{"id":18749,"date":"2022-04-12T13:21:01","date_gmt":"2022-04-12T21:21:01","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/04\/12\/news-12482\/"},"modified":"2022-04-12T13:21:01","modified_gmt":"2022-04-12T21:21:01","slug":"news-12482","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/04\/12\/news-12482\/","title":{"rendered":"RPC Vulnerability Stands Out in a Field of 128 in April"},"content":{"rendered":"<p><strong>Credit to Author: Christopher Budd| Date: Tue, 12 Apr 2022 17:45:37 +0000<\/strong><\/p>\n<div class=\"entry-content lg:prose-lg mx-auto prose max-w-4xl\">\n<p><span data-contrast=\"auto\">You can <\/span><i><span data-contrast=\"auto\">almost<\/span><\/i><span data-contrast=\"auto\"> think of the April 2022 Patch Tuesday release as having a bark that\u2019s worse than its bite.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">At first blush, this is a very large month in terms of numbers of vulnerabilities (CVEs) addressed: 128.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">However, even though this is a heavy month in terms of quantity, it\u2019s actually not as bad a month as one might expect.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">That said, there\u2019s one vulnerability that does stand out: CVE-2022-26809 RPC Runtime Library Remote Code Execution Vulnerability, a Critical-severity RPC vulnerability with no mitigating factors, low attack complexity, a greater-than-average likelihood of exploitation, and impact on all versions of Windows from Windows 7 onwards. Even more unnerving for infosecurity veterans, RPC was the vulnerable component behind the <\/span><a href=\"https:\/\/en.wikipedia.org\/wiki\/Blaster_(computer_worm)\"><span data-contrast=\"none\">crippling Blaster worm attacks in 2003<\/span><\/a><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Aside from that eye-catching vulnerability, the rest of this large release is more about quantity than severity. Only nine of the remaining vulnerabilities are rated \u201cCritical,\u201d three are rated \u201cModerate,\u201d and the remaining vulnerabilities are rated as \u201cImportant.\u201d Though counted in the tally of 128, one CVE this month is technically a Defense-in-Depth release rather than a true vulnerability according to Microsoft\u2019s classification scheme.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">There are no Critical-class vulnerabilities that are publicly disclosed or exploited at time of release.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In fact, there is only vulnerability listed as exploited, CVE-2022-24521 Windows Common Log File System Driver Elevation of Privilege Vulnerability, and only one vulnerability, CVE-2022-26904 Windows User Profile Service Elevation of Privilege Vulnerability, publicly disclosed. Both are rated \u201cImportant.\u201d<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Even in terms of likelihood of exploitability, this month is relatively light. Only eleven of the 128 are listed as \u201cExploitation More Likely,\u201d and aside from the RPC vulnerability, only two others of these are rated \u201cCritical\u201d: CVE-2022-24491 Windows Network File System Remote Code Execution Vulnerability and CVE-2022-24497 Windows Network File System Remote Code Execution Vulnerability.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This month\u2019s release covers a range of products. The overwhelming majority of patches are for Microsoft Windows and its components. These include the most notable vulnerabilities this month. Other products affected include Microsoft Edge, .NET and Visual Studio, Defender, Office, and a handful of lesser-known and less-deployed products.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">You can find a complete breakdown of the vulnerabilities by severity and impact, product, and exploitability at the end in the Appendix.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span class=\"TextRun SCXW20984722 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW20984722 BCX0\">Below we highlight some of the most notable vulnerabilities to be considered in April\u2019s risk assessment and deployment prioritization.<\/span><\/span><span class=\"EOP SCXW20984722 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/04\/2204-sev-imp-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-83909 aligncenter\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/04\/2204-sev-imp-1.png?w=300\" alt=\"\" width=\"668\" height=\"445\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/04\/2204-sev-imp-1.png 2934w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/04\/2204-sev-imp-1.png?resize=300,200 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/04\/2204-sev-imp-1.png?resize=768,512 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/04\/2204-sev-imp-1.png?resize=1024,683 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/04\/2204-sev-imp-1.png?resize=1536,1024 1536w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/04\/2204-sev-imp-1.png?resize=2048,1365 2048w\" sizes=\"auto, (max-width: 668px) 100vw, 668px\" \/><\/a><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/04\/2204-prods-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-83910 aligncenter\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/04\/2204-prods-1.png?w=300\" alt=\"\" width=\"687\" height=\"438\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/04\/2204-prods-1.png 3071w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/04\/2204-prods-1.png?resize=300,191 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/04\/2204-prods-1.png?resize=768,489 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/04\/2204-prods-1.png?resize=1024,652 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/04\/2204-prods-1.png?resize=1536,978 1536w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/04\/2204-prods-1.png?resize=2048,1304 2048w\" sizes=\"auto, (max-width: 687px) 100vw, 687px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><b><span data-contrast=\"auto\">Notable Vulnerabilities<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">RPC, SMB, and NFS<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Five vulnerabilities &#8212; half of this month\u2019s critical vulnerabilities &#8212; affect networking protocols and capabilities, specifically RPC, SMB, and NFS.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Of the four vulnerabilities affecting RPC, the vulnerability described above (CVE-2022-26809) is rated as critical, with no mitigating factors listed and \u201cExploitation More Likely.\u201d These points plus RPC\u2019s role in past attacks like Blaster mean this vulnerability should also have a high prioritization. The remaining three RPC vulnerabilities also have mitigating factors that would likely make successful attacks more difficult, rating them as \u201cImportant\u201d in severity.