{"id":31027,"date":"2023-07-12T18:01:18","date_gmt":"2023-07-12T18:01:18","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=31027"},"modified":"2023-07-26T19:05:58","modified_gmt":"2023-07-26T19:05:58","slug":"romcom-exploit","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/romcom-exploit\/","title":{"rendered":"Microsoft Patch Tuesday Addresses 130 Flaws &#8211; Including Unpatched RomCom Exploit"},"content":{"rendered":"\n<p>Microsoft&#8217;s Patch Tuesday for July 2023 includes nine critical flaws, and five are actively being exploited. Notably, one of those five remains unpatched at this point.<\/p>\n\n\n\n<p>&#8220;While some Patch Tuesdays focus on fixes for minor bugs or issues with features, these patches almost purely focus on security-related issues,&#8221; Cloud Range vice president of technology Tom Marsland said by email. &#8220;They should be pushed to vulnerable machines immediately.&#8221;<\/p>\n\n\n\n<p>The July 2023 fixes include <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2023-Jul\" target=\"_blank\" rel=\"noreferrer noopener\">updates<\/a> for 130 vulnerabilities, a significant increase from <a href=\"https:\/\/www.esecurityplanet.com\/threats\/windows-pgm-vulnerabilities\/\">last month&#8217;s<\/a> total of 78. Here are the details.<\/p>\n\n\n\n<p><strong>See the <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\">Top Patch Management Tools<\/a><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Malicious Drivers Addressed by Advisory<\/h2>\n\n\n\n<p>Microsoft also released a pair of advisories. The first, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/ADV230001\" target=\"_blank\" rel=\"noreferrer noopener\">ADV230001<\/a>, warns that drivers certified by Microsoft&#8217;s Windows Hardware Developer Program (MWHDP) are being used maliciously by attackers who have gained admin privileges on compromised systems. The issue was first discovered by Sophos researchers on February 9.<\/p>\n\n\n\n<p>&#8220;Microsoft has completed its investigation and determined that the activity was limited to the abuse of several developer program accounts and that no Microsoft account compromise has been identified,&#8221; Microsoft said. &#8220;We&#8217;ve suspended the partners&#8217; seller accounts and implemented blocking detections for all the reported malicious drivers to help protect customers from this threat.&#8221;<\/p>\n\n\n\n<p>In a <a href=\"https:\/\/news.sophos.com\/en-us\/2023\/07\/11\/microsoft-revokes-malicious-drivers-in-patch-tuesday-culling\/\" target=\"_blank\" rel=\"noreferrer noopener\">blog post<\/a>, SophosLabs principal researcher Andrew Brandt reported that the advisory was published following a Sophos research discovery of more than 100 malicious drivers that had been digitally signed by Microsoft and others, dating as far back as April 2021.<\/p>\n\n\n\n<p>The second advisory, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/ADV230002\" target=\"_blank\" rel=\"noreferrer noopener\">ADV230002<\/a>, notes that Trend Micro released a patch in March for <a href=\"https:\/\/success.trendmicro.com\/dcx\/s\/solution\/000292473?language=en_US\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-28005<\/a>, a secure boot bypass vulnerability in Trend Micro Endpoint Encryption Full Disk Encryption. &#8220;Subsequently Microsoft has released the July Windows security updates to block the vulnerable UEFI modules by using the DBX (UEFI Secure Boot Forbidden Signature Database) disallow list,&#8221; Microsoft said.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Actively Exploited Flaws<\/h2>\n\n\n\n<p>Microsoft identified five vulnerabilities that are being actively exploited:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-32046\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-32046<\/a>, an elevation of privilege vulnerability in Windows MSHTML with a CVSS score of 7.8<\/li>\n\n\n\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-32049\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-32049<\/a>, a security feature bypass vulnerability in Windows SmartScreen with a CVSS score of 8.8<\/li>\n\n\n\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36874\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-36874<\/a>, an elevation of privilege vulnerability in the Windows Error Reporting Service with a CVSS score of 7.8<\/li>\n\n\n\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36884\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-36884<\/a>, a remote code execution vulnerability in Office and Windows HTML with a CVSS score of 8.3<\/li>\n\n\n\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-35311\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-35311<\/a>, a security feature bypass vulnerability in Microsoft Outlook with a CVSS score of 8.8<\/li>\n<\/ul>\n\n\n\n<p>Ivanti vice president of security products Chris Goettl said by email that CVE-2023-32046 could be leveraged in a variety of ways, including email and web-based attacks. &#8220;If exploited, the attacker would gain the rights of the user that is running the affected application, so running <a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">least privilege<\/a> would help to mitigate the impact of this vulnerability and force the attacker to take additional steps to take full control of the target system,&#8221; he wrote.<\/p>\n\n\n\n<p>Action1 vice president of vulnerability and threat research Mike Walters observed in a <a href=\"https:\/\/www.action1.com\/patch-tuesday-july-2023\/?vyj\" target=\"_blank\" rel=\"noreferrer noopener\">blog post<\/a> that CVE-2023-35311 requires user interaction but not elevated privileges. &#8220;It&#8217;s important to note that this vulnerability specifically allows bypassing Microsoft Outlook security features and does not enable remote code execution or privilege escalation,&#8221; he wrote. &#8220;Therefore, attackers are likely to combine it with other exploits for a comprehensive attack.&#8221;<\/p>\n\n\n\n<p>CVE-2023-36874, Walters noted, can be exploited locally with low complexity and without requiring elevated privileges or user interaction. &#8220;To exploit this vulnerability, an attacker needs to gain access to the system using other exploits or harvested credentials,&#8221; he wrote. &#8220;The compromised user account must have the ability to create folders and performance traces on the computer, which is typically available to normal users by default.&#8221;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Unpatched RomCom Office Exploit<\/h2>\n\n\n\n<p>In an unusual move, CVE-2023-36884 was announced with no patch yet available.<\/p>\n\n\n\n<p>&#8220;Microsoft is investigating reports of a series of remote code execution vulnerabilities impacting Windows and Office products,&#8221; Microsoft said. &#8220;Microsoft is aware of targeted attacks that attempt to exploit these vulnerabilities by using specially-crafted Microsoft Office documents.&#8221;<\/p>\n\n\n\n<p>&#8220;Upon completion of this investigation, Microsoft will take the appropriate action to help protect our customers,&#8221; the company added. &#8220;This might include providing a security update through our monthly release process or providing an out-of-cycle security update, depending on customer needs.&#8221;<\/p>\n\n\n\n<p>A separate Microsoft <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/07\/11\/storm-0978-attacks-reveal-financial-and-espionage-motives\/\" target=\"_blank\" rel=\"noreferrer noopener\">blog post<\/a> links CVE-2023-36884 to a <a href=\"https:\/\/www.esecurityplanet.com\/threats\/phishing-attacks\/\">phishing<\/a> campaign by a Russian hacker group named Storm-0978 or RomCom, which has been &#8220;targeting defense and government entities in Europe and North America&#8221; by &#8220;using lures related to the Ukrainian World Congress.&#8221; The campaign was first detected in June 2023.<\/p>\n\n\n\n<p>Microsoft Defender for Office 365 protects users from attachments designed to exploit CVE-2023-36884. Microsoft said organizations who cannot that don&#8217;t have those protections can set the registry key <em>FEATURE_BLOCK_CROSS_PROTOCOL_FILE_NAVIGATION<\/em> to avoid exploitation.<\/p>\n\n\n\n<p>&#8220;Please note that while these registry settings would mitigate exploitation of this issue, it could affect regular functionality for certain use cases related to these applications,&#8221; the company added.<\/p>\n\n\n\n<p>Rapid7 lead software engineer Adam Barnett told <em>eSecurity Planet<\/em> that a patch could be issued as part of next month&#8217;s Patch Tuesday, but admins should be alert for a potential earlier fix.<\/p>\n\n\n\n<p>&#8220;Microsoft Office is deployed just about everywhere, and this threat actor is making waves; admins should be ready for an out-of-cycle security update for CVE-2023-26884,&#8221; Barnett said.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Remote Desktop Flaw<\/h2>\n\n\n\n<p>Cyolo head of research Dor Dali highlighted <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-35332\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-35332<\/a>, a security feature bypass flaw in Windows Remote Desktop Protocol with a CVSS score of 6.8. The issue is linked to the fact that the RDP Gateway enforces the use of Datagram Transport Layer Security (DTLS) version 1.0, which has been deprecated since March 2021 due to known flaws.<\/p>\n\n\n\n<p>&#8220;This vulnerability not only presents a substantial security risk, but also a significant compliance issue,&#8221; Dali said by email. &#8220;The use of deprecated and outdated security protocols, such as DTLS 1.0, may lead to non-compliance with industry standards and regulations \u2013 like SOC2, FEDRAMP, PCI, HIPAA, and others.