Tripwire’s March 2022 Patch Priority Index (PPI) incorporates critical vulnerabilities against Microsoft, Google Chrome, and the Spring Framework.
First on this month’s patch priority list is a remote code execution vulnerability in the Spring Framework (CVE-2022-22965). This vulnerability has been added to the Metasploit Exploit Framework and vulnerable systems should be patched as soon as possible. See the following link for more details. https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement
Here is a patch for Chrome that addresses the Use After Free vulnerability. This vulnerability has been targeted by two threat groups, Operation AppleJeus and Operation Dream Job, which use an exploit kit to target this vulnerability. Vulnerable systems should be patched as soon as possible. More information can be found at the following link. https://blog.google/threat-analysis-group/countering-threats-north-korea/
Here are the patches for Microsoft Word and Visio. This patch addresses five vulnerabilities: tampering, security feature bypass, and remote code execution vulnerabilities.
Here is a patch for Microsoft Edge (based on Chromium) that resolves over 21 vulnerabilities such as user after free, type confusion, heap buffer overflow, tampering, and elevation of privilege vulnerabilities.
The following Edge is a patch that affects components of the Windows operating system. This patch addresses more than 25 vulnerabilities, including elevation of privilege, information disclosure, security feature bypass, remote code execution, and denial of service vulnerabilities. These vulnerabilities affect core Windows, kernel, DWM core library, Windows Defender, Fast FAT file system driver, Media Center, Windows Installer, SMBv3, Remote Desktop, and more.
Here are the Windows codec libraries (HEIF Image Extension, HEIF Video Extension, Media Foundation, Raw Image Extension, VP9 Video Extension) and a patch for Paint 3D. This patch addresses 14 vulnerabilities, including remote code execution and information disclosure.
The following patches are for .NET, Visual Studio, and Visual Studio Code that address denial of service, remote code execution, buffer overflow, and spoofing vulnerabilities.
Finally, administrators should focus on server-side patches for Hyper-V and Exchange Server. This patch addresses remote code execution, spoofing, and denial of service vulnerabilities.
circular | CVE |
Exploit Framework – Metasploit | CVE-2022-22965 |
Google Chrome | CVE-2022-0609 |
microsoft office word | CVE-2022-24511, CVE-2022-24462 |
microsoft office vizio | CVE-2022-24510, CVE-2022-24509, CVE-2022-24461 |
Microsoft Edge (Chromium-based) | CVE-2022-0789, CVE-2022-0790, CVE-2022-0791, CVE-2022-0792, CVE-2022-0793, CVE-2022-0794, CVE-2022-0795, CVE-2062 2022-0797, CVE -2022-0798, CVE-2022-0799, CVE-2022-0800, CVE-2022-0801, CVE-2022-0802, CVE-2022-0803, CVE-20422-0805, CVE-2022-0806, CVE-2022 -0807, CVE-2022-0808, CVE-2022-0809 |
Microsoft Windows | CVE-2022-23293, CVE-2022-24460, CVE-2022-21973, CVE-2022-23296, CVE-2022-23281, CVE-2022-23290, CVE-2022-244254 C2022-23294, CVE-2022-24508 , CVE-2022-23297, CVE-2022-23298, CVE-2022-23291, CVE-2222-23288, CVE-2022-23253, CVE-2022-23253, C21990, CVE-2022-24503, CVE-2022-24455 , CVE-2022-24525, CVE-2022-23284, CVE-2022-22299, CVE-2022-24502, CVE-2502 CVE-2022-23287, CVE-2022-23286, CVE-2022-24459, CVE-2022- 23278 |
Microsoft Windows Codec Library | CVE-2022-24457, CVE-2022-22006, CVE-2022-22007, CVE-2022-23301, CVE-2022-24456, CVE-2022-24453, CVE-2022-244252 2022-21977, CVE-2022-23300 , CVE-2022-23295, CVE-2022-24451, CVE-2022-24501 |
paint 3d | CVE-2022-23282 |
NET, Visual Studio, Visual Studio Code | CVE-2022-24464, CVE-2022-24512, CVE-2020-8927, CVE-2022-24526 |
Microsoft Exchange Server | CVE-2022-23277, CVE-2022-24463 |
Role: Windows Hyper-V | CVE-2022-21975 |