当前位置:网站首页>2022-01 Microsoft vulnerability notification
2022-01 Microsoft vulnerability notification
2022-06-29 05:36:00 【User 6477171】
Microsoft officially released 2022 year 01 Monthly security update . This month's update announced 126 A loophole , contain 32 Remote Code Execution Vulnerability 、43 A privilege escalation vulnerability 、6 An information leak 、3 An identity counterfeiting vulnerability 、9 A denial of Service Vulnerability and 9 Security feature bypass vulnerability . among 9 The vulnerability level is “Critical”( High-risk ),92 A for “Important”( serious ). Users are advised to use the tinder safety software in time ( personal / Enterprises )【 Bug repair 】 Feature update patch .
01
Involved components
.NET Framework
Microsoft Dynamics
Microsoft Edge (Chromium-based)
Microsoft Exchange Server
Microsoft Graphics Component
Microsoft Office
Microsoft Office Excel
Microsoft Office SharePoint
Microsoft Office Word
Microsoft Teams
Microsoft Windows Codecs Library
Open Source Software
Role: Windows Hyper-V
Tablet Windows User Interface
Windows Account Control
Windows Active Directory
Windows AppContracts API Server
Windows Application Model
Windows BackupKey Remote Protocol
Windows Bind Filter Driver
Windows Certificates
Windows Cleanup Manager
Windows Clipboard User Service
Windows Cluster Port Driver
Windows Common Log File System Driver
Windows Connected Devices Platform Service
Windows Cryptographic Services
Windows Defender
Windows Devices Human Interface
Windows Diagnostic Hub
Windows DirectX
Windows DWM Core Library
Windows Event Tracing
Windows Geolocation Service
Windows HTTP Protocol Stack
Windows IKE Extension
Windows Installer
Windows Kerberos
Windows Kernel
Windows Libarchive
Windows Local Security Authority
Windows Local Security Authority Subsystem Service
Windows Modern Execution Server
Windows Push Notifications
Windows RDP
Windows Remote Access Connection Manager
Windows Remote Desktop
Windows Remote Procedure Call Runtime
Windows Resilient File System (ReFS)
Windows Secure Boot
Windows Security Center
Windows StateRepository API
Windows Storage
Windows Storage Spaces Controller
Windows System Launcher
Windows Task Flow Data Engine
Windows Tile Data Repository
Windows UEFI
Windows UI Immersive Server
Windows User Profile Service
Windows User-mode Driver Framework
Windows Virtual Machine IDE Drive
Windows Win32K
Windows Workstation Service Remote Protocol
( Slide down to view )
02
The following vulnerabilities require special attention
HTTP Protocol stack Remote Code Execution Vulnerability
CVE-2022-21907
Severity level : High-risk CVSS:9.8
Utilized level : It is likely to be used
scope :Windows 10 1809、20H2、21H1、21H2、Windows 11、Windows Server 2019、2022、Windows Server, version 20H2
This is a network 、 No user interaction required 、 Vulnerabilities that can be exploited without privileges . Unauthenticated attackers can take advantage of HTTP Protocol stack (http.sys) Send special packets to the target server to process packets for attack . This vulnerability belongs to worm level vulnerability , The user is recommended to repair it in time .
Existing in this month 3 individual Microsoft Exchange Server Loophole , Are remote code execution vulnerabilities . An attacker who successfully exploits this vulnerability can (Wifi、 bluetooth 、 LAN etc. ) Attack or spread the virus quickly .
Microsoft Exchange Server Remote code execution vulnerability
CVE-2022-21846/CVE-2022-21855/CVE-2022-21969
Severity level : High-risk ( serious ) CVSS:9
Utilized level : It is likely to be used
scope :Exchange Server 2013-2019
Active Directory Domain services privilege escalation vulnerability
CVE-2022-21857
Severity level : High-risk CVSS:8.8
Utilized level : May be used
Specific to... With incoming trust Active Directory Privilege escalation vulnerability in domain service environment . An attacker can elevate privileges across trust boundaries under certain conditions . The virus can successfully use this vulnerability to move horizontally in the internal network .
Windows Certificate spoofing vulnerability
CVE-2022-21836
Severity level : serious CVSS:7.8
Utilized level : May be used
This is an identity counterfeiting vulnerability , An attacker can use a small number of compromised certificates to bypass WPBT Binary verification .
Microsoft Office APP Remote Code Execution Vulnerability
CVE-2022-21840
Severity level : High-risk CVSS:8.8
Utilized level : May be used
An attacker must create malicious Microsoft Office file , And use social engineering to entice users to open the document to exploit this vulnerability . Because this vulnerability exists in Microsoft Office Application , Therefore, the fix will be passed as part of the automatic update Microsoft Store distribution .
Other product vulnerabilities
This month, in addition to Microsoft's own product vulnerabilities , It also disclosed two vulnerabilities in the open source software used by Microsoft
Open source Curl Remote code execution vulnerability
CVE-2021-22947
Severity level : High-risk
Utilized level : May be used
Libarchive Remote code execution vulnerability
CVE-2021-36976
Severity level : serious
Utilized level : May be used
03
Repair suggestions
1、 Through the tinder Personal Edition / Enterprise Edition 【 Bug repair 】 Function fix vulnerability .
2、 Download the official patch from Microsoft
https://msrc.microsoft.com/update-guide
Complete Microsoft notice :
https://msrc.microsoft.com/update-guide/releaseNote/2022-Jan
边栏推荐
- The subnet of the pool cannot be overlapped with that of other pools.
- Continue yesterday's plan: February 16, 2022
- C语言用 printf 打印 《爱心》《火星撞地球》等,不断更新
- Common methods for describing 3D models of objects and their advantages and disadvantages
- ICLR is going to have a big discussion on the deep generation model. Max welling and the winner of the AAAI million dollar award are here. Bengio is one of the organizers
- Easy to get started naturallanguageprocessing series topic 7 text classification based on fasttext
- patent filter
- 2022 recommended quantum industry research industry development planning prospect investment market analysis report (the attachment is a link to the online disk, and the report is continuously updated
- ES6 Modularization: export /import
- Set column width in jitter - set column width in jitter
猜你喜欢

