Newsletter Archives
-
Microsoft is releasing an OOB update to address Arm devices issue
Microsoft is releasing Out-of-band (OOB) updates today to address an issue with Azure Active Directory services on Arm-based devices. These cumulative updates are available on Windows Update and other channels.
Consumer impact: None
Business impact: Only needed for Arm-based devices
Microsoft is releasing Out-of-band (OOB) security updates today, June 20, 2022, only for Arm-based Windows devices. This update addresses a known issue that only affects Windows Arm-based devices and might prevent you from signing in using Azure Active Directory (AAD). Apps and services that use AAD to sign in, such as VPN connections, Microsoft Teams, and Microsoft Outlook, might also be affected.Important This issue only affects Windows devices that use Arm processors. No other platforms will receive this out-of-band update. This OOB update is cumulative. We recommend that you install this OOB update instead of the June 14, 2022 security update for affected devices.All updates listed below are available on Windows Update, Windows Server Update Services (WSUS), and Microsoft Update Catalog. For instructions, see the release notes for your OS listed below.- Windows 11, version 21H2: KB5016138
- Windows 10, version 21H2: KB5016139
- Windows 10, version 21H1: KB5016139
- Windows 10, version 20H2: KB5016139
Susan comment: Reminder This will only offer or install on Windows Arm-based devices.
Thus for many of us you won’t see it/you won’t care about it.
We are still tracking an issue where Internet connection sharing /being able to surf at the same time is impacted. No ETA of a fix at this time but Microsoft has acknowledged the issue. Also tracking issues with RRAS and VPN but not sure if something third party vpn is triggering the problem?
-
Master Patch List for June 14, 2022 too early to patch… yet
I’ve updated the Master Patch List tonight for today’s releases.
Key items to keep in mind – you’ll see .NET patches listed but they are not security updates. As I see issues and side effects I’ll be updating the Master Patch List page to accumulate the issues.
… so far in my early testing I’m not seeing issues but it’s early and we normally don’t start seeing trending issues until tomorrow.
6/15/2022 edit: Possible wifi connectivity issues after June patches installed on Windows 10 and Windows 11 — link here.
As always, thank you all for supporting the cause! Remember a mere $1 donation will give you access and if you donate $50 or more you’ll get a special code to enable text messages sent to your phone each time the Master Patch List gets updated and when I change the MS-DEFCON level.
-
Master Patch List as of May 19, 2022 – out of band for server auth issues
Microsoft has released an out of band update for Servers only to fix the authentication issues with certificates introduced in the May updates. I’ve updated the Master Patch list as a result.
Cumulative updates:- Windows Server 2022: KB5015013
- Windows Server, version 20H2: KB5015020
- Windows Server 2019: KB5015018
- Windows Server 2016: KB5015019
Note: You do not need to apply any previous update before installing these cumulative updates.Standalone Updates:- Windows Server 2012 R2: KB5014986
- Windows Server 2012: KB5014991
- Windows Server 2008 R2 SP1: KB5014987
- Windows Server 2008 SP2: KB5014990
Note these are not on Windows update, they are only on the Microsoft Update catalog. They can be imported into WSUS.
Note this issue does not impact consumers, only domain controllers in networks with an active directory domain. So if you are a home or small business with a peer to peer network you will not be impacted.
The only other fix discussed is to fix installing updates from the Microsoft store. If you have been impacted by any other Windows 10/11 issues (.net stuff, black monitor, etc) I personally don’t think this out of band will fix those issues. You certain can back up your system and try it, but I would be surprised/gobsmacked to hear that it actually fixed anything other than the auth problems on the servers and the Microsoft store install.
-
Master Patch List of May 16, 2022 – Apple zero days fixed
I’m releasing an update to the Master Patch list – not to give the go ahead for any Windows patches, rather to announce that Apple has released several updates that include fixes for zero days.
While it includes new features for Apple Cash, the Podcast app amongst others, it includes 30 security fixes for iOS 15.5 and macOS 12.4 includes 50 fixes.
Overall tally:
macOS Monterey 12.4 – 73 bugs fixed
macOS Big Sur 11.6.6 – 52 bugs fixed
Security Update 2022-004 Catalina – 37 bugs fixed
iOS and iPadOS 15.5 – 34 bugs fixed
watchOS 8.6 – 21 bugs fixed1 zero-day in macOS Big Sur 11.6.6
1 zero-day in watchOS 8.6One zero day involves “A remote attacker may be able to cause unexpected application termination or arbitrary code execution.”
I’ll dig around to see if I can find information on HOW the attacks occur as not all risks are created the same. Note I recommend that you wait for Apple’s ‘dribble’ patching while they get their telemetry from early updaters.
-
Master Patch List as of May 10, 2022
Patches came out yesterday. The full details will be out in next week’s newsletter but in the meantime I’ve posted up the preliminary recap up on the Master patch listing page. Remember, other than the browsers, I have pause or defer on everything else at this time.
For those tracking the NPS patching issue on domain controllers: Microsoft is aware of the issue. ” FYI we’re aware of the NPS issue. It’s not related to NPS specifically but rather with how we’re distinguishing between different kinds of names in the certificates. Only a subset of folks are affected by this.”
As always, thank you all for supporting the cause! Remember a mere $1 donation will give you access and if you donate $50 or more you’ll get a special code to enable text messages sent to your phone each time the Master Patch List gets updated and when I change the MS-DEFCON level.
-
Master Patch List as of April 12th 2022
Patches came out yesterday. So far not seeing anything major trending … yet. But it’s honestly too early to tell the impact at this time. E
dit 4/14/2022: Seeing some reports of issues with browsers with Norton and ESET antivirus. I’m not seeing issues here with Defender. Based on comments it’s not widespread and thus too early to determine root cause at this time. I’d also make sure your browser is up to date.Edit 4/14/2022 3:21 pacific – check for updated a/v – this appears to have been resolved at least with ESET.
I’ve updated the Master Patch Listing for the releases this month. Note, other than the browsers, I have pause or defer on everything else at this time.
If there is anything I’ve typed in wrong, forgive me, I’m a bit bleary eyed this week as we are almost to the USA tax due date of April 18th. (No, not the 15th, but the 18th). Take pity on your CPA and stop emailing or texting them photos of your tax documents. Not only is it not secure to be sending your sensitive tax data that way, it makes it EXTREMELY hard for us to print out or save the tax documents. The CPA listserve recently had a thread about how to deal with issue and we were all indicating how often this occurs. Remember if you can see that sensitive social security number as you email or text me that document, so can the attacker.
Stay tuned for the details in the newsletter this weekend about the Patching issues and headlines and as always, I’ll keep the Master Patch Listing up to date with the latest.
As always, thank you all for supporting the cause! Remember a mere $1 donation will give you access and if you donate $50 or more you’ll get a special code to enable text messages sent to your phone each time the Master Patch List gets updated and when I change the MS-DEFCON level.
-
The browser is your operating system – patch it!
Tonight’s topic is …. are you up to date on the platform that is REALLY the one you should be worried about? Your browser. No matter what underlying operating system you use, you really need to pay attention to how patched your Browser is.
With more and more things going to the web, with more and more things going through the web, it’s the browser that is the most important software to keep up to date. And lately I’ve noticed that the one that gets the zero days most often is Google Chrome. Don’t use Chrome, you say? Not so fast. Much of the time the other platforms browsers are built on the Chromium engine and thus (for example) you may be using Brave browser but you still need to be aware of the issues as Brave is built on the Chromium engine.
So which browsers use Chromium?
- Chrome obviously.
- Edge
- Opera
- Vivaldi
- Brave
- Colibri
- Epic
- Iron
- Among others
For Chrome you need to be on 99.0.4844.84 to be protected from this zero day bug that has been seen in use in attacks on the web.
There are not a lot of details about who or what was using the bug but it appears that it was used in targeted attacks.
While Firefox (and it’s versions) are not impacted, it’s still wise to check and make sure you are fully up to date. At this time you need to be on 98.0.2 for Firefox.