&#8221;<\/p>\n\n\n\n<p>If it&#8217;s not possible to apply Microsoft&#8217;s update, Dali recommends simply disabling UDP support in the RDP Gateway. &#8220;This prevents the establishment of the secondary channel over UDP, eliminating the use of the deprecated DTLS 1.0 and thereby mitigating the vulnerability \u2013 a necessary step that could potentially impact performance, but that will ensure security and compliance until the server can be updated,&#8221; he said.<\/p>\n\n\n\n<p><strong>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/secure-access-for-remote-workers-rdp-vpn-vdi\/\">Secure Access for Remote Workers: RDP, VPN &amp; VDI<\/a><\/strong><\/p>\n\n\n<div id=\"ta-campaign-widget-66d7040c50e9a-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d7040c50e9a\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d7040c50e9a\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d7040c50e9a\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d7040c50e9a\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d7040c50e9a\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d7040c50e9a\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft&#8217;s latest vulnerabilities include more than 100 malicious drivers and an unusual announcement of an unpatched Office and Windows flaw.<\/p>\n","protected":false},"author":166,"featured_media":31030,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[2369,3790,860,1146,532,3414,912,23006,2478,730,22929,5277,31077],"b2b_audience":[33,35],"b2b_industry":[],"b2b_product":[382,394,383,378,31780,393,392],"class_list":["post-31027","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-cloud-security","tag-cybersecurity","tag-encryption","tag-malware","tag-microsoft","tag-network-security","tag-office","tag-patch-management","tag-ransomware","tag-security","tag-vulnerability-management","tag-web-security","tag-windows-security","b2b_audience-awareness-and-consideration","b2b_audience-implementation-and-support","b2b_product-application-security-vulnerability-management","b2b_product-email-security","b2b_product-encryption-data-loss-prevention","b2b_product-endpoint-security","b2b_product-patch-management","b2b_product-virtual-private-network-vpn","b2b_product-web-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Microsoft Addresses 130 Flaws - Including Unpatched RomCom Exploit<\/title>\n<meta name=\"description\" content=\"Microsoft&#039;s latest vulnerabilities include more than 100 malicious drivers and an unusual announcement of an unpatched Office and Windows flaw.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/romcom-exploit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Addresses 130 Flaws - Including Unpatched RomCom Exploit\" \/>\n<meta property=\"og:description\" content=\"Microsoft&#039;s latest vulnerabilities include more than 100 malicious drivers and an unusual announcement of an unpatched Office and Windows flaw.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/romcom-exploit\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-12T18:01:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-26T19:05:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/esp-romcom-exploit.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"933\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jeff Goldman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Goldman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/romcom-exploit\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/romcom-exploit\/\"},\"author\":{\"name\":\"Jeff Goldman\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\"},\"headline\":\"Microsoft Patch Tuesday Addresses 130 Flaws &#8211; Including Unpatched RomCom Exploit\",\"datePublished\":\"2023-07-12T18:01:18+00:00\",\"dateModified\":\"2023-07-26T19:05:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/romcom-exploit\/\"},\"wordCount\":1059,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/romcom-exploit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/esp-romcom-exploit.png\",\"keywords\":[\"cloud security\",\"cybersecurity\",\"encryption\",\"malware\",\"Microsoft\",\"network security\",\"Office\",\"Patch Management\",\"ransomware\",\"security\",\"Vulnerability Management\",\"Web security\",\"Windows security\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/romcom-exploit\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/romcom-exploit\/\",\"name\":\"Microsoft Addresses 130 Flaws - Including Unpatched RomCom Exploit\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/romcom-exploit\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/romcom-exploit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/esp-romcom-exploit.png\",\"datePublished\":\"2023-07-12T18:01:18+00:00\",\"dateModified\":\"2023-07-26T19:05:58+00:00\",\"description\":\"Microsoft's latest vulnerabilities include more than 100 malicious drivers and an unusual announcement of an unpatched Office and Windows flaw.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/romcom-exploit\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/romcom-exploit\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/romcom-exploit\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/esp-romcom-exploit.