Coming Soon...

Q-CERT website is currently under maintenance. We should be back shortly. Thank you for yor patience.

Microsoft Patch Tuesday- Jan 2022

Issued: 
Wednesday, 12 January, 2022
Last Revision: 
Wednesday, 12 January, 2022
Vendor: 
Severity Level: 
Summary: 

Microsoft has released patches for 97 vulnerabilities with nine classified as critical, eighty eight classified as important including six zero-days. Fortunately, none of these (zero-days) vulnerabilities have been actively exploited. Though, public exploit code for two of them (CVE-2022-21919 and CVE-2022-21836) is available.

 

In Jan 2022 Microsoft has fixed problems of Privilege escalation, Remote Code Execution, Cross-site scripting (XSS), Security Feature Bypass, Information Disclosure, Denial of Service, and Spoofing Vulnerabilities. 

 

Products patched in this month security update includes Microsoft Windows and Windows Components, Microsoft Edge (Chromium-based), Exchange Server, Microsoft Office and Office Components, SharePoint Server, .NET Framework, Microsoft Dynamics, Open-Source Software, Windows Hyper-V, Windows Defender, and Windows Remote Desktop Protocol (RDP). 

 

 

CVE/Vulnerability

                 Description 

CVSS3.0 Score

CVE-2021-22947

Open Source Curl Remote Code Execution Vulnerability

5.9

CVE-2021-36976   

Lib archive Remote Code Execution Vulnerability

6.5

CVE-2022-21919   

Windows User Profile Service Elevation of Privilege Vulnerability

7.0

CVE-2022-21836   

Windows Certificate Spoofing Vulnerability

7.8

CVE-2022-21839   

Windows Event Tracing Discretionary Access Control List Denial of Service Vulnerability

6.1

CVE-2022-21874

Windows Security Center API Remote Code Execution Vulnerability

7.8

CVE-2022-21907

HTTP Protocol Stack Remote Code Execution Vulnerability

9.8

CVE-2022-21840

Microsoft Office Remote Code Execution Vulnerability

8.8

CVE-2022-21846

Microsoft Exchange Server Remote Code Execution Vulnerability

9.0

CVE-2021-22947

Open Source Curl Remote Code Execution Vulnerability

5.9

CVE-2022-21857

Active Directory Domain Services Elevation of Privilege Vulnerability

8.8

CVE-2022-21833

Virtual Machine IDE Drive Elevation of Privilege Vulnerability

7.8

CVE-2022-21912

DirectX Graphics Kernel Remote Code Execution Vulnerability

7.8

CVE-2022-21898

DirectX Graphics Kernel Remote Code Execution Vulnerability

7.8

CVE-2022-21917

HEVC Video Extensions Remote Code Execution Vulnerability

7.8

 

Table 1: Vulnerability details 

 

 

 

Security Update Types

   Affected Product(s)

Critical

Windows 10 for 32-bit Systems

Windows 10 for x64-based Systems

Windows 10 Version 1607 for 32-bit Systems

Windows 10 Version 1607 for x64-based Systems

Windows 10 Version 1809 for 32-bit Systems

Windows 10 Version 1809 for ARM64-based Systems

Windows 10 Version 1809 for x64-based Systems

Windows 10 Version 1909 for 32-bit Systems

Windows 10 Version 1909 for ARM64-based Systems

Windows 10 Version 1909 for x64-based Systems

Windows 10 Version 20H2 for 32-bit Systems

Windows 10 Version 20H2 for ARM64-based Systems

Windows 10 Version 20H2 for x64-based Systems

Windows 10 Version 21H1 for 32-bit Systems

Windows 10 Version 21H1 for ARM64-based Systems

Windows 10 Version 21H1 for x64-based Systems

Windows 10 Version 21H2 for 32-bit Systems

Windows 10 Version 21H2 for ARM64-based Systems

Windows 10 Version 21H2 for x64-based Systems

Windows 11 for ARM64-based Systems

Windows 11 for x64-based Systems

Windows 8.1 for 32-bit systems

Windows 8.1 for x64-based systems

Windows RT 8.1

Windows Server 2012

Windows Server 2012 (Server Core installation)

Windows Server 2012 R2

Windows Server 2012 R2 (Server Core installation)

Windows Server 2016

Windows Server 2016 (Server Core installation)

Windows Server 2019

Windows Server 2019 (Server Core installation)

Windows Server 2022

Windows Server 2022 (Server Core installation)

Windows Server, version 20H2 (Server Core Installation)

Microsoft 365 Apps for Enterprise for 32-bit Systems

Microsoft 365 Apps for Enterprise for 64-bit Systems

Microsoft Excel 2013 RT Service Pack 1

Microsoft Excel 2013 Service Pack 1 (32-bit editions)

Microsoft Excel 2013 Service Pack 1 (64-bit editions)

Microsoft Excel 2016 (32-bit edition)

Microsoft Excel 2016 (64-bit edition)

Microsoft Office 2013 RT Service Pack 1

Microsoft Office 2013 Service Pack 1 (32-bit editions)

Microsoft Office 2013 Service Pack 1 (64-bit editions)

Microsoft Office 2016 (32-bit edition)

Microsoft Office 2016 (64-bit edition)

Microsoft Office 2019 for 32-bit editions

Microsoft Office 2019 for 64-bit editions

Microsoft Office 2019 for Mac

Microsoft Office LTSC 2021 for 32-bit editions

Microsoft Office LTSC 2021 for 64-bit editions

Microsoft Office LTSC for Mac 2021

Microsoft Office Online Server

Microsoft Office Web Apps Server 2013 Service Pack 1

Microsoft SharePoint Enterprise Server 2013 Service Pack 1

Microsoft SharePoint Enterprise Server 2016

Microsoft SharePoint Foundation 2013 Service Pack 1

Microsoft SharePoint Server 2019

Microsoft SharePoint Server Subscription Edition

Microsoft Word 2016 (32-bit edition)

Microsoft Word 2016 (64-bit edition)

SharePoint Server Subscription Edition Language Pack

Microsoft Exchange Server 2013 Cumulative Update 23

Microsoft Exchange Server 2016 Cumulative Update 21

Microsoft Exchange Server 2016 Cumulative Update 22

Microsoft Exchange Server 2019 Cumulative Update 10

Microsoft Exchange Server 2019 Cumulative Update 11

HEVC Video Extensions

Remote Desktop client for Windows Desktop

 

 

Important

Microsoft .NET Framework 2.0 Service Pack 2

Microsoft .NET Framework 3.5

Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2

Microsoft .NET Framework 3.5 AND 4.7.2

Microsoft .NET Framework 3.5 AND 4.8

Microsoft .NET Framework 3.5.1

Microsoft .NET Framework 4.5.2

Microsoft .NET Framework 4.6

Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2

Microsoft .NET Framework 4.8

Dynamics 365 Sales

Microsoft Dynamics 365 Customer Engagement V9.0

Microsoft Dynamics 365 Customer Engagement V9.1

 

                                                                                     Table 2: Vulnerable versions                                  

 

 

Recommendation: 

Microsoft has released patches to address these vulnerabilities, organizations are encouraged to apply patches as soon as possible.