• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Microsoft Patches Six Zero-Day Bugs this Month

You are here: Home / Cyber Security News / Microsoft Patches Six Zero-Day Bugs this Month

Microsoft introduced a somewhat lower variety of security updates on Patch Tuesday yesterday, but 6 of the CVEs are getting actively exploited in the wild.

Amid these are the so-referred to as “ProxyNotShell” bugs in Microsoft Exchange Server to start with revealed in September. Elevation of privilege vulnerability CVE-2022-41040 and distant code execution (RCE) bug CVE-2022-41082 are staying exploited by Chinese risk actors, according to Automox senior item manager, Preetham Gurram.

“We advocate applying patches in 24 hrs if you have vulnerable on-prem or hybrid exchange servers where short-term mitigation has not been applied,” he mentioned.

The other zero-times all set for patching this month include critical RCE vulnerability CVE-2022-41128, which impacts the JScript9 scripting language, and CVE-2022-41073, which affects Windows Print Spooler.

CVE-2022-41125 is a privilege escalation vulnerability affecting the Windows Following-Era Cryptography (CNG) Essential Isolation provider, when CVE-2022-41091 is described as a Windows Mark of the Web (MotW) security aspect bypass vulnerability and was broadly publicized in Oct.

The operate for Exchange Server consumers does not stop with patching the ProxyNotShell CVEs, according to Swift7 guide product or service supervisor, Greg Wiseman.

“Four other CVEs affecting Trade Server have also been addressed this month. Three are rated as important, and CVE-2022-41080 is an additional privilege escalation vulnerability viewed as critical,” he defined.

“Customers are advised to update their Exchange Server units immediately, no matter of irrespective of whether any earlier advisable mitigation techniques have been utilized. The mitigation rules are no for a longer time recommended at the time units have been patched.”

Microsoft also produced a non-CVE security advisory this month its third of the yr.

ADV220003 is a “defense-in-depth” update for Microsoft Office environment 2013 and 2016.

According to Wiseman, it “improves validation of files protected by means of Microsoft’s Info Legal rights Administration (IRM) technology – a feature of somewhat doubtful price.”

Microsoft preset a full of 68 vulnerabilities this month, which includes 11 rated critical.

Some parts of this article are sourced from:
www.infosecurity-magazine.com

Previous Post: « Instagram on the web has been redesigned for large screens
Next Post: New IceXLoader Malware Loader Variant Infected Thousands of Victims Worldwide »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique
  • ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices
  • 300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide
  • SafeLine WAF: Open Source Web Application Firewall with Zero-Day Detection and Bot Protection
  • U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation

Copyright © 2025 · AllTech.News, All Rights Reserved.