Service Notices

All Notices > Security Notices > Microsoft Releases October 2022 Security Updates

Microsoft Releases October 2022 Security Updates

Oct 14, 2022 GMT+08:00

I. Overview

Microsoft has released its October 2022 security updates. A total of 84 security vulnerabilities have been disclosed, among which 13 are marked as important vulnerabilities. Attackers can exploit these vulnerabilities to perform remote code execution, escalate privileges, and leak sensitive information. The affected applications include Microsoft Windows, Microsoft Office, Microsoft Visual Studio and .NET.

For details, visit Microsoft official website:

https://msrc.microsoft.com/update-guide/releaseNote/2022-Oct

The following vulnerabilities have been exploited by attackers:

Windows COM+ Event System Service Elevation of Privilege Vulnerability (CVE-2022-41033): 0-day vulnerability, which is caused by defects in the COM+ Event System service. Authenticated attackers can exploit this vulnerability to escalate privileges. This vulnerability has been exploited in the wild, and the risk is high.

Microsoft Office Information Disclosure Vulnerability (CVE-2022-41043): 0-day vulnerability, which is an information disclosure vulnerability affecting Microsoft Office for Mac. The details of this vulnerability have been disclosed and the risk is high.

Twelve vulnerabilities (such as CVE-2022-41038 and CVE-2022-34689) are officially marked as Exploitation More Likely. For details, see the official announcement. Please perform security self-check and security hardening in a timely manner to reduce attack risks.

II. Severity

Severity: important

(Severity: low, moderate, important, and critical)

III. Affected Products

Microsoft Windows, Microsoft Office, Microsoft Visual Studio, .NET, and other products.

IV. Vulnerability Details

CVE No.

Vulnerability Name

Severity

Affected Product

CVE-2022-37979

Windows Hyper-V Elevation of Privilege Vulnerability

Important

Windows 10, Windows 11, Windows Server 2016/2019/2022

CVE-2022-41081
CVE-2022-24504
CVE-2022-33634
CVE-2022-38047

Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability

Important

Windows 10, Windows 8.1/RT 8.1, Windows 11, Windows 7, Windows Server 2008/2008R/2012/2012R/2016/2019/2022

CVE-2022-37976

Active Directory Certificate Services Elevation of Privilege Vulnerability

Important

Windows Server 2008/2008R/2012/2012R/2016/2019/2022

CVE-2022-30198
CVE-2022-22035
CVE-2022-38000

Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability

Important

Windows 10, Windows 8.1/RT 8.1, Windows 11, Windows 7, Windows Server 2008R/2012/2012R/2016/2019/2022

CVE-2022-34689

Windows CryptoAPI Spoofing Vulnerability

Important

Windows 10, Windows 8.1/RT 8.1, Windows 11, Windows 7, Windows Server 2008/2008R/2012/2012R/2016/2019/2022

CVE-2022-41038

Microsoft SharePoint Server Remote Code Execution Vulnerability

Important

Microsoft SharePoint Enterprise Server 2013/2016, Microsoft SharePoint Server 2019, Microsoft SharePoint Foundation 2013, Microsoft SharePoint Server Subscription Edition

CVE-2022-37968

Azure Arc-enabled Kubernetes cluster Connect Elevation of Privilege Vulnerability

Important

Azure Stack Edge, Azure Arc-enabled Kubernetes cluster 1.5.8/ 1.6.19/ 1.7.18/ 1.8.11

CVE-2022-38048

Microsoft Office Remote Code Execution Vulnerability

Important

Microsoft Office 2013/2013 RT/2016/2019/ LTSC 2021, Microsoft Office LTSC for Mac 2021, Microsoft Office 2019 for Mac, Microsoft 365 Apps for Enterprise

 (Note: Vulnerabilities listed above are important ones. For more information, refer to the official website of Microsoft.)

V. Security Recommendations

1. Use Windows Update or download patches from the following address to fix the vulnerabilities:

https://msrc.microsoft.com/update-guide

2. Back up data remotely to protect your data.

Note: Before fixing vulnerabilities, back up your files and conduct a thorough test.