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This month there are six RCE vulnerabilities affecting SMB. Two (CVE-2022-24500 and CVE-2022-24541) are rated as \u201cCritical,\u201d but Microsoft notes \u201cFor vulnerability to be exploited, a user would need to access a malicious SMB server to retrieve some data as part of an OS API call.\u201d This would seem to imply some level of mitigation, but the critical rating and SMBs role in major security events like EternalBlue means these vulnerabilities should be highly prioritized. The four non-Critical SMB vulnerabilities have specific requirements that would appear to make successful attacks against these more difficult, which is why they\u2019re rated as \u201cImportant\u201d.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The two vulnerabilities affecting NFS (CVE-2022-24491 and CVE-2022-24497) are rated \u201cCritical\u201d and also \u201cExploitation More Likely.\u201d However, the vulnerable component is not installed and enabled on Windows by default. This means these critical vulnerabilities only affect Windows Server \u201cwhen the server administrator uses the Add Roles and Features Wizard to add the Server NFS role service.\u201d In short, if you run NFS on Windows Server, this is a high-priority patch. But if you don\u2019t, you can skip these patches.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Hyper-V<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Three of this month\u2019s critical vulnerabilities affect Windows Hyper-V (CVE-2022-22008, CVE-2022-23257 and CVE-2022-24537).\u00a0 There are an additional six \u201cImportant\u201d vulnerabilities affecting Hyper-V.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">CVE-2022-23257 is notable because a successful attack would require an attacker to load and run a specially crafted application on a Hyper-V guest.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">CVE-2022-24537 is notable because Microsoft notes \u201cTo exploit this vulnerability, an attacker would need to trick a user into executing a specially crafted script within a Hyper-V guest instance running on a nested Hyper-V host instance.\u201d While this is rated Critical in severity, it would seem to require a very specific scenario for exploitation.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Microsoft Dynamics 365 (on-premises)<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The remaining critical vulnerability this month affects Microsoft Dynamics 365 (on-premises). Microsoft <\/span><a href=\"https:\/\/news.sophos.com\/en-us\/2022\/02\/09\/microsoft-fixes-52-vulnerabilities-in-february-2022-patches\/\"><span data-contrast=\"none\">patched<\/span><\/a><span data-contrast=\"auto\"> a critical vulnerability in this particular product in February 2022 as well. To exploit this vulnerability, an attacker would need to be an authenticated user who could run a specially crafted trusted solution package to execute arbitrary SQL commands. Once they had accomplished that, the attacker could escalate and execute commands as db_owner within their Dynamics 356 database.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">LDAP<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">There are two vulnerabilities affecting LDAP this month. One of these CVE-2022-26919 Windows LDAP Remote Code Execution Vulnerability is rated as critical. On the one hand, this vulnerability is remotely exploitable over the network by a standard user who has been authenticated in the domain. On the other hand, Microsoft notes that this has \u201chigh complexity\u201d for any attack and that an attack is not possible unless the default setting for MaxReceiveBuffer has been changed. However, as we discuss below, there are a number of non-critical vulnerabilities affecting Active Directory as well, so it makes sense to prioritize this along with those.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Active Directory<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This month there are two Important-rated remote code execution (RCE) vulnerabilities affecting Active Directory (CVE-2022-26814 and CVE-2022-26817). Both of these are race condition vulnerabilities and both require privileges to query the Domain Name Service (DNS) on the vulnerable system. These are important mitigating factors for the vulnerabilities. A successful attack could enable code execution in the Active Directory service. So, while there are notable mitigating factors, an attacker\u2019s ability to potentially compromise an organization\u2019s active directory and create privileged accounts could allow these vulnerabilities to be used as part of an attacker\u2019s lateral movement on the network if compromised.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">DNS<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This month there are 16 vulnerabilities affecting DNS. All but two of these are RCEs. Of the others, one (CVE-2022-26816) is a denial of service (DoS) vulnerability and the other (CVE-2022-26829) is an elevation of privilege (EoP) vulnerability. Several, but not all, of the RCEs have a mitigating factor: An attacker would need to be a member of the DNS Admins group to carry out a successful attack. Given the number of vulnerabilities being addressed and the importance of DNS, in this month\u2019s release it makes sense to make the bundle of DNS patches a priority for your risk assessment and deployment.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Print Spooler<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">With the <\/span><a href=\"https:\/\/nakedsecurity.sophos.com\/2021\/07\/16\/more-printnightmare-we-told-you-not-to-turn-the-print-spooler-back-on\/\"><span data-contrast=\"none\">PrintNightmare situation<\/span><\/a><span data-contrast=\"auto\"> over the summer of 2021, this is a component that has been under scrutiny and attack and thus cause for concern. This month\u2019s patches for Print Spooler mirror the tenor of this month\u2019s overall release: heavy in quantity but less severe than might be expected.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In total there are 15 vulnerabilities in the Print Spooler being addressed. However, all of these are rated \u201cImportant,\u201d all are EoPs, none are publicly disclosed, none are currently under exploit, and all are rated \u201cExploitability Less Likely.\u201d<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Because of the number of vulnerabilities in this component it makes sense to give some priority to these updates, but these are clearly less urgent for your prioritization for risk assessment and deployment.