Issued: Thursday, 25 August, 2022 |
Last Revision: Thursday, 25 August, 2022 |
Vendor: |
Product: |
Severity Level: |
Microsoft has released patches for 121 vulnerabilities with seventeen (17) classified as critical, one hundred two (102) are classified as important, one moderate, and one Low. In this updates, Microsoft addressed the two zero-day vulnerabilities with one widely exploited. The actively exploited zero-day vulnerability is known as ‘DogWalk' and assigned CVE-2022-34713. The other zero-day vulnerability is tracked as 'CVE-2022-30134–Microsoft Exchange Information Disclosure Vulnerability', enables an attacker to read certain emails. Other than this, there is no known exploit.
In August 2022 Microsoft has fixed problems of Privilege Elevation, Security Feature Bypass, Remote Code Execution, Information Disclosure, Denial of Service, and Spoofing Vulnerability.
Products patched in this month security update includes- Microsoft Windows and Windows Components, Exchange Server, Office and Office Components, Hyper-V, System Center Operations Manager, Windows Internet Information Services; Print Spooler Components, and Windows Defender Credential Guard, etc.
CVE/Vulnerability | Description | CVSS3.0 Score |
CVE-2022-34713 | Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability | 7.8 |
CVE-2022-30134 | Microsoft Exchange Server Elevation of Privilege Vulnerability | 7.6 |
CVE-2022-30133 | Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability | 9.8 |
CVE-2022-35744 | Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability | 9.8 |
CVE-2022-34691 | Active Directory Domain Services Elevation of Privilege Vulnerability | 8.8 |
CVE-2022-33646 | Azure Batch Node Agent Remote Code Execution Vulnerability | 7 |
CVE-2022-21980 | Microsoft Exchange Server Elevation of Privilege Vulnerability | 8 |
CVE-2022-24477 | Microsoft Exchange Server Elevation of Privilege Vulnerability | 8 |
CVE-2022-24516 | Microsoft Exchange Server Elevation of Privilege Vulnerability | 8 |
CVE-2022-35752 | RAS Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | 8.1 |
CVE-2022-35753 | RAS Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | 8.1 |
CVE-2022-35804 | SMB Client and Server Remote Code Execution Vulnerability | 8.8 |
CVE-2022-34696 | Windows Hyper-V Remote Code Execution Vulnerability | 7.8 |
CVE-2022-34702 | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability | 8.1 |
CVE-2022-34714 | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability | 8.1 |
CVE-2022-35745 | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability | 8.1 |
CVE-2022-35766 | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability | 8.1 |
CVE-2022-35767 | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability | 8.1 |
CVE-2022-35794 | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability | 8.1 |
Table 1: Vulnerability details
Update Types | Affected Product(s) |
Security Updates | Windows 10 for 32-bit Systems Windows 10 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems Windows 10 Version 1809 for ARM64-based Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 20H2 for 32-bit Systems Windows 10 Version 20H2 for ARM64-based Systems Windows 10 Version 20H2 for x64-based Systems Windows 10 Version 21H1 for 32-bit Systems Windows 10 Version 21H1 for ARM64-based Systems Windows 10 Version 21H1 for x64-based Systems Windows 10 Version 21H2 for 32-bit Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for x64-based Systems Windows 11 for ARM64-based Systems Windows 11 for x64-based Systems Windows 8.1 for 32-bit systems Windows 8.1 for x64-based systems Windows RT 8.1 Windows Server 2012 Windows Server 2012 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 R2 (Server Core installation) Windows Server 2016 Windows Server 2016 (Server Core installation) Windows Server 2019 Windows Server 2019 (Server Core installation) Windows Server 2022 Windows Server 2022 (Server Core installation) Windows Server, version 20H2 (Server Core Installation) Microsoft Exchange Server 2013 Cumulative Update 23 Microsoft Exchange Server 2016 Cumulative Update 22 Microsoft Exchange Server 2016 Cumulative Update 23 Microsoft Exchange Server 2019 Cumulative Update 11 Microsoft Exchange Server 2019 Cumulative Update 12 Azure Batch Microsoft 365 Apps for Enterprise for 32-bit Systems Microsoft 365 Apps for Enterprise for 64-bit Systems Microsoft Excel 2013 RT Service Pack 1 Microsoft Excel 2013 Service Pack 1 (32-bit editions) Microsoft Excel 2013 Service Pack 1 (64-bit editions) Microsoft Excel 2016 (32-bit edition) Microsoft Excel 2016 (64-bit edition) Microsoft Office 2013 RT Service Pack 1 Microsoft Office 2013 Service Pack 1 (32-bit editions) Microsoft Office 2013 Service Pack 1 (64-bit editions) Microsoft Office 2016 (32-bit edition) Microsoft Office 2016 (64-bit edition) Microsoft Office 2019 for 32-bit editions Microsoft Office 2019 for 64-bit editions Microsoft Office LTSC 2021 for 32-bit editions Microsoft Office LTSC 2021 for 64-bit editions Microsoft Office Online Server Microsoft Outlook 2013 RT Service Pack 1 Microsoft Outlook 2013 Service Pack 1 (32-bit editions) Microsoft Outlook 2013 Service Pack 1 (64-bit editions) Microsoft Outlook 2016 (32-bit edition) Microsoft Outlook 2016 (64-bit edition) .NET 6.0 .NET Core 3.1 Microsoft Visual Studio 2012 Update 5 Microsoft Visual Studio 2013 Update 5 Microsoft Visual Studio 2015 Update 3 Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8) Microsoft Visual Studio 2022 version 17.0 Microsoft Visual Studio 2022 version 17.2 System Center Operations Manager (SCOM) 2016 System Center Operations Manager (SCOM) 2019 System Center Operations Manager (SCOM) 2022 Open Management Infrastructure Azure Real Time Operating System GUIX Studio Azure Site Recovery VMWare to Azure Azure Sphere |
Table 2: Vulnerable versions
Microsoft has released patches to address these vulnerabilities, organizations are strongly encouraged to apply patches as soon as possible, particularly patches for exploited vulnerability, Exchange Server, and other critical vulnerabilities.
Please refer to the links in "REFERENCES" to explore more about vulnerabilities included in “Table 1: Vulnerability details”.
