Issued: Thursday, 10 February, 2022 |
Last Revision: Thursday, 10 February, 2022 |
Vendor: |
Product: |
Severity Level: |
Microsoft has released patches for 48 vulnerabilities with most of them are classified as important including one zero-day, none of the vulnerability is critical in this month update. Even if the exploit code for zero-day (CVE-2022-21989) is available, exploiting the vulnerability is highly complex.
Among these, Microsoft addressed a vulnerability for Windows 10/11 dating back to 2013. This vulnerability allows an attacker to inject malicious code into a signed application without causing the file's signature to be invalidated. The ability to inject malicious code into verified application allows an attacker to take entire control of a system, especially if the user running the application has administrative access.
In Feb 2022 Microsoft has fixed problems of Privilege Elevation, Security Feature Bypass, Remote Code Execution, Information Disclosure, Denial of Service, Spoofing, and Policy Bypass Vulnerabilities.
Products patched in this month update includes Windows and Windows Components, Azure Data Explorer, Kestrel Web Server, Windows Codecs Library, Microsoft Dynamics, Microsoft Dynamics GP, Microsoft Office and Office Components, Windows Hyper-V Server, SQL Server, Visual Studio Code and Microsoft Teams.
CVE/Vulnerability | Description | CVSS3.0 Score |
CVE-2022-21989 | Windows Kernel elevation-of-privilege vulnerability | 7.8 |
CVE-2022-21984 | Windows DNS Server Remote Code Execution Vulnerability | 8.8 |
CVE-2022-23280 | Microsoft Outlook for Mac Security Feature Bypass | 5.3 |
CVE-2022-21995 | Windows Hyper-V Remote Code Execution Vulnerability | 7.9 |
CVE-2022-22005 | Microsoft SharePoint Server Remote Code Execution Vulnerability | 8.8 |
CVE-2022-23256 | Azure Data Explorer Spoofing Vulnerability | 8.1 |
CVE-2022-23274 | Microsoft Dynamics GP Remote Code Execution Vulnerability | 8.3 |
CVE-2013-3900 | WinVerifyTrust Signature Validation Vulnerability | 7.4 |
Table 1: Vulnerability details
Security Update Types | Affected Product(s) |
Important | Windows 10 for 32-bit Systems Windows 10 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems Windows 10 Version 1809 for ARM64-based Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 1909 for 32-bit Systems Windows 10 Version 1909 for ARM64-based Systems Windows 10 Version 1909 for x64-based Systems Windows 10 Version 20H2 for 32-bit Systems Windows 10 Version 20H2 for ARM64-based Systems Windows 10 Version 20H2 for x64-based Systems Windows 10 Version 21H1 for 32-bit Systems Windows 10 Version 21H1 for ARM64-based Systems Windows 10 Version 21H1 for x64-based Systems Windows 10 Version 21H2 for 32-bit Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for x64-based Systems Windows 11 for ARM64-based Systems Windows 11 for x64-based Systems Windows 8.1 for 32-bit systems Windows 8.1 for x64-based systems Windows RT 8.1 Windows Server 2012 Windows Server 2012 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 R2 (Server Core installation) Windows Server 2016 Windows Server 2016 (Server Core installation) Windows Server 2019 Windows Server 2019 (Server Core installation) Windows Server 2022 Windows Server 2022 (Server Core installation) Windows Server 2022 Azure Edition Core Hotpatch Windows Server, version 20H2 (Server Core Installation) Microsoft 365 Apps for Enterprise for 32-bit Systems Microsoft 365 Apps for Enterprise for 64-bit Systems Microsoft Excel 2013 RT Service Pack 1 Microsoft Excel 2013 Service Pack 1 (32-bit editions) Microsoft Excel 2013 Service Pack 1 (64-bit editions) Microsoft Excel 2016 (32-bit edition) Microsoft Excel 2016 (64-bit edition) Microsoft Office 2013 Click-to-Run (C2R) for 32-bit editions Microsoft Office 2013 Click-to-Run (C2R) for 64-bit editions Microsoft Office 2013 RT Service Pack 1 Microsoft Office 2013 Service Pack 1 (32-bit editions) Microsoft Office 2013 Service Pack 1 (64-bit editions) Microsoft Office 2016 (32-bit edition) Microsoft Office 2016 (64-bit edition) Microsoft Office 2019 for 32-bit editions Microsoft Office 2019 for 64-bit editions Microsoft Office 2019 for Mac Microsoft Office LTSC 2021 for 32-bit editions Microsoft Office LTSC 2021 for 64-bit editions Microsoft Office LTSC for Mac 2021 Microsoft Office Online Server Microsoft Office Web Apps Server 2013 Service Pack 1 Microsoft Outlook 2016 for Mac Microsoft SharePoint Enterprise Server 2013 Service Pack 1 Microsoft SharePoint Enterprise Server 2016 Microsoft SharePoint Foundation 2013 Service Pack 1 Microsoft SharePoint Server 2019 Microsoft SharePoint Server Subscription Edition Microsoft Teams Admin Center Microsoft Teams for Android Microsoft Teams for iOS OneDrive for Android Microsoft Visual Studio 2015 Update 3 Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Microsoft Visual Studio 2019 version 16.7 (includes 16.0 - 16.6) Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8) Microsoft Visual Studio 2022 version 17.0 Visual Studio 2019 for Mac version 8.10 Visual Studio Code .NET 5.0 .NET 6.0 Microsoft Dynamics 365 (on-premises) version 8.2 Microsoft Dynamics 365 (on-premises) version 9.0 Microsoft Dynamics GP Power BI-client JS SDK SQL Server 2019 for Linux Containers HEVC Video Extension HEVC Video Extensions VP9 Video Extensions Azure Data Explorer |
|
|
Table 2: Vulnerable versions
Microsoft has released patches to address these vulnerabilities, organizations are encouraged to apply patches as soon as possible.
