Newsletter Archives
-
February 2024 patches for Windows
Ready or not, here comes the February updates for Windows.
Will we see a fix for our KB5034441 for Windows 10 22H2 and in KB5034440 for Windows 11 woes? (so far, the answer is no)
What we will see is “Highlights for Windows 11, versions 22H2 & 23H2 (cont.) •The Copilot in Windows icon will appear on the right side of the system tray on the taskbar. Also, the display of Show desktop at the rightmost corner of the taskbar will be off by default.”
Ugh. And double Ugh.
I’ll be adding more links to this post as I digest the info.
And of course it’s a “dribbled” change
- Note Windows 11 devices will get this new functionality at different times. Some of these new features roll out gradually using controlled feature rollout (CFR) to consumers.
Remember if you get Copilot and don’t want it, we’ve got your back here and here.
Grrrrrrrrrr and double grrrrrrrrrrrrrrr
Zero day blog on the updates released today.
Exchange getting patched again today. SQL client fixes released in the OS patches so check those line of business database connections. Not seeing any automated patch for the Windows RE issues. Office and specifically Outlook is getting fixed for a preview pane security issue. Defender for endpoint getting fixes for zero day that led to malware being installed.
-
Closing the year on patching
PATCH WATCH
By Susan Bradley
We need a little Copilot, now.
I have a favorite Christmas song called “We Need a Little Christmas” (now). That comes to my mind because for those of you who want to partake in the artificial intelligence experiment know as Windows Copilot, you may end up humming the slightly modified song “I Need a Little Copilot” (now).
The December updates start to bring Copilot into Windows 10. I say “start” because, like many things in Microsoftland, features and changes are no longer released en masse to everyone in the form of a service pack. Instead, the changes are dribbled out or limited to certain geographical areas.
Read the full story in our Plus Newsletter (20.51.0, 2023-12-18).
-
Wrapping up July’s updates
PATCH WATCH
By Susan Bradley
We’re at the dividing line. We are working on getting July’s updates installed and reviewing whether we have Windows 10 22H2 installed. Meanwhile, that window of opportunity for installing updates is closing soon.
But that’s just the Windows side of the patching world. On the Apple side, we’ve had to deal with zero-day patches this month. Not to be left out, Android is doing last-minute beta testing on Android 14 beta 4.1.
Read the full story in our Plus Newsletter (20.32.0, 2023-08-07).
-
Patch testing isn’t easy
PATCH WATCH
By Susan Bradley
No matter who the vendor is, bugs occur.
By the time you read this, Apple will have already re-released its rapid security patches for iOS, iPadOS (16.5.1), and MacOS Ventura (13.4.1). The patches dealt with side effects impacting Facebook, Instagram, WhatsApp, Zoom, and various other websites.
The bug release fixed a WebKit vulnerability that was being exploited in the wild. If you don’t use Safari as your default browser, or if you don’t use the impacted apps, I hope you just did the “sit tight and wait for a re-release” thing.
Read the full story in our Plus Newsletter (20.29.0, 2023-07-17).
-
Apple and Microsoft fix April zero days
PATCH WATCH
By Susan Bradley
Tomorrow is the tax-filing deadline in the US. It’s not the time to be installing updates, especially since we’re still at MS-DEFCON 2.
In other words, we’re still in deferral mode despite several newsworthy patching headlines and despite my not having noticed any significant side effects. As usual, I suggest patience until we know more.
The majority of the items of concern relate to businesses, not consumers. Here are some highlights.
Read the full story in our Plus Newsletter (20.16.0, 2023-04-17).
-
Apple emergency updates
(First off Good Friday, Happy Passover, Happy Ramadan, Happy near the end of the weekend to everyone)
Apple pushed updates for 2 new zero-days that may have been actively exploited.
CVE-2023-28206 (IOSurfaceAccelerator):
– macOS Ventura 13.3.1
– iOS and iPadOS 16.4.1CVE-2023-28205 (WebKit):
– macOS Ventura 13.3.1
– iOS and iPadOS 16.4.1Specifically:
macOS Ventura 13.3.1 – 2 bugs fixed
iOS and iPadOS 16.4.1 – 2 bugs fixed
On the Apple platform when you read “may have been exploited” that’s usually geek speak for “was used in a very targeted attack and has not been widely used”.
-
Ensuring you can recover
PATCH WATCH
By Susan Bradley
Anyone reading the title of this edition of Patch Watch may think I’m talking about a Windows update issue.
But no matter what your technology, I want to remind you that having a backup means that you will be able to recover.
A good friend of mine, totally ensconced in the Apple world, reported that her older Apple computer running Monterey was not a happy camper. She had been traveling and did not want to install updates. Once at home after her travels, she attempted to update. That’s when the “fun” started.
Read the full story in our Plus Newsletter (20.11.0, 2023-03-13).
-
Zero day in office – but don’t panic
Microsoft Releases Workaround Guidance for MSDT “Follina”; Vulnerability
05/31/2022 11:11 AM EDT
Original release date: May 31, 2022
Microsoft has released workaround guidance to address a remote code execution (RCE) vulnerability—CVE-2022-30190, known as “Follina”—affecting the Microsoft Support Diagnostic Tool (MSDT) in Windows. A remote, unauthenticated attacker could exploit this vulnerability to take control of an affected system. Microsoft has reported active exploitation of this vulnerability in the wild.
CISA urges users and administrators to review Microsoft’s Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability and apply the necessary workaround.
Here at Askwoody we are a bit more savvy. WE DON’T OPEN THINGS WE AREN’T EXPECTING. That said if you do want to proactively protect yourself ….
Group policy fix – Just disable “Troubleshooting wizards” by GPO see the location here:
Registry fix:
click on the search box, type in cmd
Right mouse click on cmd in the menu bar to RUN AS ADMIN
type in reg delete HKEY_CLASSES_ROOT\ms-msdt /f
Click enter
If you want to restore it back:
This registry key will restore the troubleshooting wizard – link here
Click on the downloads, double click to launch, follow the slightly scary instructions to import the registry key back in.
=================
Update 6/1/2022
Now the URI for Search is being abused.
Once again if you want to proactively protect yourself
Run Command Prompt as Administrator.
Execute the command “reg delete HKEY_CLASSES_ROOT\search-ms /f”
If you want to restore it back, click here