
Microsoft patched 84 CVEs in its October 2022 Patch Tuesday release, with 13 rated as critical and 71 rated as important.
- 13Critical
- 71Important
- 0 Moderate
- 0 Low
This month’s update includes patches for:
- Active Directory Domain Services
- Azure
- Azure Arc
- Client Server Run-time Subsystem (CSRSS)
- Microsoft Edge (Chromium-based)
- Microsoft Graphics Component
- Microsoft Office
- Microsoft Office SharePoint
- Microsoft Office Word
- Microsoft WDAC OLE DB provider for SQL
- NuGet Client
- Remote Access Service Point-to-Point Tunneling Protocol
- Role: Windows Hyper-V
- Service Fabric
- Visual Studio Code
- Windows Active Directory Certificate Services
- Windows ALPC
- Windows CD-ROM Driver
- Windows COM+ Event System Service
- Windows Connected User Experiences and Telemetry
- Windows CryptoAPI
- Windows Defender
- Windows DHCP Client
- Windows Distributed File System (DFS)
- Windows DWM Core Library
- Windows Event Logging Service
- Windows Group Policy
- Windows Group Policy Preference Client
- Windows Internet Key Exchange (IKE) Protocol
- Windows Kernel
- Windows Local Security Authority (LSA)
- Windows Local Security Authority Subsystem Service (LSASS)
- Windows Local Session Manager (LSM)
- Windows NTFS
- Windows NTLM
- Windows ODBC Driver
- Windows Perception Simulation Service
- Windows Point-to-Point Tunneling Protocol
- Windows Portable Device Enumerator Service
- Windows Print Spooler Components
- Windows Resilient File System (ReFS)
- Windows Secure Channel
- Windows Security Support Provider Interface
- Windows Server Remotely Accessible Registry Keys
- Windows Server Service
- Windows Storage
- Windows TCP/IP
- Windows USB Serial Driver
- Windows Web Account Manager
- Windows Win32K
- Windows WLAN Service
- Windows Workstation Service
Microsoft still has yet to release patches for the two Exchange vulnerabilities that were reported as being actively exploited last week. Admins should continue to follow Microsoft’s guidance on workarounds until official fixes are released.
Active Directory Certificate Services EoP vulnerability
CVE-2022-37976 is an EoP vulnerability affecting Active Directory Certificate Services. A malicious Distributed Component Object Model (DCOM) client could be used to entice a DCOM server to authenticate to the client, allowing an attacker to perform a cross-protocol attack and gain domain administrator privileges. With CVSS 3.1 score of 8.8, rated as Exploitation Less Likely.
Azure Arc-enabled Kubernetes cluster connect EoP vulnerability
CVE-2022-37968 is an EoP vulnerability in Microsoft’s Azure Arc, affecting the cluster connect feature of Azure Arc-enabled Kubernetes clusters. With a CVSSv3 score of 10, the highest possible rating, an unauthenticated attacker could exploit this vulnerability to gain administrative privileges for a Kubernetes cluster. While updates have been released, users that do not have auto-upgrade enabled must act to manually upgrade Azure Arc-enabled Kubernetes clusters.
Windows COM+ Event System Service EoP vulnerability – Zeroday
CVE-2022-41033 is an EoP vulnerability in the Windows COM+ Event System Service, which enables system event notifications for COM+ component services. It received a CVSSv3 score of 7.8. An authenticated attacker could exploit this vulnerability to elevate privileges on a vulnerable system and gain SYSTEM privileges. This vulnerability has been exploited in the wild, though no additional information was shared.
Windows Print Spooler EoP vulnerability
CVE-2022-38028 is an EoP vulnerability in Windows Print Spooler components that received a CVSSv3 score of 7.8 and was rated Exploitation More. Exploitation would allow an attacker to gain SYSTEM privileges. The flaw was disclosed to Microsoft by the National Security Agency. This marks the third EoP vulnerability in Windows Print Spooler credited to the NSA this year, following CVE-2022-29104 and CVE-2022-30138 in May.
Microsoft SharePoint Server RCE vulnerability
CVE-2022-38053, CVE-2022-41036, CVE-2022-41037 and CVE-2022-41038 are RCE vulnerabilities in Microsoft SharePoint Server that all received a CVSSv3 score of 8.8. All except CVE-2022-41037 were rated Exploitation More Likely and CVE-2022-41038 is the only one that has a critical rating. To exploit these vulnerabilities, a network-based attacker would need to be authenticated to the target SharePoint site with permission to use Manage Lists.
Windows Kernel EoP vulnerability
CVE-2022-37988, CVE-2022-37990, CVE-2022-37991, CVE-2022-37995, CVE-2022-38022, CVE-2022-38037, CVE-2022-38038 and CVE-2022-38039 are EoP vulnerabilities in the Windows Kernel. Except for CVE-2022-38022, all the CVEs received CVSSv3 scores of 7.8 and could allow an attacker to elevate their privileges to SYSTEM. CVE-2022-38022 was scored CVSSv3 of 2.5 and would only allow an attacker to delete empty folders as SYSTEM. The attacker would not be able to view or edit files, nor delete folders that were not empty.
Microsoft Office information disclosure vulnerability -Zeroday
CVE-2022-41043 is an information disclosure vulnerability affecting Microsoft Office for Mac. While exploitation requires local access to the host, this was the only publicly disclosed vulnerability patched this month.
Microsoft Chromium Edge
Apart from patch Tuesday update release, numerous chromium edge vulnerabilities have been fixed earlier in the month.

CVE ID | CVE Title | Severity |
CVE-2022-37968 | Azure Arc-enabled Kubernetes cluster Connect Elevation of Privilege Vulnerability | Critical |
CVE-2022-38048 | Microsoft Office Remote Code Execution Vulnerability | Critical |
CVE-2022-41038 | Microsoft SharePoint Server Remote Code Execution Vulnerability | Critical |
CVE-2022-37979 | Windows Hyper-V Elevation of Privilege Vulnerability | Critical |
CVE-2022-37976 | Active Directory Certificate Services Elevation of Privilege Vulnerability | Critical |
CVE-2022-34689 | Windows CryptoAPI Spoofing Vulnerability | Critical |
CVE-2022-33634 | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | Critical |
CVE-2022-22035 | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | Critical |
CVE-2022-24504 | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | Critical |
CVE-2022-38047 | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | Critical |
CVE-2022-41081 | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | Critical |
CVE-2022-30198 | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | Critical |
CVE-2022-38000 | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | Critical |
CVE-2022-38042 | Active Directory Domain Services Elevation of Privilege Vulnerability | Important |
CVE-2022-38017 | StorSimple 8000 Series Elevation of Privilege Vulnerability | Important |
CVE-2022-37987 | Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability | Important |
CVE-2022-37989 | Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability | Important |
CVE-2022-37986 | Windows Win32k Elevation of Privilege Vulnerability | Important |
CVE-2022-38051 | Windows Graphics Component Elevation of Privilege Vulnerability | Important |
CVE-2022-37997 | Windows Graphics Component Elevation of Privilege Vulnerability | Important |
CVE-2022-37985 | Windows Graphics Component Information Disclosure Vulnerability | Important |
CVE-2022-33635 | Windows GDI+ Remote Code Execution Vulnerability | Important |
CVE-2022-38001 | Microsoft Office Spoofing Vulnerability | Important |
CVE-2022-41043 | Microsoft Office Information Disclosure Vulnerability | Important |
CVE-2022-38053 | Microsoft SharePoint Server Remote Code Execution Vulnerability | Important |
CVE-2022-41036 | Microsoft SharePoint Server Remote Code Execution Vulnerability | Important |
CVE-2022-41037 | Microsoft SharePoint Server Remote Code Execution Vulnerability | Important |
CVE-2022-41031 | Microsoft Word Remote Code Execution Vulnerability | Important |
CVE-2022-38049 | Microsoft Office Graphics Remote Code Execution Vulnerability | Important |
CVE-2022-37982 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | Important |
CVE-2022-38031 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | Important |
CVE-2022-41032 | NuGet Client Elevation of Privilege Vulnerability | Important |
CVE-2022-37965 | Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability | Important |
CVE-2022-35829 | Service Fabric Explorer Spoofing Vulnerability | Important |
CVE-2022-41042 | Visual Studio Code Information Disclosure Vulnerability | Important |
CVE-2022-41034 | Visual Studio Code Remote Code Execution Vulnerability | Important |
CVE-2022-41083 | Visual Studio Code Elevation of Privilege Vulnerability | Important |
CVE-2022-37978 | Windows Active Directory Certificate Services Security Feature Bypass | Important |
CVE-2022-38029 | Windows ALPC Elevation of Privilege Vulnerability | Important |
CVE-2022-38044 | Windows CD-ROM File System Driver Remote Code Execution Vulnerability | Important |
CVE-2022-41033 | Windows COM+ Event System Service Elevation of Privilege Vulnerability | Important |
CVE-2022-38021 | Connected User Experiences and Telemetry Elevation of Privilege Vulnerability | Important |
CVE-2022-37971 | Microsoft Windows Defender Elevation of Privilege Vulnerability | Important |
