当前位置:网站首页>2022-01 Microsoft vulnerability notification
2022-01 Microsoft vulnerability notification
2022-06-29 05:36:00 【User 6477171】
Microsoft officially released 2022 year 01 Monthly security update . This month's update announced 126 A loophole , contain 32 Remote Code Execution Vulnerability 、43 A privilege escalation vulnerability 、6 An information leak 、3 An identity counterfeiting vulnerability 、9 A denial of Service Vulnerability and 9 Security feature bypass vulnerability . among 9 The vulnerability level is “Critical”( High-risk ),92 A for “Important”( serious ). Users are advised to use the tinder safety software in time ( personal / Enterprises )【 Bug repair 】 Feature update patch .
01
Involved components
.NET Framework
Microsoft Dynamics
Microsoft Edge (Chromium-based)
Microsoft Exchange Server
Microsoft Graphics Component
Microsoft Office
Microsoft Office Excel
Microsoft Office SharePoint
Microsoft Office Word
Microsoft Teams
Microsoft Windows Codecs Library
Open Source Software
Role: Windows Hyper-V
Tablet Windows User Interface
Windows Account Control
Windows Active Directory
Windows AppContracts API Server
Windows Application Model
Windows BackupKey Remote Protocol
Windows Bind Filter Driver
Windows Certificates
Windows Cleanup Manager
Windows Clipboard User Service
Windows Cluster Port Driver
Windows Common Log File System Driver
Windows Connected Devices Platform Service
Windows Cryptographic Services
Windows Defender
Windows Devices Human Interface
Windows Diagnostic Hub
Windows DirectX
Windows DWM Core Library
Windows Event Tracing
Windows Geolocation Service
Windows HTTP Protocol Stack
Windows IKE Extension
Windows Installer
Windows Kerberos
Windows Kernel
Windows Libarchive
Windows Local Security Authority
Windows Local Security Authority Subsystem Service
Windows Modern Execution Server
Windows Push Notifications
Windows RDP
Windows Remote Access Connection Manager
Windows Remote Desktop
Windows Remote Procedure Call Runtime
Windows Resilient File System (ReFS)
Windows Secure Boot
Windows Security Center
Windows StateRepository API
Windows Storage
Windows Storage Spaces Controller
Windows System Launcher
Windows Task Flow Data Engine
Windows Tile Data Repository
Windows UEFI
Windows UI Immersive Server
Windows User Profile Service
Windows User-mode Driver Framework
Windows Virtual Machine IDE Drive
Windows Win32K
Windows Workstation Service Remote Protocol
( Slide down to view )
02
The following vulnerabilities require special attention
HTTP Protocol stack Remote Code Execution Vulnerability
CVE-2022-21907
Severity level : High-risk CVSS:9.8
Utilized level : It is likely to be used
scope :Windows 10 1809、20H2、21H1、21H2、Windows 11、Windows Server 2019、2022、Windows Server, version 20H2
This is a network 、 No user interaction required 、 Vulnerabilities that can be exploited without privileges . Unauthenticated attackers can take advantage of HTTP Protocol stack (http.sys) Send special packets to the target server to process packets for attack . This vulnerability belongs to worm level vulnerability , The user is recommended to repair it in time .
Existing in this month 3 individual Microsoft Exchange Server Loophole , Are remote code execution vulnerabilities . An attacker who successfully exploits this vulnerability can (Wifi、 bluetooth 、 LAN etc. ) Attack or spread the virus quickly .
Microsoft Exchange Server Remote code execution vulnerability
CVE-2022-21846/CVE-2022-21855/CVE-2022-21969
Severity level : High-risk ( serious ) CVSS:9
Utilized level : It is likely to be used
scope :Exchange Server 2013-2019
Active Directory Domain services privilege escalation vulnerability
CVE-2022-21857
Severity level : High-risk CVSS:8.8
Utilized level : May be used
Specific to... With incoming trust Active Directory Privilege escalation vulnerability in domain service environment . An attacker can elevate privileges across trust boundaries under certain conditions . The virus can successfully use this vulnerability to move horizontally in the internal network .
Windows Certificate spoofing vulnerability
CVE-2022-21836
Severity level : serious CVSS:7.8
Utilized level : May be used
This is an identity counterfeiting vulnerability , An attacker can use a small number of compromised certificates to bypass WPBT Binary verification .
Microsoft Office APP Remote Code Execution Vulnerability
CVE-2022-21840
Severity level : High-risk CVSS:8.8
Utilized level : May be used
An attacker must create malicious Microsoft Office file , And use social engineering to entice users to open the document to exploit this vulnerability . Because this vulnerability exists in Microsoft Office Application , Therefore, the fix will be passed as part of the automatic update Microsoft Store distribution .
Other product vulnerabilities
This month, in addition to Microsoft's own product vulnerabilities , It also disclosed two vulnerabilities in the open source software used by Microsoft
Open source Curl Remote code execution vulnerability
CVE-2021-22947
Severity level : High-risk
Utilized level : May be used
Libarchive Remote code execution vulnerability
CVE-2021-36976
Severity level : serious
Utilized level : May be used
03
Repair suggestions
1、 Through the tinder Personal Edition / Enterprise Edition 【 Bug repair 】 Function fix vulnerability .
2、 Download the official patch from Microsoft
https://msrc.microsoft.com/update-guide
Complete Microsoft notice :
https://msrc.microsoft.com/update-guide/releaseNote/2022-Jan
边栏推荐
- Quickly write MVVM code using source generators
- Openfpga wishes you a happy Lantern Festival!
- Love that can't be met -- what is the intimate relationship maintained by video chat
- 2022 recommended precious metal industry research report industry development prospect market analysis white paper (the attachment is a link to the online disk, and the report is continuously updated)
- 机器人强化学习——Transferring End-to-End Visuomotor Control from Simulation to RealWorld (CoRL 2017)
- ICLR is going to have a big discussion on the deep generation model. Max welling and the winner of the AAAI million dollar award are here. Bengio is one of the organizers
- i-Teams W3: How to build a sound-bottling business
- How to use thread stack location
- Structure training camp module II operation
- 2022 recommended RCEP regional comprehensive economic partnership agreement market quotation Investment Analysis Industry Research Report (the attachment is a link to the online disk, and the report i
猜你喜欢

Parsing rshub document auto generation API

How to use thread stack location

Tcapulusdb Jun · industry news collection (III)

5,10,15,20-tetra (3,5-dimethoxyphenyl) porphyrin ((tdmpp) H2) /2-nitro-5,10,15,20-tetra (3,5-dimethoxyphenyl) porphyrin copper (no2tdmpp) Cu) supplied by Qiyue

Use VS to create a static link library Lib and use

It is said on the Internet that a student from Guangdong has been admitted to Peking University for three times and earned a total of 2million yuan in three years

In 2022, I haven't found a job yet. I have been unemployed for more than one year. What is the "old tester" for eight years?

Research Report on the new energy industry of recommended power equipment in 2022 industry development prospect market investment analysis (the attachment is a link to the network disk, and the report

2022 recommended RCEP regional comprehensive economic partnership agreement market quotation Investment Analysis Industry Research Report (the attachment is a link to the online disk, and the report i

How to choose congestion model and anemia model
随机推荐
开启生态新姿势 | 使用 WordPress 远程附件存储到 COS
Est - ce que l'ouverture d'un compte de titres est sécurisée? Y a - t - il un danger?
Accelerate the global cloud native layout, kyligence intelligent data cloud officially supports Google cloud
C语言用 printf 打印 《爱心》《火星撞地球》等,不断更新
Service grid ASM year end summary: how do end users use the service grid?
Difference between parametric continuity and geometric continuity
STI, one controller
How to choose congestion model and anemia model
Modularization and modular specification commonjs
Summary of redis basic knowledge points
5,10-di (4-aminophenyl) - 15,20-diphenylporphyrin (cis-dadph2) /5,15-di (4-aminophenyl) - 10,20-diphenylporphyrin (trans-dadph2) / (tri-apph2) supplied by Qiyue
5000+ 字解读 | 产品经理:如何做好元器件选型?
Collection of common terms used in satellite navigation
Matlab直接求贝塞尔函数的导函数
[high concurrency] deeply analyze the callable interface
be based on. NETCORE development blog project starblog - (13) add friendship link function
Microsoft Pinyin IME personal preferences
Loosely matched jest A value in tohavebeencalledwith - loose match one value in jest toHaveBeenCalledWith
An efficient flutter hybrid stack management scheme with zero intrusion, you deserve it!
Continue yesterday's plan: February 16, 2022