根据
产品流行度和漏洞重要性筛选出
此次更新中包含影响较大的漏洞,请相关用户重点进行关注:
Microsoft Windows
支持诊断工具
(MSDT)
远程代码执行漏洞(
CVE-2022-34713
)
:
MSDT(Microsoft 支持诊断工具)是内置于 Windows 操作系统中的诊断和故障排除工具。无需身份验证的本地攻击者通过制作恶意文件,当成功诱导用户在受影响的系统上打开恶意文件后,可在目标系统上以该用户权限执行任意代码。CVSS分数为7.8。目前,该漏洞PoC及技术细节已被披露,且已监测到在野利用。
官方通告链接:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34713
Microsoft Exchange
敏感
信息泄露漏洞
(
CVE-2022-30134
):
Microsoft Exchange中存在敏感信息泄露漏洞,具有低权限的远程攻击者成功利用该漏洞可读取目标系统的电子邮件信息,且无需用户交互。微软官方表示,受该漏洞影响的用户需启用Exchange Server的Windows扩展保护以防护该漏洞。CVSS评分为7.6。目前该漏洞已被公开披露。
官方通告链接:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30134
Windows
安全套接字隧道协议
(SSTP)
远程代码执行漏洞(
CVE-2022-35767
/
CVE-2022-35766
/
CVE-2022-35752
):
Windows 安全套接字隧道协议 (SSTP) 存在远程代码执行漏洞。由于Windows安全套接字隧道协议 (SSTP) 的安全限制存在缺陷,在特定的配置环境中,无需身份验证的远程攻击者通过向RAS服务器发送特制的请求,最终导致在目标服务器上任意执行代码,且无需用户交互。CVSS评分为8.1。
官方通告链接:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35767
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35766
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35752
Active Directory Domain Services
权限提升漏洞(
CVE-2022-34691
):
活动目录(Active Directory)是面向 Windows Standard Server、Windows Enterprie Server 以及 Windows Datacenter Server 的目录服务。由于Active Directory域服务的安全限制存在缺陷,当 Active Directory证书服务在域上运行时,经过身份验证的远程攻击者可利用该漏洞在目标系统上提升至管理员权限并执行任意代码。CVSS评分为8.8。
官方通告链接:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34691
Windows
点对点协议
(PPP)
远程代码执行漏洞
(
CVE-2022-35744
):
点对点协议(Point-to-Point Protocol)简称PPP协议,工作在数据链路层。设计目的主要是用来通过拨号或专线方式建立点对点连接发送数据,使其成为各种主机、网桥和路由器之间简单连接的一种共通的解决方案。由于Windows点对点协议的安全限制存在缺陷,无需身份验证的远程攻击者通过向RAS服务器发送特制的请求,最终导致在目标服务器上任意执行代码,且无需用户交互。CVSS评分为9.8。
官方通告链接:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35744
Azure Batch Node Agent
权限提升漏洞(
CVE-2022-33646
):
Azure Batch Node Agent中存在权限提升漏洞。由于Azure Batch Node Agent中的应用程序未实行正确的安全限制,在特定的配置环境下,具有低权限的本地攻击者通过利用该漏洞绕过安全限制,从而在目标系统上提升至SYSTEM权限并执行任意代码。CVSS评分为7.0。
官方通告链接:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33646
Windows Hyper-V
远程代码执行漏洞(
CVE-2022-34696
):
Windows Hyper-V是Microsoft的本地虚拟机管理程序,具有低权限的远程攻击者可通过在Hyper-V guest上运行特制的应用程序,最终导致在Hyper-V主机系统执行任意代码,且无需用户交互。CVSS评分为8.5。
官方通告链接:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34696
Windows Print Spooler
权限提升漏洞(
CVE-2022-35755/CVE-2022-35793
):
Windows Print Spooler存在权限提升漏洞。由于在Windows Print Spooler未实行正确的安全限制,具有低权限的本地攻击者通过利用该漏洞绕过安全限制,从而在目标系统上提升至SYSTEM权限并执行任意代码。CVSS评分为7.3。
官方通告链接:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35755
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35793
Windows Kernel
权限提升漏洞(
CVE-2022-35761
):
Windows Kernel存在权限提升漏洞,无需身份验证的本地攻击者成功利用该漏洞,最终可实现在目标系统上提升至SYSTEM权限并执行任意代码。CVSS评分为8.4。
官方通告链接:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35761
SMB
客户端与服务端
远程代码执行漏洞(
CVE-2022-35804
):
SMB协议中存在远程代码执行漏洞。由于SMB协议中未实行正确的安全限制,无需身份验证的远程攻击者成功利用该漏洞,最终可实现任意代码执行。该漏洞可通过客户端与服务端两种载体进行利用。CVSS评分为8.8。
官方通告链接:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35804
以下为重点关注漏洞的受影响产品版本,其他漏洞影响产品范围请参阅官方通告链接。
漏洞编号
|
受影响产品版本
|
CVE-2022-34713
|
Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows RT 8.1
Windows 8.1 for x64-based systems
Windows 8.1 for 32-bit systems
Windows 7 for x64-based Systems Service Pack 1
Windows 7 for 32-bit Systems Service Pack 1
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 for 32-bit Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 11 for ARM64-based Systems
Windows 11 for x64-based Systems
Windows Server, version 20H2 (Server Core Installation)
Windows 10 Version 20H2 for ARM64-based Systems
Windows 10 Version 20H2 for 32-bit Systems
Windows 10 Version 20H2 for x64-based Systems
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows 10 Version 21H1 for 32-bit Systems
Windows 10 Version 21H1 for ARM64-based Systems
Windows 10 Version 21H1 for x64-based Systems
Windows Server 2019 (Server Core installation)
Windows Server 2019
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
|
CVE-2022-30134
|
Microsoft Exchange Server 2019 Cumulative Update 11
Microsoft Exchange Server 2016 Cumulative Update 22