CVE-2022-38026 | Windows DHCP Client Information Disclosure Vulnerability | Important |
CVE-2022-37980 | Windows DHCP Client Elevation of Privilege Vulnerability | Important |
CVE-2022-38025 | Windows Distributed File System (DFS) Information Disclosure Vulnerability | Important |
CVE-2022-37970 | Windows DWM Core Library Elevation of Privilege Vulnerability | Important |
CVE-2022-37983 | Microsoft DWM Core Library Elevation of Privilege Vulnerability | Important |
CVE-2022-37981 | Windows Event Logging Service Denial of Service Vulnerability | Important |
CVE-2022-37975 | Windows Group Policy Elevation of Privilege Vulnerability | Important |
CVE-2022-37994 | Windows Group Policy Preference Client Elevation of Privilege Vulnerability | Important |
CVE-2022-37993 | Windows Group Policy Preference Client Elevation of Privilege Vulnerability | Important |
CVE-2022-37999 | Windows Group Policy Preference Client Elevation of Privilege Vulnerability | Important |
CVE-2022-38036 | Internet Key Exchange (IKE) Protocol Denial of Service Vulnerability | Important |
CVE-2022-37988 | Windows Kernel Elevation of Privilege Vulnerability | Important |
CVE-2022-38037 | Windows Kernel Elevation of Privilege Vulnerability | Important |
CVE-2022-37990 | Windows Kernel Elevation of Privilege Vulnerability | Important |
CVE-2022-38038 | Windows Kernel Elevation of Privilege Vulnerability | Important |
CVE-2022-38039 | Windows Kernel Elevation of Privilege Vulnerability | Important |
CVE-2022-37995 | Windows Kernel Elevation of Privilege Vulnerability | Important |
CVE-2022-37991 | Windows Kernel Elevation of Privilege Vulnerability | Important |
CVE-2022-38022 | Windows Kernel Elevation of Privilege Vulnerability | Important |
CVE-2022-38016 | Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability | Important |
CVE-2022-37977 | Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability | Important |
CVE-2022-37973 | Windows Local Session Manager (LSM) Denial of Service Vulnerability | Important |
CVE-2022-37998 | Windows Local Session Manager (LSM) Denial of Service Vulnerability | Important |
CVE-2022-37996 | Windows Kernel Memory Information Disclosure Vulnerability | Important |
CVE-2022-35770 | Windows NTLM Spoofing Vulnerability | Important |
CVE-2022-38040 | Microsoft ODBC Driver Remote Code Execution Vulnerability | Important |
CVE-2022-37974 | Windows Mixed Reality Developer Tools Information Disclosure Vulnerability | Important |
CVE-2022-38032 | Windows Portable Device Enumerator Service Security Feature Bypass Vulnerability | Important |
CVE-2022-38028 | Windows Print Spooler Elevation of Privilege Vulnerability | Important |
CVE-2022-38003 | Windows Resilient File System Elevation of Privilege | Important |
CVE-2022-38041 | Windows Secure Channel Denial of Service Vulnerability | Important |
CVE-2022-38043 | Windows Security Support Provider Interface Information Disclosure Vulnerability | Important |
CVE-2022-38033 | Windows Server Remotely Accessible Registry Keys Information Disclosure Vulnerability | Important |
CVE-2022-38045 | Server Service Remote Protocol Elevation of Privilege Vulnerability | Important |
CVE-2022-38027 | Windows Storage Elevation of Privilege Vulnerability | Important |
CVE-2022-33645 | Windows TCP/IP Driver Denial of Service Vulnerability | Important |
CVE-2022-38030 | Windows USB Serial Driver Information Disclosure Vulnerability | Important |
CVE-2022-38046 | Web Account Manager Information Disclosure Vulnerability | Important |
CVE-2022-38050 | Win32k Elevation of Privilege Vulnerability | Important |
CVE-2022-37984 | Windows WLAN Service Elevation of Privilege Vulnerability | Important |
CVE-2022-38034 | Windows Workstation Service Elevation of Privilege Vulnerability | Important |
CVE-2022-41035 | Microsoft Edge (Chromium-based) Spoofing Vulnerability | Moderate |
CVE-2022-3311 | Chromium: Use after free in Import | Unknown |
CVE-2022-3313 | Chromium: Incorrect security UI in Full Screen | Unknown |
CVE-2022-3315 | Chromium: Type confusion in Blink | Unknown |
CVE-2022-3370 | Chromium: Use after free in Custom Elements | Unknown |
CVE-2022-3373 | Chromium: Out of bounds write in V8 | Unknown |
CVE-2022-3316 | Chromium: Insufficient validation of untrusted input in Safe Browsing | Unknown |
CVE-2022-3317 | Chromium: Insufficient validation of untrusted input in Intents | Unknown |
CVE-2022-3310 | Chromium: Insufficient policy enforcement in Custom Tabs | Unknown |
CVE-2022-3304 | Chromium: Use after free in CSS | Unknown |
CVE-2022-3308 | Chromium: Insufficient policy enforcement in Developer Tools | Unknown |
CVE-2022-3307 | Chromium: Use after free in Media | Unknown |
1 thought on “Microsoft Patch Tuesday – October 2022”