Issued: Wednesday, 12 January, 2022 |
Last Revision: Wednesday, 12 January, 2022 |
Vendor: |
Product: |
Severity Level: |
Microsoft has released patches for 97 vulnerabilities with nine classified as critical, eighty eight classified as important including six zero-days. Fortunately, none of these (zero-days) vulnerabilities have been actively exploited. Though, public exploit code for two of them (CVE-2022-21919 and CVE-2022-21836) is available.
In Jan 2022 Microsoft has fixed problems of Privilege escalation, Remote Code Execution, Cross-site scripting (XSS), Security Feature Bypass, Information Disclosure, Denial of Service, and Spoofing Vulnerabilities.
Products patched in this month security update includes Microsoft Windows and Windows Components, Microsoft Edge (Chromium-based), Exchange Server, Microsoft Office and Office Components, SharePoint Server, .NET Framework, Microsoft Dynamics, Open-Source Software, Windows Hyper-V, Windows Defender, and Windows Remote Desktop Protocol (RDP).
CVE/Vulnerability | Description | CVSS3.0 Score |
CVE-2021-22947 | Open Source Curl Remote Code Execution Vulnerability | 5.9 |
CVE-2021-36976 | Lib archive Remote Code Execution Vulnerability | 6.5 |
CVE-2022-21919 | Windows User Profile Service Elevation of Privilege Vulnerability | 7.0 |
CVE-2022-21836 | Windows Certificate Spoofing Vulnerability | 7.8 |
CVE-2022-21839 | Windows Event Tracing Discretionary Access Control List Denial of Service Vulnerability | 6.1 |
CVE-2022-21874 | Windows Security Center API Remote Code Execution Vulnerability | 7.8 |
CVE-2022-21907 | HTTP Protocol Stack Remote Code Execution Vulnerability | 9.8 |
CVE-2022-21840 | Microsoft Office Remote Code Execution Vulnerability | 8.8 |
CVE-2022-21846 | Microsoft Exchange Server Remote Code Execution Vulnerability | 9.0 |
CVE-2021-22947 | Open Source Curl Remote Code Execution Vulnerability | 5.9 |
CVE-2022-21857 | Active Directory Domain Services Elevation of Privilege Vulnerability | 8.8 |
CVE-2022-21833 | Virtual Machine IDE Drive Elevation of Privilege Vulnerability | 7.8 |
CVE-2022-21912 | DirectX Graphics Kernel Remote Code Execution Vulnerability | 7.8 |
CVE-2022-21898 | DirectX Graphics Kernel Remote Code Execution Vulnerability | 7.8 |
CVE-2022-21917 | HEVC Video Extensions Remote Code Execution Vulnerability | 7.8 |
Table 1: Vulnerability details
Security Update Types | Affected Product(s) |
Critical | Windows 10 for 32-bit Systems Windows 10 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems Windows 10 Version 1809 for ARM64-based Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 1909 for 32-bit Systems Windows 10 Version 1909 for ARM64-based Systems Windows 10 Version 1909 for x64-based Systems Windows 10 Version 20H2 for 32-bit Systems Windows 10 Version 20H2 for ARM64-based Systems Windows 10 Version 20H2 for x64-based Systems Windows 10 Version 21H1 for 32-bit Systems Windows 10 Version 21H1 for ARM64-based Systems Windows 10 Version 21H1 for x64-based Systems Windows 10 Version 21H2 for 32-bit Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for x64-based Systems Windows 11 for ARM64-based Systems Windows 11 for x64-based Systems Windows 8.1 for 32-bit systems Windows 8.1 for x64-based systems Windows RT 8.1 Windows Server 2012 Windows Server 2012 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 R2 (Server Core installation) Windows Server 2016 Windows Server 2016 (Server Core installation) Windows Server 2019 Windows Server 2019 (Server Core installation) Windows Server 2022 Windows Server 2022 (Server Core installation) Windows Server, version 20H2 (Server Core Installation) Microsoft 365 Apps for Enterprise for 32-bit Systems Microsoft 365 Apps for Enterprise for 64-bit Systems Microsoft Excel 2013 RT Service Pack 1 Microsoft Excel 2013 Service Pack 1 (32-bit editions) Microsoft Excel 2013 Service Pack 1 (64-bit editions) Microsoft Excel 2016 (32-bit edition) Microsoft Excel 2016 (64-bit edition) Microsoft Office 2013 RT Service Pack 1 Microsoft Office 2013 Service Pack 1 (32-bit editions) Microsoft Office 2013 Service Pack 1 (64-bit editions) Microsoft Office 2016 (32-bit edition) Microsoft Office 2016 (64-bit edition) Microsoft Office 2019 for 32-bit editions Microsoft Office 2019 for 64-bit editions Microsoft Office 2019 for Mac Microsoft Office LTSC 2021 for 32-bit editions Microsoft Office LTSC 2021 for 64-bit editions Microsoft Office LTSC for Mac 2021 Microsoft Office Online Server Microsoft Office Web Apps Server 2013 Service Pack 1 Microsoft SharePoint Enterprise Server 2013 Service Pack 1 Microsoft SharePoint Enterprise Server 2016 Microsoft SharePoint Foundation 2013 Service Pack 1 Microsoft SharePoint Server 2019 Microsoft SharePoint Server Subscription Edition Microsoft Word 2016 (32-bit edition) Microsoft Word 2016 (64-bit edition) SharePoint Server Subscription Edition Language Pack Microsoft Exchange Server 2013 Cumulative Update 23 Microsoft Exchange Server 2016 Cumulative Update 21 Microsoft Exchange Server 2016 Cumulative Update 22 Microsoft Exchange Server 2019 Cumulative Update 10 Microsoft Exchange Server 2019 Cumulative Update 11 HEVC Video Extensions Remote Desktop client for Windows Desktop |
|
|
Important | Microsoft .NET Framework 2.0 Service Pack 2 Microsoft .NET Framework 3.5 Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 Microsoft .NET Framework 3.5 AND 4.7.2 Microsoft .NET Framework 3.5 AND 4.8 Microsoft .NET Framework 3.5.1 Microsoft .NET Framework 4.5.2 Microsoft .NET Framework 4.6 Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 Microsoft .NET Framework 4.8 Dynamics 365 Sales Microsoft Dynamics 365 Customer Engagement V9.0 Microsoft Dynamics 365 Customer Engagement V9.1 |
Table 2: Vulnerable versions
Microsoft has released patches to address these vulnerabilities, organizations are encouraged to apply patches as soon as possible.