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/04\/2204-cumulative-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-83911 aligncenter\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/04\/2204-cumulative-1.png?w=300\" alt=\"\" width=\"624\" height=\"414\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span class=\"TextRun SCXW66579180 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW66579180 BCX0\">Sophos protection<\/span><\/span><span class=\"EOP SCXW66579180 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/strong><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">As you can do every month, if you don\u2019t want to wait for your system to pull down the updates itself, you can download them manually from the Windows Update Catalog website. (The exceptions this month, as noted above, are the 11 patches handled via the Microsoft Store.) Run the winver.exe tool to determine which build of Windows 10 or 11 you\u2019re running, then download the Cumulative Update package for your particular system\u2019s architecture and build number.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Appendix<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><b><span data-contrast=\"auto\">Vulnerability Severity and Impact<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Below is a breakdown of the vulnerabilities by impact and severity.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Remote code execution (RCE)<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Critical:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ol>\n<li><span data-contrast=\"auto\">CVE-2022-23259<\/span> <span data-contrast=\"auto\">Microsoft Dynamics 365 (on-premises) Remote Code Execution Vulnerability<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26809<\/span> <span data-contrast=\"auto\">RPC Runtime Library Remote Code Execution Vulnerability<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-22008<\/span> <span data-contrast=\"auto\">Windows Hyper-V Remote Code Execution Vulnerability<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-23257<\/span> <span data-contrast=\"auto\">Windows Hyper-V Remote Code Execution Vulnerability<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24537<\/span> <span data-contrast=\"auto\">Windows Hyper-V Remote Code Execution Vulnerability<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24491<\/span> <span data-contrast=\"auto\">Windows Network File System Remote Code Execution Vulnerability<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24497<\/span> <span data-contrast=\"auto\">Windows Network File System Remote Code Execution Vulnerability<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24500<\/span> <span data-contrast=\"auto\">Windows SMB Remote Code Execution Vulnerability<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24541<\/span> <span data-contrast=\"auto\">Windows SMB Remote Code Execution Vulnerability<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26919<\/span> <span data-contrast=\"auto\">Windows LDAP Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"auto\">Important:\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ol>\n<li><span data-contrast=\"auto\">CVE-2022-26814<\/span> <span data-contrast=\"auto\">Active Directory Domain Services Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26817<\/span> <span data-contrast=\"auto\">Active Directory Domain Services Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26898<\/span> <span data-contrast=\"auto\">Azure Site Recovery Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24532<\/span> <span data-contrast=\"auto\">HEVC Video Extensions Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24475<\/span> <span data-contrast=\"auto\">Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26901<\/span> <span data-contrast=\"auto\">Microsoft Excel Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24533<\/span> <span data-contrast=\"auto\">Remote Desktop Protocol Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24492<\/span> <span data-contrast=\"auto\">Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24528<\/span> <span data-contrast=\"auto\">Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24495<\/span> <span data-contrast=\"auto\">Windows Direct Show &#8211; Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26829<\/span> <span data-contrast=\"auto\">Windows DNS Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24536<\/span> <span data-contrast=\"auto\">Windows DNS Server Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26811<\/span> <span data-contrast=\"auto\">Windows DNS Server Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26812<\/span> <span data-contrast=\"auto\">Windows DNS Server Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26813<\/span> <span data-contrast=\"auto\">Windows DNS Server Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26815<\/span> <span data-contrast=\"auto\">Windows DNS Server Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26818<\/span> <span data-contrast=\"auto\">Windows DNS Server Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26819<\/span> <span data-contrast=\"auto\">Windows DNS Server Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26820<\/span> <span data-contrast=\"auto\">Windows DNS Server Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26821<\/span> <span data-contrast=\"auto\">Windows DNS Server Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26822<\/span> <span data-contrast=\"auto\">Windows DNS Server Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26823<\/span> <span data-contrast=\"auto\">Windows DNS Server Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26824<\/span> <span data-contrast=\"auto\">Windows DNS Server Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26825<\/span> <span data-contrast=\"auto\">Windows DNS Server Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26826<\/span> <span data-contrast=\"auto\">Windows DNS Server Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26903<\/span> <span data-contrast=\"auto\">Windows Graphics Component Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-22009<\/span> <span data-contrast=\"auto\">Windows Hyper-V Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24543<\/span> <span data-contrast=\"auto\">Windows Installer Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24545<\/span> <span data-contrast=\"auto\">Windows Kerberos Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24487<\/span> <span data-contrast=\"auto\">Windows Local Security Authority Subsystem Service Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-21983<\/span> <span data-contrast=\"auto\">Windows