Microsoft addressed three zero-day vulnerabilities March 2022 Patch Tuesday Update
For a detailed advisory, download the pdf file here
Microsoft addressed 71 the following vulnerabilities in their March 2022 Patch Tuesday Update. This advisory briefs about six vulnerabilities out of which three of them have been rated critical in severity and three of them are zero-days.
Microsoft Patch Tuesday comprise of the following vulnerabilities: • 29 Remote Code Execution Vulnerabilities • 25 Elevation of Privilege Vulnerabilities • 6 Information Disclosure Vulnerabilities • 4 Denial of Service Vulnerabilities • 3 Security Feature Bypass Vulnerabilities • 3 Spoofing Vulnerabilities • 1 Tampering Vulnerability
The three critical vulnerabilities are remote code execution bugs affecting Microsoft Exchange Server (CVE-2022-23277), HEVC Video Extensions (CVE-2022-22006), and VP9 Video Extensions (CVE-2022-24501). In addition to this, two out of the three zero-days are remote code execution (CVE-2022-24512
CVE-2022-21990) and one of them is a privilege escalation (CVE-2022-24459). A zero-day vulnerability, CVE-2022-21990 has been labeled as “Exploitation More Likely“ by Microsoft as a proof-of-concept (PoC) exploit is publicly available.
All these vulnerabilities have been patched by Microsoft and we advise all organizations to apply patches for the same to avoid potential attacks.
Potential Mitre ATT&CK TTPs are :
TA0001: Initial Access
TA0002: Execution
TA0004: Privilege Escalation
T1190: Exploit Public-Facing Application
T1203: Exploitation of Client Execution
T1068: Exploitation for Privilege Escalation
Vulnerability Detail
Patch Link
What’s new on HivePro
Get through updates and upcoming events, and more directly in your inbox