• Tech News
  • Fintech
  • Startup
  • Games
  • Ar & Vr
  • Reviews
  • How To
  • More
    • Mobile Tech
    • Pc & Laptop
    • Security
What's Hot

The Naked Gun review: Charged with man’s laughter

July 30, 2025

Samsung Galaxy Tab S10 FE+ review: A Galaxy Tab S10+ for less?

July 30, 2025

Fairphone (Gen 6) review: Sustainability done the right way

July 29, 2025
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
  • Fintech
  • Startup
  • Games
  • Ar & Vr
  • Reviews
  • How To
  • More
    • Mobile Tech
    • Pc & Laptop
    • Security
Behind The ScreenBehind The Screen
Home»Tech News»Microsoft patches 64 vulnerabilities on September Patch Tuesday
Tech News

Microsoft patches 64 vulnerabilities on September Patch Tuesday

September 15, 2022No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
August ’22 a bumper month for high-impact vulnerabilities
Share
Facebook Twitter LinkedIn Pinterest Email

Microsoft’s September Patch Tuesday replace arrived on schedule late on 13 September, and this month contained 5 essential widespread vulnerabilities and exposures (CVEs) and one actively exploited zero-day, amongst a complete of 64 bug fixes.

The zero-day, tracked as CVE-2022-37969, is a privilege elevation vulnerability in Home windows Widespread Log File System Driver. It impacts all variations of Home windows and, if efficiently exploited, an attacker might acquire system-level privileges.

Microsoft stated the zero-day was reported by 4 completely different people or organisations independently of one another, which suggests its exploitation could also be widespread. It’s, nonetheless, solely rated as Essential, with a CVSS rating of seven.8, as a result of it requires a menace actor to be authenticated, however this makes it no much less harmful.

“The assault does require the attacker to have entry and skill to run code on the goal system, however chaining a number of vulnerabilities in an assault is widespread sufficient follow that this must be thought of a minor barrier for menace actors,” stated Chris Goettl, vice-president of safety merchandise at Ivanti.

The September drop additionally features a second publicly disclosed however apparently unexploited vulnerability in ARM-based Home windows 11 methods that might permit cache hypothesis restriction. It’s being tracked as CVE-2022-23960, and is also referred to as Spectre-BHB. It’s a variant of Spectre v2, which has been reinvented a number of occasions and has been dogging numerous processor architectures for 5 years at this level.

“This class of vulnerabilities poses a big headache to the organisations making an attempt mitigation,” stated Bharat Jogi, director of vulnerability and menace analysis at Qualys, “as they usually require updates to the working methods, firmware and, in some circumstances, a recompilation of purposes and hardening. If an attacker efficiently exploits this kind of vulnerability, they may acquire entry to delicate data.”

See also  Building the future of robotics – DailyTech

The opposite essential vulnerabilities patched yesterday are as follows:

  • CVE-2022-34700, a distant code execution (RCE) vulnerability in Microsoft Dynamics 365 (on-prem).
  • CVE-2022-34718, an RCE vulnerability in Home windows TCP/IP.
  • CVE-2022-34721, an RCE vulnerability in Home windows Web Key Trade (IKE) Protocol Extensions.
  • CVE-2022-34722, a second RCE vulnerability in Home windows IKE Protocol Extensions.
  • CVE-2022-35805, an RCE vulnerability in Microsoft Dynamics CRM (on-prem).

Assessing a few of these essential vulnerabilities, Mike Walters, president and co-founder of Action1, a distant monitoring and administration specialist, stated: “CVE-2022-34722 and CVE-2022-34721…each have low complexity for exploitation and permit menace actors to carry out the assault with no person interplay…There is no such thing as a exploit or PoC detected within the wild but; nonetheless, putting in the repair is extremely advisable,” he stated.

Walters additionally warned safety groups to concentrate to CVE-2022-34724, a denial of service vulnerability in Home windows DNS Server, which he stated was more likely to be exploited.

“It’s a community assault with low complexity, but it surely impacts solely methods which can be operating the IPsec service, so if a system doesn’t want the IPsec service, disable it as quickly as attainable,” he stated. “This vulnerability will be exploited in provide chain assaults the place contractor and buyer networks are linked by an IPsec tunnel. When you have IPsec tunnels in your Home windows infrastructure, this replace is a must have.”

Kev Breen of Immersive Labs additionally highlighted some SharePoint RCE vulnerabilities that he stated must be greater on the listing of priorities in organisations which have SharePoint put in.

See also  Microsoft Offered to Sell Bing to Apple as a Google Competitor

“Tracked as CVE-2022-35823, CVE-2022-38008, CVE-2022-38009, and CVE-2022-37961 an attacker would, nonetheless, want authenticated entry with the flexibility to edit present content material. This sort of vulnerability would probably be abused by an attacker who already has the preliminary foothold to maneuver laterally throughout the community,” stated Breen. 

“This might have an effect on organisations that use SharePoint for inside wikis or doc shops. Attackers would possibly exploit this vulnerability to steal confidential data, change paperwork with new variations that comprise malicious code, or macros to contaminate different methods.”

Lastly, Ivanti’s Chris Goettl drew consideration to 2 different bugs of be aware: “There’s a Print Spooler Elevation of Privilege vulnerability – CVE-2022-38005 – resolved this month. Since PrintNightmare, there have been quite a few further Print Spooler vulnerabilities resolved. Some have precipitated further challenges for sure distributors and fashions of printers. When you have skilled challenges, it will be good to check this replace with some further care to make sure no points have an effect on your setting.  

“An elevation of privilege vulnerability – CVE-2022-38007 – in Azure ARC and Azure Visitor Configuration might permit an attacker to switch Microsoft-shipped code with their very own code. This might permit the attacker’s code to be run as root as a daemon within the context of the affected service.”

Source link

Microsoft Patch patches September Tuesday vulnerabilities
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Microsoft To Shut Down Skype In May, Shifting Users To Teams

February 28, 2025

Microsoft Enables iPhone-to-Windows File Sharing for Insiders

December 16, 2024

Microsoft Copilot Vision: AI-Powered Browsing Redefined

December 11, 2024

Qualcomm Snapdragon X Plus 8-core Brings Microsoft Copilot+ to Premium PC Laptops

September 5, 2024
Add A Comment

Comments are closed.

Editors Picks

Sea of Thieves upcoming Season 7 has been slightly delayed

July 17, 2022

Cboe Global Markets migrates corporate data and analytics to the cloud

July 28, 2022

Charter Spectrum hit with $7 billion in punitive damages over 2019 murder

July 30, 2022

Adaptive Battery Management Lands on the iPhone in iOS 26

June 12, 2025

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

The Naked Gun review: Charged with man’s laughter

Samsung Galaxy Tab S10 FE+ review: A Galaxy Tab S10+ for less?

Fairphone (Gen 6) review: Sustainability done the right way

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2025 behindthescreen.fr - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.