Microsoft Fixed Six 0-Day Vulnerabilities and Finally Released Patches for ProxyNotShell

patches for ProxyNotShell
Written by Emma Davis

As part of November’s Update Tuesday, Microsoft fixed 68 vulnerabilities in its products, including six zero-day problems that the attackers had already exploited, and released patches for ProxyNotShell.

Of the 68 vulnerabilities, 11 were classified as “critical” because they could allow privilege escalation, spoofing, or remote arbitrary code execution. In addition, this month the developers fixed six 0-day vulnerabilities at once.

Let me remind you that the term β€œcritical” is used to vulnerabilities, information about which was either publicly disclosed before the release of the patches, or the problems were already actively exploited by hackers. In this case, all six of the bugs listed below have already been exploited by attackers.

  1. CVE-2022-41128: A remote code execution vulnerability in Windows scripting languages. Discovered by experts from the Google Threat Analysis Group. To exploit the bug, a user with a vulnerable version of Windows must gain access to a malicious server or attacker’s website.
  2. CVE-2022-41091: Windows Mark of the Web bypass vulnerability discovered by cybersecurity expert Will Dormann. So, a special malicious file can bypass Mark of the Web (MoTW) protection, which, for example, will stop the Protected View mode in Microsoft Office.
  3. CVE-2022-41073: A privilege escalation issue in Windows Print Spooler was identified by Microsoft Threat Intelligence Center (MSTIC) analysts. An attacker who successfully exploited this vulnerability is reported to be able to gain SYSTEM privileges.
  4. CVE-2022-41125: Privilege escalation in Windows CNG Key Isolation Service, also discovered by MSTIC and Microsoft Security Response Center (MSRC). As in the previous case, an attacker who successfully exploited the vulnerability could gain SYSTEM privileges.

Two other fixed zero-day issues (CVE-2022-41040 and CVE-2022-41082) are better known collectively as ProxyNotShell.

Let me remind you that these bugs, discovered by analysts from the Vietnamese company GTSC, became known back in September of this year. It took Microsoft almost two months to create patches, and before the release of fixes, the company gave only detailed recommendations on mitigating the ProxyNotShell problem.

Also this week, other companies released updates for their products. So, patches and fixes were presented:

  1. Apple: released Xcode 14.1 with numerous security updates;
  2. Cisco: has released security updates for a number of its products;
  3. Citrix: published patches for critical authentication bypass vulnerability in Citrix ADA and Gateway;
  4. Google: introduced the November update for Android;
  5. OpenSSL: released patches for issues CVE-2022-3602 and CVE-2022-3786;
  6. SAP: introduced November 2022 updates.
Sending
User Review
0 (0 votes)
Comments Rating 0 (0 reviews)

About the author

Emma Davis

I'm writer and content manager (a short time ago completed a bachelor degree in Marketing from the Gustavus Adolphus College). For now, I have a deep drive to study cyber security.

Leave a Reply

Sending

This site uses Akismet to reduce spam. Learn how your comment data is processed.