Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Tripwire Patch Priority Index for January 2022
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Tripwire Patch Priority Index for January 2022

4 years ago Lane Thames
Tripwire Patch Priority Index for May 2021

Tripwire’s January 2022 Patch Priority Index (PPI) brings together important vulnerabilities for Apache, Open Source Policy Kit, Adobe, and Microsoft.

First on the patch priority list this month are patches for Apache Log4j2 vulnerabilities, most importantly for the Log4j2 “LogShell” remote code execution vulnerability (CVE-2021-44228). This vulnerability made it on the December 2021 priority list, and it is back this month because it has been recently added to the Metasploit Exploit Framework. These systems should be patched as soon as possible.

Up next is a remote code execution in the Windows HTTP protocol stack. This vulnerability can be exploited over the network with no authentication required. Microsoft states that this vulnerability is wormable. Administrators should ensure this vulnerability is patched as soon as possible.

Next on the list is the so-called “PWNkit” vulnerability. This is a local privilege escalation vulnerability that potentially impacts any Linux operating system. The vulnerability exists in the PolicyKit (aka, polkit) pkexec application and allows a low privileged user to easily gain access to root with ease. Several proof-of-concepts are available on GitHub. The main requirements is that PolicyKit is installed on a target system and a malicious actor has the ability to login as a regular user. Many Linux distributions such as RedHat, Ubuntu, Amazon Linux, etc. have released patches to resolve this vulnerability.

Up next are patches for Microsoft Edge that resolve over 20 vulnerabilities such as user after free, type confusion, heap buffer overflow, and data validation vulnerabilities.

Following Edge, administrators should apply patches for Adobe Reader and Acrobat based on the APSB22-01 patch release. These patches resolve over 25 vulnerabilities and fix issues such as use after free, information exposure, stack-based buffer overflow, heap-based buffer overflow, and out of bounds write vulnerabilities.

Next are patches for Microsoft Office, Excel, and Word. These patches resolve 3 remote code execution vulnerabilities.

BULLETIN CVE
Exploit Framework – Metasploit CVE-2021-44228
Windows HTTP Protocol Stack CVE-2022-21907
PolicyKit (polkit) – Local Privilege Escalation CVE-2021-4034
Microsoft Edge (Chromium-based) CVE-2022-0108, CVE-2022-0109, CVE-2022-0104, CVE-2022-0105, CVE-2022-0106, CVE-2022-0107, CVE-2022-0100, CVE-2022-0101, CVE-2022-0102, CVE-2022-0103, CVE-2022-0120, CVE-2022-0113, CVE-2022-0112, CVE-2022-0111, CVE-2022-0110, CVE-2022-0117, CVE-2022-0116, CVE-2022-0115, CVE-2022-0114, CVE-2022-0118, CVE-2022-0098, CVE-2022-0099, CVE-2022-0096, CVE-2022-0097
APSB22-01 CVE-2021-44701, CVE-2021-44702, CVE-2021-44703, CVE-2021-44704, CVE-2021-44705, CVE-2021-44706, CVE-2021-44707, CVE-2021-44708, CVE-2021-44709, CVE-2021-44710, CVE-2021-44711, CVE-2021-44712, CVE-2021-44713, CVE-2021-44714, CVE-2021-44715, CVE-2021-44739, CVE-2021-44740, CVE-2021-44741, CVE-2021-44742, CVE-2021-45060, CVE-2021-45061, CVE-2021-45062, CVE-2021-45063, CVE-2021-45064, CVE-2021-45067, CVE-2021-45068
Microsoft Office Word CVE-2022-21842
Microsoft Office Excel CVE-2022-21841
Microsoft Office CVE-2022-21840
Microsoft Windows I CVE-2022-21883, CVE-2022-21889, CVE-2022-21890, CVE-2022-21848, CVE-2022-21843, CVE-2022-21849, CVE-2021-22947, CVE-2022-21870, CVE-2022-21959, CVE-2022-21958, CVE-2022-21892, CVE-2022-21960, CVE-2022-21961, CVE-2022-21962, CVE-2022-21963, CVE-2022-21928, CVE-2022-21924, CVE-2022-21862, CVE-2022-21835, CVE-2022-21908, CVE-2022-21897, CVE-2022-21916, CVE-2022-21877, CVE-2022-21894, CVE-2022-21918, CVE-2022-21898, CVE-2022-21912, CVE-2022-21884, CVE-2022-21836, CVE-2022-21834, CVE-2022-21868, CVE-2022-21903, CVE-2022-21904, CVE-2022-21880, CVE-2022-21915, CVE-2022-21839, CVE-2022-21872, CVE-2022-21838, CVE-2022-21881, CVE-2022-21879, CVE-2022-21896, CVE-2022-21902, CVE-2022-21852, CVE-2022-21895, CVE-2022-21919, CVE-2022-21869
Microsoft Windows II CVE-2022-21867, CVE-2022-21922, CVE-2022-21906, CVE-2022-21921, CVE-2022-21964, CVE-2022-21858, CVE-2022-21871, CVE-2022-21850, CVE-2022-21851, CVE-2022-21893, CVE-2022-21878, CVE-2022-21863, CVE-2022-21925, CVE-2022-21874, CVE-2021-36976, CVE-2022-21882, CVE-2022-21887, CVE-2022-21876, CVE-2022-21920, CVE-2022-21865, CVE-2022-21888, CVE-2022-21875, CVE-2022-21885, CVE-2022-21914, CVE-2022-21864, CVE-2022-21861, CVE-2022-21866, CVE-2022-21860, CVE-2022-21899, CVE-2022-21873, CVE-2022-21913, CVE-2022-21833, CVE-2022-21859, CVE-2022-21910
.NET Framework CVE-2022-21911
Role: Windows Hyper-V CVE-2022-21847, CVE-2022-21901, CVE-2022-21900, CVE-2022-21905
Windows Active Directory CVE-2022-21857
Microsoft Exchange Server CVE-2022-21969, CVE-2022-21855, CVE-2022-21846
Microsoft Office SharePoint CVE-2022-21837
Microsoft Dynamics CVE-2022-21932

The post ” Tripwire Patch Priority Index for January 2022″ appeared first on TripWire

Source:TripWire – Lane Thames

Tags: Exploit, Google, Linux, Low Severity, Microsoft, TripWire, Vulnerability

Continue Reading

Previous Making Progress Securing Our Nation’s Water Supply
Next Iranian Hackers Using New PowerShell Backdoor in Cyber Espionage Attacks

More Stories

  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists

2 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

22 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

24 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

1 day ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

How Samsung Knox Helps Stop Your Network Security Breach

1 day ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

1 day ago [email protected] (The Hacker News)

Recent Posts

  • German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists
  • China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
  • CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
  • Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
  • How Samsung Knox Helps Stop Your Network Security Breach

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT