Advisory overview
Qualys Vulnerability R&D Lab has released new
vulnerability checks in the Enterprise TruRisk Platform to protect
organizations against
80 vulnerabilities
that were fixed in
8 bulletins
announced today by Microsoft. Customers can immediately audit
their networks for these and other new vulnerabilities by accessing
their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Vulnerability details
Microsoft has released 8 security
bulletins
to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
-
Microsoft Office Security Update for October 2022
-
Severity
-
Critical
4
-
Qualys ID
-
110417
-
Vendor Reference
-
KB5002026,
KB5002279,
KB5002288
-
CVE Reference
-
CVE-2022-38001,
CVE-2022-38048,
CVE-2022-38049,
CVE-2022-41031,
CVE-2022-41043
-
CVSS Scores
-
Base 7.2 /
Temporal 5.6
-
Description
-
Microsoft has released October 2022 security updates to fix multiple security vulnerabilities.
This security update contains the following:
KB5002279
KB5002288
KB5002026
-
Consequence
-
Successful exploitation allows an attacker to execute code remotely.
-
Solution
-
Refer to Microsoft Security Guidance for more details pertaining to this vulnerability.
KB5002279
KB5002288
KB5002026
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Office October 2022
-
Microsoft SharePoint Server and Foundation Update for October 2022
-
Severity
-
Critical
4
-
Qualys ID
-
110418
-
Vendor Reference
-
KB5002278,
KB5002283,
KB5002284,
KB5002287,
KB5002290
-
CVE Reference
-
CVE-2022-38053,
CVE-2022-41036,
CVE-2022-41037,
CVE-2022-41038
-
CVSS Scores
-
Base 9 /
Temporal 7
-
Description
-
Microsoft has released October 2022 security updates to fix multiple security vulnerabilities.
This security update contains the following KBs:
KB5002284
KB5002290
KB5002278
KB5002283
KB5002287
QID Detection Logic:
This authenticated QID checks the file versions from above Microsoft KB article with the versions on affected SharePoint system.
-
Consequence
-
Successful exploitation allows an attacker to execute code remotely.
-
Solution
-
Refer to Microsoft Security Guidance for more details pertaining to this vulnerability.
This security update contains the following KBs:
KB5002284
KB5002290
KB5002278
KB5002283
KB5002287
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft SharePoint Foundation and SharePoint Server
-
Microsoft Visual Studio Code Security Update for October 2022
-
Severity
-
Critical
4
-
Qualys ID
-
377627
-
Vendor Reference
-
CVE-2022-41034,
CVE-2022-41042
-
CVE Reference
-
CVE-2022-41034,
CVE-2022-41042
-
CVSS Scores
-
Base 7.2 /
Temporal 5.6
-
Description
-
Visual Studio Code is a lightweight but powerful source code editor which runs on your desktop and is available for Windows, macOS and Linux.
Affected Versions:
Visual studio code prior to version 1.72.1
QID Detection Logic(Authenticated):
This QID checks for the vulnerable versions of Visual Studio Code.
-
Consequence
-
Visual Studio Code is prone to Remote Code Execution and Information Disclosure impacting confidentiality, integrity and availablity
-
Solution
-
Customers are advised to refer to CVE-2022-41034 and CVE-2022-41042 for more information pertaining to this vulnerability.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2022-41034
CVE-2022-41042
-
Microsoft Visual Studio Code Jupyter Extension Elevation of Privilege Vulnerability for October 2022
-
Severity
-
Critical
4
-
Qualys ID
-
377628
-
Vendor Reference
-
CVE-2022-41083
-
CVE Reference
-
CVE-2022-41083
-
CVSS Scores
-
Base 7.2 /
Temporal 5.3
-
Description
-
An attacker who successfully exploited this vulnerability could execute code in the context of another Visual Studio Code user on the vulnerable system.
Affected Versions:
2022.9.110
QID Detection Logic(Authenticated):
This QID checks for the vulnerable versions of Visual Studio Code with Jupyter extension.
-
Consequence
-
Visual Studio Code Jupyter extension is prone to privilege escalation vulnerability
-
Solution
-
Customers are advised to refer to CVE-2022-41083for more information pertaining to these vulnerabilities.
Workaround:
Create a folder C:\ProgramData\jupyter\kernels\ and configure it to be writable only by the current user
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2022-41083
-
Microsoft Visual Studio (NuGet Client) Security Update for October 2022
-
Severity
-
Critical
4
-
Qualys ID
-
91949
-
Vendor Reference
-
CVE-2022-41032
-
CVE Reference
-
CVE-2022-41032
-
CVSS Scores
-
Base 4.3 /
Temporal 3.2
-
Description
-
Microsoft has released security Updates for Visual Studio which resolve Elevation of Privilege Vulnerabilities.