SMB Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24485<\/span> <span data-contrast=\"auto\">Windows SMB Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24534<\/span> <span data-contrast=\"auto\">Windows SMB Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26830<\/span> <span data-contrast=\"auto\">Windows SMB Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24473<\/span> <span data-contrast=\"auto\">Microsoft Excel Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26916<\/span> <span data-contrast=\"auto\">Windows Fax Compose Form Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26917<\/span> <span data-contrast=\"auto\">Windows Fax Compose Form Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26918<\/span> <span data-contrast=\"auto\">Windows Fax Compose Form Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"auto\">Elevation of privilege (EoP)<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Important:\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ol>\n<li><span data-contrast=\"auto\">CVE-2022-26896<\/span> <span data-contrast=\"auto\">Azure Site Recovery Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26897<\/span> <span data-contrast=\"auto\">Azure Site Recovery Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24479<\/span> <span data-contrast=\"auto\">Connected User Experiences and Telemetry Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24496<\/span> <span data-contrast=\"auto\">Local Security Authority Subsystem Service Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26891<\/span> <span data-contrast=\"auto\">Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26894<\/span> <span data-contrast=\"auto\">Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26895<\/span> <span data-contrast=\"auto\">Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26900<\/span> <span data-contrast=\"auto\">Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26908<\/span> <span data-contrast=\"auto\">Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26788<\/span> <span data-contrast=\"auto\">PowerShell Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24765<\/span> <span data-contrast=\"auto\">Uncontrolled search for the Git directory in Git for Windows<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24513<\/span> <span data-contrast=\"auto\">Visual Studio Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24482<\/span> <span data-contrast=\"auto\">Windows ALPC Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24540<\/span> <span data-contrast=\"auto\">Windows ALPC Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24494<\/span> <span data-contrast=\"auto\">Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24549<\/span> <span data-contrast=\"auto\">Windows AppX Package Manager Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26828<\/span> <span data-contrast=\"auto\">Windows Bluetooth Driver Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24538<\/span> <span data-contrast=\"auto\">Windows Cluster Shared Volume (CSV) Denial of Service Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24489<\/span> <span data-contrast=\"auto\">Windows Cluster Shared Volume (CSV) Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24481<\/span> <span data-contrast=\"auto\">Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24521<\/span> <span data-contrast=\"auto\">Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24488<\/span> <span data-contrast=\"auto\">Windows Desktop Bridge Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24547<\/span> <span data-contrast=\"auto\">Windows Digital Media Receiver Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24546<\/span> <span data-contrast=\"auto\">Windows DWM Core Library Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24527<\/span> <span data-contrast=\"auto\">Windows Endpoint Configuration Manager Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26808<\/span> <span data-contrast=\"auto\">Windows File Explorer Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26810<\/span> <span data-contrast=\"auto\">Windows File Server Resource Management Service Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26827<\/span> <span data-contrast=\"auto\">Windows File Server Resource Management Service Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24499<\/span> <span data-contrast=\"auto\">Windows Installer Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24530<\/span> <span data-contrast=\"auto\">Windows Installer Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24486<\/span> <span data-contrast=\"auto\">Windows Kerberos Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24544<\/span> <span data-contrast=\"auto\">Windows Kerberos Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26786<\/span> <span data-contrast=\"auto\">Windows Print Spooler Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26787<\/span> <span data-contrast=\"auto\">Windows Print Spooler Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26789<\/span> <span data-contrast=\"auto\">Windows Print Spooler Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26790<\/span> <span data-contrast=\"auto\">Windows Print Spooler Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26791<\/span> <span data-contrast=\"auto\">Windows Print Spooler Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26792<\/span> <span data-contrast=\"auto\">Windows Print Spooler Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26793<\/span> <span data-contrast=\"auto\">Windows Print Spooler Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26794<\/span> <span data-contrast=\"auto\">Windows Print Spooler Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26795<\/span> <span data-contrast=\"auto\">Windows Print Spooler Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26796<\/span> <span data-contrast=\"auto\">Windows Print Spooler Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26797<\/span> <span data-contrast=\"auto\">Windows Print Spooler Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26798<\/span> <span data-contrast=\"auto\">Windows Print Spooler Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26801<\/span> <span data-contrast=\"auto\">Windows Print Spooler Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26802<\/span> <span data-contrast=\"auto\">Windows Print Spooler Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26803<\/span> <span data-contrast=\"auto\">Windows Print Spooler Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24550<\/span> <span data-contrast=\"auto\">Windows Telephony Server Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26904<\/span> <span data-contrast=\"auto\">Windows User Profile Service Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24474<\/span> <span