Robot reinforcement learning - transferring end-to-end videomotor control from simulation to realworld (curl 2017)

2022 recommended precious metal industry research report industry development prospect market analysis white paper (the attachment is a link to the online disk, and the report is continuously updated)

β- Tetraphenyl nickel porphyrin with all chlorine substitution| β- Thiocyano tetraphenyl porphyrin copper| β- Dihydroxy tetraphenyl porphyrin 𞓜 2-nitroporphyrin | supplied by Qiyue

2022 recommended tire industry research report industry development prospect market analysis white paper

It is said on the Internet that a student from Guangdong has been admitted to Peking University for three times and earned a total of 2million yuan in three years

See how I do it step by step (I)

be based on. NETCORE development blog project starblog - (13) add friendship link function

Blip: conduct multimodal pre training with cleaner and more diverse data, and the performance exceeds clip! Open source code

Analysis report on the investment market of the development planning prospect of the recommended NFT industry research industry in 2022 (the attachment is a link to the online disk, and the report is

Research on heuristic intelligent task scheduling
随机推荐
Network device setting / canceling console port login separate password
Is it safe to open a securities account? Is there any danger
Structure training camp module II operation
ICLR is going to have a big discussion on the deep generation model. Max welling and the winner of the AAAI million dollar award are here. Bengio is one of the organizers
[IOT] description of renaming the official account "Jianyi commerce" to "product renweipeng"
Parsing rshub document auto generation API
Annual inventory review of Alibaba cloud's observable practices in 2021
Agilent digital multimeter software ns multimeter, real-time data acquisition and automatic data saving
想问问,券商选哪个比较好尼?本人小白不懂,现在网上开户安全么?
Service grid ASM year end summary: how do end users use the service grid?
Robot reinforcement learning - transferring end-to-end videomotor control from simulation to realworld (curl 2017)
Distributed transaction Seata
Boost the digital economy and face the future office | the launch of the new version of spreadjsv15.0 is about to begin
Meso tetra (4-N, N, n-trimethylaminophenyl) porphyrin (ttmapp) /meso tetra - [4- (BOC threonine) aminophenyl] porphyrin (TAPP thr BOC) supplied by Qiyue
How to use thread stack location
Software architecture final review summary
Continue yesterday's plan: February 16, 2022
Manual (functional) test 1
C language uses printf to print love, Mars strikes the earth, etc., which are constantly updated
Software architecture experiment summary