A new Flexera Community experience is coming on November 25th. Click here for more information.
In September, Secunia Research at Flexera issued 514 advisories for 389 unique versions of 289 products from 69 different vendors.
Apache Struts and Microsoft Exchange Server had notable vulnerabilities with a high threat score.
Since we can’t patch everything due to the sheer volume of vulnerabilities, prioritize remediation efforts from a risk management perspective. Threat intelligence is a crucial parameter in risk analysis.
No Zero-day advisory in September.
However, 78 highly critical advisories with 63 had a CVSS score between 9 and 10. Majority of these were for RedHat, SUSE, Microsoft SharePoint, and Exchange.
Two highly critical vulnerabilities were reported in Apache Struts 2.5.22 and prior versions. CVE-2019-0230 with CVSS oft 9.8 where an error when applying forced OGNL evaluation inside a Struts tag attribute can be exploited to execute arbitrary code via a specially crafted request. CVE-2019-0233 with CVSS 7.5 where an error when handling file uploads can be exploited to cause a DoS condition via a specially crafted request. Both vulnerabilities are linked to malware and used in recent and historic cyber exploits.
In September, advisories are released for other software that uses the Apache Struts framework, namely IBM Sterling File Gateway, IBM Tivoli Netcool/OMNIbus Web GUI, and F5 BIG IP Application Acceleration Manager (AAM). In the coming months, we would probably see other vendors releasing patches or at least acknowledgement of these CVEs in their software.
CVE-2020-16875 has a threat score of 82, but Microsoft states that exploitation is highly unlikely. The patch KB4577352 was released as part of Patch Tuesday on September 8th. However, the advisory was updated on September 17th. It affects Microsoft Exchange Server 2016 and 2019. An error related to Microsoft Exchange software when handling objects in memory can be exploited to corrupt memory and subsequently execute arbitrary code with system privileges via a specially crafted email sent to the Microsoft Exchange server.
Secunia advisories for different Operating systems are as below:
Key Points
On September 8th – Second Tuesday of September, Microsoft issued advisories for these software:
A complete list of all applicable updates for August’s Patch Tuesday is here [1]
A digest of Patch Tuesday is listed here [2]
KB Article |
Applies To |
SharePoint Foundation 2013 |
|
SharePoint Enterprise Server 2013 |
|
SharePoint Foundation 2010 |
|
Windows 10 Version 1809, Windows Server 2019 |
|
Windows 10, version 2004 |
|
Windows 10, version 1903, Windows Server version 1903, Windows 10, version 1909, Windows Server version 1909 |
|
Windows 10, version 1607, Windows Server 2016 |
|
Windows Server 2012 (Monthly Rollup) |
|
Windows Server 2012 (Security-only update) |
|
Windows 7, Windows Server 2008 R2 (Monthly Rollup) |
|
Windows 7, Windows Server 2008 R2 (Security-only update) |
|
Windows Server 2008 Service Pack 2 (Monthly Rollup) |
|
Windows 8.1, Windows Server 2012 R2 (Monthly Rollup) |
|
Windows Server 2008 Service Pack 2 (Security-only update) |
|
Windows 8.1, Windows Server 2012 R2 (Security-only update) |
|
Exchange Server 2019, Exchange Server 2016 |
|
SharePoint Server 2019 |
|
SharePoint Enterprise Server 2016 |
|
SharePoint Foundation 2013 |
For easy understanding of Operations teams and management, Secunia Advisories are ranked into 5 simple and easy to understand criticalities. Secunia research follows a meticulous process which involves detailed analysis, peer review, and a QA process – among other things. Our customers can depend on the intelligence without indulging into more minute details of CVSS, impact and attack vector. All of these factors are considered during the ranking process. Further explained at this link.
A CVSS score is a metric used to measure the severity of a vulnerability. CVSS v3 specifications and the criteria details are at this link.
CVSS ranges from 0 to 10. 0 being the lowest and 10 being the highest score; the advisories spread is as below:
Threat score is calculated based on criticality and its linkage to a recent or historical threat of either remote trojan horse, ransomware, used in penetration testing tools, availability of exploit kit, and cyber exploit. Each rule triggers an increase in the threat value. A detailed explanation of Threat Score calculation is available at this link.
Advisories with positive Threat Score (1+): 346 (67.32%)
Patch Tuesday should be applied as soon possible after its initial release. Most organization focus on client and Server Operating system patches, but we have noticed that a lot of critical patches are released for software like Exchange, Office, and SharePoint.
Once the vulnerabilities in common frameworks are discovered, the software that uses or redistributes the software also issues patches for their versions. However, the process can take time and leaves the software vulnerable to attack as the exploit or POC are usually available for the base vulnerability.
Threat score is an essential parameter in risk analysis, and most organization ignores risk management and choose to patch a predefined set of software – which is a dangerous approach. We will discuss remediation from a risk management perspective in the next episode of the blog.
A complete list of vulnerabilities, affected software, criticality, threat score, and relevant patch information is available in the Software Vulnerability Research and Software Vulnerability Manager solutions from Flexera. Stay Secure!
References:
[2] https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/2020-Sep