data-contrast=\"auto\">Windows Win32k Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24542<\/span> <span data-contrast=\"auto\">Windows Win32k Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26807<\/span> <span data-contrast=\"auto\">Windows Work Folder Service Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24767<\/span> <span data-contrast=\"auto\">GitHub: Git for Windows&#8217; uninstaller vulnerable to DLL hijacking when run under the SYSTEM user account<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26914<\/span> <span data-contrast=\"auto\">Win32k Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26921<\/span> <span data-contrast=\"auto\">Visual Studio Code Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span class=\"TextRun SCXW12256654 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW12256654 BCX0\">Moderate:<\/span><\/span><span class=\"EOP SCXW12256654 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ol>\n<li><span data-contrast=\"auto\">CVE-2022-26909<\/span> <span data-contrast=\"auto\">Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26912<\/span> <span data-contrast=\"auto\">Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span class=\"TextRun SCXW162570450 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW162570450 BCX0\">D<\/span><span class=\"NormalTextRun SCXW162570450 BCX0\">enial of service (DoS) <\/span><span class=\"NormalTextRun SCXW162570450 BCX0\">&#8211; Important<\/span><\/span><span class=\"EOP SCXW162570450 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ol>\n<li><span data-contrast=\"auto\">CVE-2022-26831<\/span> <span data-contrast=\"auto\">LDAP Denial of Service Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26832<\/span> <span data-contrast=\"auto\">Microsoft .NET Framework and ASP.NET Information Disclosure<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24548<\/span> <span data-contrast=\"auto\">Microsoft Defender Denial of Service Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24484<\/span> <span data-contrast=\"auto\">Windows Cluster Shared Volume (CSV) Denial of Service Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26784<\/span> <span data-contrast=\"auto\">Windows Cluster Shared Volume (CSV) Denial of Service Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26816<\/span> <span data-contrast=\"auto\">Windows DNS Server Denial of Service Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-23268<\/span> <span data-contrast=\"auto\">Windows Hyper-V Denial of Service Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26915<\/span> <span data-contrast=\"auto\">Windows Secure Channel Denial of Service Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26924<\/span> <span data-contrast=\"auto\">YARP Denial of Service Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span class=\"TextRun SCXW149420265 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW149420265 BCX0\">I<\/span><span class=\"NormalTextRun SCXW149420265 BCX0\">nformation disclosure<\/span><span class=\"NormalTextRun SCXW149420265 BCX0\"> &#8211; Important<\/span><\/span><span class=\"EOP SCXW149420265 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ol>\n<li><span data-contrast=\"auto\">CVE-2022-24493<\/span> <span data-contrast=\"auto\">Microsoft Local Security Authority Server (lsasrv) Information Disclosure Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26911<\/span> <span data-contrast=\"auto\">Skype for Business Information Disclosure Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24490<\/span> <span data-contrast=\"auto\">Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24539<\/span> <span data-contrast=\"auto\">Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26783<\/span> <span data-contrast=\"auto\">Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26785<\/span> <span data-contrast=\"auto\">Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24498<\/span> <span data-contrast=\"auto\">Windows iSCSI Target Service Information Disclosure<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24483<\/span> <span data-contrast=\"auto\">Windows Kernel Information Disclosure Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26920<\/span> <span data-contrast=\"auto\">Windows Graphics Component Information Disclosure Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"auto\">Spoofing:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Important<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ol>\n<li><span data-contrast=\"auto\">CVE-2022-23292<\/span> <span data-contrast=\"auto\">Microsoft Power BI Spoofing Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24472<\/span> <span data-contrast=\"auto\">Microsoft SharePoint Server Spoofing Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26910<\/span> <span data-contrast=\"auto\">Skype for Business and Lync Spoofing Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span class=\"TextRun SCXW32885585 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW32885585 BCX0\">Moderate<\/span><\/span><span class=\"EOP SCXW32885585 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ol>\n<li><span class=\"TextRun SCXW184207080 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW184207080 BCX0\">CVE-2022-24523<\/span><\/span> <span class=\"TextRun SCXW184207080 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW184207080 BCX0\">Microsoft Edge (Chromium-based) Spoofing Vulnerability<\/span><\/span><\/li>\n<\/ol>\n<p><span class=\"TextRun SCXW78394459 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW78394459 BCX0\">Defense in Depth<\/span> <span class=\"NormalTextRun SCXW78394459 BCX0\">\u2013<\/span><span class=\"NormalTextRun SCXW78394459 BCX0\"> Important<\/span><span class=\"NormalTextRun SCXW78394459 BCX0\">:<\/span><\/span><span class=\"EOP SCXW78394459 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ol>\n<li><span class=\"TextRun SCXW59105637 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW59105637 BCX0\">CVE-2022-26907<\/span><\/span> <span class=\"TextRun SCXW59105637 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW59105637 BCX0\">Azure SDK for .NET Information Disclosure Vulnerability<\/span><\/span><span class=\"EOP SCXW59105637 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><b><span data-contrast=\"auto\">Exploitability Indexes<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Below are the vulnerabilities marked as \u201cExploitation more likely\u201d.\u00a0 This month the Exploitability Indexes are identical for both latest and older software.