当前位置:网站首页>2022-01 Microsoft vulnerability notification
2022-01 Microsoft vulnerability notification
2022-06-29 05:36:00 【User 6477171】
Microsoft officially released 2022 year 01 Monthly security update . This month's update announced 126 A loophole , contain 32 Remote Code Execution Vulnerability 、43 A privilege escalation vulnerability 、6 An information leak 、3 An identity counterfeiting vulnerability 、9 A denial of Service Vulnerability and 9 Security feature bypass vulnerability . among 9 The vulnerability level is “Critical”( High-risk ),92 A for “Important”( serious ). Users are advised to use the tinder safety software in time ( personal / Enterprises )【 Bug repair 】 Feature update patch .
01
Involved components
.NET Framework
Microsoft Dynamics
Microsoft Edge (Chromium-based)
Microsoft Exchange Server
Microsoft Graphics Component
Microsoft Office
Microsoft Office Excel
Microsoft Office SharePoint
Microsoft Office Word
Microsoft Teams
Microsoft Windows Codecs Library
Open Source Software
Role: Windows Hyper-V
Tablet Windows User Interface
Windows Account Control
Windows Active Directory
Windows AppContracts API Server
Windows Application Model
Windows BackupKey Remote Protocol
Windows Bind Filter Driver
Windows Certificates
Windows Cleanup Manager
Windows Clipboard User Service
Windows Cluster Port Driver
Windows Common Log File System Driver
Windows Connected Devices Platform Service
Windows Cryptographic Services
Windows Defender
Windows Devices Human Interface
Windows Diagnostic Hub
Windows DirectX
Windows DWM Core Library
Windows Event Tracing
Windows Geolocation Service
Windows HTTP Protocol Stack
Windows IKE Extension
Windows Installer
Windows Kerberos
Windows Kernel
Windows Libarchive
Windows Local Security Authority
Windows Local Security Authority Subsystem Service
Windows Modern Execution Server
Windows Push Notifications
Windows RDP
Windows Remote Access Connection Manager
Windows Remote Desktop
Windows Remote Procedure Call Runtime
Windows Resilient File System (ReFS)
Windows Secure Boot
Windows Security Center
Windows StateRepository API
Windows Storage
Windows Storage Spaces Controller
Windows System Launcher
Windows Task Flow Data Engine
Windows Tile Data Repository
Windows UEFI
Windows UI Immersive Server
Windows User Profile Service
Windows User-mode Driver Framework
Windows Virtual Machine IDE Drive
Windows Win32K
Windows Workstation Service Remote Protocol
( Slide down to view )
02
The following vulnerabilities require special attention
HTTP Protocol stack Remote Code Execution Vulnerability
CVE-2022-21907
Severity level : High-risk CVSS:9.8
Utilized level : It is likely to be used
scope :Windows 10 1809、20H2、21H1、21H2、Windows 11、Windows Server 2019、2022、Windows Server, version 20H2
This is a network 、 No user interaction required 、 Vulnerabilities that can be exploited without privileges . Unauthenticated attackers can take advantage of HTTP Protocol stack (http.sys) Send special packets to the target server to process packets for attack . This vulnerability belongs to worm level vulnerability , The user is recommended to repair it in time .
Existing in this month 3 individual Microsoft Exchange Server Loophole , Are remote code execution vulnerabilities . An attacker who successfully exploits this vulnerability can (Wifi、 bluetooth 、 LAN etc. ) Attack or spread the virus quickly .
Microsoft Exchange Server Remote code execution vulnerability
CVE-2022-21846/CVE-2022-21855/CVE-2022-21969
Severity level : High-risk ( serious ) CVSS:9
Utilized level : It is likely to be used
scope :Exchange Server 2013-2019
Active Directory Domain services privilege escalation vulnerability
CVE-2022-21857
Severity level : High-risk CVSS:8.8
Utilized level : May be used
Specific to... With incoming trust Active Directory Privilege escalation vulnerability in domain service environment . An attacker can elevate privileges across trust boundaries under certain conditions . The virus can successfully use this vulnerability to move horizontally in the internal network .
Windows Certificate spoofing vulnerability
CVE-2022-21836
Severity level : serious CVSS:7.8
Utilized level : May be used
This is an identity counterfeiting vulnerability , An attacker can use a small number of compromised certificates to bypass WPBT Binary verification .
Microsoft Office APP Remote Code Execution Vulnerability
CVE-2022-21840
Severity level : High-risk CVSS:8.8
Utilized level : May be used
An attacker must create malicious Microsoft Office file , And use social engineering to entice users to open the document to exploit this vulnerability . Because this vulnerability exists in Microsoft Office Application , Therefore, the fix will be passed as part of the automatic update Microsoft Store distribution .
Other product vulnerabilities
This month, in addition to Microsoft's own product vulnerabilities , It also disclosed two vulnerabilities in the open source software used by Microsoft
Open source Curl Remote code execution vulnerability
CVE-2021-22947
Severity level : High-risk
Utilized level : May be used
Libarchive Remote code execution vulnerability
CVE-2021-36976
Severity level : serious
Utilized level : May be used
03
Repair suggestions
1、 Through the tinder Personal Edition / Enterprise Edition 【 Bug repair 】 Function fix vulnerability .
2、 Download the official patch from Microsoft
https://msrc.microsoft.com/update-guide
Complete Microsoft notice :
https://msrc.microsoft.com/update-guide/releaseNote/2022-Jan
边栏推荐
- C语言用 printf 打印 《爱心》《火星撞地球》等,不断更新
- 2022 recommended cloud computing industry research report investment strategy industry development prospect market analysis (the attachment is a link to the online disk, and the report is continuously
- Difference between parametric continuity and geometric continuity
- HTTP Caching Protocol practice
- [IOT] description of renaming the official account "Jianyi commerce" to "product renweipeng"
- 2,5-di (3,4-dicarboxyphenoxy) - 4 '- phenylethynylbiphenyldianhydride (pephqda) / Qiyue custom supply porphyrin modified amphiphilic block copolymer peg113-pcl46-porphyrin
- Purple red solid meso tetra (o-alkoxyphenyl) porphyrin cobalt (meso-t (2-rop) PCO) / tetra (n, n-diphenyl-p-amino) phenyl porphyrin (tdpatph2)
- Research Report on the overall scale, major manufacturers, major regions, products and applications of electric hydrofoil surfboards in the global market in 2022
- Introduction to Photoshop (the first case)
- ES6 Modularization: export /import
猜你喜欢

Research Report on recommended specialized, special and new industries in 2022 industry development prospect and market investment analysis (the attachment is a link to the online disk, and the report

《软件体系结构》期末复习总结

HTTP Caching Protocol practice

Research Report on the recommended lithography industry in 2022 industry development prospect market investment analysis (the attachment is a link to the network disk, and the report is continuously u

机器人强化学习——Transferring End-to-End Visuomotor Control from Simulation to RealWorld (CoRL 2017)

2,5-di (3,4-dicarboxyphenoxy) - 4 '- phenylethynylbiphenyldianhydride (pephqda) / Qiyue custom supply porphyrin modified amphiphilic block copolymer peg113-pcl46-porphyrin

2022 recommended quantum industry research industry development planning prospect investment market analysis report (the attachment is a link to the online disk, and the report is continuously updated

β- Tetraphenyl nickel porphyrin with all chlorine substitution| β- Thiocyano tetraphenyl porphyrin copper| β- Dihydroxy tetraphenyl porphyrin 𞓜 2-nitroporphyrin | supplied by Qiyue

Complete collection of necessary documents for project management: you can't write these 14 project documents yet?

JS messagechannel transport
随机推荐
HTTP Caching Protocol practice
Software architecture final review summary
Output various graphics and text on the console through C #
Robot reinforcement learning - transferring end-to-end videomotor control from simulation to realworld (curl 2017)
Loosely matched jest A value in tohavebeencalledwith - loose match one value in jest toHaveBeenCalledWith
It is said on the Internet that a student from Guangdong has been admitted to Peking University for three times and earned a total of 2million yuan in three years
After nine years of testing, the salary for interviewing Huawei is 10000. Huawei employees: the company doesn't have such a low salary position
Use some examples of qte5
Experience sharing of system analysts in preparing for exams: phased and focused
I haven't encountered these three problems. I'm sorry to say that I used redis
DataX connection MySQL cannot find driver
Why Houdini made the pyside2 plug-in crash
2022 recommended tire industry research report industry development prospect market analysis white paper
What has urbanization brought to our mental health and behavior?
5000+ word interpretation | Product Manager: how to do a good job in component selection?
The easiest GUI to compile: dgui
Analysis of ArrayList set in teacher Yang's class
Tcapulusdb Jun · industry news collection (VI)
How to use thread stack location
Analysis report on the investment market situation of the development planning prospect of the recommended chip industry research industry in 2022 (the attachment is a link to the network disk, and th