{"id":24953,"date":"2022-06-18T15:51:45","date_gmt":"2022-06-18T13:51:45","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=24953"},"modified":"2022-06-18T15:51:45","modified_gmt":"2022-06-18T13:51:45","slug":"microsoft-security-update-revisions-14-juni-2022","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2022\/06\/18\/microsoft-security-update-revisions-14-juni-2022\/","title":{"rendered":"Microsoft Security Update Revisions (June 14, 2022)"},"content":{"rendered":"<p>[<a href=\"https:\/\/www.borncity.com\/blog\/2022\/06\/18\/microsoft-security-update-revisions-14-juni-2022\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]One more quick piece of info from this week's post. Microsoft has released some security description revisions as of June 14, 2022, which I'll just post here on the blog.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg08.met.vgwort.de\/na\/a242bcc6408b46c4ab42239fcab88ea6\" width=\"1\" height=\"1\">********************************************************************<br \/>Title: Microsoft Security Update Revisions<br \/>Issued: June 14, 2022<br \/>********************************************************************<\/p>\n<p>Summary<br \/>=======<\/p>\n<p>The following CVEs have undergone a revision increment.<br \/>====================================================================<\/p>\n<p>* CVE-2021-26414<br \/>* CVE-2022-23267<br \/>* CVE-2022-24513<br \/>* CVE-2022-24527<br \/>* CVE-2022-26832<br \/>* CVE-2022-30190<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-26414\" target=\"_blank\" rel=\"noopener\">CVE-2021-26414<\/a> | Windows DCOM Server Security Feature Bypass <br \/>&#8211; Version: 2.0<br \/>&#8211; Reason for Revision: Microsoft is announcing the release of the June 14, 2022 <br \/>&nbsp;&nbsp; Windows security updates to address the second phase of hardening changes for this <br \/>&nbsp;&nbsp; vulnerability. After these updates are installed, RPC_C_AUTHN_LEVEL_PKT_INTEGRITY <br \/>&nbsp;&nbsp; on DCOM servers will be enabled by default. Customers who need to do so can still<br \/>&nbsp;&nbsp; disable it by using the&nbsp; RequireIntegrityActivationAuthenticationLevel registry key. <br \/>&nbsp;&nbsp; Microsoft strongly recommends that customers install the June 14, 2022 updates,<br \/>&nbsp;&nbsp; complete testing in your environment, and enable these hardening changes as soon<br \/>&nbsp;&nbsp; as possible.<br \/>&#8211; Originally posted: June 8, 2021<br \/>&#8211; Updated: June 14, 2022<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-23267\" target=\"_blank\" rel=\"noopener\">CVE-2022-23267<\/a> | .NET and Visual Studio Denial of Service Vulnerability<br \/>&#8211; Version: 3.0<br \/>&#8211; Reason for Revision: Revised the Security Updates table to include Visual Studio<br \/>&nbsp;&nbsp; 2019 for Mac and Visual Studio 2022 for Mac because these versions of Visual<br \/>&nbsp;&nbsp; Studio for Mac are affected by this vulnerability. Microsoft strongly recommends<br \/>&nbsp;&nbsp; that customers running these versions of Visual Studio install the updates to be<br \/>&nbsp;&nbsp; fully protected from the vulnerability.<br \/>&#8211; Originally posted: May 10, 2022<br \/>&#8211; Updated: June 14, 2022<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-24513\" target=\"_blank\" rel=\"noopener\">CVE-2022-24513<\/a> | Visual Studio Elevation of Privilege Vulnerability<br \/>&#8211; Version: 3.0<br \/>&#8211; Reason for Revision: Microsoft has released the June 2022 security updates to <br \/>&nbsp;&nbsp; further address CVE-2022-24513 for the following supported versions of Visual Studio:<br \/>&nbsp;&nbsp; Visual Studio 2017 version 15.9, Visual Studio 2019 version 16.9, Visual Studio 2019<br \/>&nbsp;&nbsp; version 16.11, Microsoft Visual Studio 2022 version 17.0, and Visual Studio 2019 for<br \/>&nbsp;&nbsp; Mac version 8.10. In addition, Visual Studio 2022 for Mac version 17.0 has been added <br \/>&nbsp;&nbsp; to the Security Updates table as it is also affected by this vulnerability. Microsoft<br \/>&nbsp;&nbsp; strongly recommends that customers install these updates to be fully protected from<br \/>&nbsp;&nbsp; the vulnerability.