Service Notices

All Notices > Security Notices > Microsoft Releases June 2022 Security Updates

Microsoft Releases June 2022 Security Updates

Jun 20, 2022 GMT+08:00

I. Overview

Microsoft has released its June 2022 Security Updates. A total of 55 security vulnerabilities have been disclosed, among which 3 are marked as important vulnerabilities. Attackers can exploit these vulnerabilities to perform remote code execution, escalate privileges, and leak sensitive information. The affected applications include Microsoft Windows, Microsoft Office, Windows Hyper-V, and Microsoft Edge.

For details, visit Microsoft official website:

https://msrc.microsoft.com/update-guide/releaseNote/2022-Jun

The following vulnerabilities have been exploited by attackers:

Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability (CVE-2022-30190): The vulnerability can be exploited when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The EXP/POC of the vulnerability has been disclosed and the vulnerability has been exploited in the wild. The risk is high.

Windows Network File System Remote Code Execution Vulnerability (CVE-2022-30136): Unauthenticated attackers can construct malicious requests to execute arbitrary code on affected hosts running NFS. It is officially marked as Exploitation More Likely. According to the official description, the vulnerability cannot be exploited in NFSV 2.0 or NFSV 3.0. You can disable NFSV 4.1 to mitigate the risk.

Windows SMB Denial-of-Service Vulnerability (CVE-2022-32230): This vulnerability has been fixed in the April security updates and disclosed this month. Windows SMB has a null pointer dereference during request processing. Unauthenticated remote attackers can send specially crafted requests to the Microsoft Windows Domain Controllers to launch a denial-of-service (DoS) attack. Currently, the vulnerability details and POC have been disclosed.

Windows Installer Elevation of Privilege Vulnerability (CVE-2022-30147): This vulnerability is officially marked as Exploitation More Likely.

Windows Advanced Local Procedure Call Elevation of Privilege Vulnerability (CVE-2022-30160): This vulnerability is officially marked as Exploitation More Likely.

Please perform security self-check and security hardening in a timely manner to reduce attack risks.

II. Severity

Severity: important

(Severity: low, moderate, important, and critical)

III. Affected Products

Microsoft Windows, Microsoft Office, Windows Hyper-V, Microsoft Edge, and other products.

IV. Vulnerability Details

CVE No.

Vulnerability

Severity

Affected Product

CVE-2022-30163

Windows Hyper-V Remote Code Execution Vulnerability

Important

Windows 10, Windows 8.1, Windows 11, Windows Server 2008R/2012/2012R/2016/2019/2022, Windows Server 20H2

CVE-2022-30139

Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability

Important

Windows 10, Windows 11, Windows Server 2016/2019/2022, Windows Server 20H2

CVE-2022-30136

Windows Network File System Remote Code Execution Vulnerability

Important

Windows Server 2012/2012R/2016/2019

(Note: Vulnerabilities listed above are important ones. For more information, refer to the official website of Microsoft.)

V. Security Recommendations

1. Use Windows Update or download patches from the following address to fix the vulnerabilities:

https://msrc.microsoft.com/update-guide

2. Back up data remotely to protect your data.

Note: Before fixing vulnerabilities, back up your files and conduct a thorough test.