Views:

Mitigations, Trend Micro Protection, and Detection Against Exploitation

First and foremost, it is always highly recommended that users apply the vendor's patches when they become available and is feasible.  Microsoft has released a patch as part of their March 2023 Monthly Security Update (more commonly known as "Patch Tuesday").  

Also, Microsoft has outlined some additional mitigations in their security bulletin that could potentially be taken, but as with any modifications of this type administrators should carefully consider the impact on other production applications and implement based on proper risk/reward analysis:
  • Customers can disable the WebClient service (however, note it will block all WebDAV connections including intranet).
  • Adding users to the Protected Users Security Group, which prevents the use if NTLM as an authentication mechanism.  (Could impact applications that rely on NTLM in your environment).
  • Block TCP 445/SMB outbound from your network by using a perimeter firewall, a local firewall, and via your VPN settings. This will prevent the sending of NTLM authentication messages to remote file shares.

In addition to the formal patch, Trend Micro does have some supplementary rules, filters and detection that may help provide additional protection against potential exploits. 
 
Preventative Rules, Filters & Detection
Trend Micro Cloud One - Workload Security and Deep Security Policy IPS Rules
  • Rule 1009058 - Detected Server Message Block (SMB) Outgoing Request
This rule can be configured to only block SMB Outgoing Requests to Public IP(s) to reduce impact on internal applications.
 

Module state


By default, this policy rule is set to Detect, and should be carefully observed if used to ensure business critical traffic is not impacted before changing to Prevent.

Trend Micro TippingPoint Filters
  • Filter 28471: SMB: SMBv1 Successful Protocol Negotiation
  • Filter 28472: SMB: SMBv2 Successful Protocol Negotiation
Please note: enabling these filters in Block mode will interrupt legitimate SMB traffic. Customers are advised to add exceptions for their Private IP address space.

Trend Micro Malware Detection Patterns (VSAPI, Predictive Learning, Behavioral Monitoring) for Endpoint, Servers (e.g. Apex One, Worry-Free Business Security Services, Worry-Free Business Security Standard/Advanced, Deep Security w/Anti-malware, etc.), Mail & Gateway (e.g. Cloud App Security, ScanMail for Exchange, IMSVA)
  • Starting with Trend Micro Smart Scan Pattern versions TBL 21474.296.07 / Smart Scan Agent 18.331.00, known exploits associated with this vulnerability are being detected as Trojan.Win32.CVE202323397.* 
 

Using Trend Micro Products for Investigation


The following highlights several items that can be used by customers to investigation potential exposure to the vulnerabilities.

Trend Vision One™
Trend Vision One customers benefit from XDR detection capabilities of the underlying products such as Trend Micro Apex One.  The following outlines some of the components of Trend Vision One that can be used for preparation and inventory:

Risk Insights Operations Dashboard

Trend Micro has added CVE-2023-23397 to its list of HIGHLY-EXPLOITABLE UNIQUE CVES located under the Risk Insights Operations Dashboard:

1.  Open Trend Vision One and navigate to Risk Index > Operations Dashboard.
2.  Select the Vulnerabilities square at the top.
3.  Enter CVE-2023-23397 in the filter (optional).
4.  Any potential detections would appear at the bottom of the screen.

image.png

Search Query

Customers may utilize the General Search Query function in Trend Vision One to do some preliminary investigation of potential exposure:

1. Open Trend Vision One and navigate to Search.
2.  Select Endpoint Activity Data for Search Method.
3.  Enter the following query:

dpt: 445 AND eventSubId: 204 AND processCmd: *OUTLOOK*

image.png

4. Execute the search (and save for later if desired).

image.png

5. Take note of any suspicious results and for further investigation.

6.  Add to the Watchlist in Saved Queries if desired (optional).

image.png




Trend Micro Deep Discovery Inspector
  • Rule 4479:  NTLM v1 Authentication - SMB (Request)
If NTLM v1 is configured by default, customers can use this rule to monitor attempts for outgoing NTLM handshakes.  Please note this rule only detects and does not block, so it is best used as an investigative tool for follow-up.
 

Please continue to visit this article for updates.

 

Reference