For all of these browsers you can check if you are up to date by clicking on the help menu or about menu and that usually triggers them to download a new update if they are out of date. Alternatively you can go to their direct download site and download a new version and install over the top.
For those of you that are Plus members I’ve put the versions or build numbers of the major Browsers on the Master patch listing that you need to be sure you are up to date on. I’m not sure I’ll be able to keep up with every release of every browser, but for sure when there is a patch like this that is fixing a known in the wild and what appears to me to be a realistic risk of attack, I’ll be sure to flag it and also send out a tweet and a text message if you need to update your browser for known in the wild attacks.
So remember, tonight or in the morning, launch your browser, click on (typically) the dot dot dot in the menu bar at the top, then on help and about.
Make sure your browser is fully patched!
-
Master Patch List as of March 22, 2022
We have yet to see the preview releases for Windows 11 either last week or this week (I’m guessing they may be coming out tomorrow?), but I’ve published the updates to the Master Patch List tonight as of March 22, 2022 and we’re getting ready to send out the alert tomorrow regarding the Patch status for March.
Thank you all for supporting the cause! Remember a mere $1 donation will give you access and if you donate $50 or more you’ll get a special code to enable text messages sent to your phone each time the Master Patch List gets updated and when I change the MS-DEFCON level.
If Microsoft does release the preview updates for Windows 11, I’ll update the Master Patch List but remember, I don’t recommend installing preview releases.
-
Master Patch List as of March 8th
A reminder again, for those of you that are Plus members, I’ve updated the Master patch listing through March 8, 2022. The ONLY thing I want folks to install at this time is Exchange updates for anyone who has Exchange on premises email servers running Exchange 2013, 2016 or 2019. There is a “from remote” vulnerability. Full details will be in the newsletter out on the weekend.
Remember if you get offered/or install the PC Health tool called KB 5005463 or KB4023057 you can remove them by going into control panel, programs and look Windows PC Health Check or Microsoft Update Health Tools. They should have a recent date of install and look similar to below:
Click on it to remove them from your computer.
Thank you all for supporting the cause! Remember a mere $1 donation will give you access and if you donate $50 or more you’ll get a special code to enable text messages sent to your phone each time the Master Patch List gets updated and when I change the MS-DEFCON level.
-
Master Patch List updated through Feb 22
For those of you that are Plus members, I’ve updated the Master patch listing through February 22, 2022. I’ve expanded the listing of Browsers showcasing that many of them received updates last week.
Remember the .NET updates this month did not include security updates but I’ve gone ahead and indicated they should be installed if you are offered them.
Thank you all for supporting the cause! Remember a mere $1 donation will give you access and if you donate $50 or more you’ll get a special code to enable text messages sent to your phone each time the Master Patch List gets updated and when I change the MS-DEFCON level.
-
Master Patch Listing updated as of February 8, 2022
I’ve just updated the Master Patch Listing through February 8, 2022. (Plus members only – remember a mere $1 donation gains you access but we are VERY appreciative of any and all donations to the cause and my slightly bleary eyes this time of year for me.)
Remember I’m not recommending that you install updates at this time. This is merely to let you know that I’ve updated the list of released updates so you know what to expect to be offered and installed later on.
Some notes for the February releases…. .NET does not include security updates so you’ll see monthly rollups and not security only updates.
I recommend 21H1 or 21H2 at this time, but not yet Windows 11.
As always, the full details of security patches for Windows, Office, Chrome Browser, Firefox Browser, and Chromebook will be discussed in the Plus Newsletter along with several other articles from our expert authors. Thank you all for supporting the cause!
-
Why I recommend pausing Windows updates every month
WOODY’S WINDOWS WATCH
By Woody Leonhard
Yeah, I know I sound like a broken record. But the simple fact is that you have much to lose and little to gain by opening your system up to Windows’ automatic updating system.
Rather than installing Microsoft’s patches as soon as they’re released, I believe it’s much safer to hold off, let the screams of pain die down, wait for MS to fix its problems, and patch a few weeks later.
Read the full story in the AskWoody Plus Newsletter 16.23.0 (2019-06-24).