Security Guidance

Microsoft Patch Tuesday: December 2022

December 14, 2022

Microsoft Patch Tuesday: December 2022

December’s Patch Tuesday contains fixes for 44 vulnerabilities, with 7 critical, 2 publicly disclosed and 1 exploited in the wild. This Patch Tuesday is quieter than what we have seen over the past couple of months, with a big decrease in the number of vulnerabilities.

December’s instalment includes patches for some key services such as:

  • Azure
  • Microsoft Bluetooth Driver
  • Microsoft Dynamics
  • Microsoft Edge
  • Microsoft Office
  • Microsoft Office OneNote
  • Microsoft Office Outlook
  • Microsoft Office SharePoint
  • Microsoft Office Visio
  • Role: Windows Hyper-V
  • SysInternals
  • Windows Certificates
  • Windows Contacts
  • Windows HTTP Print Provider
  • Windows Kernel
  • Windows PowerShell
  • Windows Print Spooler Components
  • Windows SmartScreen
  • Windows Subsystem for Linux
  • Windows Terminal

CVE-2022-44698: Windows SmartScreen Security Feature Bypass Vulnerability

Being the only known vulnerability to be exploited in the wild, this moderate vulnerability would allow an attacker can craft a malicious file that would evade Mark of the Web defences. This file would result in an error with SmartScreen causing security warnings to not be displayed to users. This was known to be used by QBot trojan and Magniber Ransomware to bypass Microsoft’s security systems.

CVE-2022-44710: DirectX Graphics Kernel Elevation of Privilege Vulnerability

This publicly disclosed moderate vulnerability could allow an attacker to access SYSTEM privileges by exploiting DirectX Graphics Kernel. Weak mitigation of this vulnerability is that an attacker would have to win a race condition for a successful exploit. This vulnerability only affects Windows 11 Version 22H2 for ARM64- and x64-based systems.

CVE-2022-41076: PowerShell Remote Code Execution Vulnerability

This critical vulnerability could allow an attacker to escape the PowerShell Remoting Session configuration and run unapproved commands. This vulnerability is complex to exploit and would require the attack to win a race condition.

For a full list of this month’s updates please see the links below:

Patch Tuesday release notes: https://msrc.microsoft.com/update-guide/releaseNote/2022-Dec

Security update guide: https://msrc.microsoft.com/update-guide/

Author

Stuart Hare is a Technologist with a passion for helping people in all aspects of IT & Cyber Security. Stuart is the Founder of Ironshare, an Information and Cyber Security company providing consultancy and managed services.

Samuel is a Security Analyst with Ironshare, an Information and Cyber Security company providing Security consultancy and managed services.

Joshua is working as a Managed Service Lead with Ironshare, an Information and Cyber Security company providing Security consultancy and managed services.

SUBSCRIBE

Ironshare is a provider of Information and Cyber Security services.

we went with; wizard pi