• Tech News
  • Fintech
  • Startup
  • Games
  • Ar & Vr
  • Reviews
  • How To
  • More
    • Mobile Tech
    • Pc & Laptop
    • Security
What's Hot

Supermouth Ultim8 electric toothbrush review: Gentle giant

August 20, 2025

Samsung Galaxy Watch 8 Review: A solid albeit unexciting smartwatch

August 19, 2025

Huawei MatePad 11.5 review: iPad rival that’s missing a trick

August 17, 2025
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
  • Fintech
  • Startup
  • Games
  • Ar & Vr
  • Reviews
  • How To
  • More
    • Mobile Tech
    • Pc & Laptop
    • Security
Behind The ScreenBehind The Screen
Home»Tech News»Microsoft patches 64 vulnerabilities on September Patch Tuesday
Tech News

Microsoft patches 64 vulnerabilities on September Patch Tuesday

September 15, 2022No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
August ’22 a bumper month for high-impact vulnerabilities
Share
Facebook Twitter LinkedIn Pinterest Email

Microsoft’s September Patch Tuesday replace arrived on schedule late on 13 September, and this month contained 5 essential widespread vulnerabilities and exposures (CVEs) and one actively exploited zero-day, amongst a complete of 64 bug fixes.

The zero-day, tracked as CVE-2022-37969, is a privilege elevation vulnerability in Home windows Widespread Log File System Driver. It impacts all variations of Home windows and, if efficiently exploited, an attacker might acquire system-level privileges.

Microsoft stated the zero-day was reported by 4 completely different people or organisations independently of one another, which suggests its exploitation could also be widespread. It’s, nonetheless, solely rated as Essential, with a CVSS rating of seven.8, as a result of it requires a menace actor to be authenticated, however this makes it no much less harmful.

“The assault does require the attacker to have entry and skill to run code on the goal system, however chaining a number of vulnerabilities in an assault is widespread sufficient follow that this must be thought of a minor barrier for menace actors,” stated Chris Goettl, vice-president of safety merchandise at Ivanti.

The September drop additionally features a second publicly disclosed however apparently unexploited vulnerability in ARM-based Home windows 11 methods that might permit cache hypothesis restriction. It’s being tracked as CVE-2022-23960, and is also referred to as Spectre-BHB. It’s a variant of Spectre v2, which has been reinvented a number of occasions and has been dogging numerous processor architectures for 5 years at this level.

“This class of vulnerabilities poses a big headache to the organisations making an attempt mitigation,” stated Bharat Jogi, director of vulnerability and menace analysis at Qualys, “as they usually require updates to the working methods, firmware and, in some circumstances, a recompilation of purposes and hardening. If an attacker efficiently exploits this kind of vulnerability, they may acquire entry to delicate data.”

See also  Axie Infinity NFT game reopens transactions months after $625 million theft

The opposite essential vulnerabilities patched yesterday are as follows:

  • CVE-2022-34700, a distant code execution (RCE) vulnerability in Microsoft Dynamics 365 (on-prem).
  • CVE-2022-34718, an RCE vulnerability in Home windows TCP/IP.
  • CVE-2022-34721, an RCE vulnerability in Home windows Web Key Trade (IKE) Protocol Extensions.
  • CVE-2022-34722, a second RCE vulnerability in Home windows IKE Protocol Extensions.
  • CVE-2022-35805, an RCE vulnerability in Microsoft Dynamics CRM (on-prem).

Assessing a few of these essential vulnerabilities, Mike Walters, president and co-founder of Action1, a distant monitoring and administration specialist, stated: “CVE-2022-34722 and CVE-2022-34721…each have low complexity for exploitation and permit menace actors to carry out the assault with no person interplay…There is no such thing as a exploit or PoC detected within the wild but; nonetheless, putting in the repair is extremely advisable,” he stated.

Walters additionally warned safety groups to concentrate to CVE-2022-34724, a denial of service vulnerability in Home windows DNS Server, which he stated was more likely to be exploited.

“It’s a community assault with low complexity, but it surely impacts solely methods which can be operating the IPsec service, so if a system doesn’t want the IPsec service, disable it as quickly as attainable,” he stated. “This vulnerability will be exploited in provide chain assaults the place contractor and buyer networks are linked by an IPsec tunnel. When you have IPsec tunnels in your Home windows infrastructure, this replace is a must have.”

Kev Breen of Immersive Labs additionally highlighted some SharePoint RCE vulnerabilities that he stated must be greater on the listing of priorities in organisations which have SharePoint put in.

See also  Best Dell laptop deals for September 2022

“Tracked as CVE-2022-35823, CVE-2022-38008, CVE-2022-38009, and CVE-2022-37961 an attacker would, nonetheless, want authenticated entry with the flexibility to edit present content material. This sort of vulnerability would probably be abused by an attacker who already has the preliminary foothold to maneuver laterally throughout the community,” stated Breen. 

“This might have an effect on organisations that use SharePoint for inside wikis or doc shops. Attackers would possibly exploit this vulnerability to steal confidential data, change paperwork with new variations that comprise malicious code, or macros to contaminate different methods.”

Lastly, Ivanti’s Chris Goettl drew consideration to 2 different bugs of be aware: “There’s a Print Spooler Elevation of Privilege vulnerability – CVE-2022-38005 – resolved this month. Since PrintNightmare, there have been quite a few further Print Spooler vulnerabilities resolved. Some have precipitated further challenges for sure distributors and fashions of printers. When you have skilled challenges, it will be good to check this replace with some further care to make sure no points have an effect on your setting.  

“An elevation of privilege vulnerability – CVE-2022-38007 – in Azure ARC and Azure Visitor Configuration might permit an attacker to switch Microsoft-shipped code with their very own code. This might permit the attacker’s code to be run as root as a daemon within the context of the affected service.”

Source link

Microsoft Patch patches September Tuesday vulnerabilities
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Microsoft To Shut Down Skype In May, Shifting Users To Teams

February 28, 2025

Microsoft Enables iPhone-to-Windows File Sharing for Insiders

December 16, 2024

Microsoft Copilot Vision: AI-Powered Browsing Redefined

December 11, 2024

Qualcomm Snapdragon X Plus 8-core Brings Microsoft Copilot+ to Premium PC Laptops

September 5, 2024
Add A Comment

Comments are closed.

Editors Picks

Berlin-based fintech startup Justhome raises €3.3 million

August 31, 2022

Project S teases an open world multiplayer puzzle game

August 4, 2022

The Best Deals on Apple Gear This Weekend!

May 21, 2023

These working prototypes reveal the Steam Deck’s evolution

September 13, 2022

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

Supermouth Ultim8 electric toothbrush review: Gentle giant

Samsung Galaxy Watch 8 Review: A solid albeit unexciting smartwatch

Huawei MatePad 11.5 review: iPad rival that’s missing a trick

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2025 behindthescreen.fr - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.