Published on: 12 January 2022
Last update on: 14 January 2022
Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. The list of security updates can be found at:
https://msrc.microsoft.com/update-guide/releaseNote/2022-Jan
Reports indicated that the technical details of multiple vulnerabilities in Microsoft Windows and Server (CVE-2021-22947, CVE-2021-36976, CVE-2022-21836, CVE-2022-21839, CVE-2022-21874 and CVE-2022-21919) were publicly disclosed and at a high risk of exploitation. System administrators are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
Further to our Security Alert (A22-01-07), Microsoft has released additional information on the remote code execution vulnerability (CVE-2022-21907) affecting a number of Windows 10 and 11, as well as Server 2019 and 2022 build versions. An unauthenticated remote attacker could send a specially crafted packet to the targeted server to exploit the vulnerability. System administrators are advised to take immediate actions to patch your affected systems to mitigate the elevated risk of cyber attacks.
For detailed information on the affected Windows and Server build versions and the corresponding security patches, please refer to the following vendor’s URL:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21907
Please note that Windows Server 2019 and Windows 10 version 1809 are not vulnerable by default unless the registry value "EnableTrailerSupport" is enabled. System administrators are advised to confirm if the registry value “EnableTrailerSupport” is present under: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\HTTP\Parameters.
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, denial of service, elevation of privilege, information disclosure, security feature bypass and spoofing.
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.