Microsoft Fixes 52 Vulnerabilities in February, 2022 Patches

Credit to Author: Christopher Budd| Date: Wed, 09 Feb 2022 18:48:31 +0000

February 2022 provides a month of some respite after two relatively heavy and challenging months. After fixing 64 vulnerabilities in December 2021 and fixing over 100 in January 2022, February presents 52 vulnerabilities.

February is also a quieter month, since at the time of release Microsoft rated none of the vulnerabilities critical. Only one is listed as being publicly known (still not critical), and none have been publicly exploited, according to the company.

However, it’s not a month off: This month’s patches fix Microsoft Windows, Office, Microsoft Dynamics, the Edge browser, Microsoft Visual Studio, and some lesser known products. Three of the vulnerabilities affecting  Visual Studio and Windows are notable.

Also, Microsoft has just announced a major change in how some Microsoft Office applications will handle macros in documents that come from the internet: VBA macros obtained from the internet will now be blocked by default. This change will be rolled out starting in April, 2022 with Version 2203.

Notable Vulnerabilities

Windows DNS Server Remote Code Execution Vulnerability

CVE-2022-21984

While this vulnerability is rated as “Important”, organizations that use Active Directory may want to prioritize this as a “Critical” update. This affects all instances of Windows DNS server, including those running Active Directory. Microsoft notes that there are at best, only partial mitigations to this vulnerability. Applying the update is the only thorough remedy.

Based on the information provided about this CVE by Microsoft, it appears to be a SYSTEM-level code execution vulnerability in Microsoft’s DNS server, meaning that it’s network-based. This would seem to indicate that a successful compromise of an Active Directory server using this could potentially give attackers control over Active Directory, putting the full network at risk.

It is listed as “Exploitation Less Likely” for both the latest and older software releases. It’s also not publicly disclosed. And the credits indicate that this is an internal find by the Microsoft Offensive Research & Security Engineering (MORSE). All of these mitigate the risks of active attacks against this vulnerability, at least in the near-term.

CVE-2022-21991 Visual Studio Code Remote Development Extension Remote Code Execution Vulnerability

Developers and those who manage developer environments should note there are two Visual Studio vulnerabilities this month, and CVE-2022-21991 is particularly notable.

This affects the Visual Studio Code Remote Development Extension. Microsoft’s page notes “The Remote Development extension pack allows you to open any folder in a container, on a remote machine, or in the Windows Subsystem for Linux (WSL) and take advantage of VS Code’s full feature set.”

Microsoft notes regarding this vulnerability that “[a]n attacker would need to send a specially crafted request to a host running the Visual Studio Code Remote Development Extension. This issue only affects systems configured to host a remote development environment.”

While this means only those development environments that have installed this are at risk, it also means that development environments that have installed this tool to enable remote development are at risk for a network-based code execution attack. A successful attack could potentially put anything in that development environment at risk, including but not limited to source code, tools, documents or any other resources housed in that remote-enabled development environment.

The ramifications of this are that development environments that use the Visual Studio Code Remote Development Extension could be at risk from attacks targeting the integrity of the source code they develop, as we’ve seen in some supply-chain attacks over the years.

It’s also worth noting CVE-2022-21986 Kestrel Web Server Denial of Service Vulnerability which also affects Visual Studio. In this case, it impacts the Kestrel web server that is part of Visual Studio 2017 for Mac.

Microsoft Dynamics GP and Microsoft Dynamics 365 (on-premises)

There are six vulnerabilities that affect customers using older and on-premises versions of Microsoft Dynamics: Microsoft Dynamics GP, a predecessor of the current Microsoft Dynamics 365 and the on-premises version of Microsoft Dynamics 365. Both products are subject to remote code execution vulnerabilities. Because Microsoft Dynamics customers can include small-to-medium businesses (SMBs) who may not have a regular patching program in place, these are important updates to call out.

Windows Kernel Elevation of Privilege Vulnerability

CVE-2022-21989

This is the one vulnerability that is publicly known. It’s also rated as “Exploitation” likely for both the latest and older versions of Windows. This is an elevation of privilege (EoP) vulnerability affecting AppContainer. A successful attack could elevate privileges from a container and execute code or access resources at a higher integrity level than that AppContainer’s execution environment.

Microsoft Windows

All total, 26 of this month’s vulnerabilities apply to various versions of Microsoft Windows. All are rated as “Important”. None are publicly disclosed and none are publicly exploited at the time of release.

As noted earlier, one of these (CVE-2022-21984) affects Windows DNS and another (CVE-2022-21989) is a publicly known EoP kernel vulnerability rated as “likely” to be exploited. Additional key points regarding the other Windows vulnerabilities include:

  • One vulnerability, CVE-2022-21996 – Win32k Elevation of Privilege Vulnerability, applies to Windows 11 only.
  • There are four vulnerabilities (CVE-2022-22717, CVE-2022-22718, CVE-2022-21997 CVE-2022-21999) affecting the Print Spooler, a component that has been under attack and scrutiny since the PrintNightmare situation began in late June 2021.  It’s worth noting these are all EoP vulnerabilities, and none have been publicly disclosed nor have they been publicly exploited, as far as Microsoft knows.
  • There are four vulnerabilities (CVE-2022-21981, CVE-2022-22710, CVE-2022-21998, CVE-2022-22000) affecting the Windows Common Log File System Driver. Two are EoPs, one is a Denial of Service (DoS), and one Information Disclosure
  • Four vulnerabilities (CVE-2022-22709, CVE-2022-21844, CVE-2022-21926, CVE-2022-21927)  affect Microsoft Windows Codecs Library.
  • Two vulnerabilities (CVE-2022-22712, CVE-2022-21995) affect Hyper-V, including one RCE vulnerability.
  • Two vulnerabilities (CVE-2022-21985, CVE-2022-22001) affecting Remote Access Connection Manager: an Information Disclosure and an EoP vulnerability.
  • One RCE vulnerability (CVE-2022-21992) affecting Windows Mobile Device Management
  • One EoP vulnerability (CVE-2022-21994) affecting Windows DWM Core Library (Desktop Window Manager).
  • One information disclosure vulnerability (CVE-2022-21993) affecting the NFS ONCRPC XDR kernel mode driver.
  • One EoP vulnerability (CVE-2022-22715) affecting Named Pipes.
  • One RCE vulnerability (CVE-2022-21971) affecting the Windows runtime.
  • One RCE vulnerability (CVE-2022-21974)  affecting the Windows Roaming Security RMS (RMSRoamingSecurity.dll).
  • One DoS vulnerability (CVE-2022-22002) affecting the Windows User Account Profile Picture.

The full list of vulnerabilities that are applicable to Microsoft Windows is listed below.

Microsoft Office

Eleven vulnerabilities affect Microsoft Office.  All are rated as “Important.” None are publicly disclosed and none are publicly exploited at the time of release.

  • Three RCE vulnerabilities (CVE-2022-22003, CVE-2022-23252, CVE-2022-22004) affect Microsoft Office.
  • Thee vulnerabilities (CVE-2022-21987, CVE-2022-21968, CVE-2022-22005) affect Microsoft SharePoint and include one RCE, one EoP and one spoofing vulnerability.
  • One DoS vulnerability (CVE-2022-21965) affects Microsoft Teams.
  • One information disclosure vulnerability (CVE-2022-22716) affects Microsoft Excel.
  • One RCE vulnerability (CVE-2022-21988) affects Microsoft Visio.
  • One security feature bypass (CVE-2022-23255) affects Microsoft OneDrive for Android.
  • One security feature bypass (CVE-2022-23280) affects Microsoft Outlook for Mac. This vulnerability has a no-user-interaction preview pane attack vector however the main impact appears to be exposing the IP address of the target: code execution is possible.

The full list of vulnerabilities that are applicable to Microsoft Office is listed below.

1.CVE-2022-21965Microsoft Teams Denial of Service VulnerabilityDenial of Service
2.CVE-2022-21968Microsoft SharePoint Server Security Feature BypassVulnerabilityElevation of Privilege
3.CVE-2022-21987Microsoft SharePoint Server Spoofing VulnerabilitySpoofing
4.CVE-2022-21988Microsoft Office Visio Remote Code Execution VulnerabilityRemote Code Execution
5.CVE-2022-22003Microsoft Office Graphics Remote Code Execution VulnerabilityRemote Code Execution
6.CVE-2022-22004Microsoft Office ClickToRun Remote Code Execution VulnerabilityRemote Code Execution
7.CVE-2022-22005Microsoft SharePoint Server Remote Code Execution VulnerabilityRemote Code Execution
8.CVE-2022-22716Microsoft Excel Information Disclosure VulnerabilityInformation Disclosure
9.CVE-2022-23252Microsoft Office Information Disclosure VulnerabilityInformation Disclosure
10.CVE-2022-23255Microsoft OneDrive for Android Security Feature Bypass VulnerabilitySecurity Feature Bypass
11.CVE-2022-23280Microsoft Outlook for Mac Security Feature Bypass VulnerabilitySecurity Feature Bypass

Microsoft Dynamics

Five of the six vulnerabilities this month affect Microsoft Dynamics GP, a predecessor of the current Microsoft Dynamics 365. One affects Microsoft Dynamics 365 but the on-premises version only.

One of the Microsoft Dynamics GP vulnerabilities is an RCE (CVE-2022-23274), three are EoPs (CVE-2022-23271, CVE-2022-23272, CVE-2022-23273) and the last one is a spoofing vulnerability (CVE-2022-23269).

Microsoft Dynamics 365 is also affected by an RCE (CVE-2022-21957) but it’s important to note this only affects the on-premises version of the product.

The full list of vulnerabilities that are applicable to Microsoft Dynamics is listed below.

1.CVE-2022-21957Microsoft Dynamics 365 (on-premises) Remote Code Execution VulnerabilityRemote Code Execution
2.CVE-2022-23269Microsoft Dynamics GP Spoofing VulnerabilitySpoofing
3.CVE-2022-23271Microsoft Dynamics GP Elevation Of Privilege VulnerabilityElevation of Privilege
4.CVE-2022-23272Microsoft Dynamics GP Elevation Of Privilege VulnerabilityElevation of Privilege
5.CVE-2022-23273Microsoft Dynamics GP Elevation Of Privilege VulnerabilityElevation of Privilege
6.CVE-2022-23274Microsoft Dynamics GP Remote Code Execution VulnerabilityRemote Code Execution

Microsoft Edge

There are four vulnerabilities affecting the Chromium-based Microsoft Edge. Two “Important” rated EoPs (CVE-2022-23262 and CVE-2022-23263), one “Moderate” rated Tampering vulnerability, and one “Low” rated Spoofing vulnerability.

In addition to these vulnerabilities affecting Edge, specifically, Microsoft also published guidance that they have incorporated fixes to a range of CVEs affecting the underlying Chromium engine. The company says “no action is required” to address the 19 bugs (CVE-2021-0452 through CVE-2021-0470) affected. Between these and the 51 bugs specific to Microsoft patches, these bring the total number of fixes in February to 70.

The full list of vulnerabilities that are applicable to Microsoft Edge is listed below.

1.CVE-2022-23261Microsoft Edge (Chromium-based) Tampering VulnerabilityTampering
2.CVE-2022-23262Microsoft Edge (Chromium-based) Elevation of Privilege VulnerabilityElevation of Privilege
3.CVE-2022-23263Microsoft Edge (Chromium-based) Elevation of Privilege VulnerabilityElevation of Privilege
4.CVE-2022-23264Microsoft Edge (Chromium-based) Spoofing VulnerabilitySpoofing

Microsoft Visual Studio

Two vulnerabilities affect Microsoft Visual Studio: one RCE (CVE-2022-21991) and one DoS (CVE-2022-21986) discussed above.
The full list of vulnerabilities that are applicable to Visual Studio is listed below.

1.CVE-2022-21991Visual Studio Code Remote Development Extension Remote Code Execution VulnerabilityRemote Code Execution
2.CVE-2022-21986Kestrel Web Server Denial of Service VulnerabilityDenial of Service

Other Products

The other products are affected by EoPs and include the Azure Data Explorer (CVE-2022-23256), Microsoft Power BI (CVE-2022-23254) and SQL Server 2019 for Linux Containers (CVE-2022-23276).

The full list of vulnerabilities that are applicable to other products is listed below.

1.CVE-2022-23256Azure Data Explorer Spoofing VulnerabilityElevation of Privilege
2.CVE-2022-23254Microsoft Power BI Elevation of Privilege VulnerabilityElevation of Privilege
3.CVE-2022-23276SQL Server for Linux Containers Elevation of Privilege VulnerabilityElevation of Privilege

Exploitability Indexes

Below are the Exploitability Indexes for this month’s release, at the time of release.

Exploitation More Likely for Latest Versions

CVE-2022-21981Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2022-21994Windows DWM Core Library Elevation of Privilege Vulnerability
CVE-2022-21996Win32k Elevation of Privilege Vulnerability
CVE-2022-21999Windows Print Spooler Elevation of Privilege Vulnerability
CVE-2022-22000Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2022-22005Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2022-22715Named Pipe File System Elevation of Privilege Vulnerability
CVE-2022-22718Windows Print Spooler Elevation of Privilege Vulnerability
CVE-2022-21989Windows Kernel Elevation of Privilege Vulnerability

Exploitation More Likely for Older Versions

CVE-2022-21981Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2022-21994Windows DWM Core Library Elevation of Privilege Vulnerability
CVE-2022-21999Windows Print Spooler Elevation of Privilege Vulnerability
CVE-2022-22000Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2022-22005Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2022-22715Named Pipe File System Elevation of Privilege Vulnerability
CVE-2022-22718Windows Print Spooler Elevation of Privilege Vulnerability
CVE-2022-21989Windows Kernel Elevation of Privilege Vulnerability

 

 

Sophos protection

CVESAV
CVE-2022-21989Exp/2221989-A
CVE-2022-21996Exp/2221996-A
CVE-2022-22715Exp/2222715-A

As you can do every month, if you don’t want to wait for your system to pull down the updates itself, you can download them manually from the Windows Update Catalog website. Run the winver.exe tool to determine which build of Windows 10 or 11 you’re running, then download the Cumulative Update package for your particular system architecture and build number.

http://feeds.feedburner.com/sophos/dgdY

Leave a Reply