Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 47 vulnerabilities that were fixed in 11 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 11 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
This security update contains the following KBs:
KB5002327
KB5002311
KB5002319
KB5002321
KB5002317
QID Detection Logic:
This authenticated QID checks the file versions from above Microsoft KB article with the versions on affected SharePoint system.
KB5002327
KB5002311
KB5002319
KB5002321
KB5002317
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft SharePoint Foundation and SharePoint Server
This security update contains the following:
Office Click-2-Run and Office 365 Release Notes
Release notes for Office for Mac
KB5002203
KB5002203
QID Detection Logic:
This authenticated QID checks the file versions from the Microsoft advisory with the versions on the affected office system.
Note: Office click-2-run and Office 365 installations need to be updated manually or need to be set to automatic update. There is no direct download for the patch.
Office Click-2-Run and Office 365 Release Notes
Release notes for Office for Mac
KB5002203
KB5002203
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft office December 2022
This security update contains the following KBs:
Affected Products:
Microsoft Office LTSC for Mac 2021
Microsoft Outlook 2019 for Mac
QID Detection Logic:
This authenticated QID checks the file versions from the Microsoft advisory with the versions on affected outlook applications.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Outlook for Mac
Affected Versions:
Windows Terminal for Windows 10 below 1.15.2874
Windows Terminal for Windows 11 below 1.15.2875
QID Detection Logic (Authenticated):
The QID checks for vulnerable version of Windows Terminal by checking the file version of wt.exe.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2022-44702
Following KBs are covered in this detection:
KB5021243
KB5021086
KB5021087
KB5020880
KB5021088
KB5021089
KB5021094
KB5021082
KB5020868
KB5021081
KB5021093
KB5021091
KB5021079
KB5021092
KB5021080
KB5021090
KB5021095
KB5020873
KB5021085
This security update is rated Important for supported versions of Microsoft .NET Framework.
.NET Framework 2.0, 3.0, 3.5, 3.5.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8, and 4.8.1
QID Detection Logic (Authenticated):
Checks for vulnerable file.version of ntoskrnl.exe or Mscorlib.dll or System.core.dll for the respective .Net Framework KBs
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2022-41089
QID Detection Logic (Authenticated):
Operating Systems:
The KB Articles associated with the update:
The patch version is 6.3.9600.20718KB5021294
The patch version is 6.3.9600.20718KB5021296
The patch version is 6.2.9200.24013KB5021285
The patch version is 6.2.9200.24013KB5021303
The patch version is 6.1.7601.26262KB5021291
The patch version is 6.1.7601.26262KB5021288
The patch version is 6.0.6003.21811KB5021289
The patch version is 6.0.6003.21811KB5021293
The patch version is 10.0.14393.5582KB5021235
The patch version is 10.0.10240.19624KB5021243
The patch version is 10.0.19041.2364KB5021233
The patch version is 10.0.22621.963KB5021255
The patch version is 10.0.22000.1335KB5021234
The patch version is 10.0.20348.1366KB5021249
The patch version is 10.0.17763.3770KB5021237
This QID checks for the file version of ntoskrnl.exe.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
5021233
5021234
5021235
5021237
5021243
5021249
5021255
5021285
5021288
5021289
5021291
5021293
5021294
5021296
5021303
Affected versions:
.NET 6.0 before version 6.0.12
.NET Core 3.1 before version 3.1.32
and .NET 7.0 before version 7.0.1
QID Detection Logic: Authenticated
On Windows, this QID detects vulnerable versions of Microsoft .NET by checking the file version.
On Linux, this QID detects vulnerable versions of Microsoft .NET by checking the .NET version present in "/usr/share/dotnet/shared/Microsoft.NETCore.App/" and "/root/shared/Microsoft.NETCore.App" folders.
On Mac, this QID detects vulnerable versions of Microsoft .NET by checking the .NET version present in "/usr/share/dotnet/shared/Microsoft.NETCore.App/" folder.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2022-41089
Affected Software:
Microsoft Dynamics 365 Business Central 2022 Release Wave 1 - Update
Microsoft Dynamics 365 Business Central 2022 Release Wave 2 - Update
Microsoft Dynamics 365 Business Central 2021 Release Wave 1 - Update
Microsoft Dynamics 365 Business Central 2021 Release Wave 2 - Update
Microsoft Dynamics 365 Business Central 2020 Release Wave 1 - Update
Microsoft Dynamics 365 Business Central 2020 Release Wave 2 - Update
Microsoft Dynamics 365 Business Central 2019 Release Wave 2 (On-Premise)
Microsoft Dynamics 365 Business Central Spring 2019 Update
Microsoft Dynamics NAV 2018
Microsoft Dynamics NAV 2017
Microsoft Dynamics NAV 2016
QID Detection Logic:
This QID detects vulnerable software versions by fetching file versions from the following locations:
This authenticated QID flags vulnerable systems by detecting Vulnerable versions for file Microsoft.Dynamics.Nav.Server.exe
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2022-41127
Affected Software
Sysmon prior to version 14.1.3.0
QID Detection Logic(Authenticated):
This authenticated QID flags vulnerable systems by detecting Vulnerable versions for file Sysmon.exe
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2022-44704
Microsoft has released security Updates for Visual Studio which resolve Remote Code Execution Vulnerabilities.
Affected Software:
Microsoft Visual Studio 2022 version 17.4
Microsoft Visual Studio 2022 version 17.2
Microsoft Visual Studio 2022 version 17.0
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
QID Detection Logic: Authenticated : Windows
This QID detects vulnerable versions of Microsoft Visual Studio by checking the registry key "HKLM\SOFTWARE\Microsoft" and file "evenv.exe" to check the version of the Visual Studio.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2022-41089
For all supported versions of Windows 10, the secure version is v2.0.32791.0 and later. For Windows 11 operating systems, the secure version is v2.1.32791.0 and later.
QID detection Logic:
The gets the version of RawImageExtension by querying wmi class Win32_InstalledStoreProgram.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2022-44687
These new vulnerability checks are included in Qualys vulnerability signature 2.5.650-3. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.