March Patch Tuesday: Three high severity holes in Microsoft Office

Satnam Narang, senior staff research engineer at Tenable, commented on the fix for Azure Model Context Protocol (MCP) tools. “This bug is a server-side request forgery,” he said in an email, “so an attacker could exploit it by sending a request to a vulnerable Azure MCP Server. But exploitation requires that the server accept user-provided parameters.

“MCP servers have become extremely popular for connecting large language models and agentic AI applications,” he noted, “and with the rise of tools like OpenClaw and other agents, it has become even more critical to secure these tools from cybercriminals.”

Good news for admins

Nick Carroll, cyber incident response manager at Nightwing, spotted what he said is “some incredibly good news. For years, defenders and SOC analysts have relied on Microsoft’s System Monitor (Sysmon) to gain high-fidelity telemetry into process creation, network connections, and file modifications. But because it lived in the external Sysinternals suite, deploying it required manual downloads, custom scripts, and constant maintenance.



Source link