Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

Microsoft Patches for 51 Windows Security Defects

Microsoft’s Patch Tuesday train rumbled into Windows networks with fixes for 51 documented security vulnerabilities, some serious enough to cause full computer takeover attacks.

Microsoft’s Patch Tuesday train rumbled into Windows networks with fixes for 51 documented security vulnerabilities, some serious enough to cause full computer takeover attacks.

In addition to the 51 CVEs fixed with this month’s scheduled release, Redmond also patched about 20 different security defects in its Microsoft Edge (Chromium-based) web browser.

According to data from the Microsoft Security Response Center (MSRC), there are no in-the-wild zero-days being addressed with the February updates.  However, proof-of-concept exists code for an elevation of privilege bug (CVE-2022-21989) in the Windows kernel.

“A successful attack could be performed from a low privilege AppContainer. The attacker could elevate their privileges and execute code or access resources at a higher integrity level than that of the AppContainer execution environment,” Microsoft warned in an advisory.  The kernel bug is rated “important” with a CVSS Score of 7.8.

[ READ: Law Enforcement Blowback, Cyber Insurance Renewals Powering Anti-Ransomware Success ]

The list of vulnerabilities this month affect a wide range of Windows products and components, including remote code execution issues in the Windows DNS Server, Windows Hyper-V, Microsoft SharePoint, HEVC Video Extensions, Microsoft Dynamics 365,  and Microsoft Office.

Advertisement. Scroll to continue reading.

Microsoft also provided cover for an Office for Mac security vulnerability that allows exploitation via the Preview Pane to expose sensitive user data.

Separately, Adobe released patches for more than a dozen security vulnerabilities in its Illustrator, Photoshop, After Effects, Creative Cloud, and Premiere Rush software programs.

Adobe said it was not aware of any attacks exploiting these vulnerabilities.

Related: Microsoft Calls Attention to ‘Wormable’ Windows Flaw

Related: Adobe Joins Security Patch Tuesday Frenzy

Related: Microsoft Patch Tuesday: Windows Flaw Under Active Attack

Written By

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Organizations are investing heavily in third-party risk management, but breaches, delays, and blind spots continue to persist. Join this live webinar as we examine the gap between how organizations think their third-party risk programs are performing and what’s actually happening in practice.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Tim Byrd has been appointed Chief Information Security Officer at First Citizens Bank.

IRONSCALES has named Steve McKenzie as Chief Operating Officer.

Silvio Pappalardo has joined AuthMind as Chief Revenue Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.