15.6 C
London
Tuesday, July 2, 2024

Tripwire Patch Priority Index for March 2022

Tripwire’s March 2022 Patch Priority Index (PPI) incorporates critical vulnerabilities against Microsoft, Google Chrome, and the Spring Framework.

First on this month’s patch priority list is a remote code execution vulnerability in the Spring Framework (CVE-2022-22965). This vulnerability has been added to the Metasploit Exploit Framework and vulnerable systems should be patched as soon as possible. See the following link for more details. https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement

Here is a patch for Chrome that addresses the Use After Free vulnerability. This vulnerability has been targeted by two threat groups, Operation AppleJeus and Operation Dream Job, which use an exploit kit to target this vulnerability. Vulnerable systems should be patched as soon as possible. More information can be found at the following link. https://blog.google/threat-analysis-group/countering-threats-north-korea/

Here are the patches for Microsoft Word and Visio. This patch addresses five vulnerabilities: tampering, security feature bypass, and remote code execution vulnerabilities.

Here is a patch for Microsoft Edge (based on Chromium) that resolves over 21 vulnerabilities such as user after free, type confusion, heap buffer overflow, tampering, and elevation of privilege vulnerabilities.

The following Edge is a patch that affects components of the Windows operating system. This patch addresses more than 25 vulnerabilities, including elevation of privilege, information disclosure, security feature bypass, remote code execution, and denial of service vulnerabilities. These vulnerabilities affect core Windows, kernel, DWM core library, Windows Defender, Fast FAT file system driver, Media Center, Windows Installer, SMBv3, Remote Desktop, and more.

Here are the Windows codec libraries (HEIF Image Extension, HEIF Video Extension, Media Foundation, Raw Image Extension, VP9 Video Extension) and a patch for Paint 3D. This patch addresses 14 vulnerabilities, including remote code execution and information disclosure.

The following patches are for .NET, Visual Studio, and Visual Studio Code that address denial of service, remote code execution, buffer overflow, and spoofing vulnerabilities.

Finally, administrators should focus on server-side patches for Hyper-V and Exchange Server. This patch addresses remote code execution, spoofing, and denial of service vulnerabilities.

circular CVE
Exploit Framework – Metasploit CVE-2022-22965
Google Chrome CVE-2022-0609
microsoft office word CVE-2022-24511, CVE-2022-24462
microsoft office vizio CVE-2022-24510, CVE-2022-24509, CVE-2022-24461
Microsoft Edge (Chromium-based) CVE-2022-0789, CVE-2022-0790, CVE-2022-0791, CVE-2022-0792, CVE-2022-0793, CVE-2022-0794, CVE-2022-0795, CVE-2062 2022-0797, CVE -2022-0798, CVE-2022-0799, CVE-2022-0800, CVE-2022-0801, CVE-2022-0802, CVE-2022-0803, CVE-20422-0805, CVE-2022-0806, CVE-2022 -0807, CVE-2022-0808, CVE-2022-0809
Microsoft Windows CVE-2022-23293, CVE-2022-24460, CVE-2022-21973, CVE-2022-23296, CVE-2022-23281, CVE-2022-23290, CVE-2022-244254 C2022-23294, CVE-2022-24508 , CVE-2022-23297, CVE-2022-23298, CVE-2022-23291, CVE-2222-23288, CVE-2022-23253, CVE-2022-23253, C21990, CVE-2022-24503, CVE-2022-24455 , CVE-2022-24525, CVE-2022-23284, CVE-2022-22299, CVE-2022-24502, CVE-2502 CVE-2022-23287, CVE-2022-23286, CVE-2022-24459, CVE-2022- 23278
Microsoft Windows Codec Library CVE-2022-24457, CVE-2022-22006, CVE-2022-22007, CVE-2022-23301, CVE-2022-24456, CVE-2022-24453, CVE-2022-244252 2022-21977, CVE-2022-23300 , CVE-2022-23295, CVE-2022-24451, CVE-2022-24501
paint 3d CVE-2022-23282
NET, Visual Studio, Visual Studio Code CVE-2022-24464, CVE-2022-24512, CVE-2020-8927, CVE-2022-24526
Microsoft Exchange Server CVE-2022-23277, CVE-2022-24463
Role: Windows Hyper-V CVE-2022-21975

Source

Latest news
Related news
- Advertisement -spot_img