Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 57 vulnerabilities that were fixed in 13 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 13 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
Microsoft has released KB501148 for Internet Explorer 11 and 9.
Affected Versions:
Internet Explorer 11 on Windows Server 2012 R2 Windows 8.1 Windows Server 2012 Windows Server 2008 R2 SP1
Internet Explorer 9 on Windows Server 2008
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB5011486
This security update contains the following:
MacOS Release Notes
Office Click-2-Run and Office 365 Release Notes
KB5002068
KB5002139
QID Detection Logic:
This authenticated QID checks the file versions from the Microsoft advisory with the versions on the affected office system.
Note: Office click-2-run and Office 365 installations need to be updated manually or need to be set to automatic update. There is no direct download for the patch.
MacOS Release Notes
Office Click-2-Run and Office 365 Release Notes
KB5002068
KB5002139
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft office March 2022
Affected Versions:
Visual studio code prior to version 1.65.1
QID Detection Logic(Authenticated):
This QID checks for the vulnerable versions of Visual Studio Code.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2022-24526
CVE-2022-24522: Skype Extension for Chrome Information Disclosure Vulnerability.
Affected Versions:-
Skype Extension before 10.2.0.9951
QID Detection Logic(Authenticated)
It checks for vulnerable version of Skype Extension on Chrome browsers.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Skype Extension for Chrome
KB Articles associated with this update are: 5012698, 5010324
Affected Versions:
Microsoft Exchange Server 2016 Cumulative Update 21
Microsoft Exchange Server 2016 Cumulative Update 22
Microsoft Exchange Server 2019 Cumulative Update 10
Microsoft Exchange Server 2019 Cumulative Update 11
Microsoft Exchange Server 2013 Cumulative Update 23
QID Detection Logic (authenticated):
The QID checks for the version of file Exsetup.exe.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB5010324
KB5012698
Affected versions:
.NET 5.0 before version 5.0.15
.NET 6.0 before version 6.0.3
and .NET Core 3.1 before version 3.1.23
QID Detection Logic: Authenticated
This QID detects vulnerable versions of Microsoft .NET Core by checking the file version on windows.
Successful exploitation of this vulnerability could lead to Denial of Service and Remote Code Execution Vulnerabilities.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2020-8927
CVE-2022-24464
CVE-2022-24512
Affected Product:
HEIFImageExtension before 1.0.43012.0
VP9VideoExtensions before 1.0.42791.0
HEVCVideoExtension before 1.0.50361.0 and 1.0.50362.0
For Windows 11 RawImageExtension before 2.1.30391.0
For Windows 10 RawImageExtension before 2.0.30391.0
QID detection Logic:
Detection gets the version of Microsoft.VP9VideoExtension, Microsoft.HEIFImageExtension, Microsoft.RawImageExtension, HEVCVideoExtension by querying wmi class Win32_InstalledStoreProgram.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2022-22006
CVE-2022-22007
CVE-2022-23295
CVE-2022-23300
CVE-2022-23301
CVE-2022-24451
CVE-2022-24452
CVE-2022-24453
CVE-2022-24456
CVE-2022-24457
CVE-2022-24501
The KB Articles associated with the update:
KB5011491
KB5011487
KB5011493
KB5011495
KB5011485
KB5011503
KB5011534
KB5011525
KB5011564
KB5011497
KB5011560
KB5011535
KB5011527
KB5011552
KB5011529
QID Detection Logic: (Authenticated)
This QID checks for the file version of " windir\system32\ntoskrnl.exe" and whether the following KBs- KB5011491, KB5011487, KB5011493, KB5011495, KB5011485, KB5011503, KB5011534, KB5011525, KB5011564, KB5011497, KB5011560, KB5011535, KB5011527, KB5011552, KB5011529 are installed or not.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB5011485
KB5011487
KB5011491
KB5011493
KB5011495
KB5011497
KB5011503
KB5011525
KB5011527
KB5011529
KB5011534
KB5011535
KB5011552
KB5011560
KB5011564
QID Detection Logic (Authenticated):
The detection gets the version of Microsoft.MSPaint by querying wmi class Win32_InstalledStoreProgram.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2022-23282
The KB Articles associated with the update:
KB5011495
KB5011491
KB5011487
KB5011493
KB5011485
KB5011503
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB5011485
KB5011487
KB5011491
KB5011493
KB5011495
KB5011503
Microsoft has released security Updates for Visual Studio which resolves Remote Code Execution and Denial of Service vulnerability.
Affected Software:
Microsoft Visual Studio 2022 Version 17.1
Microsoft Visual Studio 2022 Version 17.0
Microsoft Visual Studio 2019 version 16.7 (includes 16.0 - 16.6)
Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
QID Detection Logic: Authenticated
This QID detects vulnerable versions of Microsoft Visual Studio by checking the file version of the Visual Studio.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2020-8927
CVE-2022-24464
VCE-2022-24512
The KB Articles associated with the update:
KB5011564
KB5011560
KB5011535
KB5011527
KB5011552
KB5011529
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB5011527
KB5011529
KB5011535
KB5011552
KB5011560
KB5011564
CVE-2022-24503: Remote Desktop Protocol Client Information Disclosure Vulnerability.
CVE-2022-21990:Remote Desktop Client Remote Code Execution Vulnerability.
Affected Versions:-
Remote Desktop client Prior to 1.2.2925.
QID Detection Logic:(Authenticated)
This QID checks for a vulnerable Remote Desktop client
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2022-21990
CVE-2022-24503
These new vulnerability checks are included in Qualys vulnerability signature 2.5.420-5. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.