article thumbnail

Microsoft rolled out emergency updates to fix Windows Server auth failures

Security Affairs

Microsoft has released out-of-band security updates to address authentication issues affecting Windows Server. Microsoft has released out-of-band updates to fix authentication failures related to Kerberos delegation scenarios impacting Domain Controllers (DC) running Windows Server. ” warns Microsoft.

article thumbnail

Microsoft Patch Tuesday, November 2023 Edition

Krebs on Security

.” The final zero day in this month’s Patch Tuesday is a problem in the “Windows Cloud Files Mini Filter Driver” tracked as CVE-2023-36036 that affects Windows 10 and later, as well as Windows Server 2008 at later.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft Patch Tuesday, June 2023 Edition

Krebs on Security

Security firm Action1 says all three bugs ( CVE-2023-32015 , CVE-2023-32014 , and CVE-2023-29363 ) can be exploited over the network without requiring any privileges or user interaction, and affected systems include all versions of Windows Server 2008 and later, as well as Windows 10 and later.

article thumbnail

Microsoft Patches ‘Wormable’ Flaw in Windows XP, 7 and Windows 2003

Krebs on Security

The vulnerability ( CVE-2019-0708 ) resides in the “remote desktop services” component built into supported versions of Windows, including Windows 7 , Windows Server 2008 R2 , and Windows Server 2008. “This vulnerability is pre-authentication and requires no user interaction,” Pope said.

Malware 263
article thumbnail

Microsoft Patch Tuesday, May 2022 Edition

Krebs on Security

The flaw affects Windows 7 through 10 and Windows Server 2008 through 2022. “This allows attackers to perform a man-in-the-middle attack to force domain controllers to authenticate to the attacker using NTLM authentication,” Wiseman said. in certain situations. in certain situations.

article thumbnail

Microsoft recommends Exchange admins to disable the SMBv1 protocol

Security Affairs

It also provides an authenticated inter-process communication mechanism. Since 2016, Microsoft is urging admins to stop using SMBv1, later versions of the protocol implemented security enhancements, such as encryption, pre- authentication integrity checks to prevent man-in-the-middle (MiTM) attacks, and insecure guest authentication blocking.

article thumbnail

Microsoft provides more mitigation instructions for the PetitPotam attack

Malwarebytes

The PetitPotam PoC takes the form of a manipulator-in-the-middle (MitM) attack against Microsoft’s NTLM authentication system. The targeted computer is forced to initiate an authentication procedure and share its authentication details via NTLM. The authentication process does not require the plaintext password.