Microsoft Alert
3163Warning Date
Severity Level
Warning Number
Target Sector
9 February, 2022
● High
2022-4349
All
Microsoft has released security updates to address several vulnerabilities in the following products:
- Azure Data Explorer
- Kestrel Web Server
- Microsoft Dynamics
- Microsoft Dynamics GP
- Microsoft Edge (Chromium-based)
- Microsoft Office
- Microsoft Office Excel
- Microsoft Office Outlook
- Microsoft Office SharePoint
- Microsoft Office Visio
- Microsoft OneDrive
- Microsoft Teams
- Microsoft Windows Codecs Library
- Power BI
- Roaming Security Rights Management Services
- Role: DNS Server
- Role: Windows Hyper-V
- SQL Server
- Visual Studio Code
- Windows Common Log File System Driver
- Windows DWM Core Library
- Windows Kernel
- Windows Kernel-Mode Drivers
- Windows Named Pipe File System
- Windows Print Spooler Components
- Windows Remote Access Connection Manager
- Windows Remote Procedure Call Runtime
- Windows User Account Profile
- Windows Win32K
Attacker could exploit these vulnerabilities by doing the following:
- Buffer overflow
- Bypass of a protection mechanism
- Remote Code Execution
- Denial of service attack (DoS)
- Spoofing attacks
- Unauthorized disclosure of information
The CERT team encourages users to review Microsoft security advisory and apply the necessary updates: