• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Microsoft Fixes 71 Bugs Including Three Zero Days

You are here: Home / Cyber Security News / Microsoft Fixes 71 Bugs Including Three Zero Days

Microsoft has produced fixes for a somewhat small range of CVEs this month, with only a few critical bugs and 3 publicly disclosed flaws in the Patch Tuesday roundup.

None of the a few zero times have been exploited in the wild. They include CVE-2022-24512, a remote code execution (RCE) vulnerability in .NET and Visible Studio.

“According to Microsoft, this vulnerability requires ‘under interaction’ to exploit, meaning that an attacker would probably will need to upload a payload to a vulnerable program and then execute it remotely, instead than attacking the company specifically,” explained Recorded Long term senior security architect, Allan Liska.

“This is most likely why Microsoft has assigned it a criticality level of ‘Important’ and rated it as ‘exploitation much less probably.’”

An additional zero-day patched this month is CVE-2022-24459, an elevation of privilege vulnerability in Microsoft’s Fax and Scan Services, which is also rated “exploitation fewer probable.”

The final 1 is CVE-2022-21990, another RCE bug but this time in the Remote Desktop Consumer and rated “exploitation a lot more very likely.”

It’s a person of a few CVEs this thirty day period impacting the distant desktop protocol (RDP), which has been closely targeted for the duration of the pandemic.

“With the improve in distant operating driving the growth of the attack area presented by RDP, a trio of RCE vulnerabilities influencing this protocol ought to be on security teams’ radar,” argued Kev Breen, director of cyber-threat study at Immersive Labs.

“CVE-2022-23285, CVE-2022-21990 and CVE-2022-24503 are a likely issue in particular as this an infection vector is normally utilised by ransomware actors. Even though exploitation is not trivial, requiring an attacker to set up bespoke infrastructure, it continue to presents plenty of of a risk to be a priority.”

Breen also flagged critical vulnerability CVE-2022-23277 as a precedence.

“While demanding authentication, this vulnerability influencing on-premises Exchange servers could potentially be used throughout lateral movement into a element of the environment which provides the prospect for business enterprise email compromise or data theft from email,” he said.

Some parts of this article are sourced from:
www.infosecurity-journal.com

Previous Post: « Apple adds green color options to its iPhone 13 lineup
Next Post: Russian APTs Furiously Phish Ukraine – Google »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Urgent: Google Releases Critical Chrome Update for CVE-2025-6558 Exploit Active in the Wild
  • Google AI “Big Sleep” Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act
  • Hyper-Volumetric DDoS Attacks Reach Record 7.3 Tbps, Targeting Key Global Sectors
  • Newly Emerged GLOBAL GROUP RaaS Expands Operations with AI-Driven Negotiation Tools
  • State-Backed HazyBeacon Malware Uses AWS Lambda to Steal Data from SE Asian Governments

Copyright © 2025 · AllTech.News, All Rights Reserved.