Microsoft released patches for more than 100 vulnerabilities on 12 April 2022. Nine of those vulnerabilities have been assessed as “critical” (CVE-2022-22008, CVE-2022-23257, CVE-2022-23259, CVE-2022-24500, CVE-2022-24491, CVE-2022-24357, CVE-2022-24541, CVE-2022-26809, CVE-2022-26919) by Microsoft (these are all remote code execution vulnerabilities).
Additionally, two other vulnerabilities have been stated as “zero-day vulnerabilities” (CVE-2022-24501, CVE-2022-26904). It is highly recommended that the following patches are downloaded to ensure the safety of systems/assets.
Affected Systems
The following servers/systems are affected by these vulnerabilities;
IoC’s
-
Recommended Solution(s)
It is recommended that for the critical and zero-day vulnerabilities, organizations using the specified products download the patches in the links in the related websites section below. For the other vulnerabilities, organizations can download the patches from Microsoft webpage stated below;
https://msrc.microsoft.com/update-guide/vulnerability/CVE / CWE
CVE-2022-22008, CVE-2022-23257, CVE-2022-23259, CVE-2022-24500, CVE-2022-24491, CVE-2022-24357, CVE-2022-24541, CVE-2022-26809, CVE-2022-26919, CVE-2022-24501, CVE-2022-26904
Related Website(s)
* Vulnerabilities with a CVSS 3.1 score between 7.0 and 8.9 are evaluated to be “high” whereas vulnerabilities with a CVSS 3.1 score between 9.0 and 10.0 are evaluated to be “critical”.
+90 216 504 53 32
Aydınevler Mahallesi,İsmet İnönü Cadddesi,Küçükyalı Ofis Park A Blok,No:20/1 Maltepe İstanbul
+90 312 235 44 51
You can register to our newsletter on the home page to be instantly informed about security vulnerabilities.