December Patch Tuesday Updates

Microsoft releases 52 fixes this month including 6 Critical, one Public Aware and one Weaponised Threat.

There are 6 Rated Critical, 43 are rated Important and the remaining 3 are rated Moderate.  Microsoft Windows and Windows Components, MS Azure, Office Components, Sysinternals, Microsoft Edge, SharePoint Server and .NET framework have all received fixes this month.

Robert Brown, Head of Customer Success for Syxsense said, “We are ending the year with the smallest release of fixes of the year, which could be well for companies which have a change freeze during the December period, however I would urge all IT Departments to deploy the recommendations below as they pose a serious risk to your network if left unresolved.” 

Syxsense Recommendations

Based on the Vendor Severity & CVSS Score, we have made a few recommendations below.  As usual we recommend our customers enter the CVE numbers below into your Patch Management solution and deploy as soon as possible.

CVE-2022-44698 Windows SmartScreen Security Feature Bypass Vulnerability

An attacker can craft a malicious file that would evade Mark of the Web (MOTW) defences, resulting in a limited loss of integrity and availability of security features such as Protected View in Microsoft Office, which rely on MOTW tagging.  This is the second time in as many months where this vulnerability has seen a fix, and as this is vulnerable on almost every Windows operating system you may need to deploy this to your entire enterprise even if you have observed a change freeze.

Note:  The vulnerability is Weaponised

Syxscore

  • Vendor Severity: Important
  • CVSS: 5.4
  • Weaponised: Yes
  • Public Aware: No
  • Countermeasure: No 

Syxscore Risk

  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges: None
  • User Interaction: Required
  • Scope (Jump Point): Unchanged / No

CVE-2022-44710 DirectX Graphics Kernel Elevation of Privilege Vulnerability

There are very few details released by Microsoft for this Elevation of Privilege (EoP) vulnerability however we do know this requires an attacker to win a race condition on Windows 11.  An attacker who successfully exploited this vulnerability could gain SYSTEM privileges and if they could do that, then the vulnerability has a Jump Point meaning they are able to breakout of the vulnerable component and into another area of the Operating System.  Since there are no known countermeasures the only option is to deploy this patch.

Note:  The vulnerability has been made Publicly aware.

Syxscore

  • Vendor Severity: Important
  • CVSS: 7.8
  • Weaponised: No
  • Public Aware: Yes
  • Countermeasure: No

Syxscore Risk

  • Attack Vector: Local
  • Attack Complexity: High
  • Privileges: Low
  • User Interaction: None
  • Scope (Jump Point): Changed / Yes

CVE-2022-41076 PowerShell Remote Code Execution Vulnerability

An authenticated attacker could escape the PowerShell Remoting Session Configuration and run unapproved commands on the target system.  Although the attack complexity is High, this only means that this vulnerability cannot be exploited directly and require additional actions on the target environment however this should not reduce the severity of this, we know several other vulnerabilities can provide a platform for more sophisticated attacks.  Microsoft are also advising this vulnerability is more likely to be exploited, although at present there are no indicators that it has done so.

Note:  The vulnerability has a Jump Point

Syxscore

  • Vendor Severity: Critical
  • CVSS: 8.5
  • Weaponised: No
  • Public Aware: No
  • Countermeasure: No

Syxscore Risk

  • Attack Vector: Network
  • Attack Complexity: High
  • Privileges: Low
  • User Interaction: None
  • Scope (Jump Point): Changed / Yes

Syxsense Cortex Workflows are being set up to remediate all of December’s patches with the click of a button.

If you would like to see how Syxsense can help you automate your patch remediation process, click to schedule a customized demo.

