Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 60 vulnerabilities that were fixed in 14 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 14 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
This security update contains the following KBs:
KB5002271
KB5002258
KB5002264
KB5002267
KB5002269
KB5002159
KB5002270
KB5002257
KB5002142
QID Detection Logic:
This authenticated QID checks the file versions from above Microsoft KB article with the versions on affected SharePoint system.
KB5002271
KB5002258
KB5002264
KB5002267
KB5002269
KB5002159
KB5002270
KB5002257
KB5002142
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft SharePoint Foundation and SharePoint Server
This security update contains the following:
KB5002166
KB5002178
KB5002016
KB5002017
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft office September 2022
Affected Versions:
Visual studio code prior to version 1.71.1
QID Detection Logic(Authenticated):
This QID checks for the vulnerable versions of Visual Studio Code.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2022-38020
Affected Software:
Microsoft Dynamics 365 (on-premises) V9.0
Microsoft Dynamics 365 (on-premises) V9.1
QID Detection Logic(Authenticated):
This authenticated QID flags vulnerable systems by detecting Vulnerable versions for file Microsoft.Crm.Setup.Server.exe:
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2022-34700
CVE-2022-35805
Microsoft has released security Updates for Visual Studio which resolve Remote Code Execution Vulnerabilities.
Affected Software:
Microsoft Visual Studio 2022 version 17.2
Microsoft Visual Studio 2022 version 17.0
Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
Microsoft Visual Studio 2022 version 17.3
Visual Studio 2022 for Mac version 17.3
QID Detection Logic: Authenticated : Windows
This QID detects vulnerable versions of Microsoft Visual Studio by checking the registry key "HKLM\SOFTWARE\Microsoft" and file "evenv.exe" to check the version of the Visual Studio.
QID Detection Logic: Authenticated : MacOs
This QID detects vulnerable versions of Microsoft Visual Studio by checking the "Visual Studio.app" location and checking version for this.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2022-38013
Following KBs are covered in this detection:
KB5017498
KB5017501
KB5017315
KB5017367
KB5017365
KB5017370
KB5017377
KB5017361
KB5017373
KB5017497
KB5017500
KB5017499
KB5017358
KB5017371
KB5017305
This security update is rated Important for supported versions of Microsoft .NET Framework.
.NET Framework 2.0, 3.0, 3.5, 3.5.1, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8, and 4.8.1
QID Detection Logic (Authenticated):
Checks for vulnerable version of ntoskrnl.exe or Mscorlib.dll for the respective .Net Framework KBs
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2022-26929
QID Detection Logic (Authenticated):
Operating Systems: Windows Server 2012, Windows 8.1, Windows Server 2008, Windows Server 2016, Windows 10, Windows 7, Windows Server 2019, Windows Server 2022, Windows 11
The KB Articles associated with the update:
The patch version is 6.3.9600.20564 (KB5017367)
The patch version is 6.0.6003.21661 (KB5017358)
The patch version is 6.0.6003.21661 (KB5017371)
The patch version is 10.0.14393.5356 (KB5017305)
The patch version is 6.2.9200.23861 (KB5017370)
The patch version is 6.2.9200.23861 (KB5017377)
The patch version is 6.3.9600.20564 (KB5017365)
The patch version is 6.1.7601.26111 (KB5017361)
The patch version is 6.1.7601.26111 (KB5017373)
The patch version is 10.0.10240.19444 (KB5017327)
The patch version is 10.0.17763.3406 (KB5017315)
The patch version is 10.0.19041.2006 (KB5017308)
The patch version is 10.0.20348.1006 (KB5017316)
The patch version is 10.0.22000.978 (KB5017328)
This QID checks for the file version of ntoskrnl.exe
Patches:
The following are links for downloading patches to fix these vulnerabilities:
5017305
5017308
5017315
5017316
5017327
5017328
5017358
5017361
5017365
5017367
5017370
5017371
5017373
5017377
Affected versions:
.NET 6.0 before version 6.0.9
.NET Core 3.1 before version 3.1.29
QID Detection Logic: Authenticated- Windows
This QID detects vulnerable versions of Microsoft .NET Core by checking the file version on windows and the installation path and file name ".version".
QID Detection Logic: Authenticated- Linux
This QID is executing the command "ls -d /usr/share/dotnet/shared/Microsoft.NETCore.App/*" or "ls -d /root/shared/Microsoft.NETCore.App/*" to check the Microsoft .NET Core versions.
QID Detection Logic: Authenticated-MacOs
This QID is executing the command "ls -d /usr/local/share/dotnet/shared/Microsoft.NETCore.App/*" to check the .NETCore.App versions.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2022-38013
QID Detection Logic (Authenticated):
This QID checks for the file version of dns.exe
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB5017305
KB5017315
KB5017316
KB5017358
KB5017361
KB5017365
KB5017367
KB5017370
KB5017371
KB5017373
KB5017377
The KB Articles associated with the update:
5017367
5017365
5017370
5017377
5017361
5017373
5017358
5017371
5017305
5017316
5017315
QID Detection Logic (Authenticated):
This QID checks for the file version of ntoskrnl.exe
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB5017305
KB5017315
KB5017316
KB5017358
KB5017361
KB5017365
KB5017367
KB5017370
KB5017371
KB5017373
KB5017377
QID Detection Logic (Authenticated):
Operating Systems:
The KB Articles associated with the update:
The patch version is 6.3.9600.20564 (KB5017367)
The patch version is 6.3.9600.20564 (KB5017365)
The patch version is 10.0.14393.5356 (KB5017305)
The patch version is 10.0.20348.1006 (KB5017316)
The patch version is 10.0.17763.3406 (KB5017315)
This QID checks for the file version of ntoskrnl.exe
Patches:
The following are links for downloading patches to fix these vulnerabilities:
5017305
5017315
5017316
5017365
5017367
A complete Qualys vulnerability scan report for Microsoft Azure Stack Hub can be obtained at Azure Stack Vulnerability Scan Report.
QID Detection Logic (Authenticated):
This QID checks for the file version of ntoskrnl.exe, if this file version is less than 10.0.17763.10964, it is considered as vulnerable.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Azure Stack Hub
Affected Product:
RawImageExtension from Device Manufacturer" media codec before version 2.0.32061.0
AV1 from Device Manufacturer" media codec before version 1.1.52074.0
QID detection Logic:
The gets the version of AV1VideoExtension by querying wmi class Win32_InstalledStoreProgram.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2022-38011
CVE-2022-38019
The vulnerability is applicable if IPSec service is running. Hosts are not affected if IPv6 is disabled on it.
QID Detection Logic (Authenticated):
Operating Systems: Windows Server 2012, Windows 8.1, Windows Server 2008, Windows Server 2016, Windows 10, Windows 7, Windows Server 2019, Windows Server 2022, Windows 11
The KB Articles associated with the update:
The patch version is 6.3.9600.20564 (KB5017367)
The patch version is 6.0.6003.21661 (KB5017358)
The patch version is 6.0.6003.21661 (KB5017371)
The patch version is 10.0.14393.5356 (KB5017305)
The patch version is 6.2.9200.23861 (KB5017370)
The patch version is 6.2.9200.23861 (KB5017377)
The patch version is 6.3.9600.20564 (KB5017365)
The patch version is 6.1.7601.26111 (KB5017361)
The patch version is 6.1.7601.26111 (KB5017373)
The patch version is 10.0.10240.19444 (KB5017327)
The patch version is 10.0.17763.3406 (KB5017315)
The patch version is 10.0.19041.2006 (KB5017308)
The patch version is 10.0.20348.1006 (KB5017316)
The patch version is 10.0.22000.978 (KB5017328)
This QID checks for the file version of ntoskrnl.exe. The QID additionally checks if IPv6 and IPSec is enabled on the host.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2022-34718
These new vulnerability checks are included in Qualys vulnerability signature 2.5.580-3. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.