Blog Post

Microsoft Defender Vulnerability Management Blog
2 MIN READ

Reduce OpenSSL 3.0 vulnerabilities risks with Microsoft Defender Vulnerability Management

Linh_Hoang's avatar
Linh_Hoang
Icon for Microsoft rankMicrosoft
Nov 02, 2022

On November 1, 2022 the OpenSSL team published two high severity vulnerabilities: CVE-2022-3602 and CVE-2022-3786. Any OpenSSL versions between 3.0.0 and 3.0.6 are affected and the guidance is OpenSSL 3.0 users should expedite upgrade to OpenSSL v 3.0.7 to reduce the impact of this threat.

 

Microsoft customers can use Defender Vulnerability Management to identify devices that have these vulnerabilities in their organizations and track their patching process to minimize risks. Defender Vulnerability Management is a risk-based vulnerability management platform within Microsoft 365 Defender portal to help organizations reduce cyber risk with continuous vulnerability discovery, risk-based prioritization, and remediation.

 

Microsoft Defender for Cloud customers can use Defender Vulnerability Management to identify vulnerabilities in the software installed on VMs and other capabilities highlighted below.

 

Identify vulnerable assets

Figure 1. Within Microsoft 365 Defender Portal, Defender Vulnerability Management can be accessed on the left navigation menu. OpenSSL CVEs are shown in the ‘Weaknesses’ page.

 

Figure 2. The detailed CVE page shows the consolidated view of the organizational exposure of the 2 OpenSSL vulnerabilities (CVE-2022-3786 is shown as an example in the following screenshots).

 

Figure 3. Defender Vulnerability Management finds exposed devices based on vulnerable software and vulnerable files detected on disk.

 

Figure 4. The ‘Security Recommendations’ tab shows the available recommendations for this CVE. Clicking on a recommendation provides additional details and the option to request remediation.

 

Track patching on vulnerable assets

Figure 5. By issuing a ‘request remediation’, users can track the patching process of exposed devices. Submitting a remediation request creates a remediation activity item within vulnerability management, which can be used for monitoring the remediation progress for this recommendation. 

 

___

Advanced hunting

Microsoft customers can also use the below advanced hunting query and 'DeviceTvmSoftwareVulnerabilities' table to detect assets running the affected OpenSSL versions.

 

DeviceTvmSoftwareVulnerabilities

| where CveId in ("CVE-2022-3786", "CVE-2022-3602")

 

For count of vulnerable devices by operating system, users can execute the below query:

 

DeviceTvmSoftwareVulnerabilities

| where CveId in ("CVE-2022-3786", "CVE-2022-3602")

| summarize dcount(DeviceId) by OSPlatform, SoftwareVendor

___

 

 

Next steps:

Read more about how you can address the OpenSSL vulnerability with Microsoft Defender for Cloud.

If you haven’t already, sign up for a free 6-month trial of Microsoft Defender Vulnerability Management.

 

We will continue to update this article with the necessary updates.

 

Updated Nov 28, 2022
Version 5.0
  • ksobier1160's avatar
    ksobier1160
    Copper Contributor

    We see OpenSSL vulnerabilities on all the computers and they show for the Microsoft applications - Onedrive, Microsoft Photos etc. even though the software are updated to the latest version.

  • Mark_G300's avatar
    Mark_G300
    Copper Contributor

    I'm seeing this issue also on my new Win 11 laptop. Likely related to one of several packages I installed on 12/21/22. No idea of which one. Any fix yet?

  • KailashY's avatar
    KailashY
    Copper Contributor

    We are also facing this issue, but not sure exactly how we can fix these openssl dependencies of different different software's.

     

    Do we need to install openssl 3.0.7 on the devices to fix it?

     

    Thanks  

  • Sudipa's avatar
    Sudipa
    Copper Contributor

    We Microsoft 365 Defender for keeping on top of security, in the past few days we've been flagged an out-of-date version of OpenSSL within some files within Office 365:

     

    c:\program files\microsoft office\root\office16\odbc drivers\salesforce\lib\libcurl64.dlla\openssl64.dlla\libcrypto-1_1-x64.dll

    c:\program files\microsoft office\root\office16\odbc drivers\salesforce\lib\libcurl64.dlla\openssl64.dlla\libssl-1_1-x64.dll

    c:\program files\microsoft office\root\office16\odbc drivers\salesforce\lib\openssl64.dlla\libcrypto-1_1-x64.dll

    c:\program files\microsoft office\root\office16\odbc drivers\salesforce\lib\openssl64.dlla\libssl-1_1-x64.dll

     

    It seems these are part of the Office 365 install as I do not see anywhere in Salesforce affected by this vulnerability, This is present in some 10% of the systems in the organization.    In which version of office 365 it will be resolved ?