#MSRC

Yet another Josh :donor:crankylinuxuser@infosec.exchange
2025-04-18

#Fedihired

Does anybody happen to work for the #Microsoft #Security #Response #Center #MSRC ?

I just applied to jobs.careers.microsoft.com/glo and wanted to touch base with someone internally, to prove that I'm a real human and not a AI agent 😂

2025-04-05

The final day of #ZeroDayQuest was truly a blast 💥 While I’m still unpacking all that has happened (not to mention a baggage full of swag), I’d like to thank once again #MSRC for their warm welcome and impeccable organization.

I’m so happy to have been part of an event that has already made history in our industry. Congratulations to all the winners! Cheers, my friends 🥂

Raptor + MS = WTF!?We’re not worthy!!Mount Rainier viewSunset at the Space Needle
2024-10-24

Got some #MSRC #swag 😂

QUARTERLY
LEADERBOARD
Microsoft
24
2024-08-09

Is #Microsoft #Defender for #Identity part of the #MSRC #Bounty program?

Asking for a fried.

2024-08-07

Happy to announce that, with 23 valid reports and 660 total case points, I’m 25th worldwide in this year’s #MSRC Most Valuable Researcher (#MVR) leaderboard!

msrc.microsoft.com/leaderboard

Stay tuned to the @hnsec blog for a comprehensive writeup. And, who knows, perhaps even a conference talk is brewing…

2024-05-23

Reporting issues in Windows. 🤡

* August, 25, 2023: Issue reported to MSRC.

* April 9, 2024: Fix released as CVE-2024-20693.
* April 25, 2024: MSRC asks Microsoft Bounty Team for an update, CCing us.
* April 26, 2024: Microsoft Bounty Team sends back a boilerplate reply that the case is under review.
* May 17, 2024: MSRC asks Microsoft Bounty Team for an update, CCing us again.
* May 22, 2024: Microsoft Bounty Team replies that the vulnerability is out of scope for a bounty, claiming it wasn’t reproduced on the right WIP build.

#Microsoft #MSRC

2024-04-19

New Microsoft Security Response Center (MSRC) security advisory for Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability CVE-2024-29991 (5.0 medium). A lot of information is revealed: attack complexity=high, and MSRC says that it would need to be used in an exploit chain for an attack. An attacker must send the user a malicious file and convince them to open it. 🔗 msrc.microsoft.com/update-guid

#CVE_2024_29991 #MSRC #Microsoft #vulnerability #Chrome

2024-04-18

Umm... Microsoft Security Response Center (MSRC) just updated 38 security advisories. Most of them are titled "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability", unique CVE IDs (not duplicates in the RSS feed), and appear to be from April 2024 Patch Tuesday. I'm currently assessing what updates were made.

cc: @campuscodi

#MSRC #vulnerability #Microsoft #PatchTuesday

2024-04-13

Microsoft Security Response Center (MSRC) creates security advisories for the same 3 Chromium vulnerabilities identified in Google Chrome's blog post on Wednesday:

  • CVE-2024-3515 Chromium: CVE-2024-3515 Use after free in Dawn
  • CVE-2024-3516 Chromium: CVE-2024-3516 Heap buffer overflow in ANGLE
  • CVE-2024-3157 Chromium: CVE-2024-3157 Out of bounds write in Compositing

No additional information provided. No mention of exploitation.

#Google #Chrome #vulnerability #MSRC #Microsoft #CVE_2024_3515 #CVE_2024_3516 #CVE_2024_3517

2024-04-12

Microsoft Security Response Center (MSRC) suspiciously updated four security advisories from this week:

  • CVE-2024-26234 (Proxy Driver Spoofing Vulnerability, 6.7 medium, previously updated to confirm that it was an exploited zero-day): added acknowledgements
  • CVE-2024-29053 (Microsoft Defender for IoT Remote Code Execution Vulnerability, 8.8 high): Added FAQ
  • CVE-2024-29054 (Microsoft Defender for IoT Elevation of Privilege Vulnerability, 7.2 high): Added FAQ
  • CVE-2024-29055 (Microsoft Defender for IoT Elevation of Privilege Vulnerability, 7.2 high): Added FAQ

Enough information in CVE-2024-29053's FAQ is provided to potentially develop an exploit without relying on a patch diffing. 29054 and 29055 are identical FAQs.

#CVE_2024_26234 #CVE_2024_29053 #CVE_2024_29054 #CVE_2024_29055 #vulnerability #Microsoft #MSRC #PatchTuesday

2024-04-09

WILD! Microsoft Security Response Center (MSRC) releases an additional security advisory for a 2 year old vulnerability with a unique CVE ID: Intel: CVE-2022-0001 Branch History Injection (4.7 medium, CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection'), disclosed 08 March 2022 by Intel). Not publicly disclosed, not exploited, and exploitation less likely. 🔗 msrc.microsoft.com/update-guid

#Microsoft #MSRC #PatchTuesday #vulnerability #CVE_2022_0001

2024-04-09

Microsoft Security Response Center (MSRC) indicated that they will adopt the Common Weakness Enumeration (CWE) industry standard when identifying a root causeof security vulnerabilities in Microsoft products and services. 🔗 msrc.microsoft.com/blog/2024/0

#CWE #vulnerability #Microsoft #MSRC

2024-04-09

Happy Patch Tuesday from Microsoft: 155 vulnerabilities.
EDIT: 1 vulnerability was updated to say Exploited and Publicly Disclosed: CVE-2024-26234 (6.7 medium) THIS IS AN EXPLOITED ZERO-DAY! See Sophos article for information on a malicious executable signed by a valid Microsoft Hardware Publisher Certificate: news.sophos.com/en-us/2024/04/

Updated CVE to correct exploit status. This is an informational update only.

cc: @campuscodi @briankrebs @todb @serghei

#PatchTuesday #Microsoft #MSRC #Vulnerability #CVE_2024_26234 #eitw #activeexploitation

Konstantin Weddigeweddige@gruene.social
2024-04-05

Am I the only one having problems logging in with a Live account at #MSRC?

I can use my work account, but with my #Live account I get the error "unauthorized_client: The client does not exist or is not enabled for consumers.".

Login Screen of MSRC:

Sign in with your work or social account

 * Live, Work or School Account
 * Google
2024-04-05

Microsoft Security Response Center (MSRC) published security advisories that follow the Google Chrome blog post (check original toot above this reply)

  • CVE-2024-3156 Chromium: CVE-2024-3156 Inappropriate implementation in V8
  • CVE-2024-3158 Chromium: CVE-2024-3158 Use after free in Bookmarks
  • CVE-2024-3159 Chromium: CVE-2024-3159 Out of bounds memory access in V8 New
  • CVE-2024-29981 (4.3 medium) Microsoft Edge (Chromium-based) Spoofing Vulnerability New!
  • CVE-2024-29049 (4.1 medium) Microsoft Edge (Chromium-based) Webview2 Spoofing Vulnerability New!

The last two are marked Not Exploited, Not Publicly Disclosed, and Exploitation Less Likely.

#MSRC #Microsoft #Chrome #vulnerability #PatchTuesday

2024-04-03

DHS Cyber Safety Review Board (CSRB) absolutely savages Microsoft over the June 2023 Exchange Online breach by Chinese threat actor Storm-0558 and accessing U.S. government emails right before Secretary of State Anthony Blinken was to visit China. This 34 page PDF is written in the style of a U.S. Government Accountability Office (GAO) report. 🔗 dhs.gov/news/2024/04/02/cyber-

Key takeways (copied verbatim, emphasis mine):

  • "Google's Threat Analysis Group was able to link at least one entity tied to this threat actor to the group responsible for the 2009 compromise of Google and dozens of other private companies in a campaign known as Operation Aurora, as well as the RSA SecurID incident."
  • "However, by the conclusion of this review, Microsoft was still unable to demonstrate to the Board that it knew how Storm-0558 had obtained the 2016 MSA key."
  • "Microsoft acknowledged to the Board in November 2023 that its September 6, 2023 blog post about the root cause was inaccurate, it did not update that post until March 12, 2024, as the Board was concluding its review and only after the Board's repeated questioning about Microsoft's plans to issue a correction;"

#DHS #CSRB #Microsoft #MSRC #China #cyberespionage #Storm0558

2024-03-27

Microsoft Security Response Center (MSRC) published 4 Chromium security advisories (none exploited) that don't contain any additional information beyond what was already disclosed in Google Chrome's blog post:

#Microsoft #MSRC #Chrome #PatchTuesday

2024-03-22

It appears Microsoft messed up again and forgot to publish this back in January 2024's Patch Tuesday:

"This CVE was addressed by updates that were released in January 2024, but the CVE was inadvertently omitted from the January 2024 Security Updates."

@mwulftange of @codewhitesec publicly disclosed the vulnerability details of "Leaking ObjRefs to Exploit HTTP .NET Remoting" on 27 February 2024: 🔗 code-white.com/blog/leaking-ob

This concludes the case. No CVE was assigned, nor was there any acknowledgment."

well @mwulftange, CVE-2024-29059 was assigned and you were given credit. 👍

The same Proof of Concept was also provided at GitHub: github.com/codewhitesec/HttpRe

#CVE_2024_29059 #vulnerability #MSRC #Microsoft

2024-03-22

Unexpected Microsoft Security Response Center (MSRC) security advisory: CVE-2024-29059 (7.5 high) .NET Framework Information Disclosure Vulnerability: An attacker who successfully exploited this vulnerability could obtain the ObjRef URI which could lead to Remote Code Execution. 🔗 msrc.microsoft.com/update-guid

Not exploited. not publicly disclosed, exploitation more likely. Interesting that MSRC made a syntax error which reveals that they use markdown language ** to make their Questions bold.

#CVE_2024_29059 #vulnerability #MSRC #Microsoft

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst