Microsoft’s Patch Tuesday train rumbled into Windows networks with fixes for 51 documented security vulnerabilities, some serious enough to cause full computer takeover attacks.
In addition to the 51 CVEs fixed with this month’s scheduled release, Redmond also patched about 20 different security defects in its Microsoft Edge (Chromium-based) web browser.
According to data from the Microsoft Security Response Center (MSRC), there are no in-the-wild zero-days being addressed with the February updates. However, proof-of-concept exists code for an elevation of privilege bug (CVE-2022-21989) in the Windows kernel.
“A successful attack could be performed from a low privilege AppContainer. The attacker could elevate their privileges and execute code or access resources at a higher integrity level than that of the AppContainer execution environment,” Microsoft warned in an advisory. The kernel bug is rated “important” with a CVSS Score of 7.8.
[ READ: Law Enforcement Blowback, Cyber Insurance Renewals Powering Anti-Ransomware Success ]
The list of vulnerabilities this month affect a wide range of Windows products and components, including remote code execution issues in the Windows DNS Server, Windows Hyper-V, Microsoft SharePoint, HEVC Video Extensions, Microsoft Dynamics 365, and Microsoft Office.
Microsoft also provided cover for an Office for Mac security vulnerability that allows exploitation via the Preview Pane to expose sensitive user data.
Separately, Adobe released patches for more than a dozen security vulnerabilities in its Illustrator, Photoshop, After Effects, Creative Cloud, and Premiere Rush software programs.
Adobe said it was not aware of any attacks exploiting these vulnerabilities.
Related: Microsoft Calls Attention to ‘Wormable’ Windows Flaw
Related: Adobe Joins Security Patch Tuesday Frenzy
Related: Microsoft Patch Tuesday: Windows Flaw Under Active Attack

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.
More from Ryan Naraine
- Oleria Scores $8M Seed Funding for ID Authentication Technology
- Aembit Scores $16.6M Seed Funding for Workload IAM Technology
- Project Zero: Samsung Mobile Chipsets Vulnerable to Baseband Code Execution Exploits
- Rapid7 Buys Anti-Ransomware Firm Minerva Labs for $38 Million
- Microsoft Pins Outlook Zero-Day Attacks on Russian Actor, Offers Detection Script
- Microsoft Warns of Outlook Zero-Day Exploitation, Patches 80 Security Vulns
- Adobe Warns of ‘Very Limited Attacks’ Exploiting ColdFusion Zero-Day
- Cloud Forensics Startup Mitiga Completes $45M Series A
Latest News
- Burnout in Cybersecurity – Can it be Prevented?
- Spain Needs More Transparency Over Pegasus: EU Lawmakers
- Ransomware Will Likely Target OT Systems in EU Transport Sector: ENISA
- Virtual Event Today: Supply Chain & Third-Party Risk Summit
- Google Suspends Chinese Shopping App Amid Security Concerns
- Verosint Launches Account Fraud Detection and Prevention Platform
- Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager
- Zoom Paid Out $3.9 Million in Bug Bounties in 2022
