SusanBradley/SBSDiva/PatchLady

181 Followers
222 Following
63 Posts
Small Business Susan, Patch Lady at http://askwoody.com, Writer at http://csoonline.com, moderator at http://patchmanagement.org
Success!!! Found all the burnt out ones. Every year I find burnt out ones
@nathanmcnulty can you pop me your email address to [email protected] ?
So https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21715 is only vulnerable on M365 apps for enterprise and no other sku?
Security Update Guide - Microsoft Security Response Center

https://support.microsoft.com/en-gb/topic/january-17-2023-update-for-office-2013-office-2010-and-office-2007-kb5021751-f4a23c1d-4d1f-44ba-a43a-7a5528afb4ea So I have questions. Now I know from past discussions that often what ends up in MU is not vetted by the Security side of Microsoft. But would the Microsoft of SDL/Security era vintage post 2003 version of Microsoft send out an update through Microsoft update doing a head count on old systems? Something that only goes out on MU, "doesn't install anything on your computer" but isn't transparent to customers of what is going on.
January 17, 2023, update for Office 2013, Office 2010, and Office 2007 (KB5021751) - Microsoft Support

#patchtuesday Just psconfig it from Dustin Childs zero day blog:
"CVE-2023-21743 - Microsoft SharePoint Server Security Feature Bypass Vulnerability
You rarely see a Critical-rated Security Feature Bypass (SFB), but this one seems to qualify. This bug could allow a remote, unauthenticated attacker to make an anonymous connection to an affected SharePoint server. Sysadmins need to take additional measures to be fully protected from this vulnerability. To fully resolve this bug, you must also trigger a SharePoint upgrade action that’s also included in this update. Full details on how to do this are in the bulletin. Situations like this are why people who scream “Just patch it!” show they have never actually had to patch an enterprise in the real world."
huh.... mastadon is apparently UK english "favourited your post" ... versus favorited . Just noticed that nuance
Next question of the moment-which version of the Jan 6th report do I buy on Amazon-there are three
Question of the moment- what third party apps install their own hidsense.sys file that is now triggering bsod’s?
I think it’s the secure boot patch triggering it again https://support.microsoft.com/en-us/topic/kb5012170-security-update-for-secure-boot-dbx-72ff5eed-25b4-47c7-be28-c42bd211bb15 avoid it if you have older processors and 22h2 #askwoody
KB5012170: Security update for Secure Boot DBX - Microsoft Support

Topic: Win 10 Pro 22H2 OS fails to boot after updates @ AskWoody