Microsoft’s December Patch Tuesday Fixes

Reference Description Vendor Severity CVSS Score Publicly Aware Weaponised Countermeasure Additional Details Syxsense Recommended
CVE-2022-44698 Windows SmartScreen Security Feature Bypass Vulnerability Moderate 5.4 No Yes No An attacker can craft a malicious file that would evade Mark of the Web (MOTW) defences, resulting in a limited loss of integrity and availability of security features such as Protected View in Microsoft Office, which rely on MOTW tagging. Yes
CVE-2022-44710 DirectX Graphics Kernel Elevation of Privilege Vulnerability Important 7.8 Yes No No An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Yes
This vulnerability has a Jump Point meaning it is able to breakout of the vulnerable component.
CVE-2022-44690 Microsoft SharePoint Server Remote Code Execution Vulnerability Critical 8.8 No No No Yes
CVE-2022-44693 Microsoft SharePoint Server Remote Code Execution Vulnerability Critical 8.8 No No No Yes
CVE-2022-41089 .NET Framework Remote Code Execution Vulnerability Important 8.8 No No No Yes
CVE-2022-41127 Microsoft Dynamics NAV and Microsoft Dynamics 365 Business Central (On Premises) Remote Code Execution Vulnerability Critical 8.5 No No No This vulnerability has a Jump Point meaning it is able to breakout of the vulnerable component. Yes
CVE-2022-41076 PowerShell Remote Code Execution Vulnerability Critical 8.5 No No No Exploitation More Likely.  Any authenticated user could trigger this vulnerability. It does not require admin or other elevated privileges. Yes
This vulnerability has a Jump Point meaning it is able to breakout of the vulnerable component.
CVE-2022-44708 Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability Important 8.3 No No No This vulnerability has a Jump Point meaning it is able to breakout of the vulnerable component. Yes
CVE-2022-44670 Windows Secure Socket Tunnelling Protocol (SSTP) Remote Code Execution Vulnerability Critical 8.1 No No No
CVE-2022-44676 Windows Secure Socket Tunnelling Protocol (SSTP) Remote Code Execution Vulnerability Critical 8.1 No No No
CVE-2022-26804 Microsoft Office Graphics Remote Code Execution Vulnerability Important 7.8 No No No
CVE-2022-26805 Microsoft Office Graphics Remote Code Execution Vulnerability Important 7.8 No No No
CVE-2022-26806 Microsoft Office Graphics Remote Code Execution Vulnerability Important 7.8 No No No
CVE-2022-44692 Microsoft Office Graphics Remote Code Execution Vulnerability Important 7.8 No No No
CVE-2022-47211 Microsoft Office Graphics Remote Code Execution Vulnerability Important 7.8 No No No
CVE-2022-47212 Microsoft Office Graphics Remote Code Execution Vulnerability Important 7.8 No No No
CVE-2022-47213 Microsoft Office Graphics Remote Code Execution Vulnerability Important 7.8 No No No
CVE-2022-44691 Microsoft Office OneNote Remote Code Execution Vulnerability Important 7.8 No No No
CVE-2022-44694 Microsoft Office Visio Remote Code Execution Vulnerability Important 7.8 No No No
CVE-2022-44695 Microsoft Office Visio Remote Code Execution Vulnerability Important 7.8 No No No
CVE-2022-44696 Microsoft Office Visio Remote Code Execution Vulnerability Important 7.8 No No No
CVE-2022-44704 Microsoft Windows Sysmon Elevation of Privilege Vulnerability Important 7.8 No No No Exploitation More Likely
CVE-2022-44687 Raw Image Extension Remote Code Execution Vulnerability Important 7.8 No No No
CVE-2022-44675 Windows Bluetooth Driver Elevation of Privilege Vulnerability Important 7.8 No No No Exploitation More Likely
CVE-2022-44666 Windows Contacts Remote Code Execution Vulnerability Important 7.8 No No No
CVE-2022-41077 Windows Fax Compose Form Elevation of Privilege Vulnerability Important 7.8 No No No
CVE-2022-41121 Windows Graphics Component Elevation of Privilege Vulnerability Important 7.8 No No No An attacker who successfully exploited this vulnerability could gain specific limited SYSTEM privileges.
CVE-2022-44671 Windows Graphics Component Elevation of Privilege Vulnerability Important 7.8 No No No Exploitation More Likely
CVE-2022-44680 Windows Graphics Component Elevation of Privilege Vulnerability Important 7.8 No No No
CVE-2022-41094 Windows Hyper-V Elevation of Privilege Vulnerability Important 7.8 No No No
CVE-2022-44683 Windows Kernel Elevation of Privilege Vulnerability Important 7.8 No No No
CVE-2022-44667 Windows Media Remote Code Execution Vulnerability Important 7.8 No No No
CVE-2022-44668 Windows Media Remote Code Execution Vulnerability Important 7.8 No No No
CVE-2022-44678 Windows Print Spooler Elevation of Privilege Vulnerability Important 7.8 No No No
CVE-2022-44681 Windows Print Spooler Elevation of Privilege Vulnerability Important 7.8 No No No
CVE-2022-44677 Windows Projected File System Elevation of Privilege Vulnerability Important 7.8 No No No
CVE-2022-44689 Windows Subsystem for Linux (WSL2) Kernel Elevation of Privilege Vulnerability Important 7.8 No No No An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
CVE-2022-44702 Windows Terminal Remote Code Execution Vulnerability Important 7.8 No No No
CVE-2022-44697 Windows Graphics Component Elevation of Privilege Vulnerability Moderate 7.8 No No No
CVE-2022-44713 Microsoft Outlook for Mac Spoofing Vulnerability Important 7.5 No No No
CVE-2022-44673 Windows Client Server Run-Time Subsystem (CSRSS) Elevation of Privilege Vulnerability Important 7 No No No An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
CVE-2022-44669 Windows Error Reporting Elevation of Privilege Vulnerability Important 7 No No No
CVE-2022-44682 Windows Hyper-V Denial of Service Vulnerability Important 6.8 No No No This vulnerability has a Jump Point meaning it is able to breakout of the vulnerable component.
CVE-2022-41115 Microsoft Edge (Chromium-based) Update Elevation of Privilege Vulnerability Important 6.6 No No No
CVE-2022-44679 Windows Graphics Component Information Disclosure Vulnerability Important 6.5 No No No This vulnerability has a Jump Point meaning it is able to breakout of the vulnerable component.
CVE-2022-44707 Windows Kernel Denial of Service Vulnerability Important 6.5 No No No
CVE-2022-44684 Windows Local Session Manager (LSM) Denial of Service Vulnerability Important 6.5 No No No
CVE-2022-24480 Outlook for Android Elevation of Privilege Vulnerability Important 6.3 No No No
CVE-2022-44674 Windows Bluetooth Driver Information Disclosure Vulnerability Important 5.5 No No No
CVE-2022-41074 Windows Graphics Component Information Disclosure Vulnerability Important 5.5 No No No Exploiting this vulnerability could allow the disclosure of initialized or uninitialized memory in the process heap.
CVE-2022-44699 Azure Network Watcher Agent Security Feature Bypass Vulnerability Important 4.4 No No No
CVE-2022-44688 Microsoft Edge (Chromium-based) Spoofing Vulnerability Moderate 4.3 No No No