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/esp-romcom-exploit.png\",\"width\":1400,\"height\":933,\"caption\":\"Virtual warning alert on a laptop.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/romcom-exploit\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft Patch Tuesday Addresses 130 Flaws &#8211; Including Unpatched RomCom Exploit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\",\"name\":\"Jeff Goldman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"caption\":\"Jeff Goldman\"},\"description\":\"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Addresses 130 Flaws - Including Unpatched RomCom Exploit","description":"Microsoft's latest vulnerabilities include more than 100 malicious drivers and an unusual announcement of an unpatched Office and Windows flaw.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/romcom-exploit\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Addresses 130 Flaws - Including Unpatched RomCom Exploit","og_description":"Microsoft's latest vulnerabilities include more than 100 malicious drivers and an unusual announcement of an unpatched Office and Windows flaw.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/romcom-exploit\/","og_site_name":"eSecurity Planet","article_published_time":"2023-07-12T18:01:18+00:00","article_modified_time":"2023-07-26T19:05:58+00:00","og_image":[{"width":1400,"height":933,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/esp-romcom-exploit.png","type":"image\/png"}],"author":"Jeff Goldman","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Goldman","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/romcom-exploit\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/romcom-exploit\/"},"author":{"name":"Jeff Goldman","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795"},"headline":"Microsoft Patch Tuesday Addresses 130 Flaws &#8211; Including Unpatched RomCom Exploit","datePublished":"2023-07-12T18:01:18+00:00","dateModified":"2023-07-26T19:05:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/romcom-exploit\/"},"wordCount":1059,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/romcom-exploit\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/esp-romcom-exploit.png","keywords":["cloud security","cybersecurity","encryption","malware","Microsoft","network security","Office","Patch Management","ransomware","security","Vulnerability Management","Web security","Windows security"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/romcom-exploit\/","url":"https:\/\/www.esecurityplanet.com\/threats\/romcom-exploit\/","name":"Microsoft Addresses 130 Flaws - Including Unpatched RomCom Exploit","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/romcom-exploit\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/romcom-exploit\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/esp-romcom-exploit.png","datePublished":"2023-07-12T18:01:18+00:00","dateModified":"2023-07-26T19:05:58+00:00","description":"Microsoft's latest vulnerabilities include more than 100 malicious drivers and an unusual announcement of an unpatched Office and Windows flaw.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/romcom-exploit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/romcom-exploit\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/romcom-exploit\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/esp-romcom-exploit.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/esp-romcom-exploit.png","width":1400,"height":933,"caption":"Virtual warning alert on a laptop."},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/romcom-exploit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Microsoft Patch Tuesday Addresses 130 Flaws &#8211; Including Unpatched RomCom Exploit"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795","name":"Jeff Goldman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","caption":"Jeff Goldman"},"description":"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.","url":"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/31027"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/166"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=31027"}],"version-history":[{"count":1,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/31027\/revisions"}],"predecessor-version":[{"id":31031,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/31027\/revisions\/31031"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/31030"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=31027"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=31027"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=31027"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=31027"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=31027"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=31027"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}