September 25, 2023

Microsoft patched 48 CVE in its December 2022 Patch Tuesday release, one final time for the year 2022. With seven rated as critical and 40 rated as important and 1 rated as moderate. Microsoft also released a Defense in Depth update (ADV220005) for Driver Certificate Deprecation.

This month’s update includes patches for:

  • .NET Framework
  • Azure
  • Client Server Run-time Subsystem (CSRSS)
  • Microsoft Bluetooth Driver
  • Microsoft Dynamics
  • Microsoft Edge (Chromium-based)
  • Microsoft Graphics Component
  • Microsoft Office
  • Microsoft Office OneNote
  • Microsoft Office Outlook
  • Microsoft Office SharePoint
  • Microsoft Office Visio
  • Microsoft Windows Codecs Library
  • Role: Windows Hyper-V
  • SysInternals
  • Windows Certificates
  • Windows Contacts
  • Windows DirectX
  • Windows Error Reporting
  • Windows Fax Compose Form
  • Windows HTTP Print Provider
  • Windows Kernel
  • Windows PowerShell
  • Windows Print Spooler Components
  • Windows Projected File System
  • Windows Secure Socket Tunneling Protocol (SSTP)
  • Windows SmartScreen
  • Windows Subsystem for Linux
  • Windows Terminal

Windows SmartScreen security feature bypass vulnerability

CVE-2022-44698 is a security feature bypass vulnerability in the Windows operating system. This is a mark of the web (MoTW) vulnerability like those patched in the November 2022 Patch Tuesday release. All these MoTW vulnerabilities prevent specially crafted downloads from being marked as being from the web, which affects the integrity and availability of security features that utilize MoTW tagging. It affects only the SmartScreen feature of Windows operating systems, rather than the Protected View feature in Office. Successful exploitation prevents SmartScreen from performing a reputation check on the downloaded file. This could lead to a known malicious executable not alerting users that the file may be malicious. This vulnerability is exploited in wild.

DirectX Graphics Kernel EoP vulnerability

CVE-2022-44710  is the second zero-day vulnerability patched this month, this important-rated bug was publicly disclosed before Microsoft issued its security updates. Microsoft gives it a CVSS score of 7.8 but is a flaw less likely to be exploited.

Advertisements

Microsoft SharePoint Server RCE vulnerabilities

CVE-2022-44690 and CVE-2022-44693 are RCE vulnerabilities in Microsoft SharePoint Server that both received a CVSSv3 score of 8.8. An authenticated attacker with permission to use Manage Lists in SharePoint could exploit these vulnerabilities to execute code remotely. Both vulnerabilities are rated as “Exploitation Less Likely.”

.NET Framework RCE vulnerability

CVE-2022-41089 is an unauthenticated RCE vulnerability in Microsoft.NET framework with a CVSSv3 score of 8.8 and low attack complexity. However, successful exploitation requires user interaction, making exploitation less likely.

PowerShell RCE vulnerability

CVE-2022-41076 is a RCE vulnerability in Windows PowerShell that received a CVSSv3 score of 8.5 and was rated as Exploitation more likely. Exploitation of this flaw requires that an authenticated attacker first prepare the target. While the advisory does not detail what actions must be taken, it does note that any authenticated attacker can exploit this vulnerability and no elevated privileges are required. Successful exploitation would allow an attacker to run arbitrary commands on an affected system.

Windows Print Spooler components EoP vulnerability

CVE-2022-44678 and CVE-2022-44681 are EoP vulnerabilities in Windows Print Spooler components. As with their many predecessors, these vulnerabilities received a CVSSv3 score of 7.8. However, despite the similarities, Microsoft rated these as Exploitation Less Likely and Exploitation Unlikely respectively.