Affected Software:
Microsoft Visual Studio 2022 version 17.2
Microsoft Visual Studio 2022 version 17.0
Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
Microsoft Visual Studio 2022 version 17.3
Visual Studio 2022 for Mac version 17.3
QID Detection Logic: Authenticated : Windows
This QID detects vulnerable versions of Microsoft Visual Studio by checking the registry key "HKLM\SOFTWARE\Microsoft" and file "evenv.exe" to check the version of the Visual Studio.
QID Detection Logic: Authenticated : MacOs
This QID detects vulnerable versions of Microsoft Visual Studio by checking the "Visual Studio.app" location and checking version for this.
-
Consequence
-
Vulnerable versions of Microsoft Visual Studio are prone to Elevation of Privilege Vulnerability.
-
Solution
-
Customers are advised to refer to CVE-2022-41032 for more information pertaining to this vulnerability.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2022-41032
-
Microsoft .NET (NuGet Client) Security Update for October 2022
-
Severity
-
Critical
4
-
Qualys ID
-
91950
-
Vendor Reference
-
CVE-2022-41032
-
CVE Reference
-
CVE-2022-41032
-
CVSS Scores
-
Base 4.3 /
Temporal 3.2
-
Description
-
Microsoft has released a security Update for .NET which resolves Elevation of Privilege Vulnerability.
This security update is rated Important for affected versions of .NET
Affected versions:
.NET 6.0 before version 6.0.10
and .NET Core 3.1 before version 3.1.30
QID Detection Logic: Authenticated
On Windows, this QID detects vulnerable versions of Microsoft .NET by checking the file version.
On Linux, this QID detects vulnerable versions of Microsoft .NET by checking the .NET version present in "/usr/share/dotnet/shared/Microsoft.NETCore.App/" and "/root/shared/Microsoft.NETCore.App" folders.
On Mac, this QID detects vulnerable versions of Microsoft .NET by checking the .NET version present in "/usr/share/dotnet/shared/Microsoft.NETCore.App/" folder.
-
Consequence
-
Vulnerable versions of Microsoft .NET are prone to Elevation of Privilege Vulnerability.
-
Solution
-
Customers are advised to refer to CVE-2022-41032 for more information pertaining to these vulnerabilities.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2022-41032
-
Microsoft Windows Security Update for October 2022
-
Severity
-
Critical
4
-
Qualys ID
-
91951
-
Vendor Reference
-
KB5018410,
KB5018411,
KB5018418,
KB5018419,
KB5018421,
KB5018425,
KB5018427,
KB5018446,
KB5018450,
KB5018454,
KB5018457,
KB5018474,
KB5018476,
KB5018478,
KB5018479
-
CVE Reference
-
CVE-2022-22035,
CVE-2022-24504,
CVE-2022-30198,
CVE-2022-33634,
CVE-2022-33635,
CVE-2022-33645,
CVE-2022-34689,
CVE-2022-35770,
CVE-2022-37965,
CVE-2022-37970,
CVE-2022-37973,
CVE-2022-37974,
CVE-2022-37975,
CVE-2022-37976,
CVE-2022-37977,
CVE-2022-37978,
CVE-2022-37979,
CVE-2022-37980,
CVE-2022-37981,
CVE-2022-37982,
CVE-2022-37983,
CVE-2022-37984,
CVE-2022-37985,
CVE-2022-37986,
CVE-2022-37987,
CVE-2022-37988,
CVE-2022-37989,
CVE-2022-37990,
CVE-2022-37991,
CVE-2022-37993,
CVE-2022-37994,
CVE-2022-37995,
CVE-2022-37996,
CVE-2022-37997,
CVE-2022-37998,
CVE-2022-37999,
CVE-2022-38000,
CVE-2022-38003,
CVE-2022-38016,
CVE-2022-38021,
CVE-2022-38022,
CVE-2022-38025,
CVE-2022-38026,
CVE-2022-38027,
CVE-2022-38028,
CVE-2022-38029,
CVE-2022-38030,
CVE-2022-38031,
CVE-2022-38032,
CVE-2022-38033,
CVE-2022-38034,
CVE-2022-38036,
CVE-2022-38037,
CVE-2022-38038,
CVE-2022-38039,
CVE-2022-38040,
CVE-2022-38041,
CVE-2022-38042,
CVE-2022-38043,
CVE-2022-38044,
CVE-2022-38045,
CVE-2022-38046,
CVE-2022-38047,
CVE-2022-38050,
CVE-2022-38051,
CVE-2022-41033,
CVE-2022-41081
-
CVSS Scores
-
Base 7.6 /
Temporal 6.3
-
Description
-
Microsoft Windows Security Update - October 2022
QID Detection Logic (Authenticated):
Operating Systems:
The KB Articles associated with the update:
The patch version is 6.1.7601.26220KB5020000
The patch version is 6.1.7601.26220KB5020013
The patch version is 6.0.6003.21768KB5020019
The patch version is 6.0.6003.21768KB5020005
The patch version is 10.0.20348.1249KB5019081
The patch version is 10.0.17763.3650KB5019966
The patch version is 10.0.14393.5501KB5019964
The patch version is 6.3.9600.20666KB5020023
The patch version is 6.3.9600.20666KB5020010
The patch version is 6.2.9200.23961KB5020009
The patch version is 6.2.9200.23961KB5020003
This QID checks for the file version of ntoskrnl.exe.
-
Consequence
-
Successful exploit could compromise Confidentiality, Integrity and Availability
-
Solution
-
Please refer to the Following KB Articles associated with the update:
KB5018474
KB5018421
KB5018425
KB5018454
KB5018479
KB5018427
KB5018410
KB5018419
KB5018476
KB5018457
KB5018478
KB5018450
KB5018446
KB5018411
KB5018418
Patches:
The following are links for downloading patches to fix these vulnerabilities:
5018410
5018411
5018418
5018419
5018421
5018425
5018427
5018446
5018450
5018454
5018457
5018474
5018476
5018478
5018479
-
Microsoft Azure Stack Hub Security Updates for October 2022
-
Severity
-
Urgent
5
-
Qualys ID
-
91953
-
Vendor Reference
-
Azure Stack Hub
-
CVE Reference
-
CVE-2022-22035,
CVE-2022-24504,
CVE-2022-30198,
CVE-2022-33634,
CVE-2022-33635,
CVE-2022-33645,
CVE-2022-34689,
CVE-2022-35770,
CVE-2022-37965,
CVE-2022-37970,
CVE-2022-37975,
CVE-2022-37976,
CVE-2022-37977,
CVE-2022-37978,
CVE-2022-37979,
CVE-2022-37981,
CVE-2022-37982,
CVE-2022-37983,
CVE-2022-37984,
CVE-2022-37985,
CVE-2022-37986,
CVE-2022-37987,
CVE-2022-37988,
CVE-2022-37989,
CVE-2022-37990,
CVE-2022-37991,
CVE-2022-37993,
CVE-2022-37994,
CVE-2022-37995,
CVE-2022-37996,
CVE-2022-37997,
CVE-2022-37999,
CVE-2022-38000,
CVE-2022-38003,
CVE-2022-38016,
CVE-2022-38021,
CVE-2022-38022,
CVE-2022-38026,
CVE-2022-38027,
CVE-2022-38028,
CVE-2022-38029,
CVE-2022-38030,
CVE-2022-38031,
CVE-2022-38032,
CVE-2022-38033,
CVE-2022-38034,
CVE-2022-38037,
CVE-2022-38038,
CVE-2022-38039,
CVE-2022-38040,
CVE-2022-38041,
CVE-2022-38042,
CVE-2022-38043,
CVE-2022-38044,
CVE-2022-38045,
CVE-2022-38046,
CVE-2022-38047,
CVE-2022-38050,
CVE-2022-38051,
CVE-2022-41033,
CVE-2022-41081
-
CVSS Scores
-
Base 10 /
Temporal 8.3
-
Description
-
Azure Stack Hub is an extension of Azure that provides a way to run apps in an on-premises environment and deliver Azure services in your datacenter.
A complete Qualys vulnerability scan report for Microsoft Azure Stack Hub can be obtained at Azure Stack Vulnerability Scan Report.
QID Detection Logic (Authenticated):
This QID checks for the file version of ntoskrnl.exe, if this file version is less than 10.0.17763.11030, it is considered as vulnerable.
-
Consequence
-
Successful exploit could compromise Confidentiality, Integrity and Availability
-
Solution
-
Customers are encouraged to connect with Microsoft for obtaining more information about patches and upcoming releases.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Azure Stack Hub
These new vulnerability checks are included in Qualys
vulnerability signature
2.5.603-5.
Each Qualys account is automatically updated with the latest
vulnerability signatures as they become available. To view the
vulnerability signature version in your account, from the
Qualys Help menu, select the About tab.
Selective Scan Instructions Using Qualys
To perform a selective vulnerability scan, configure a scan profile to use the following options:
-
Ensure access to TCP ports 135 and 139 are available.
-
Enable Windows Authentication (specify Authentication Records).
-
Enable the following Qualys IDs:
-
110417
-
110418
-
377627
-
377628
-
91949
-
91950
-
91951
-
91953
- If you would like the scan to return the Windows Hostname, also include QID 82044 and ensure access to UDP port 137 is available.
- If you would like to be notified if Qualys is unable to log on to a host (if Authentication fails), also include QID 105015.
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Access for Qualys Customers
Platforms and Platform Identification
Technical Support
For more information, customers may contact Qualys Technical Support.
About Qualys
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.