Curl Use-After-Free < 7.87 on Windows

The ePatching and Security Assurance Teams are aware of the increase in Tenable findings for Curl < 7.87 on Windows-based Operating Systems and are monitoring the situation. It appears that a fix for this will have to come from Microsoft. The vulnerability is classified as a “Medium” severity and is not currently on CISA’s list of Read More…

Updated Schedule- November 2022 Patching for Windows

Windows Logo 2022

UPDATE 2 (11/18/2022):

Microsoft has published Out-of-Band (OOB) Cumulative Updates for Server OSs, including KB5021654KB5021655KB5021656. These non-security updates address the Kerberos authentication issue that were introduced and discovered during the November Monthly Fast Ring. 

No new patches have been published for client operating systems.

The November Monthly BigFix Baseline …

Read More…

ePatching for macOS: New Deadline 11/14/2022 6PM Eastern

Apple Macintosh Logo

Subject:   [UPDATE 3] October 2022 ePatching for macOS – Begins 10/25/2022

UPDATE 3: Please distribute this information to your macOS Monterey end users.

To complete patching on macOS Monterey, user interaction is required. If no action is taken, updates will be enforced at the installation deadline: Monday, November 14th at 6PM EST. 

Users will be notified that updates are available with a popup like this:

Read More…

October 2022 ePatching for Windows

Windows Logo 2022

To:           GS IT All 

Subject:   October 2022 ePatching for Windows – Deadline 10/26/2022 

IMPORTANT – Ongoing BigFix Issues: The DOI BigFix Team is continuing to work with the vendor HCL on resolving reliability issues with authentication into the BigFix Console and Web Reports. The Department considers the issue as “ongoing” until we are told otherwise.  

Except for offices with Approved Exceptions …

Read More…

September 2022 ePatching for Windows

Windows Logo 2022

To:           GS IT All

Subject:   September 2022 ePatching for Windows – Deadline 09/28/2022

WHEN IT WILL HAPPEN:   

 Fast Ring Testing Schedule:

  • Offers Available: Thursday, September 15, 2022 at 2:30pm
  • Installation Deadline: Tuesday, September 20, 2022 at 2:00am
  • Please send Fast Ring feedback using the Service Desk Form

Production Patching Schedule:

  • Offers Available: Wednesday, September 21, 2022 at …

    Read More…

September 2022 Patches for MacOS and Safari

Apple Macintosh Logo

Subject:   September 2022 ePatching for macOS – Begins 9/12/2022

WHEN IT WILL HAPPEN:   

 Fast Ring Testing Schedule:

  • Begins: Monday, September 12, 2022
  • Allowed Deferral Limit: 3 days from first notification 
  • Please send Fast Ring feedback using the Service Desk Form

Production Patching Schedule:

  • Begins: Thursday, September 15, 2022
  • Allowed Deferral Limit: 5 days from first notification

WHAT WILL HAPPEN:        ePatching Update Cycle for MacOS

Updates …

Read More…

CVE-2021-44228 – Apache Log4j Remote Code Execution Vulnerability

A critical zero-day remote code execution vulnerability identified as CVE-2021-44228 was published through various sources this past week affecting many versions of Apache Log4j. There are growing numbers of active exploitations in the wild, and CISA is recommending that affected systems be patched to Apache Log4j 2.16 immediately to mitigate.

JNDI features used in configuration, log …

Read More…

Emergency Directive 21-04 – Print Nightmare

Network Printer Icon

Mitigate Windows Print Spooler Service Vulnerability

CISA has become aware of active exploitation, by multiple threat actors, of a vulnerability (CVE-2021-34527) in the Microsoft Windows Print Spooler service. Exploitation of the vulnerability allows an attacker to remotely execute code with system level privileges enabling a threat actor to quickly compromise the entire identity infrastructure of a targeted organization.

The …

Read More…

DHS EMERGENCY DIRECTIVE – January ePatching for Windows, Mac, and Linux, Multiple Deadlines

Windows Logo

DHS EMERGENCY DIRECTIVE 20-02 INFORMATION:  

The Department of Homeland Security (DHS) has issued Emergency directive 20-02 which requires all systems to have this patch applied within 10 business days of the Microsoft patch release date.   

  • CryptoAPI spoofing vulnerability – CVE-2020-0601: This vulnerability affects all machines running 32- or 64-bit Windows 10 operating systems, including Windows Server versions 2016 …

    Read More…