Advertisements

Patch update list

CVE IDTagSeverity
CVE-2022-41127Microsoft DynamicsCritical
CVE-2022-44690Microsoft Office SharePointCritical
CVE-2022-44693Microsoft Office SharePointCritical
CVE-2022-41076Windows PowerShellCritical
CVE-2022-44670Windows Secure Socket Tunneling Protocol (SSTP)Critical
CVE-2022-44676Windows Secure Socket Tunneling Protocol (SSTP)Critical
CVE-2022-44702Windows TerminalImport
CVE-2022-41089.NET FrameworkImportant
CVE-2022-44699AzureImportant
CVE-2022-44673Client Server Run-time Subsystem (CSRSS)Important
CVE-2022-44675Microsoft Bluetooth DriverImportant
CVE-2022-44674Microsoft Bluetooth DriverImportant
CVE-2022-41115Microsoft Edge (Chromium-based)Important
CVE-2022-44708Microsoft Edge (Chromium-based)Important
CVE-2022-26805Microsoft Graphics ComponentImportant
CVE-2022-26804Microsoft Graphics ComponentImportant
CVE-2022-47213Microsoft Graphics ComponentImportant
CVE-2022-41121Microsoft Graphics ComponentImportant
CVE-2022-44671Microsoft Graphics ComponentImportant
CVE-2022-47212Microsoft Graphics ComponentImportant
CVE-2022-26806Microsoft Graphics ComponentImportant
CVE-2022-47211Microsoft Graphics ComponentImportant
CVE-2022-41074Microsoft Graphics ComponentImportant
CVE-2022-44679Microsoft Graphics ComponentImportant
CVE-2022-44680Microsoft Graphics ComponentImportant
CVE-2022-44692Microsoft OfficeImportant
CVE-2022-44691Microsoft Office OneNoteImportant
CVE-2022-24480Microsoft Office OutlookImportant
CVE-2022-44713Microsoft Office OutlookImportant
CVE-2022-44696Microsoft Office VisioImportant
CVE-2022-44695Microsoft Office VisioImportant
CVE-2022-44694Microsoft Office VisioImportant
CVE-2022-44668Microsoft Windows Codecs LibraryImportant
CVE-2022-44667Microsoft Windows Codecs LibraryImportant
CVE-2022-44687Microsoft Windows Codecs LibraryImportant
CVE-2022-41094Role: Windows Hyper-VImportant
CVE-2022-44682Role: Windows Hyper-VImportant
CVE-2022-44704SysInternalsImportant
CVE-2022-44666Windows ContactsImportant
CVE-2022-44710Windows DirectXImportant
CVE-2022-44669Windows Error ReportingImportant
CVE-2022-41077Windows Fax Compose FormImportant
CVE-2022-44678Windows HTTP Print ProviderImportant
CVE-2022-44707Windows KernelImportant
CVE-2022-44683Windows KernelImportant
CVE-2022-44681Windows Print Spooler ComponentsImportant
CVE-2022-44677Windows Projected File SystemImportant
CVE-2022-44689Windows Subsystem for LinuxImportant
CVE-2022-44688Microsoft Edge (Chromium-based)Moderate
CVE-2022-44697Microsoft Graphics ComponentModerate
CVE-2022-44698Windows SmartScreenModerate
ADV220005Windows CertificatesNone
CVE-2022-4192Microsoft Edge (Chromium-based)Unknown
CVE-2022-4193Microsoft Edge (Chromium-based)Unknown
CVE-2022-4190Microsoft Edge (Chromium-based)Unknown
CVE-2022-4191Microsoft Edge (Chromium-based)Unknown
CVE-2022-4194Microsoft Edge (Chromium-based)Unknown
CVE-2022-4195Microsoft Edge (Chromium-based)Unknown
CVE-2022-4181Microsoft Edge (Chromium-based)Unknown
CVE-2022-4180Microsoft Edge (Chromium-based)Unknown
CVE-2022-4174Microsoft Edge (Chromium-based)Unknown
CVE-2022-4182Microsoft Edge (Chromium-based)Unknown
CVE-2022-4179Microsoft Edge (Chromium-based)Unknown
CVE-2022-4178Microsoft Edge (Chromium-based)Unknown
CVE-2022-4175Microsoft Edge (Chromium-based)Unknown
CVE-2022-4177Microsoft Edge (Chromium-based)Unknown
CVE-2022-4187Microsoft Edge (Chromium-based)Unknown
CVE-2022-4185Microsoft Edge (Chromium-based)Unknown
CVE-2022-4188Microsoft Edge (Chromium-based)Unknown
CVE-2022-4189Microsoft Edge (Chromium-based)Unknown
CVE-2022-4186Microsoft Edge (Chromium-based)Unknown
CVE-2022-4183Microsoft Edge (Chromium-based)Unknown
CVE-2022-4184Microsoft Edge (Chromium-based)Unknown

1 thought on “Microsoft Patch Tuesday -December 2022

Leave a Reply

%d bloggers like this: