Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • VERT Threat Alert: October 2022 Patch Tuesday Analysis
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

VERT Threat Alert: October 2022 Patch Tuesday Analysis

3 years ago Tyler Reguly
VERT Threat Alert: July 2022 Patch Tuesday Analysis

Today’s VERT Alert addresses Microsoft’s October 2022 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-1025 on Wednesday, October 12th.

In-The-Wild & Disclosed CVEs

CVE-2022-41033

A vulnerability in the Windows COM+ Event System service could allow malicious individuals to obtain SYSTEM level access on all supported versions of Windows. The system is responsible for providing automatic distribution of events to subscribing COM components. According to Microsoft, this vulnerability is currently seeing active exploitation.

CVE-2022-41043

A vulnerability in Microsoft Office for Mac could allow for the disclosure of user tokens and other sensitive information. According to Microsoft, this vulnerability has been publicly disclosed, but is not currently seeing active exploitation.

CVE Breakdown by Tag

While historical Microsoft Security Bulletin groupings are gone, Microsoft vulnerabilities are tagged with an identifier. This list provides a breakdown of the CVEs on a per tag basis. Vulnerabilities are also color coded to aid with identifying key issues.

  • Traditional Software
  • Mobile Software
  • Cloud or Cloud Adjacent
  • Vulnerabilities that are being exploited or that have been disclosed
Tag CVE Count CVEs
Windows Workstation Service 1 CVE-2022-38034
Microsoft Office Word 2 CVE-2022-38049, CVE-2022-41031
Windows USB Serial Driver 1 CVE-2022-38030
Windows Portable Device Enumerator Service 1 CVE-2022-38032
Windows Group Policy 1 CVE-2022-37975
Windows Local Session Manager (LSM) 2 CVE-2022-37998, CVE-2022-37973
Windows Distributed File System (DFS) 1 CVE-2022-38025
Windows Internet Key Exchange (IKE) Protocol 1 CVE-2022-38036
Active Directory Domain Services 1 CVE-2022-38042
Microsoft Office SharePoint 4 CVE-2022-41036, CVE-2022-41037, CVE-2022-38053, CVE-2022-41038
Remote Access Service Point-to-Point Tunneling Protocol 1 CVE-2022-37965
Windows Web Account Manager 1 CVE-2022-38046
Visual Studio Code 3 CVE-2022-41034, CVE-2022-41083, CVE-2022-41042
Windows Perception Simulation Service 1 CVE-2022-37974
Windows Secure Channel 1 CVE-2022-38041
Windows Connected User Experiences and Telemetry 1 CVE-2022-38021
Windows Security Support Provider Interface 1 CVE-2022-38043
Microsoft Graphics Component 5 CVE-2022-33635, CVE-2022-37986, CVE-2022-38051, CVE-2022-37985, CVE-2022-37997
Windows Kernel 8 CVE-2022-38022, CVE-2022-37988, CVE-2022-38037, CVE-2022-38038, CVE-2022-37990, CVE-2022-38039, CVE-2022-37991, CVE-2022-37995
Windows DWM Core Library 2 CVE-2022-37970, CVE-2022-37983
Windows Local Security Authority Subsystem Service (LSASS) 1 CVE-2022-37977
Windows Point-to-Point Tunneling Protocol 7 CVE-2022-30198, CVE-2022-22035, CVE-2022-24504, CVE-2022-33634, CVE-2022-38047, CVE-2022-38000, CVE-2022-41081
Microsoft Office 3 CVE-2022-38048, CVE-2022-38001, CVE-2022-41043
Windows ODBC Driver 1 CVE-2022-38040
NuGet Client 1 CVE-2022-41032
Client Server Run-time Subsystem (CSRSS) 2 CVE-2022-37987, CVE-2022-37989
Windows Defender 1 CVE-2022-37971
Windows NTLM 1 CVE-2022-35770
Windows CryptoAPI 1 CVE-2022-34689
Windows Local Security Authority (LSA) 1 CVE-2022-38016
Windows Group Policy Preference Client 3 CVE-2022-37999, CVE-2022-37993, CVE-2022-37994
Windows Event Logging Service 1 CVE-2022-37981
Microsoft WDAC OLE DB provider for SQL 2 CVE-2022-37982, CVE-2022-38031
Windows Active Directory Certificate Services 2 CVE-2022-37976, CVE-2022-37978
Service Fabric 1 CVE-2022-35829
Windows Win32K 1 CVE-2022-38050
Azure 1 CVE-2022-38017
Windows TCP/IP 1 CVE-2022-33645
Windows Resilient File System (ReFS) 1 CVE-2022-38003
Windows Server Remotely Accessible Registry Keys 1 CVE-2022-38033
Windows COM+ Event System Service 1 CVE-2022-41033
Windows Server Service 1 CVE-2022-38045
Windows Print Spooler Components 1 CVE-2022-38028
Role: Windows Hyper-V 1 CVE-2022-37979
Windows Storage 1 CVE-2022-38027
Windows WLAN Service 1 CVE-2022-37984
Microsoft Edge (Chromium-based) 12 CVE-2022-3304, CVE-2022-3307, CVE-2022-3308, CVE-2022-3310, CVE-2022-3311, CVE-2022-3313, CVE-2022-3315, CVE-2022-3316, CVE-2022-3317, CVE-2022-3370, CVE-2022-3373, CVE-2022-41035
Azure Arc 1 CVE-2022-37968
Windows ALPC 1 CVE-2022-38029
Windows DHCP Client 2 CVE-2022-38026, CVE-2022-37980
Windows CD-ROM Driver 1 CVE-2022-38044
Windows NTFS 1 CVE-2022-37996

Other Information

At the time of publication, there were no new advisories included with the October Security Guidance.

The post ” VERT Threat Alert: October 2022 Patch Tuesday Analysis” appeared first on TripWire

Source:TripWire – Tyler Reguly

Tags: Cloud, Microsoft, Patch Tuesday, TripWire

Continue Reading

Previous BazarCall Callback Phishing Attacks Constantly Evolving Its Social Engineering Tactics
Next Microsoft Patch Tuesday Fixes New Windows Zero-Day; No Patch for Exchange Server Bugs

More Stories

  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks

37 mins ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

Mozilla Adds One-Click Option to Disable Generative AI Features in Firefox

4 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Notepad++ Hosting Breach Attributed to China-Linked Lotus Blossom Hacking Group

5 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users

16 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link

17 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos

18 hours ago [email protected] (The Hacker News)

Recent Posts

  • APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks
  • Mozilla Adds One-Click Option to Disable Generative AI Features in Firefox
  • Notepad++ Hosting Breach Attributed to China-Linked Lotus Blossom Hacking Group
  • Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT