Description:
Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. The list of security updates can be found at:
https://msrc.microsoft.com/update-guide/releaseNote/2022-Nov
Further to our Security Alerts (A22-09-21 and A22-11-07), reports indicated that the URL rewrite mitigations recommended by Microsoft for the vulnerability on Microsoft Exchange Server (CVE-2022-41082) could be bypassed. System administrators are advised to take immediate action to ensure the latest patches have been applied for your affected systems to mitigate the elevated risk of cyber attacks.
Further to our Security Alert (A22-09-21), Microsoft has released security updates to address the vulnerabilities (CVE-2022-41040 and CVE-2022-41082) in Microsoft Exchange Server. In addition, reports indicated that multiple vulnerabilities (CVE-2022-41073, CVE-2022-41091, CVE-2022-41125 and CVE-2022-41128) in Microsoft Windows and Server are being actively exploited. System administrators are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
Affected Systems:
- Microsoft Windows 7, 8.1, RT 8.1, 10, 11
- Microsoft Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016, 2019, 2022
- Microsoft Office 2013, 2013 RT, 2016, 2019, 2019 for Mac, LTSC 2021, LTSC for Mac 2021
- Microsoft Office Online Server
- Microsoft Office Web Apps Server 2013
- Microsoft Excel 2013, 2013 RT, 2016
- Microsoft Word 2013, 2013 RT, 2016
- Microsoft 365 Apps for Enterprise
- Microsoft Exchange Server 2013, 2016, 2019
- Microsoft SharePoint Foundation 2013
- Microsoft SharePoint Enterprise Server 2013, 2016
- Microsoft SharePoint Server 2019, Subscription Edition
- Microsoft Visual Studio 2017, 2019, 2022
- Azure CLI
- Azure CycleCloud 7, 8
- Azure EFLOW
- Azure RTOS GUIX Studio
- Microsoft Dynamics 365 Business Central 2022 Release Wave 1
- Microsoft .NET Framework 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8, 4.8.1
- Nuget 2.1.2, 4.8.5
Impact:
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, denial of service, elevation of privilege, information disclosure, security feature bypass and spoofing.
Recommendation:
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. System administrators of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
More Information:
- https://msrc.microsoft.com/update-guide/releaseNote/2022-Nov
- https://www.hkcert.org/security-bulletin/microsoft-monthly-security-update-november-2022
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34730
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34732
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34734
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35823
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35837
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37966 (to CVE-2022-37967)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37972 (to CVE-2022-37973)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37975
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37992
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38014 (to CVE-2022-38015)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38022 (to CVE-2022-38023)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38034
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38043
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38045 (to CVE-2022-38046)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39253
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39327
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41035
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41039 (to CVE-2022-41040)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41044 (to CVE-2022-41045)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41047 (to CVE-2022-41058)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41060 (to CVE-2022-41064)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41066
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41073
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41078 (to CVE-2022-41080)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41082
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41085 (to CVE-2022-41086)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41088
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41090 (to CVE-2022-41093)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41095 (to CVE-2022-41107)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41109
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41113 (to CVE-2022-41114)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41116
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41118 (to CVE-2022-41120)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41122 (to CVE-2022-41123)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41125
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41128