Coming Soon...

Q-CERT website is currently under maintenance. We should be back shortly. Thank you for yor patience.

Microsoft Patch Tuesday- Feb 2022

Issued: 
Thursday, 10 February, 2022
Last Revision: 
Thursday, 10 February, 2022
Vendor: 
Severity Level: 
Summary: 

Microsoft has released patches for 48 vulnerabilities with most of them are classified as important including one zero-day, none of the vulnerability is critical in this month update. Even if the exploit code for zero-day (CVE-2022-21989) is available, exploiting the vulnerability is highly complex.

 

Among these, Microsoft addressed a vulnerability for Windows 10/11 dating back to 2013. This vulnerability allows an attacker to inject malicious code into a signed application without causing the file's signature to be invalidated. The ability to inject malicious code into verified application allows an attacker to take entire control of a system, especially if the user running the application has administrative access.

 

In Feb 2022 Microsoft has fixed problems of Privilege Elevation, Security Feature Bypass, Remote Code Execution, Information Disclosure, Denial of Service, Spoofing, and Policy Bypass Vulnerabilities. 

 

Products patched in this month update includes Windows and Windows Components, Azure Data Explorer, Kestrel Web Server, Windows Codecs Library, Microsoft Dynamics, Microsoft Dynamics GP, Microsoft Office and Office Components, Windows Hyper-V Server, SQL Server, Visual Studio Code and Microsoft Teams. 

 

CVE/Vulnerability

                  Description 

CVSS3.0 Score

CVE-2022-21989

Windows Kernel elevation-of-privilege vulnerability

7.8

CVE-2022-21984

Windows DNS Server Remote Code Execution Vulnerability

8.8

CVE-2022-23280

Microsoft Outlook for Mac Security Feature Bypass

5.3

CVE-2022-21995

Windows Hyper-V Remote Code Execution Vulnerability

7.9

CVE-2022-22005

Microsoft SharePoint Server Remote Code Execution Vulnerability

8.8

CVE-2022-23256

Azure Data Explorer Spoofing Vulnerability

8.1

CVE-2022-23274

Microsoft Dynamics GP Remote Code Execution Vulnerability

8.3

CVE-2013-3900

WinVerifyTrust Signature Validation Vulnerability

7.4

 

 

Table 1: Vulnerability details 

 

 

 

 

 

 

 

 

Security Update Types

       Affected Product(s)

Important

Windows 10 for 32-bit Systems

Windows 10 for x64-based Systems

Windows 10 Version 1607 for 32-bit Systems

Windows 10 Version 1607 for x64-based Systems

Windows 10 Version 1809 for 32-bit Systems

Windows 10 Version 1809 for ARM64-based Systems

Windows 10 Version 1809 for x64-based Systems

Windows 10 Version 1909 for 32-bit Systems

Windows 10 Version 1909 for ARM64-based Systems

Windows 10 Version 1909 for x64-based Systems

Windows 10 Version 20H2 for 32-bit Systems

Windows 10 Version 20H2 for ARM64-based Systems

Windows 10 Version 20H2 for x64-based Systems

Windows 10 Version 21H1 for 32-bit Systems

Windows 10 Version 21H1 for ARM64-based Systems

Windows 10 Version 21H1 for x64-based Systems

Windows 10 Version 21H2 for 32-bit Systems

Windows 10 Version 21H2 for ARM64-based Systems

Windows 10 Version 21H2 for x64-based Systems

Windows 11 for ARM64-based Systems

Windows 11 for x64-based Systems

Windows 8.1 for 32-bit systems

Windows 8.1 for x64-based systems

Windows RT 8.1

Windows Server 2012

Windows Server 2012 (Server Core installation)

Windows Server 2012 R2

Windows Server 2012 R2 (Server Core installation)

Windows Server 2016

Windows Server 2016 (Server Core installation)

Windows Server 2019

Windows Server 2019 (Server Core installation)

Windows Server 2022

Windows Server 2022 (Server Core installation)

Windows Server 2022 Azure Edition Core Hotpatch

Windows Server, version 20H2 (Server Core Installation)

Microsoft 365 Apps for Enterprise for 32-bit Systems

Microsoft 365 Apps for Enterprise for 64-bit Systems

Microsoft Excel 2013 RT Service Pack 1

Microsoft Excel 2013 Service Pack 1 (32-bit editions)

Microsoft Excel 2013 Service Pack 1 (64-bit editions)

Microsoft Excel 2016 (32-bit edition)

Microsoft Excel 2016 (64-bit edition)

Microsoft Office 2013 Click-to-Run (C2R) for 32-bit editions

Microsoft Office 2013 Click-to-Run (C2R) for 64-bit editions

Microsoft Office 2013 RT Service Pack 1

Microsoft Office 2013 Service Pack 1 (32-bit editions)

Microsoft Office 2013 Service Pack 1 (64-bit editions)

Microsoft Office 2016 (32-bit edition)

Microsoft Office 2016 (64-bit edition)

Microsoft Office 2019 for 32-bit editions

Microsoft Office 2019 for 64-bit editions

Microsoft Office 2019 for Mac

Microsoft Office LTSC 2021 for 32-bit editions

Microsoft Office LTSC 2021 for 64-bit editions

Microsoft Office LTSC for Mac 2021

Microsoft Office Online Server

Microsoft Office Web Apps Server 2013 Service Pack 1

Microsoft Outlook 2016 for Mac

Microsoft SharePoint Enterprise Server 2013 Service Pack 1

Microsoft SharePoint Enterprise Server 2016

Microsoft SharePoint Foundation 2013 Service Pack 1

Microsoft SharePoint Server 2019

Microsoft SharePoint Server Subscription Edition

Microsoft Teams Admin Center

Microsoft Teams for Android

Microsoft Teams for iOS

OneDrive for Android

Microsoft Visual Studio 2015 Update 3

Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)

Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)

Microsoft Visual Studio 2019 version 16.7 (includes 16.0 - 16.6)

Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)

Microsoft Visual Studio 2022 version 17.0

Visual Studio 2019 for Mac version 8.10

Visual Studio Code

.NET 5.0

.NET 6.0

Microsoft Dynamics 365 (on-premises) version 8.2

Microsoft Dynamics 365 (on-premises) version 9.0

Microsoft Dynamics GP

Power BI-client JS SDK

SQL Server 2019 for Linux Containers

HEVC Video Extension

HEVC Video Extensions

VP9 Video Extensions

Azure Data Explorer

 

 

                                                                                        Table 2: Vulnerable versions 

Recommendation: 

Microsoft has released patches to address these vulnerabilities, organizations are encouraged to apply patches as soon as possible.