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ol>\n<li><span data-contrast=\"auto\">CVE-2022-26809<\/span> <span data-contrast=\"auto\">RPC Runtime Library Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24481<\/span> <span data-contrast=\"auto\">Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24521<\/span> <span data-contrast=\"auto\">Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24547<\/span> <span data-contrast=\"auto\">Windows Digital Media Receiver Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24546<\/span> <span data-contrast=\"auto\">Windows DWM Core Library Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24491<\/span> <span data-contrast=\"auto\">Windows Network File System Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24497<\/span> <span data-contrast=\"auto\">Windows Network File System Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26904<\/span> <span data-contrast=\"auto\">Windows User Profile Service Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24474<\/span> <span data-contrast=\"auto\">Windows Win32k Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24542<\/span> <span data-contrast=\"auto\">Windows Win32k Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26914<\/span> <span data-contrast=\"auto\">Win32k Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><b><span data-contrast=\"auto\">Products Affected<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">.NET and Visual Studio<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/p>\n<ol>\n<li><span data-contrast=\"auto\">CVE-2022-26832<\/span> <span data-contrast=\"auto\">Microsoft .NET Framework and ASP.NET Information Disclosure<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24765<\/span> <span data-contrast=\"auto\">Uncontrolled search for the Git directory in Git for Windows<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24513<\/span> <span data-contrast=\"auto\">Visual Studio Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26907<\/span> <span data-contrast=\"auto\">Azure SDK for .NET Information Disclosure Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24767<\/span> <span data-contrast=\"auto\">GitHub: Git for Windows&#8217; uninstaller vulnerable to DLL hijacking when run under the SYSTEM user account<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26921<\/span> <span data-contrast=\"auto\">Visual Studio Code Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26924<\/span> <span data-contrast=\"auto\">YARP Denial of Service Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span class=\"TextRun SCXW44256744 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW44256744 BCX0\">Azure Site Recovery<\/span><\/span><span class=\"EOP SCXW44256744 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/p>\n<ol>\n<li><span data-contrast=\"auto\">CVE-2022-26896<\/span> <span data-contrast=\"auto\">Azure Site Recovery Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26897<\/span> <span data-contrast=\"auto\">Azure Site Recovery Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26898<\/span> <span data-contrast=\"auto\">Azure Site Recovery Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span class=\"TextRun SCXW58230624 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW58230624 BCX0\">Microsoft Defender<\/span><\/span><\/p>\n<ol>\n<li><span data-contrast=\"auto\">CVE-2022-24548<\/span> <span data-contrast=\"auto\">Microsoft Defender Denial of Service Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span class=\"TextRun SCXW213905392 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW213905392 BCX0\">Microsoft Dynamics<\/span><\/span><span class=\"EOP SCXW213905392 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/p>\n<ol>\n<li><span class=\"TextRun SCXW34651174 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW34651174 BCX0\">CVE-2022-23259<\/span><\/span> <span class=\"TextRun SCXW34651174 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW34651174 BCX0\">Microsoft Dynamics 365 (on-premises) Remote Code Execution Vulnerability<\/span><\/span><span class=\"EOP SCXW34651174 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span class=\"TextRun SCXW52605457 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW52605457 BCX0\">Microsoft Edge<\/span><\/span><span class=\"EOP SCXW52605457 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/p>\n<ol>\n<li><span data-contrast=\"auto\">CVE-2022-26891<\/span> <span data-contrast=\"auto\">Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26894<\/span> <span data-contrast=\"auto\">Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26895<\/span> <span data-contrast=\"auto\">Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26900<\/span> <span data-contrast=\"auto\">Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26908<\/span> <span data-contrast=\"auto\">Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26909<\/span> <span data-contrast=\"auto\">Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24475<\/span> <span data-contrast=\"auto\">Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24523<\/span> <span data-contrast=\"auto\">Microsoft Edge (Chromium-based) Spoofing Vulnerability <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26912<\/span> <span data-contrast=\"auto\">Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span class=\"TextRun SCXW165100308 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW165100308 BCX0\">Microsoft Office<\/span><\/span><span class=\"EOP SCXW165100308 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/p>\n<ol>\n<li><span data-contrast=\"auto\">CVE-2022-26901<\/span> <span data-contrast=\"auto\">Microsoft Excel Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24472<\/span> <span data-contrast=\"auto\">Microsoft SharePoint Server Spoofing Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24473<\/span> <span data-contrast=\"auto\">Microsoft Excel Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span class=\"TextRun SCXW18776903 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW18776903 BCX0\">Microsoft Power BI<\/span><\/span><span class=\"EOP SCXW18776903 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/p>\n<ol>\n<li><span class=\"TextRun SCXW206763455 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW206763455 BCX0\">CVE-2022-23292<\/span><\/span> <span class=\"TextRun SCXW206763455 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW206763455 BCX0\">Microsoft Power BI Spoofing Vulnerability<\/span><\/span><span class=\"EOP SCXW206763455 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span class=\"TextRun SCXW59801472 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW59801472 BCX0\">Microsoft Skype for Business<\/span><\/span><span class=\"EOP SCXW59801472 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/p>\n<ol>\n<li><span data-contrast=\"auto\">CVE-2022-26910<\/span> <span data-contrast=\"auto\">Skype for Business and Lync