• Tech News
  • Fintech
  • Startup
  • Games
  • Ar & Vr
  • Reviews
  • How To
  • More
    • Mobile Tech
    • Pc & Laptop
    • Security
What's Hot

8 Fantastic Battery-Saving Tips That Actually Work

September 13, 2025

Dyson V16 Piston Animal review: Anti-hair wrap tech that actually works

September 11, 2025

How to Make Your iPhone Feel Brand New Without Upgrading

September 8, 2025
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
  • Fintech
  • Startup
  • Games
  • Ar & Vr
  • Reviews
  • How To
  • More
    • Mobile Tech
    • Pc & Laptop
    • Security
Behind The ScreenBehind The Screen
Home»Tech News»Microsoft patches 64 vulnerabilities on September Patch Tuesday
Tech News

Microsoft patches 64 vulnerabilities on September Patch Tuesday

September 15, 2022No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
August ’22 a bumper month for high-impact vulnerabilities
Share
Facebook Twitter LinkedIn Pinterest Email

Microsoft’s September Patch Tuesday replace arrived on schedule late on 13 September, and this month contained 5 essential widespread vulnerabilities and exposures (CVEs) and one actively exploited zero-day, amongst a complete of 64 bug fixes.

The zero-day, tracked as CVE-2022-37969, is a privilege elevation vulnerability in Home windows Widespread Log File System Driver. It impacts all variations of Home windows and, if efficiently exploited, an attacker might acquire system-level privileges.

Microsoft stated the zero-day was reported by 4 completely different people or organisations independently of one another, which suggests its exploitation could also be widespread. It’s, nonetheless, solely rated as Essential, with a CVSS rating of seven.8, as a result of it requires a menace actor to be authenticated, however this makes it no much less harmful.

“The assault does require the attacker to have entry and skill to run code on the goal system, however chaining a number of vulnerabilities in an assault is widespread sufficient follow that this must be thought of a minor barrier for menace actors,” stated Chris Goettl, vice-president of safety merchandise at Ivanti.

The September drop additionally features a second publicly disclosed however apparently unexploited vulnerability in ARM-based Home windows 11 methods that might permit cache hypothesis restriction. It’s being tracked as CVE-2022-23960, and is also referred to as Spectre-BHB. It’s a variant of Spectre v2, which has been reinvented a number of occasions and has been dogging numerous processor architectures for 5 years at this level.

“This class of vulnerabilities poses a big headache to the organisations making an attempt mitigation,” stated Bharat Jogi, director of vulnerability and menace analysis at Qualys, “as they usually require updates to the working methods, firmware and, in some circumstances, a recompilation of purposes and hardening. If an attacker efficiently exploits this kind of vulnerability, they may acquire entry to delicate data.”

See also  T-Mobile will use Starlink satellites to blanket the US with text coverage

The opposite essential vulnerabilities patched yesterday are as follows:

  • CVE-2022-34700, a distant code execution (RCE) vulnerability in Microsoft Dynamics 365 (on-prem).
  • CVE-2022-34718, an RCE vulnerability in Home windows TCP/IP.
  • CVE-2022-34721, an RCE vulnerability in Home windows Web Key Trade (IKE) Protocol Extensions.
  • CVE-2022-34722, a second RCE vulnerability in Home windows IKE Protocol Extensions.
  • CVE-2022-35805, an RCE vulnerability in Microsoft Dynamics CRM (on-prem).

Assessing a few of these essential vulnerabilities, Mike Walters, president and co-founder of Action1, a distant monitoring and administration specialist, stated: “CVE-2022-34722 and CVE-2022-34721…each have low complexity for exploitation and permit menace actors to carry out the assault with no person interplay…There is no such thing as a exploit or PoC detected within the wild but; nonetheless, putting in the repair is extremely advisable,” he stated.

Walters additionally warned safety groups to concentrate to CVE-2022-34724, a denial of service vulnerability in Home windows DNS Server, which he stated was more likely to be exploited.

“It’s a community assault with low complexity, but it surely impacts solely methods which can be operating the IPsec service, so if a system doesn’t want the IPsec service, disable it as quickly as attainable,” he stated. “This vulnerability will be exploited in provide chain assaults the place contractor and buyer networks are linked by an IPsec tunnel. When you have IPsec tunnels in your Home windows infrastructure, this replace is a must have.”

Kev Breen of Immersive Labs additionally highlighted some SharePoint RCE vulnerabilities that he stated must be greater on the listing of priorities in organisations which have SharePoint put in.

See also  28% of Americans still won’t consider buying an EV – DailyTech

“Tracked as CVE-2022-35823, CVE-2022-38008, CVE-2022-38009, and CVE-2022-37961 an attacker would, nonetheless, want authenticated entry with the flexibility to edit present content material. This sort of vulnerability would probably be abused by an attacker who already has the preliminary foothold to maneuver laterally throughout the community,” stated Breen. 

“This might have an effect on organisations that use SharePoint for inside wikis or doc shops. Attackers would possibly exploit this vulnerability to steal confidential data, change paperwork with new variations that comprise malicious code, or macros to contaminate different methods.”

Lastly, Ivanti’s Chris Goettl drew consideration to 2 different bugs of be aware: “There’s a Print Spooler Elevation of Privilege vulnerability – CVE-2022-38005 – resolved this month. Since PrintNightmare, there have been quite a few further Print Spooler vulnerabilities resolved. Some have precipitated further challenges for sure distributors and fashions of printers. When you have skilled challenges, it will be good to check this replace with some further care to make sure no points have an effect on your setting.  

“An elevation of privilege vulnerability – CVE-2022-38007 – in Azure ARC and Azure Visitor Configuration might permit an attacker to switch Microsoft-shipped code with their very own code. This might permit the attacker’s code to be run as root as a daemon within the context of the affected service.”

Source link

Microsoft Patch patches September Tuesday vulnerabilities
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Microsoft To Shut Down Skype In May, Shifting Users To Teams

February 28, 2025

Microsoft Enables iPhone-to-Windows File Sharing for Insiders

December 16, 2024

Microsoft Copilot Vision: AI-Powered Browsing Redefined

December 11, 2024

Qualcomm Snapdragon X Plus 8-core Brings Microsoft Copilot+ to Premium PC Laptops

September 5, 2024
Add A Comment

Comments are closed.

Editors Picks

FX HedgePool hires Karen Phillips as head of business development

September 26, 2022

Google put Parler’s app back in the Play Store

September 3, 2022

Canadian Securities Administrators strengthens crypto oversight

December 12, 2022

The best passive bookshelf speakers for most people

March 28, 2023

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

8 Fantastic Battery-Saving Tips That Actually Work

Dyson V16 Piston Animal review: Anti-hair wrap tech that actually works

How to Make Your iPhone Feel Brand New Without Upgrading

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2025 behindthescreen.fr - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.