Security Guidance

Microsoft Patch Tuesday: November 2022

November 9, 2022

Microsoft Patch Tuesday Nov 2022

Microsoft Patch Tuesday: November 2022

November’s Microsoft Patch Tuesday is met with only 66 total vulnerabilities, but don’t let that mislead you into thinking this was a quiet month. With a massive 10 critical vulnerabilities as well as 2 publicly disclosed and 6 exploited in the wild it seems this month has much to offer.

November’s instalment includes patches for some key services such as:

  • Azure
  • Linux Kernel
  • Microsoft Dynamics
  • Microsoft Exchange Server
  • Microsoft Graphics Component
  • Microsoft Office
  • Network Policy Server (NPS)
  • Role: Windows Hyper-V
  • SysInternals
  • Visual Studio
  • Windows BitLocker
  • Windows HTTP.sys
  • Windows Kerberos
  • Windows Netlogon
  • Windows Point-to-Point Tunneling Protocol
  • Windows Print Spooler Components
  • Windows Win32K

CVE-2022-41073: Windows Print Spooler Elevation of Privilege Vulnerability

This important vulnerability has been found on a popular windows component for hackers, this is the 9th time the Windows Print Spooler component will be patched in 12 months. the latest vulnerability for the windows printer spooler is privilege escalation and has been recorded as being exploited in the wild.

CVE-2022-41091: Windows Mark of the Web Security Feature Bypass Vulnerability

Windows mark of the web is a security feature used to determine files that have been downloaded from untrusted sources. An important vulnerability in this service has led to malicious files bypassing this security feature which would later bypass other security features such as the protected view in Microsoft office. This vulnerability has been publicly disclosed and seen in the wild.

CVE-2022-41128: Windows Scripting Languages Remote Code Execution Vulnerability

This critical exploited in the wild vulnerability is due to weaknesses in windows scripting languages that would allow for remote code execution for the Jscript9 scripting language. If a user visits a website that is hosted or compromised by an attacker that has been specially crafted, then the attacker could conduct remote code execution on the visitor’s device.

CVE-2022-41080: Microsoft Exchange Server Spoofing Vulnerability

The most severe of the exchange server vulnerabilities patched this month was CVE-2022-41080. With a CVSS of 8.8 and the confirmation from Microsoft that this vulnerability is likely to be exploited, technical details surrounding the vulnerability haven’t been disclosed.

The other exchange vulnerability seen this month are:

  • CVE-2022-41123: Microsoft Exchange Server Elevation of Privilege Vulnerability
  • CVE-2022-41082: Microsoft Exchange Server Remote Code Execution Vulnerability
  • CVE-2022-41079: Microsoft Exchange Server Spoofing Vulnerability
  • CVE-2022-41078: Microsoft Exchange Server Spoofing Vulnerability
  • CVE-2022-41040: Microsoft Exchange Server Elevation of Privilege Vulnerability

For a full list of this month’s updates please see the links below:

Patch Tuesday Release Notes: https://msrc.microsoft.com/update-guide/releaseNote/2022-Nov

Security Update Guide: https://msrc.microsoft.com/update-guide/

Author

Stuart Hare is a Technologist with a passion for helping people in all aspects of IT & Cyber Security. Stuart is the Founder of Ironshare, an Information and Cyber Security company providing consultancy and managed services.

Samuel is a Security Analyst with Ironshare, an Information and Cyber Security company providing Security consultancy and managed services.

Joshua is working as a Managed Service Lead with Ironshare, an Information and Cyber Security company providing Security consultancy and managed services.

SUBSCRIBE

Ironshare is a provider of Information and Cyber Security services.

we went with; wizard pi