Mover Remote Code Execution VulnerabilityNoNo8

Browser vulnerabilities










































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-0225Chromium: CVE-2024-0225 Use after free in WebGPUNoNoN/A
CVE-2024-0224Chromium: CVE-2024-0224 Use after free in WebAudioNoNoN/A
CVE-2024-0223Chromium: CVE-2024-0223 Heap buffer overflow in ANGLENoNoN/A
CVE-2024-0222Chromium: CVE-2024-0222 Use after free in ANGLENoNoN/A

Developer Tools vulnerabilities










































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-0057NET, .NET Framework, and Visual Studio Security Feature Bypass VulnerabilityNoNo9.1
CVE-2024-20656Visual Studio Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-21312.NET Framework Denial of Service VulnerabilityNoNo7.5
CVE-2024-20672.NET Core and Visual Studio Denial of Service VulnerabilityNoNo7.5

Developer Tools Azure vulnerabilities





















CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-21319Microsoft Identity Denial of service vulnerabilityNoNo6.8

Developer Tools SQL Server vulnerabilities





















CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-0056Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass VulnerabilityNoNo8.7

ESU Windows vulnerabilities








































































































































































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-20674Windows Kerberos Security Feature Bypass VulnerabilityNoNo9
CVE-2024-20654Microsoft ODBC Driver Remote Code Execution VulnerabilityNoNo8
CVE-2024-20682Windows Cryptographic Services Remote Code Execution VulnerabilityNoNo7.8
CVE-2024-20683Win32k Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-20658Microsoft Virtual Hard Disk Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-20653Microsoft Common Log File System Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-20652Windows HTML Platforms Security Feature Bypass VulnerabilityNoNo7.5
CVE-2024-21307Remote Desktop Client Remote Code Execution VulnerabilityNoNo7.5
CVE-2024-20661Microsoft Message Queuing Denial of Service VulnerabilityNoNo7.5
CVE-2024-20657Windows Group Policy Elevation of Privilege VulnerabilityNoNo7
CVE-2024-20655Microsoft Online Certificate Status Protocol (OCSP) Remote Code Execution VulnerabilityNoNo6.6
CVE-2024-21320Windows Themes Spoofing VulnerabilityNoNo6.5
CVE-2024-20680Windows Message Queuing Client (MSMQC) Information DisclosureNoNo6.5
CVE-2024-20663Windows Message Queuing Client (MSMQC) Information DisclosureNoNo6.5
CVE-2024-20660Microsoft Message Queuing Information Disclosure VulnerabilityNoNo6.5
CVE-2024-20664Microsoft Message Queuing Information Disclosure VulnerabilityNoNo6.5
CVE-2024-21314Microsoft Message Queuing Information Disclosure VulnerabilityNoNo6.5
CVE-2024-20692Microsoft Local Security Authority Subsystem Service Information Disclosure VulnerabilityNoNo5.7
CVE-2024-21311Windows Cryptographic Services Information Disclosure VulnerabilityNoNo5.5
CVE-2024-21313Windows TCP/IP Information Disclosure VulnerabilityNoNo5.3
CVE-2024-20662Windows Online Certificate Status Protocol (OCSP) Information Disclosure VulnerabilityNoNo4.9
CVE-2024-20691Windows Themes Information Disclosure VulnerabilityNoNo4.7

Microsoft Office vulnerabilities




























CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-21318Microsoft SharePoint Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-20677Microsoft Office Remote Code Execution VulnerabilityNoNo7.8

Windows vulnerabilities





































































































































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-20681Windows Subsystem for Linux Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-21309Windows Kernel-Mode Driver Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-20698Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-21310Windows Cloud Files Mini Filter Driver Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-20686Win32k Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-20700Windows Hyper-V Remote Code Execution VulnerabilityNoNo7.5
CVE-2024-20687Microsoft AllJoyn API Denial of Service VulnerabilityNoNo7.5
CVE-2024-20696Windows Libarchive Remote Code Execution VulnerabilityNoNo7.3
CVE-2024-20697Windows Libarchive Remote Code Execution VulnerabilityNoNo7.3
CVE-2024-20666BitLocker Security Feature Bypass VulnerabilityNoNo6.6
CVE-2024-20690Windows Nearby Sharing Spoofing VulnerabilityNoNo6.5
CVE-2024-21316Windows Server Key Distribution Service Security Feature BypassNoNo6.1
CVE-2024-21306Microsoft Bluetooth Driver Spoofing VulnerabilityNoNo5.7
CVE-2024-20699Windows Hyper-V Denial of Service VulnerabilityNoNo5.5
CVE-2024-20694Windows CoreMessaging Information Disclosure VulnerabilityNoNo5.5
CVE-2024-21305Hypervisor-Protected Code Integrity (HVCI) Security Feature Bypass VulnerabilityNoNo4.4
CVE-2024-21325Microsoft Printer Metadata Troubleshooter Tool Remote Code Execution VulnerabilityNoNoN/A

Windows Mariner vulnerabilities





















CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2022-35737MITRE: CVE-2022-35737 SQLite allows an array-bounds overflowNoNoN/A



Source: Rapid7
Source Link: https://blog.rapid7.com/2024/01/09/patch-tuesday-january-2024/


Comments
new comment
Nobody has commented yet. Will you be the first?
 
Forum
Red Team (CNA)



Copyright 2012 through 2024 - National Cyber Warfare Foundation - All rights reserved worldwide.