{"id":267321,"date":"2022-06-18T15:47:57","date_gmt":"2022-06-18T13:47:57","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=267321"},"modified":"2022-06-18T15:52:36","modified_gmt":"2022-06-18T13:52:36","slug":"microsoft-security-update-revisions-14-juni-2022","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2022\/06\/18\/microsoft-security-update-revisions-14-juni-2022\/","title":{"rendered":"Microsoft Security Update Revisions (14. Juni 2022)"},"content":{"rendered":"<p>[<a href=\"https:\/\/borncity.com\/win\/2022\/06\/18\/microsoft-security-update-revisions-14-juni-2022\/\" target=\"_blank\" rel=\"noopener\">English<\/a>]Noch eine kurze Info von dieser Woche nachgereicht. Microsoft hat zum 14. Juni 2022 einige Revisionen von Sicherheitsbeschreibungen ver\u00f6ffentlicht, die ich einfach hier im Blog einstelle.<\/p>\n<p><!--more--><br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg08.met.vgwort.de\/na\/a242bcc6408b46c4ab42239fcab88ea6\" alt=\"\" width=\"1\" height=\"1\" \/>********************************************************************<br \/>\nTitle: Microsoft Security Update Revisions<br \/>\nIssued: June 14, 2022<br \/>\n********************************************************************<\/p>\n<p>Summary<br \/>\n=======<\/p>\n<p>The following CVEs have undergone a revision increment.<br \/>\n====================================================================<\/p>\n<p>* CVE-2021-26414<br \/>\n* CVE-2022-23267<br \/>\n* CVE-2022-24513<br \/>\n* CVE-2022-24527<br \/>\n* CVE-2022-26832<br \/>\n* CVE-2022-30190<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-26414\" target=\"_blank\" rel=\"noopener\">CVE-2021-26414<\/a> | Windows DCOM Server Security Feature Bypass<br \/>\n&#8211; Version: 2.0<br \/>\n&#8211; Reason for Revision: Microsoft is announcing the release of the June 14, 2022<br \/>\nWindows security updates to address the second phase of hardening changes for this<br \/>\nvulnerability. After these updates are installed, RPC_C_AUTHN_LEVEL_PKT_INTEGRITY<br \/>\non DCOM servers will be enabled by default. Customers who need to do so can still<br \/>\ndisable it by using the\u00a0 RequireIntegrityActivationAuthenticationLevel registry key.<br \/>\nMicrosoft strongly recommends that customers install the June 14, 2022 updates,<br \/>\ncomplete testing in your environment, and enable these hardening changes as soon<br \/>\nas possible.<br \/>\n&#8211; Originally posted: June 8, 2021<br \/>\n&#8211; Updated: June 14, 2022<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-23267\" target=\"_blank\" rel=\"noopener\">CVE-2022-23267<\/a> | .NET and Visual Studio Denial of Service Vulnerability<br \/>\n&#8211; Version: 3.0<br \/>\n&#8211; Reason for Revision: Revised the Security Updates table to include Visual Studio<br \/>\n2019 for Mac and Visual Studio 2022 for Mac because these versions of Visual<br \/>\nStudio for Mac are affected by this vulnerability. Microsoft strongly recommends<br \/>\nthat customers running these versions of Visual Studio install the updates to be<br \/>\nfully protected from the vulnerability.<br \/>\n&#8211; Originally posted: May 10, 2022<br \/>\n&#8211; Updated: June 14, 2022<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-24513\" target=\"_blank\" rel=\"noopener\">CVE-2022-24513<\/a> | Visual Studio Elevation of Privilege Vulnerability<br \/>\n&#8211; Version: 3.0<br \/>\n&#8211; Reason for Revision: Microsoft has released the June 2022 security updates to<br \/>\nfurther address CVE-2022-24513 for the following supported versions of Visual Studio:<br \/>\nVisual Studio 2017 version 15.9, Visual Studio 2019 version 16.9, Visual Studio 2019<br \/>\nversion 16.11, Microsoft Visual Studio 2022 version 17.0, and Visual Studio 2019 for<br \/>\nMac version 8.10. In addition, Visual Studio 2022 for Mac version 17.0 has been added<br \/>\nto the Security Updates table as it is also affected by this vulnerability. Microsoft<br \/>\nstrongly recommends that customers install these updates to be fully protected from<br \/>\nthe vulnerability.<br \/>\n&#8211; Originally posted: April 12, 2022<br \/>\n&#8211; Updated: June 14, 2022<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-24527\" target=\"_blank\" rel=\"noopener\">CVE-2022-24527<\/a> | Microsoft Endpoint Configuration Manager Elevation of Privilege<br \/>\nVulnerability<br \/>\n&#8211;\u00a0 Version: 2.0<br \/>\n&#8211; Reason for Revision: The following revisions have been made: 1) Added Microsoft<br \/>\nEndpoint Configuration Manager to the Security Updates table as it is affected by this<br \/>\nvulnerability. 2) Removed all versions of Windows from the Security Updates table,<br \/>\nbecause the update to address this vulnerability is not available via the Windows<br \/>\nsecurity updates. 3) Updated the FAQs to provide information about how customers can<br \/>\nget the hotfix for Microsoft Endpoint Configuration Manager that addresses this<br \/>\nvulnerability. 4) Corrected the CVE title.<br \/>\n&#8211; Originally posted: April 12, 2022<br \/>\n&#8211; Updated: June 14, 2022<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-26832\" target=\"_blank\" rel=\"noopener\">CVE-2022-26832<\/a> | .NET Framework Denial of Service Vulnerability<br \/>\n&#8211; Version: 3.0<br \/>\n&#8211; Reason for Revision: In the Security Updates table, added .NET Framework<br \/>\n4.6.2\/4.7\/4.7.1\/4.7.2 installed on Windows 10 version 1607, Windows Server 2016, and<br \/>\nWindows Server 2016 (Server Core installation) as these versions of Window 10 and Windows<br \/>\nServer with .NET Framework 4.6.2\/4.7\/4.7.1\/4.7.2 installed are affected by this<br \/>\nvulnerability. Customers running these versions of .NET Framework should install the<br \/>\nApril 2022 security updates to be protected from this vulnerability.<br \/>\n&#8211; Originally posted: April 12, 2022<br \/>\n&#8211; Updated: June 14, 2022<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-30190\" target=\"_blank\" rel=\"noopener\">CVE-2022-30190<\/a> | Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code<br \/>\nExecution Vulnerability<br \/>\n&#8211; Version: 2.0<br \/>\n&#8211; Reason for Revision: The update for this vulnerability is in the June 2022<br \/>\ncumulative Windows Updates. Microsoft strongly recommends that customers install<br \/>\nthe updates to be fully protected from the vulnerability. Customers whose systems are<br \/>\nconfigured to receive automatic updates do not need to take any further action.<br \/>\n&#8211; Originally posted: May 30, 2022<br \/>\n&#8211; Updated: June 14, 2022<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[English]Noch eine kurze Info von dieser Woche nachgereicht. Microsoft hat zum 14. Juni 2022 einige Revisionen von Sicherheitsbeschreibungen ver\u00f6ffentlicht, die ich einfach hier im Blog einstelle.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426],"tags":[4328],"class_list":["post-267321","post","type-post","status-publish","format-standard","hentry","category-sicherheit","tag-sicherheit"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/267321","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=267321"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/267321\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=267321"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=267321"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=267321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}