Detection and Response

Patch Tuesday - November 2022

|Last updated on Nov 8, 2022|1 min read
LinkedInFacebookX
Patch Tuesday - November 2022

It’s a relatively light Patch Tuesday this month by the numbers – Microsoft has only published 67 new CVEs, most of which affect their flagship Windows operating system. However, four of these are zero-days, having been observed as exploited in the wild.

The big news is that two older zero-day CVEs affecting Exchange Server, made public at the end of September, have finally been fixed. CVE-2022-41040 is a “Critical” elevation of privilege vulnerability, and CVE-2022-41082 is considered Important, allowing Remote Code Execution (RCE) when PowerShell is accessible to the attacker. Both vulnerabilities have been exploited in the wild. Four other CVEs affecting Exchange Server have also been addressed this month. Three are rated as Important, and CVE-2022-41080 is another privilege escalation vulnerability considered Critical. Customers are advised to update their Exchange Server systems immediately, regardless of whether any previously recommended mitigation steps have been applied. The mitigation rules are no longer recommended once systems have been patched.

Three of the new zero-day vulnerabilities are:

  • CVE-2022-41128, a Critical RCE affecting the JScript9 scripting language (Microsoft’s legacy JavaScript dialect, used by their Internet Explorer browser).
  • CVE-2022-41073 is the latest in a storied history of vulnerabilities affecting the Windows Print Spooler, allowing privilege escalation and considered Important.
  • CVE-2022-41125 is also an Important privilege escalation vulnerability, affecting the Windows Next-generation Cryptography (CNG) Key Isolation service.

The fourth zero-day, CVE-2022-41091, was previously disclosed and widely reported on in October. It is a Security Feature Bypass of “Windows Mark of the Web” – a mechanism meant to flag files that have come from an untrusted source.

Exchange Server admins are not the only ones on the hook this month: SharePoint Server is affected by CVE-2022-41062, an Important RCE that could allow an attacker who has Site Member privileges to execute code remotely on the server. CVE-2022-41122, a Spoofing vulnerability that Microsoft rates as “Exploitation more likely” than not, was actually addressed in September’s SharePoint patches but not included in their Security Update Guide at the time.

This month also sees Microsoft’s third non-CVE security advisory of the year, ADV220003, which is a “defense-in-depth” update for older versions of Microsoft Office (2013 and 2016) that improves validation of documents protected via Microsoft’s Information Rights Management (IRM) technology – a feature of somewhat dubious value, meant to help prevent sensitive information from being printed, forwarded, or copied without authorization.

Summary charts

2022-11-vuln_count_severity.png2022-11-vuln_count_impact.png2022-11-cvssv3_hist.png2022-11-vuln_count_component.png

Summary tables

Azure vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2022-41051Azure RTOS GUIX Studio Remote Code Execution VulnerabilityNoNo7.8
CVE-2022-41085Azure CycleCloud Elevation of Privilege VulnerabilityNoNo7.5
CVE-2022-39327GitHub: CVE-2022-39327 Improper Control of Generation of Code ('Code Injection') in Azure CLINoNoN/A

Developer Tools vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2022-41119Visual Studio Remote Code Execution VulnerabilityNoNo7.8
CVE-2022-41120Microsoft Windows Sysmon Elevation of Privilege VulnerabilityNoNo7.8
CVE-2022-41064.NET Framework Information Disclosure VulnerabilityNoNo5.8
CVE-2022-39253GitHub: CVE-2022-39253 Local clone optimization dereferences symbolic links by defaultNoNoN/A

ESU vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2022-41044Windows Point-to-Point Tunneling Protocol Remote Code Execution VulnerabilityNoNo8.1
CVE-2022-41116Windows Point-to-Point Tunneling Protocol Denial of Service VulnerabilityNoNo5.9

ESU Windows vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2022-41128Windows Scripting Languages Remote Code Execution VulnerabilityYesNo8.8
CVE-2022-41047Microsoft ODBC Driver Remote Code Execution VulnerabilityNoNo8.8
CVE-2022-41048Microsoft ODBC Driver Remote Code Execution VulnerabilityNoNo8.8
CVE-2022-41039Windows Point-to-Point Tunneling Protocol Remote Code Execution VulnerabilityNoNo8.1
CVE-2022-37966Windows Kerberos RC4-HMAC Elevation of Privilege VulnerabilityNoNo8.1
CVE-2022-38023Netlogon RPC Elevation of Privilege VulnerabilityNoNo8.1
CVE-2022-41109Windows Win32k Elevation of Privilege VulnerabilityNoNo7.8
CVE-2022-41073Windows Print Spooler Elevation of Privilege VulnerabilityYesNo7.8
CVE-2022-41057Windows HTTP.sys Elevation of Privilege VulnerabilityNoNo7.8
CVE-2022-37992Windows Group Policy Elevation of Privilege VulnerabilityNoNo7.8
CVE-2022-41095Windows Digital Media Receiver Elevation of Privilege VulnerabilityNoNo7.8
CVE-2022-41045Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege VulnerabilityNoNo7.8
CVE-2022-41118Windows Scripting Languages Remote Code Execution VulnerabilityNoNo7.5
CVE-2022-41058Windows Network Address Translation (NAT) Denial of Service VulnerabilityNoNo7.5
CVE-2022-41053Windows Kerberos Denial of Service VulnerabilityNoNo7.5
CVE-2022-41056Network Policy Server (NPS) RADIUS Protocol Denial of Service VulnerabilityNoNo7.5
CVE-2022-37967Windows Kerberos Elevation of Privilege VulnerabilityNoNo7.2
CVE-2022-41097Network Policy Server (NPS) RADIUS Protocol Information Disclosure VulnerabilityNoNo6.5
CVE-2022-41086Windows Group Policy Elevation of Privilege VulnerabilityNoNo6.4
CVE-2022-41090Windows Point-to-Point Tunneling Protocol Denial of Service VulnerabilityNoNo5.9
CVE-2022-41098Windows GDI+ Information Disclosure VulnerabilityNoNo5.5
CVE-2022-23824AMD: CVE-2022-23824 IBPB and Return Address Predictor InteractionsNoNoN/A

Exchange Server vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2022-41080Microsoft Exchange Server Elevation of Privilege VulnerabilityNoNo8.8
CVE-2022-41078Microsoft Exchange Server Spoofing VulnerabilityNoNo8
CVE-2022-41079Microsoft Exchange Server Spoofing VulnerabilityNoNo8
CVE-2022-41123Microsoft Exchange Server Elevation of Privilege VulnerabilityNoNo7.8

Microsoft Dynamics vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2022-41066Microsoft Business Central Information Disclosure VulnerabilityNoNo4.4

Microsoft Office vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2022-41062Microsoft SharePoint Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2022-41061Microsoft Word Remote Code Execution VulnerabilityNoNo7.8
CVE-2022-41107Microsoft Office Graphics Remote Code Execution VulnerabilityNoNo7.8
CVE-2022-41106Microsoft Excel Remote Code Execution VulnerabilityNoNo7.8
CVE-2022-41063Microsoft Excel Remote Code Execution VulnerabilityNoNo7.8
CVE-2022-41122Microsoft SharePoint Server Spoofing VulnerabilityNoNo6.5
CVE-2022-41060Microsoft Word Information Disclosure VulnerabilityNoNo5.5
CVE-2022-41103Microsoft Word Information Disclosure VulnerabilityNoNo5.5
CVE-2022-41104Microsoft Excel Security Feature Bypass VulnerabilityNoNo5.5
CVE-2022-41105Microsoft Excel Information Disclosure VulnerabilityNoNo5.5

Open Source Software Azure vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2022-38014Windows Subsystem for Linux (WSL2) Kernel Elevation of Privilege VulnerabilityNoNo7
CVE-2022-3786OpenSSL: CVE-2022-3786 X.509 certificate verification buffer overrunNoNoN/A
CVE-2022-3602OpenSSL: CVE-2022-3602 X.509 certificate verification buffer overrunNoNoN/A

Windows vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2022-41088Windows Point-to-Point Tunneling Protocol Remote Code Execution VulnerabilityNoNo8.1
CVE-2022-41092Windows Win32k Elevation of Privilege VulnerabilityNoNo7.8
CVE-2022-41113Windows Win32 Kernel Subsystem Elevation of Privilege VulnerabilityNoNo7.8
CVE-2022-41054Windows Resilient File System (ReFS) Elevation of Privilege VulnerabilityNoNo7.8
CVE-2022-41101Windows Overlay Filter Elevation of Privilege VulnerabilityNoNo7.8
CVE-2022-41102Windows Overlay Filter Elevation of Privilege VulnerabilityNoNo7.8
CVE-2022-41052Windows Graphics Component Remote Code Execution VulnerabilityNoNo7.8
CVE-2022-41050Windows Extensible File Allocation Table Elevation of Privilege VulnerabilityNoNo7.8
CVE-2022-41125Windows CNG Key Isolation Service Elevation of Privilege VulnerabilityYesNo7.8
CVE-2022-41100Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege VulnerabilityNoNo7.8
CVE-2022-41093Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege VulnerabilityNoNo7.8
CVE-2022-41096Microsoft DWM Core Library Elevation of Privilege VulnerabilityNoNo7.8
CVE-2022-41114Windows Bind Filter Driver Elevation of Privilege VulnerabilityNoNo7
CVE-2022-38015Windows Hyper-V Denial of Service VulnerabilityNoNo6.5
CVE-2022-41055Windows Human Interface Device Information Disclosure VulnerabilityNoNo5.5
CVE-2022-41091Windows Mark of the Web Security Feature Bypass VulnerabilityYesYes5.4
CVE-2022-41049Windows Mark of the Web Security Feature Bypass VulnerabilityNoNo5.4
CVE-2022-41099BitLocker Security Feature Bypass VulnerabilityNoNo4.6

Related blog posts