• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
microsoft's patch tuesday fixes 70 vulnerabilities after a troublesome january

Microsoft’s Patch Tuesday fixes 70 vulnerabilities after a troublesome January update

You are here: Home / General Cyber Security News / Microsoft’s Patch Tuesday fixes 70 vulnerabilities after a troublesome January update
February 9, 2022

Getty Photos

Microsoft’s latest round of security updates for Windows, frequently referred to as ‘Patch Tuesday’, have been produced addressing a full of 70 vulnerabilities across Microsoft and Windows solutions.

The most up-to-date spherical of patches include fixes for 17 privilege escalation flaws, 16 remote code execution (RCE) issues, 22 Chromium-primarily based Edge browser flaws, and 3 security element bypasses, amid other individuals.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


None of the vulnerabilities are rated critical – categorised by a CVSSv3.1 score of 8.9 or higher – while there are a sizeable quantity that have a score of 8.8, just shy of critical standing and categorised as ‘important’.

There is also no regarded energetic exploitation of any of the 70 vulnerabilities preset by Microsoft at the time of writing, however evidence of notion (PoC) code does exist for a modest selection of them, meaning firms really should apply patches no matter of the degree of exploitation at present.

“It may perhaps have transpired right before, but I can not discover an case in point of a every month launch from Microsoft that does not include things like at least 1 Critical-rated patch,” mentioned Dustin Childs at the Zero-Working day Initiative. 

“It unquestionably has not occurred in new memory. Apparently, Microsoft has preferred to deliver some supplemental explanations of CVSS scores in this month’s release, but there are nonetheless lots of facts about the bugs by themselves that are still left obscured.”

Amid the most serious of the 70 bugs addressed in this week’s update are issues connected to Microsoft SharePoint, an assortment of Windows 10 and Windows Server variations, Azure Info Explorer, and Visible Studio code. 

Patch Tuesday highlights

Windows DNS Server RCE Vulnerability – CVE-2022-21984

Offered a score of 8.8/10, this RCE flaw is among the the most extreme in this week’s patch listing and is regarded as by Microsoft to be a low complexity attack, need lower levels of privileges in get to execute, and could consequence in “a whole loss of availability”. If exploited, the attacker could thoroughly deny access to methods in the impacted ingredient.

Qualys mentioned: “the server is only impacted if dynamic updates are enabled, but this is a rather widespread configuration. An attacker may totally acquire handle of your DNS and execute code with elevated privileges if you have this set up in your surroundings.”

Windows Kernel Elevation of Privilege Vulnerability – CVE-2022-21989

Though on the lower-end of the severity scores with a CVSSv3.1 rating of 7.8/10, this privilege escalation flaw has PoC available which led Microsoft to explain this particular vulnerability as additional probable to be exploited. 

It also pointed out this is a large complexity attack and probable only able to be carried by a advanced menace actor offered that exploitation success is dependent on problems beyond the attacker’s manage. 

“A successful attack can not be achieved at will, but requires the attacker to devote in some measurable amount of work in preparation or execution towards the vulnerable component ahead of a productive attack can be predicted,” explained Microsoft.

Supplied the nearby attack vector, a hacker would either need actual physical obtain to the concentrate on equipment by means of its very own connected keyboard and mouse. Alternatively, a remote  attack could feasibly do the job by means of SSH distant accessibility or tricking a person into opening a destructive document. 

Microsoft SharePoint Server RCE Vulnerability – CVE-2022-22005

One more of the “extra likely” vulnerabilities patched in this update is an 8.8/10-rated RCE flaw impacting Microsoft SharePoint Server. A minimal complexity attack necessitating reduced levels of privileges, Microsoft claimed “an attacker can anticipate repeatable results against the susceptible component” because of to the absent specialised entry problems or extenuating circumstances expected to reach exploitation.

Windows directors can accessibility the updates by way of Microsoft Update Catalogue.

Patch Tuesday challenges

January’s Patch Tuesday brought on to some degree of an uproar among Windows directors past month which led lots of to forgo the myriad security patches produced by Microsoft, such as a number of zero-working day vulnerabilities. 

On line conversations exposed quite a few admins had been complaining that updates were breaking main parts of their organization environments and some uninstalled the updates fully to resume standard get. 

Industry experts at the time commented that security patches are nearly normally proposed to be applied as quickly as they turn into out there, but it “is very considerably a concern of risk administration and risk assessment,” in accordance to Andy Norton, European cyber risk officer at Armis.

It is not normally suggested to overlook security updates, but if they are triggering far more disruption than they possibly may repair, then enterprises might experience it would be superior to hold out a month for a more steady version to be released.

“January’s patch launch could have still left some IT teams experience rather sour as Microsoft experienced to re-issue updates to repair some unanticipated issues caused by the updates,” said Kev Breen, director of cyber threat research at Immersive Labs to IT Pro in relation to modern patches. 

“This must not be applied as an justification to skip updates, but it does boost how critical it is to examination patches in a staging atmosphere or use a staggered rollout, and why monitoring for any adverse impacts should really constantly be a important step in your patching policy.”


Some pieces of this report are sourced from:
www.itpro.co.uk

Previous Post: «us seizes record $3.6 billion in bitcoin from bitfinex hack US seizes record $3.6 billion in Bitcoin from Bitfinex hack
Next Post: Iranian Hackers Using New Marlin Backdoor in ‘Out to Sea’ Espionage Campaign iranian hackers using new marlin backdoor in 'out to sea'»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • US and Korean Agencies Issue Warning on North Korean Cyber-Attacks
  • Malicious PyPI Packages Use Compiled Python Code to Bypass Detection
  • New Botnet Malware ‘Horabot’ Targets Spanish-Speaking Users in Latin America
  • The Importance of Managing Your Data Security Posture
  • Camaro Dragon Strikes with New TinyNote Backdoor for Intelligence Gathering
  • Insurers Predict $33bn Bill for Catastrophic “Cyber Event”
  • Chinese Phishing Gang “PostalFurious” Expands Campaign
  • Kaspersky Says it is Being Targeted By Zero-Click Exploits
  • North Korea’s Kimsuky Group Mimics Key Figures in Targeted Cyber Attacks
  • MOVEit Transfer Under Attack: Zero-Day Vulnerability Actively Being Exploited

Copyright © TheCyberSecurity.News, All Rights Reserved.