Microsoft Exchange Server 2013 Cumulative Update 23
Microsoft Exchange Server 2016 Cumulative Update 23
Microsoft Exchange Server 2019 Cumulative Update 12
|
CVE-2022-35767
CVE-2022-35752
CVE-2022-35793
CVE-2022-34691
CVE-2022-35744
|
Windows 10 Version 1809 for 32-bit Systems
Windows 10 for 32-bit Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 11 for ARM64-based Systems
Windows 10 Version 21H1 for ARM64-based Systems
Windows 10 Version 21H1 for x64-based Systems
Windows Server 2019 (Server Core installation)
Windows Server 2019
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows 7 for x64-based Systems Service Pack 1
Windows 7 for 32-bit Systems Service Pack 1
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 for x64-based Systems
Windows RT 8.1
Windows 8.1 for x64-based systems
Windows 8.1 for 32-bit systems
Windows 11 for x64-based Systems
Windows Server, version 20H2 (Server Core Installation)
Windows 10 Version 20H2 for ARM64-based Systems
Windows 10 Version 20H2 for 32-bit Systems
Windows 10 Version 20H2 for x64-based Systems
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows 10 Version 21H1 for 32-bit Systems
Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
|
CVE-2022-35766
|
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 11 for ARM64-based Systems
Windows 11 for x64-based Systems
Windows Server, version 20H2 (Server Core Installation)
Windows 10 Version 20H2 for ARM64-based Systems
Windows 10 Version 20H2 for 32-bit Systems
Windows 10 Version 20H2 for x64-based Systems
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows 10 Version 21H1 for 32-bit Systems
Windows 10 Version 21H1 for ARM64-based Systems
Windows 10 Version 21H1 for x64-based Systems
Windows Server 2019 (Server Core installation)
Windows Server 2019
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 21H2 for x64-based Systems
|
CVE-2022-33646
|
Azure Batch
|
CVE-2022-34696
|
Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows 8.1 for x64-based systems
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 for x64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 11 for x64-based Systems
Windows Server, version 20H2 (Server Core Installation)
Windows 10 Version 20H2 for x64-based Systems
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows 10 Version 21H1 for x64-based Systems
Windows Server 2019 (Server Core installation)
Windows Server 2019
Windows 10 Version 1809 for x64-based Systems
|
CVE-2022-35755
|
Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows RT 8.1
Windows 8.1 for x64-based systems
Windows 8.1 for 32-bit systems
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 for 32-bit Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 11 for ARM64-based Systems
Windows 11 for x64-based Systems
Windows Server, version 20H2 (Server Core Installation)
Windows 10 Version 20H2 for ARM64-based Systems
Windows 10 Version 20H2 for 32-bit Systems
Windows 10 Version 20H2 for x64-based Systems
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows 10 Version 21H1 for 32-bit Systems
Windows 10 Version 21H1 for ARM64-based Systems
Windows 10 Version 21H1 for x64-based Systems
Windows Server 2019 (Server Core installation)
Windows Server 2019
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
|
CVE-2022-35761
|
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 11 for ARM64-based Systems
Windows 11 for x64-based Systems
Windows Server, version 20H2 (Server Core Installation)
Windows 10 Version 20H2 for ARM64-based Systems
Windows 10 Version 20H2 for 32-bit Systems
Windows 10 Version 20H2 for x64-based Systems
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows 10 Version 21H1 for 32-bit Systems
Windows 10 Version 21H1 for ARM64-based Systems
Windows 10 Version 21H1 for x64-based Systems
Windows Server 2019 (Server Core installation)
Windows Server 2019
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
|
CVE-2022-35804
|
Windows 11 for x64-based Systems
Windows 11 for ARM64-based Systems
|