<br \/>&#8211; Originally posted: April 12, 2022<br \/>&#8211; Updated: June 14, 2022<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-24527\" target=\"_blank\" rel=\"noopener\">CVE-2022-24527<\/a> | Microsoft Endpoint Configuration Manager Elevation of Privilege<br \/>&nbsp;&nbsp; Vulnerability<br \/>&#8211;&nbsp; Version: 2.0<br \/>&#8211; Reason for Revision: The following revisions have been made: 1) Added Microsoft <br \/>&nbsp;&nbsp; Endpoint Configuration Manager to the Security Updates table as it is affected by this<br \/>&nbsp;&nbsp; vulnerability. 2) Removed all versions of Windows from the Security Updates table,<br \/>&nbsp;&nbsp; because the update to address this vulnerability is not available via the Windows<br \/>&nbsp;&nbsp; security updates. 3) Updated the FAQs to provide information about how customers can<br \/>&nbsp;&nbsp; get the hotfix for Microsoft Endpoint Configuration Manager that addresses this<br \/>&nbsp;&nbsp; vulnerability. 4) Corrected the CVE title.<br \/>&#8211; Originally posted: April 12, 2022<br \/>&#8211; Updated: June 14, 2022<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-26832\" target=\"_blank\" rel=\"noopener\">CVE-2022-26832<\/a> | .NET Framework Denial of Service Vulnerability<br \/>&#8211; Version: 3.0<br \/>&#8211; Reason for Revision: In the Security Updates table, added .NET Framework <br \/>&nbsp;&nbsp; 4.6.2\/4.7\/4.7.1\/4.7.2 installed on Windows 10 version 1607, Windows Server 2016, and<br \/>&nbsp;&nbsp; Windows Server 2016 (Server Core installation) as these versions of Window 10 and Windows <br \/>&nbsp;&nbsp; Server with .NET Framework 4.6.2\/4.7\/4.7.1\/4.7.2 installed are affected by this<br \/>&nbsp;&nbsp; vulnerability. Customers running these versions of .NET Framework should install the <br \/>&nbsp;&nbsp; April 2022 security updates to be protected from this vulnerability.<br \/>&#8211; Originally posted: April 12, 2022<br \/>&#8211; Updated: June 14, 2022<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-30190\" target=\"_blank\" rel=\"noopener\">CVE-2022-30190<\/a> | Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code<br \/>&nbsp;&nbsp; Execution Vulnerability<br \/>&#8211; Version: 2.0<br \/>&#8211; Reason for Revision: The update for this vulnerability is in the June 2022 <br \/>&nbsp;&nbsp; cumulative Windows Updates. Microsoft strongly recommends that customers install <br \/>&nbsp;&nbsp; the updates to be fully protected from the vulnerability. Customers whose systems are<br \/>&nbsp;&nbsp; configured to receive automatic updates do not need to take any further action.<br \/>&#8211; Originally posted: May 30, 2022<br \/>&#8211; Updated: June 14, 2022<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]One more quick piece of info from this week's post. Microsoft has released some security description revisions as of June 14, 2022, which I'll just post here on the blog.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580],"tags":[69],"class_list":["post-24953","post","type-post","status-publish","format-standard","hentry","category-security","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/24953","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=24953"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/24953\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=24953"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=24953"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=24953"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}