Description:
Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. The list of security updates can be found at:
https://msrc.microsoft.com/update-guide/releaseNote/2022-Dec
Reports indicated that a security feature bypass vulnerability (CVE-2022-44698) in Microsoft Windows and Server is being exploited in the wild. System administrators and users are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
Affected Systems:
- Microsoft Windows 7, 8.1, RT 8.1, 10, 11
- Microsoft Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016, 2019, 2022
- Microsoft Windows Server 2022 Datacenter: Azure Edition
- Microsoft Office 2019, 2019 for Mac, LTSC 2021, LTSC for Mac 2021
- Microsoft Outlook for Android
- Microsoft SharePoint Foundation 2013
- Microsoft SharePoint Enterprise Server 2013, 2016
- Microsoft SharePoint Server 2019, Subscription Edition
- Microsoft Visio 2013, 2016
- Microsoft Visual Studio 2019, 2022
- Microsoft 365 Apps for Enterprise
- Microsoft Dynamics 365 Business Central 2019, 2020, 2021, 2022
- Microsoft Dynamics NAV 2016, 2017, 2018
- Microsoft Windows Subsystem for Linux (WSL2)
- Microsoft Windows Sysmon
- Microsoft Windows Terminal for Windows 10, Terminal for Windows 11
- Microsoft .NET Framework 2.0, 3.0, 3.5, 3.5.1, 4.6, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8, 4.8.1
- .NET 6.0, 7.0
- .NET Core 3.1
- PowerShell 7.2, 7.3
- Azure Network Watcher VM Extension
- Raw Image Extension
- Remote Desktop client for Windows Desktop
Impact:
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, denial of service, elevation of privilege, information disclosure, security feature bypass and spoofing.
Recommendation:
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. System administrators and users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
More Information:
- https://msrc.microsoft.com/update-guide/releaseNote/2022-Dec
- https://www.hkcert.org/security-bulletin/microsoft-monthly-security-update-december-2022
- https://www.cisa.gov/uscert/ncas/current-activity/2022/12/13/microsoft-releases-december-2022-security-updates
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24480
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26804 (to CVE-2022-26806)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41074
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41076 (to CVE-2022-41077)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41089
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41094
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41121
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41127
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44666 (to CVE-2022-44671)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44673 (to CVE-2022-44683)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44687
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44689 (to CVE-2022-44699)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44702
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44704
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44707
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44710
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44713
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47211 (to CVE-2022-47213)