Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 114 vulnerabilities that were fixed in 14 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 14 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
This security update contains the following:
MacOS Release Notes
Office Click-2-Run and Office 365 Release Notes
KB5012681
KB5002169
KB5002148
KB5002175
KB5002143
KB5002177
KB5002162
QID Detection Logic:
This authenticated QID checks the file versions from the Microsoft advisory with the versions on the affected office system.
Note: Office click-2-run and Office 365 installations need to be updated manually or need to be set to automatic update. There is no direct download for the patch.
MacOS Release Notes
Office Click-2-Run and Office 365 Release Notes
KB5012681
KB5002169
KB5002148
KB5002175
KB5002143
KB5002177
KB5002162
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft office April 2022
Affected Software:
Microsoft Lync Server 2013
Microsoft Skype for Business Server 2015
Microsoft Skype for Business Server 2019
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Update Guide
This security update contains the following KBs:
KB5002189
KB5002183
KB5002191
KB5002180
QID Detection Logic:
This authenticated QID checks the file versions from the above Microsoft KB article with the versions on the affected SharePoint system.
KB5002189
KB5002183
KB5002191
KB5002180
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Sharepoint
Affected Versions:
Visual studio code prior to version 1.66.2
QID Detection Logic(Authenticated):
This QID checks for the vulnerable versions of Visual Studio Code.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2022-26921
The KB Articles associated with the update:
5012647
5012592
5012599
5012604
5012658
5012632
5012670
5012653
5012639
5012650
5012666
5011552
5011529
5012596
5012591
5012626
5012649
This QID checks for the file version of ntoskrnl.exe
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB5011529
KB5011552
KB5012591
KB5012592
KB5012596
KB5012599
KB5012604
KB5012626
KB5012632
KB5012639
KB5012647
KB5012649
KB5012650
KB5012653
KB5012658
KB5012666
KB5012670
Affected Products:
Microsoft System Center Endpoint Protection
Microsoft System Center 2012 R2 Endpoint Protection
Microsoft System Center 2012 Endpoint Protection
Microsoft Security Essentials.
QID Detection Logic (Authenticated):
The authenticated check looks for the version of mpengine.dll file.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2022-24548
Microsoft has released security Updates for Visual Studio which resolves Remote Code Execution and Denial of Service vulnerability.
Affected Software:
Microsoft Visual Studio 2022 Version 17.1
Microsoft Visual Studio 2022 Version 17.0
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)
Microsoft Visual Studio 2019 version 16.7 (includes 16.0 - 16.6)
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
and
Microsoft VIsual Studio for Mac prior to 8.10.22.11
QID Detection Logic: Authenticated
This QID detects vulnerable versions of Microsoft Visual Studio by checking the file version of the Visual Studio.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2022-24513
CVE-2022-24765
CVE-2022-24767
CVE-2022-23259: Microsoft Dynamics 365 (on-premise) Remote Code Execution Vulnerability
Affected Software:
Microsoft Dynamics 365 (on-premises) V9.0
Microsoft Dynamics 365 (on-premises) V9.1
QID Detection Logic(Authenticated):
This authenticated QID flags vulnerable systems by detecting Vulnerable versions for file Microsoft.Crm.Setup.Server.exe:
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2022-23259
Microsoft Hyper-V its release as Windows Server Virtualization, is a native hypervisor.it can create virtual machines on x86-64 systems running Windows.
CVE-2022-26785 - Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability.
CVE-2022-24539 - Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability.
CVE-2022-24490 - Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability.
CVE-2022-26783 - Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability.
Microsoft releases the security update for Windows October 2021
The KB Articles associated with the update:
KB5012596
KB5012647
KB5012604
KB5012599
This QID checks for the file version of ntoskrnl.exe
This QID check for Hyper-V service
The following versions of ntoskrnl.exe with their corresponding KBs are verified:
KB5012596-10.0.14393.5066
KB5012647-10.0.17763.2803
KB5012604-10.0.20348.643
KB5012599-10.0.19042.1645
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB5012596
KB5012599
KB5012604
KB5012647
The KB Articles associated with the update:
5012647
5012599
5012604
5012658
5012632
5012670
5012639
5012650
5012666
5012596
5012626
5012649
QID Detection Logic:
Authenticated: This QID checks for the file version of dns.exe
Unauthenticated: This QID checks for vulnerable version of Microsoft DNS by checking the DNS version exposed in the banner.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB5012596
KB5012599
KB5012604
KB5012626
KB5012632
KB5012639
KB5012647
KB5012649
KB5012650
KB5012658
KB5012666
KB5012670
Affected Product:
"HEVC from Device Manufacturer" media codec before version 1.0.50361.0
QID detection Logic:
This gets the version of HEVCVideoExtension by querying WMI class Win32_InstalledStoreProgram.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2022-24532
The KB Articles associated with the update:
KB5012596
KB5012647
KB5012604
KB5012599
KB5012650
KB5012670
This QID checks for the file version of ntoskrnl.exe
The following versions of ntoskrnl.exe with their corresponding KBs are verified:
KB5012596-10.0.14393.5066
KB5012647-10.0.17763.2803
KB5012604-10.0.20348.643
KB5012599-10.0.19042.1645
KB5012650-6.2.9200.23670
KB5012670-6.3.9600.20326
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB5012596
KB5012599
KB5012604
KB5012647
KB5012650
KB5012670
Following KBs are covered in this detection:
KB5012117
KB5012118
KB5012120
KB5012121
KB5012123
KB5012324
KB5012325
KB5012326
KB5012327
KB5012328
KB5012329
KB5012330
KB5012331
KB5012332
This security update is rated Important for supported versions of Microsoft .NET Framework.
.NET Framework 3.5, 3.5.1, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 and 4.8
QID Detection Logic (Authenticated):
- Checks for vulnerable version of System.web.dll for .Net Framework
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2022-26832
This vulnerability is only exploitable for systems that have the NFS role enabled.
The KB Articles associated with the update are:
5012591
5012592
5012596
5012599
5012604
5012639
5012647
5012650
5012653
5012666
5012670
QID Detection Logic (Authenticated):
This QID checks for the file version of rpcxdr.sys.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Update Guide
These new vulnerability checks are included in Qualys vulnerability signature 2.5.447-3. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.