Description:
Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. The list of security updates can be found at:
- https://msrc.microsoft.com/update-guide/releaseNote/2022-Jun
- https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#june-13-2022
Further to our High Threat Security Alert (A22-05-17), Microsoft has released the patch for the remote code execution vulnerability (CVE-2022-30190). In addition, reports indicated that multiple vulnerabilities (CVE-2022-30136, CVE-2022-30139 and CVE-2022-30163) in Microsoft Windows and Server are at a high risk of exploitation. System administrators are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks. If the security patch for CVE-2022-30190 could not be applied immediately, administrators of affected systems should ensure the temporary workaround recommended by Microsoft has been implemented.
Affected Systems:
- Microsoft Windows 7, 8.1, RT 8.1, 10, 11
- Microsoft Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016, 2019, 2022, 2022 Azure Edition Core Hotpatch
- Microsoft Windows Server, version 20H2
- Microsoft Edge (Chromium-based) prior to version 102.0.1245.41
- Microsoft Office LTSC 2021
- Microsoft Office Online Server
- Microsoft Office Web Apps Server 2013
- Microsoft Excel 2013, 2013 RT, 2016
- Microsoft 365 Apps for Enterprise
- Microsoft SharePoint Foundation 2013
- Microsoft SharePoint Enterprise Server 2013, 2016
- Microsoft SharePoint Server 2013, 2019, Subscription Edition
- Microsoft SQL Server 2014, 2016, 2017, 2019
- Microsoft Visual Studio 2019, 2022
- Visual Studio 2019 for Mac version 8.10, 2022 for Mac version 17.0
- .NET 6.0
- .NET Core 3.1
- AV1 Video Extension
- HEVC Video Extensions
Impact:
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, denial of service, elevation of privilege, information disclosure, security feature bypass and spoofing.
Recommendation:
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
More Information:
- https://msrc.microsoft.com/update-guide/releaseNote/2022-Jun
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30190
- https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#june-13-2022
- https://www.hkcert.org/security-bulletin/microsoft-monthly-security-update-june-2022
- https://www.hkcert.org/security-bulletin/microsoft-products-remote-code-execution-vulnerability_20220531
- https://www.cisa.gov/uscert/ncas/current-activity/2022/06/14/microsoft-releases-june-2022-security-updates
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2007 (to CVE-2022-2008)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2010 (to CVE-2022-2011)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22018
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29111
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29119
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29143
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29149
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30131 (to CVE-2022-30132)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30135 (to CVE-2022-30137)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30139 (to CVE-2022-30143)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30145 (to CVE-2022-30155)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30157 (to CVE-2022-30168)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30171 (to CVE-2022-30174)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30177 (to CVE-2022-30180)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30184
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30188 (to CVE-2022-30190)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30193
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32230