Your review has been sent successfully

Microsoft Alert

3163
Classification
These posts contain security alerts, including digital loopholes, electronic attacks, technical updates, and they are classified base on the level of severity.

Critical

High

Medium

Low

Warning Date

Severity Level

Warning Number

Target Sector

9 February, 2022

● High

2022-4349

All

Description:

Microsoft has released security updates to address several vulnerabilities in the following products:

  • Azure Data Explorer
  • Kestrel Web Server
  • Microsoft Dynamics
  • Microsoft Dynamics GP
  • Microsoft Edge (Chromium-based)
  • Microsoft Office
  • Microsoft Office Excel
  • Microsoft Office Outlook
  • Microsoft Office SharePoint
  • Microsoft Office Visio
  • Microsoft OneDrive
  • Microsoft Teams
  • Microsoft Windows Codecs Library
  • Power BI
  • Roaming Security Rights Management Services
  • Role: DNS Server
  • Role: Windows Hyper-V
  • SQL Server
  • Visual Studio Code
  • Windows Common Log File System Driver
  • Windows DWM Core Library
  • Windows Kernel
  • Windows Kernel-Mode Drivers
  • Windows Named Pipe File System
  • Windows Print Spooler Components
  • Windows Remote Access Connection Manager
  • Windows Remote Procedure Call Runtime
  • Windows User Account Profile
  • Windows Win32K
Threats:

Attacker could exploit these vulnerabilities by doing the following:

  • Buffer overflow
  • Bypass of a protection mechanism
  • Remote Code Execution
  • Denial of service attack (DoS)
  • Spoofing attacks
  • Unauthorized disclosure of information
Best practice and Recommendations:

The CERT team encourages users to review Microsoft security advisory and apply the necessary updates:

Last updated at 9 February, 2022

Rate the content

rate-icon
up icon