{"id":5087,"date":"2023-07-16T17:00:39","date_gmt":"2023-07-16T15:00:39","guid":{"rendered":"https:\/\/sajberinfo.com\/?p=5087"},"modified":"2023-07-16T17:00:39","modified_gmt":"2023-07-16T15:00:39","slug":"microsoft-upozorava-na-office-napade-nultog-dana","status":"publish","type":"post","link":"https:\/\/sajberinfo.com\/en\/2023\/07\/16\/microsoft-upozorava-na-office-napade-nultog-dana\/","title":{"rendered":"Microsoft upozorava na Office napade nultog dana"},"content":{"rendered":"<p><span style=\"font-size: 14pt;\">Kompanija <em>Microsoft<\/em> upozorava korisnike na <em>Office<\/em> napade <a href=\"https:\/\/sajberinfo.com\/en\/2023\/04\/11\/zero-day\/\" target=\"_blank\" rel=\"nofollow noopener\">nultog dana<\/a>, u kojima zlonamjerni akteri aktivno iskori\u0161tavaju sigurnosne ranjivosti u <em>Microsoft<\/em> <em>Windows<\/em> i <em>Office<\/em> proizvodima koje jo\u0161 nisu a\u017eurirane.<\/span><\/p>\n<div id=\"attachment_5089\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-5089\" class=\"size-full wp-image-5089\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/07\/Office-Zero-Day-Attacks.jpg\" alt=\"Microsoft upozorava na Office napade nultog dana\" width=\"1024\" height=\"668\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/07\/Office-Zero-Day-Attacks.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/07\/Office-Zero-Day-Attacks-300x196.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/07\/Office-Zero-Day-Attacks-768x501.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/07\/Office-Zero-Day-Attacks-18x12.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-5089\" class=\"wp-caption-text\"><em>Microsoft upozorava na Office napade nultog dana; Redizajn: Sa\u0161a \u0110uri\u0107<\/em><\/p><\/div>\n<h2><span style=\"font-size: 14pt;\"><strong>Ranjivost nultog dana<br \/>\n<\/strong><\/span><\/h2>\n<p><span style=\"font-size: 14pt;\">Kompanija <em>Microsoft<\/em> je na neuobi\u010dajen na\u010din objavila da dokumentuje seriju ranjivosti koja omogu\u0107ava daljinsko izvr\u0161avanje k\u00f4da kod korisnika <em>Windows<\/em> i <em>Office<\/em> proizvoda ove kompanije i da i dalje istra\u017euje navode o ciljanim napadima u kojima se zloupotrebljavaju <em>Office<\/em> dokumenti.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Sigurnosni istra\u017eiva\u010di ove kompanije su identifikovali ranjivosti u <em>Office<\/em> proizvodu koja je ozna\u010dena kao <em>CVE-2023-36884<\/em> i najavi da bi mogli izdati vanredno a\u017euriranje. <a href=\"https:\/\/sajberinfo.com\/en\/2022\/03\/19\/hakeri-crni-sesiri-epizoda-3\/\" target=\"_blank\" rel=\"nofollow noopener\">Zlonamjerni akteri<\/a> bi bez autentifikacije mogli iskoristiti ovu ranjivosti u veoma slo\u017eenima napadima bez potrebe interakcije sa korisnikom. Uspje\u0161no iskori\u0161tavanje mo\u017ee dovesti do potpunog gubitka pokvjerljivosti, dostupnosti i integriteta, omogu\u0107avaju\u0107i napada\u010dima da pristupe osjetljivim informacijama, isklju\u010de za\u0161titu sistema i uskrate pristup kompromitovanom sistemu.<\/span><\/p>\n<p>&nbsp;<\/p>\n<blockquote><p><em><span style=\"font-size: 14pt;\">\u201cMicrosoft istra\u017euje izvje\u0161taje o nizu ranjivosti u daljinskom izvr\u0161avanju k\u00f4da koje uti\u010du na Windows i Office proizvode. Microsoft je svjestan ciljanih napada koji poku\u0161avaju da iskoriste ove ranjivosti kori\u0161tenjem posebno napravljenih Microsoft Office dokumenata.<\/span><\/em><\/p>\n<p><em><span style=\"font-size: 14pt;\">\u00a0Napada\u010d bi mogao da kreira posebno napravljen Microsoft Office dokument koji mu omogu\u0107ava da izvr\u0161i daljinsko izvr\u0161avanje k\u00f4da u kontekstu \u017ertve. Me\u0111utim, napada\u010d bi morao da ubijedi \u017ertvu da otvori zlonamjerni fajl.<\/span><\/em><\/p>\n<p><em><span style=\"font-size: 14pt;\">\u00a0Po zavr\u0161etku ove istrage, Microsoft \u0107e preduzeti odgovaraju\u0107e mjere kako bi za\u0161titio na\u0161e klijente. Ovo mo\u017ee uklju\u010divati obezbje\u0111ivanje bezbjednosnog a\u017euriranja kroz na\u0161 mjese\u010dni proces izdavanja ili obezbje\u0111ivanje bezbjednosnog a\u017euriranja van ciklusa, u zavisnosti od potreba korisnika.\u201d<\/span><\/em><\/p>\n<p style=\"text-align: right;\"><em><span style=\"font-size: 14pt;\">&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36884\" target=\"_blank\" rel=\"noopener\">Microsoft<\/a> &#8211;<\/span><\/em><\/p>\n<\/blockquote>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt;\"><strong>Mjere za ubla\u017eavanje<\/strong><\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Dok se ne objavi bezbjednosno a\u017euriranje za <em>CVE-2023-36884<\/em>, preporuka kompanije <em>Microsoft<\/em> za korisnike koji koriste <em>Defender<\/em> za <em>Office<\/em> i za korisnike koji su omogu\u0107ili opciju \u201c<em>Block all Office applications from creating child processes<\/em>\u201d kroz pravilo za smanjenje <a href=\"https:\/\/sajberinfo.com\/en\/2023\/03\/24\/povrsina-napada-uvod-epizoda-1\/\" target=\"_blank\" rel=\"nofollow noopener\">povr\u0161ine napada<\/a> za\u0161ti\u0107eni od poku\u0161aja da se iskoristi ova ranjivosti. Korisnici koji ne koriste ovu vrstu za\u0161tite, mogu dodati sljede\u0107a imena aplikacija u:<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt;\"><em>HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_BLOCK_CROSS_PROTOCOL_FILE_NAVIGATION<\/em><\/span><\/p>\n<p><span style=\"font-size: 14pt;\"><em>\u00a0<\/em><\/span><\/p>\n<p><span style=\"font-size: 14pt;\"><em>sa tipom klju\u010da registra <\/em><em>REG_DWORD<\/em><em> i vrijedno\u0161\u0107u <\/em><em>1<\/em><em>. Preporu\u010dene aplikacije su:<\/em><em>\u00a0<\/em><\/span><\/p>\n<ul>\n<li><span style=\"font-size: 14pt;\"><em>Excel.exe<\/em><\/span><\/li>\n<li><span style=\"font-size: 14pt;\"><em>Graph.exe<\/em><\/span><\/li>\n<li><span style=\"font-size: 14pt;\"><em>MSAccess.exe<\/em><\/span><\/li>\n<li><span style=\"font-size: 14pt;\"><em>MSPub.exe<\/em><\/span><\/li>\n<li><span style=\"font-size: 14pt;\"><em>PowerPoint.exe<\/em><\/span><\/li>\n<li><span style=\"font-size: 14pt;\"><em>Visio.exe<\/em><\/span><\/li>\n<li><span style=\"font-size: 14pt;\"><em>WinProj.exe<\/em><\/span><\/li>\n<li><span style=\"font-size: 14pt;\"><em>WinWord.exe<\/em><\/span><\/li>\n<li><span style=\"font-size: 14pt;\"><em>Wordpad.exe<\/em><\/span><\/li>\n<\/ul>\n<div id=\"attachment_5091\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-5091\" class=\"size-full wp-image-5091\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/07\/Setting-the-registry-key-Microsoft.webp\" alt=\"Setting the registry key\" width=\"1024\" height=\"364\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/07\/Setting-the-registry-key-Microsoft.webp 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/07\/Setting-the-registry-key-Microsoft-300x107.webp 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/07\/Setting-the-registry-key-Microsoft-768x273.webp 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/07\/Setting-the-registry-key-Microsoft-18x6.webp 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-5091\" class=\"wp-caption-text\">Setting the registry key; Source: Microsoft<\/p><\/div>\n<p><span style=\"font-size: 14pt;\">Treba svakako napomenuti, da ovo pode\u0161avanje klju\u010da u <em>Windows<\/em> registru kako bi se blokirali poku\u0161aji zloupotrebe, mo\u017ee uticati na neke funkcionalnosti povezane sa iznad navedenim aplikacijama.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Kompanija Microsoft upozorava korisnike na Office napade nultog dana, u kojima zlonamjerni akteri aktivno iskori\u0161tavaju sigurnosne ranjivosti u Microsoft Windows i Office proizvodima koje jo\u0161 nisu a\u017eurirane. Ranjivost nultog dana Kompanija Microsoft je na&#46;&#46;&#46;<\/p>","protected":false},"author":1,"featured_media":5089,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[467,304,143,236],"class_list":["post-5087","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hronike","tag-att","tag-microsoft-office","tag-windows","tag-zero-day"],"_links":{"self":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/5087","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/comments?post=5087"}],"version-history":[{"count":0,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/5087\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media\/5089"}],"wp:attachment":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media?parent=5087"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/categories?post=5087"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/tags?post=5087"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}