Spoofing Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26911<\/span> <span data-contrast=\"auto\">Skype for Business Information Disclosure Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span class=\"TextRun SCXW214065974 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW214065974 BCX0\">Microsoft Windows<\/span><\/span><span class=\"EOP SCXW214065974 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/p>\n<ol>\n<li><span data-contrast=\"auto\">CVE-2022-26814<\/span> <span data-contrast=\"auto\">Active Directory Domain Services Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26817<\/span> <span data-contrast=\"auto\">Active Directory Domain Services Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24479<\/span> <span data-contrast=\"auto\">Connected User Experiences and Telemetry Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24532<\/span> <span data-contrast=\"auto\">HEVC Video Extensions Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26831<\/span> <span data-contrast=\"auto\">LDAP Denial of Service Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24496<\/span> <span data-contrast=\"auto\">Local Security Authority Subsystem Service Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24493<\/span> <span data-contrast=\"auto\">Microsoft Local Security Authority Server (lsasrv) Information Disclosure Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26788<\/span> <span data-contrast=\"auto\">PowerShell Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24533<\/span> <span data-contrast=\"auto\">Remote Desktop Protocol Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24492<\/span> <span data-contrast=\"auto\">Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24528<\/span> <span data-contrast=\"auto\">Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26809<\/span> <span data-contrast=\"auto\">RPC Runtime Library Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24482<\/span> <span data-contrast=\"auto\">Windows ALPC Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24540<\/span> <span data-contrast=\"auto\">Windows ALPC Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24494<\/span> <span data-contrast=\"auto\">Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24549<\/span> <span data-contrast=\"auto\">Windows AppX Package Manager Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26828<\/span> <span data-contrast=\"auto\">Windows Bluetooth Driver Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24484<\/span> <span data-contrast=\"auto\">Windows Cluster Shared Volume (CSV) Denial of Service Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24538<\/span> <span data-contrast=\"auto\">Windows Cluster Shared Volume (CSV) Denial of Service Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26784<\/span> <span data-contrast=\"auto\">Windows Cluster Shared Volume (CSV) Denial of Service Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24489<\/span> <span data-contrast=\"auto\">Windows Cluster Shared Volume (CSV) Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24481<\/span> <span data-contrast=\"auto\">Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24521<\/span> <span data-contrast=\"auto\">Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24488<\/span> <span data-contrast=\"auto\">Windows Desktop Bridge Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24547<\/span> <span data-contrast=\"auto\">Windows Digital Media Receiver Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24495<\/span> <span data-contrast=\"auto\">Windows Direct Show &#8211; Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26829<\/span> <span data-contrast=\"auto\">Windows DNS Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26816<\/span> <span data-contrast=\"auto\">Windows DNS Server Denial of Service Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24536<\/span> <span data-contrast=\"auto\">Windows DNS Server Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26811<\/span> <span data-contrast=\"auto\">Windows DNS Server Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26812<\/span> <span data-contrast=\"auto\">Windows DNS Server Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26813<\/span> <span data-contrast=\"auto\">Windows DNS Server Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26815<\/span> <span data-contrast=\"auto\">Windows DNS Server Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26818<\/span> <span data-contrast=\"auto\">Windows DNS Server Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26819<\/span> <span data-contrast=\"auto\">Windows DNS Server Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26820<\/span> <span data-contrast=\"auto\">Windows DNS Server Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26821<\/span> <span data-contrast=\"auto\">Windows DNS Server Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26822<\/span> <span data-contrast=\"auto\">Windows DNS Server Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26823<\/span> <span data-contrast=\"auto\">Windows DNS Server Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26824<\/span> <span data-contrast=\"auto\">Windows DNS Server Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26825<\/span> <span data-contrast=\"auto\">Windows DNS Server Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26826<\/span> <span data-contrast=\"auto\">Windows DNS Server Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24546<\/span> <span data-contrast=\"auto\">Windows DWM Core Library Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24527<\/span> <span data-contrast=\"auto\">Windows Endpoint Configuration Manager Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26808<\/span> <span data-contrast=\"auto\">Windows File Explorer Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26810<\/span> <span data-contrast=\"auto\">Windows File Server Resource Management Service Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26827<\/span> <span data-contrast=\"auto\">Windows File Server Resource Management Service Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26903<\/span> <span data-contrast=\"auto\">Windows Graphics Component Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-23268<\/span> <span data-contrast=\"auto\">Windows Hyper-V Denial of Service Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-22008<\/span> <span data-contrast=\"auto\">Windows Hyper-V Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-22009<\/span> <span data-contrast=\"auto\">Windows Hyper-V Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-23257<\/span> <span data-contrast=\"auto\">Windows Hyper-V Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24537<\/span> <span data-contrast=\"auto\">Windows Hyper-V Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24490<\/span> <span data-contrast=\"auto\">Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24539<\/span> <span data-contrast=\"auto\">Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26783<\/span> <span data-contrast=\"auto\">Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26785<\/span> <span data-contrast=\"auto\">Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24499<\/span> <span data-contrast=\"auto\">Windows Installer Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24530<\/span> <span data-contrast=\"auto\">Windows Installer Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24543<\/span> <span data-contrast=\"auto\">Windows Installer Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24498<\/span> <span data-contrast=\"auto\">Windows iSCSI Target Service Information Disclosure<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24486<\/span> <span data-contrast=\"auto\">Windows Kerberos Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24544<\/span> <span data-contrast=\"auto\">Windows Kerberos Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24545<\/span> <span data-contrast=\"auto\">Windows Kerberos Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24483<\/span> <span data-contrast=\"auto\">Windows Kernel Information Disclosure Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24487<\/span> <span data-contrast=\"auto\">Windows Local Security Authority Subsystem Service Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24491<\/span> <span data-contrast=\"auto\">Windows Network File System Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24497<\/span> <span data-contrast=\"auto\">Windows Network File System Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26786<\/span> <span data-contrast=\"auto\">Windows Print Spooler Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26787<\/span> <span data-contrast=\"auto\">Windows Print Spooler Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26789<\/span> <span data-contrast=\"auto\">Windows Print Spooler Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26790<\/span> <span data-contrast=\"auto\">Windows Print Spooler Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26791<\/span> <span data-contrast=\"auto\">Windows Print Spooler Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26792<\/span> <span data-contrast=\"auto\">Windows Print Spooler Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26793<\/span> <span data-contrast=\"auto\">Windows Print Spooler Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26794<\/span> <span data-contrast=\"auto\">Windows Print Spooler Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26795<\/span> <span data-contrast=\"auto\">Windows Print Spooler Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26796<\/span> <span data-contrast=\"auto\">Windows Print Spooler Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26797<\/span> <span data-contrast=\"auto\">Windows Print Spooler Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26798<\/span> <span data-contrast=\"auto\">Windows Print Spooler Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26801<\/span> <span data-contrast=\"auto\">Windows Print Spooler Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26802<\/span> <span data-contrast=\"auto\">Windows Print Spooler Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26803<\/span> <span data-contrast=\"auto\">Windows Print Spooler Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-21983<\/span> <span data-contrast=\"auto\">Windows SMB Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24485<\/span> <span data-contrast=\"auto\">Windows SMB Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24500<\/span> <span data-contrast=\"auto\">Windows SMB Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24534<\/span> <span data-contrast=\"auto\">Windows SMB Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24541<\/span> <span data-contrast=\"auto\">Windows SMB Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26830<\/span> <span data-contrast=\"auto\">Windows SMB Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24550<\/span> <span data-contrast=\"auto\">Windows Telephony Server Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26904<\/span> <span data-contrast=\"auto\">Windows User Profile Service Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24474<\/span> <span data-contrast=\"auto\">Windows Win32k Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-24542<\/span> <span data-contrast=\"auto\">Windows Win32k Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26807<\/span> <span data-contrast=\"auto\">Windows Work Folder Service Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26914<\/span> <span data-contrast=\"auto\">Win32k Elevation of Privilege Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26916<\/span> <span data-contrast=\"auto\">Windows Fax Compose Form Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26917<\/span> <span data-contrast=\"auto\">Windows Fax Compose Form Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26918<\/span> <span data-contrast=\"auto\">Windows Fax Compose Form Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26920<\/span> <span data-contrast=\"auto\">Windows Graphics Component Information Disclosure Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26919<\/span> <span data-contrast=\"auto\">Windows LDAP Remote Code Execution Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">CVE-2022-26915<\/span> <span data-contrast=\"auto\">Windows Secure Channel Denial of Service Vulnerability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[1140],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/li>\n<\/ol><\/div>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2022\/04\/12\/rpc-vulnerability-stands-out-in-a-field-of-128-in-april\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2021\/08\/patch_tuesday.jpg\"\/><\/p>\n<p><strong>Credit to Author: Christopher Budd| Date: Tue, 12 Apr 2022 17:45:37 +0000<\/strong><\/p>\n<p>This month\u2019s Patch Tuesday is more about quantity than severity, with one flashback-inducing exception<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[25683,19245,18513,16771],"class_list":["post-18749","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-2022-04","tag-patch-tuesday","tag-sophoslabs-uncut","tag-threat-research"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18749","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18749"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18749\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18749"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18749"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18749"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}