Security
Headlines
HeadlinesLatestCVEs

Source

Microsoft Security Response Center

CVE-2022-0972: Chromium: CVE-2022-0972 Use after free in Extensions

**Why is this Chrome CVE included in the Security Update Guide?** The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. **How can I see the version of the browser?** 1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window 2. Click on **Help and Feedback** 3. Click on **About Microsoft Edge**

Microsoft Security Response Center
#vulnerability#microsoft#Microsoft Edge (Chromium-based)#Security Vulnerability
CVE-2022-0971: Chromium: CVE-2022-0971 Use after free in Blink Layout

**Why is this Chrome CVE included in the Security Update Guide?** The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. **How can I see the version of the browser?** 1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window 2. Click on **Help and Feedback** 3. Click on **About Microsoft Edge**

CVE-2022-24526: Visual Studio Code Spoofing Vulnerability

**According to the CVSS Score, User Interaction is not required to potentially allow this vulnerability. What would the user do to allow exploitation?** The user would have be enticed to open a malicious file in vscode. Users should never open anything that they do not know or trust to be safe.

CVE-2022-24525: Windows Update Stack Elevation of Privilege Vulnerability

**Why is Attack Complexity marked as High for this vulnerability?** Successful exploitation of this vulnerability requires an attacker to win a race condition.

CVE-2020-8927: Brotli Library Buffer Overflow Vulnerability

**Why is this Google LLC CVE included in the Security Update Guide?** The vulnerability assigned to this CVE is in the Brotli library which is consumed by .NET and by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds of .NET and Visual Studio are no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information.

CVE-2022-24520: Azure Site Recovery Remote Code Execution Vulnerability

**What privileges does an attacker require to exploit this vulnerability?** Exploiting this vulnerability requires an attacker to compromise admin credentials to the replication appliance, configuration server, or one of the VMs associated with the configuration server.

CVE-2022-24471: Azure Site Recovery Remote Code Execution Vulnerability

**What privileges does an attacker require to exploit this vulnerability?** Exploiting this vulnerability requires an attacker to compromise admin credentials to the replication appliance, configuration server, or one of the VMs associated with the configuration server.

CVE-2022-24519: Azure Site Recovery Elevation of Privilege Vulnerability

**What privileges does an attacker require to exploit this vulnerability?** Exploiting this vulnerability requires an attacker to compromise admin credentials to one of the VMs associated with the configuration server. **What data can be exposed by this vulnerability?** This vulnerability allows disclosure of accounts and user table data, including encrypted credentials.

CVE-2022-24518: Azure Site Recovery Elevation of Privilege Vulnerability

**What privileges does an attacker require to exploit this vulnerability?** Exploiting this vulnerability requires an attacker to compromise admin credentials to one of the VMs associated with the configuration server. **What data can be exposed by this vulnerability?** This vulnerability allows disclosure of accounts and user table data, including encrypted credentials.

CVE-2022-24470: Azure Site Recovery Remote Code Execution Vulnerability

**What privileges does an attacker require to exploit this vulnerability?** Exploiting this vulnerability requires an attacker to compromise admin credentials to the replication appliance, configuration server, or one of the VMs associated with the configuration server.