{"id":24409,"date":"2022-05-10T23:13:16","date_gmt":"2022-05-10T21:13:16","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=24409"},"modified":"2022-05-15T11:23:06","modified_gmt":"2022-05-15T09:23:06","slug":"microsoft-security-update-summary-10-mai-2022","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2022\/05\/10\/microsoft-security-update-summary-10-mai-2022\/","title":{"rendered":"Microsoft Security Update Summary (May 10, 2022)"},"content":{"rendered":"<p><img decoding=\"async\" style=\"margin: 0px 10px 0px 0px;\" title=\"Update\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/06\/Update-01.jpg\" alt=\"Update\" align=\"left\" border=\"0\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2022\/05\/10\/microsoft-security-update-summary-10-mai-2022\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]On May 10, 2022, Microsoft released security updates for Windows clients and servers, for Office, etc. &#8211; as well as for other products &#8211; were released. Below is a compact overview of these updates that were released on Patchday. The May 2022 security updates address 75 vulnerabilities, three of which are 0-day, in Microsoft products. Vulnerabilities in the Printer Spooler are also included again. At the same time, remember that Windows 10 1909 and 20H2 will receive security updates for the last time and will fall out of support (see <a href=\"https:\/\/borncity.com\/win\/2022\/04\/12\/windows-10-version-1909-und-20h2-fallen-am-10-mai-2022-aus-dem-support\/\">Windows 10: Version 1909 and 20H2 reaching end of support on May 10, 2022<\/a>).<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg02.met.vgwort.de\/na\/0e577ed85183457eb23898cfdceeec73\" alt=\"\" width=\"1\" height=\"1\" \/>A list of updates can be found on <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener\">this Microsoft page<\/a>. Details on update packages for Windows, Office, etc. are available in separate blog posts.<\/p>\n<h2>Notes on the updates<\/h2>\n<p>Windows 10 version 20H2 to 21H2 use a common core and have an identical set of system files. Therefore, the same security update will be delivered for these Windows 10 versions. Information on how to enable the features of Windows 10, which is done through an Enablement Package update, can be found in <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Windows-IT-Pro-Blog\/Windows-10-version-1909-delivery-options\/ba-p\/1002660\" target=\"_blank\" rel=\"noopener\">this Techcommunity post<\/a>.<\/p>\n<p>All Windows 10 updates are cumulative. The monthly Patchday update includes all security fixes for Windows 10 and all non-security fixes up to Patchday. In addition to vulnerability security patches, the updates include security enhancement measures. Microsoft is integrating the Servicing Stack Updates (SSUs) into the Latest Cumulative Updates (LCUs) for newer versions of Windows 10. A list of the latest SSUs can be found at <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/ADV990001\">ADV990001<\/a> (although the list is not always up-to-date).<\/p>\n<p>Windows 7 SP1 is no longer supported as of January 2020. Only customers with a 3rd year ESU license (or bypass measures) will still receive updates. With the current ESU bypass lets install the update. Updates can also be downloaded from the <a href=\"https:\/\/www.catalog.update.microsoft.com\/Home.aspx\">Microsoft Update Catalog<\/a>. The updates for Windows RT 8.1 and Microsoft Office RT are only available via Windows Update.<\/p>\n<h2>Fixed vulnerabilities<\/h2>\n<p>The May 2022 security updates fix 75 vulnerabilities, three of which are 0-day, in Microsoft products. A list of all covered CVEs can be found on <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/\" target=\"_blank\" rel=\"noopener\">this Microsoft page<\/a>. Tenable also has <a href=\"https:\/\/www.tenable.com\/blog\/microsofts-may-2022-patch-tuesday-addresses-73-cves-cve-2022-26925\" target=\"_blank\" rel=\"noopener\">this blog post<\/a> with an overview &#8211; the following critical updates are included in May 2022.<\/p>\n<ul>\n<li><u><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-26925\">CVE-2022-26925<\/a><\/u><u><\/u>: Important; Windows LSA Spoofing Vulnerability<\/li>\n<li><u><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-26937\">CVE-2022-26937<\/a><\/u>: Critical; Windows Network File System Remote Code Execution Vulnerability<\/li>\n<li>Important; Remote Code Execution Vulnerabilities in Windows Lightweight Directory Access Protocol (LDAP)\n<ul>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-22012\">CVE-2022-22012<\/a><\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-22013\">CVE-2022-22013<\/a><\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-22014\">CVE-2022-22014<\/a><\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-29128\">CVE-2022-29128<\/a><\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-29129\">CVE-2022-29129<\/a><\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-29130\">CVE-2022-29130<\/a><\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-29131\">CVE-2022-29131<\/a><\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-29137\">CVE-2022-29137<\/a><\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-29139\">CVE-2022-29139<\/a><\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-29141\">CVE-2022-29141<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-22713\">CVE-2022-22713<\/a>: Important; Windows Hyper-V Denial of Service Vulnerability<\/li>\n<li><u><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-21978\">CVE-2022-21978<\/a><\/u>: Important; Microsoft Exchange Server Elevation of Privilege Vulnerability<\/li>\n<li><u><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-29132\">CVE-2022-29132<\/a><\/u> und <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-29104\">CVE-2022-29104<\/a>: Important; Windows Print Spooler Elevation of Privilege Vulnerabilities<\/li>\n<\/ul>\n<p>Below is the list of critical and important security updates &#8211; details of which will be reported in separate blog posts.<\/p>\n<h2>Critical Security Updates<\/h2>\n<p>Windows 10 for 32-bit Systems<br \/>\nWindows 10 for x64-based Systems<br \/>\nWindows 10 Version 1607 for 32-bit Systems<br \/>\nWindows 10 Version 1607 for x64-based Systems<br \/>\nWindows 10 Version 1809 for 32-bit Systems<br \/>\nWindows 10 Version 1809 for ARM64-based Systems<br \/>\nWindows 10 Version 1809 for x64-based Systems<br \/>\nWindows 10 Version 1909 for 32-bit Systems<br \/>\nWindows 10 Version 1909 for ARM64-based Systems<br \/>\nWindows 10 Version 1909 for x64-based Systems<br \/>\nWindows 10 Version 20H2 for 32-bit Systems<br \/>\nWindows 10 Version 20H2 for ARM64-based Systems<br \/>\nWindows 10 Version 20H2 for x64-based Systems<br \/>\nWindows 10 Version 21H1 for 32-bit Systems<br \/>\nWindows 10 Version 21H1 for ARM64-based Systems<br \/>\nWindows 10 Version 21H1 for x64-based Systems<br \/>\nWindows 10 Version 21H2 for 32-bit Systems<br \/>\nWindows 10 Version 21H2 for ARM64-based Systems<br \/>\nWindows 10 Version 21H2 for x64-based Systems<br \/>\nWindows 11 for ARM64-based Systems<br \/>\nWindows 11 for x64-based Systems<br \/>\nWindows 8.1 for 32-bit systems<br \/>\nWindows 8.1 for x64-based systems<br \/>\nWindows RT 8.1<br \/>\nWindows Server 2012<br \/>\nWindows Server 2012 (Server Core installation)<br \/>\nWindows Server 2012 R2<br \/>\nWindows Server 2012 R2 (Server Core installation)<br \/>\nWindows Server 2016<br \/>\nWindows Server 2016\u00a0 (Server Core installation)<br \/>\nWindows Server 2019<br \/>\nWindows Server 2019\u00a0 (Server Core installation)<br \/>\nWindows Server 2022<br \/>\nWindows Server 2022 (Server Core installation)<br \/>\nWindows Server, version 20H2 (Server Core Installation)<br \/>\nRemote Desktop client for Windows Desktop<\/p>\n<h2>Important Security Updates<\/h2>\n<p>Microsoft 365 Apps for Enterprise for 32-bit Systems<br \/>\nMicrosoft 365 Apps for Enterprise for 64-bit Systems<br \/>\nMicrosoft Excel 2013 RT Service Pack 1<br \/>\nMicrosoft Excel 2013 Service Pack 1 (32-bit editions)<br \/>\nMicrosoft Excel 2013 Service Pack 1 (64-bit editions)<br \/>\nMicrosoft Excel 2016 (32-bit edition)<br \/>\nMicrosoft Excel 2016 (64-bit edition)<br \/>\nMicrosoft Office 2019 for 32-bit editions<br \/>\nMicrosoft Office 2019 for 64-bit editions<br \/>\nMicrosoft Office LTSC 2021 for 32-bit editions<br \/>\nMicrosoft Office LTSC 2021 for 64-bit editions<br \/>\nMicrosoft Office Online Server<br \/>\nMicrosoft Office Web Apps Server 2013 Service Pack 1<br \/>\nMicrosoft Publisher 2013 Service Pack 1 (32-bit editions)<br \/>\nMicrosoft Publisher 2013 Service Pack 1 (64-bit editions)<br \/>\nMicrosoft Publisher 2016 (32-bit edition)<br \/>\nMicrosoft Publisher 2016 (64-bit edition)<br \/>\nMicrosoft SharePoint Enterprise Server 2016<br \/>\nMicrosoft SharePoint Foundation 2013 Service Pack 1<br \/>\nMicrosoft SharePoint Server 2019<br \/>\nMicrosoft SharePoint Server Subscription Edition<br \/>\nMicrosoft Word 2013 RT Service Pack 1<br \/>\nMicrosoft Word 2013 Service Pack 1 (32-bit editions)<br \/>\nMicrosoft Word 2013 Service Pack 1 (64-bit editions)<br \/>\nMicrosoft Word 2016 (32-bit edition)<br \/>\nMicrosoft Word 2016 (64-bit edition)<br \/>\nMicrosoft Visual Studio 2017 version 15.9 (includes 15.0 &#8211; 15.8)<br \/>\nMicrosoft Visual Studio 2019 version 16.11 (includes 16.0 &#8211; 16.10)<br \/>\nMicrosoft Visual Studio 2019 version 16.9 (includes 16.0 &#8211; 16.8)<br \/>\nMicrosoft Visual Studio 2022 version 17.0<br \/>\nMicrosoft Visual Studio 2022 version 17.1<br \/>\nVisual Studio Code<br \/>\n.NET 5.0<br \/>\n.NET 6.0<br \/>\n.NET Core 3.1<br \/>\nMicrosoft Exchange Server 2013 Cumulative Update 23<br \/>\nMicrosoft Exchange Server 2016 Cumulative Update 22<br \/>\nMicrosoft Exchange Server 2016 Cumulative Update 23<br \/>\nMicrosoft Exchange Server 2019 Cumulative Update 11<br \/>\nMicrosoft Exchange Server 2019 Cumulative Update 12<\/p>\n<h2>Low Security Updates<\/h2>\n<p>Microsoft .NET Framework 2.0 Service Pack 2<br \/>\nMicrosoft .NET Framework 3.0 Service Pack 2<br \/>\nMicrosoft .NET Framework 3.5<br \/>\nMicrosoft .NET Framework 3.5 AND 4.6.2\/4.7\/4.7.1\/4.7.2<br \/>\nMicrosoft .NET Framework 3.5 AND 4.7.2<br \/>\nMicrosoft .NET Framework 3.5 AND 4.8<br \/>\nMicrosoft .NET Framework 3.5.1<br \/>\nMicrosoft .NET Framework 4.6<br \/>\nMicrosoft .NET Framework 4.6\/4.6.1\/4.6.2\/4.7\/4.7.1\/4.7.2<br \/>\nMicrosoft .NET Framework 4.8<\/p>\n<p><strong>Similar articles:<br \/>\n<\/strong><a href=\"https:\/\/borncity.com\/win\/2022\/05\/05\/microsoft-office-updates-3-mai-2022\/\">Microsoft Office Updates (May 3, 2022)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/05\/10\/microsoft-security-update-summary-10-mai-2022\/\">Microsoft Security Update Summary (May 10, 2022)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/05\/11\/patchday-windows-10-updates-10-mai-2022\/\">Patchday: Windows 10-Updates (May 10, 2022)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/05\/11\/patchday-windows-11-server-2022-updates-may-10-2022\/\">Patchday: Windows 11\/Server 2022-Updates (May 10, 2022)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/05\/11\/windows-7-server-2008r2-windows-8-1-server-2012r2-updates-may-10-2022\/\">Windows 7\/Server 2008R2; Windows 8.1\/Server 2012R2: Updates (May 10, 2022)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/05\/12\/patchday-microsoft-office-updates-10-mai-2022\/\">Patchday: Microsoft Office Updates (May 10, 2022)<\/a><\/p>\n<div class=\"code-block code-block-2\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>[German]On May 10, 2022, Microsoft released security updates for Windows clients and servers, for Office, etc. &#8211; as well as for other products &#8211; were released. Below is a compact overview of these updates that were released on Patchday. The &hellip; <a href=\"https:\/\/borncity.com\/win\/2022\/05\/10\/microsoft-security-update-summary-10-mai-2022\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,580,1547,22,2],"tags":[125,2727,69,1544,195,194],"class_list":["post-24409","post","type-post","status-publish","format-standard","hentry","category-office","category-security","category-software","category-update","category-windows","tag-office","tag-patchday-5-2022","tag-security","tag-software","tag-update","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/24409","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=24409"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/24409\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=24409"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=24409"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=24409"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}