Security
Headlines
HeadlinesLatestCVEs

Tag

#windows

Accessible Cybersecurity Awareness Training Reduces Your Risk of Cyberattack

If you're not teaching all of your employees proper security hygiene, you are leaving the door open to risk. Close that door by providing accessible training.

DARKReading
#web#windows#git#perl
CVE-2022-23825: AMD: CVE-2022-23825 AMD CPU Branch Type Confusion

**Why is this AMD CVE included in the Security Update Guide?** The vulnerability assigned to this CVE is in certain processor models offered by AMD. The mitigation for this vulnerability requires a Windows update. This CVE is being documented in the Security Update Guide to announce that the latest builds of Windows enable the mitigation and provide protection against the vulnerability. Please see the following for more information: * AMD-SB-1037

CVE-2022-22050: Windows Fax Service Elevation of Privilege Vulnerability

**What privileges could an attacker gain?** An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.

CVE-2022-22049: Windows CSRSS Elevation of Privilege Vulnerability

**What privileges could an attacker gain?** An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.

CVE-2022-22047: Windows CSRSS Elevation of Privilege Vulnerability

**What privileges could an attacker gain?** An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.

CVE-2022-22045: Windows.Devices.Picker.dll Elevation of Privilege Vulnerability

**According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?** Successful exploitation of this vulnerability requires an attacker to win a race condition.

CVE-2022-22043: Windows Fast FAT File System Driver Elevation of Privilege Vulnerability

**Why are there two different impacts in the Security Updates table?** An attacker could potentially exploit this vulnerability to elevate privileges from a client-side application sandbox in earlier Microsoft operating systems. However, mitigation technologies in later Microsoft operating systems make this more difficult. For this reason, this vulnerability has two different impact ratings.

CVE-2022-22042: Windows Hyper-V Information Disclosure Vulnerability

**What type of information could be disclosed by this vulnerability?** An attacker can gain access to uninitialized buffer information.

CVE-2022-22041: Windows Print Spooler Elevation of Privilege Vulnerability

**Determine if the Print Spooler service is running** Run the following in Windows PowerShell: Get-Service -Name Spooler If the Print Spooler is running or if the service is not disabled, follow these steps: **Stop and disable the Print Spooler service** If stopping and disabling the Print Spooler service is appropriate for your environment, run the following in Windows PowerShell: Stop-Service -Name Spooler -Force Set-Service -Name Spooler -StartupType Disabled **Impact of workaround** Stopping and disabling the Print Spooler service disables the ability to print both locally and remotely.

CVE-2022-22039: Windows Network File System Remote Code Execution Vulnerability

**According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?** Successful exploitation of this vulnerability requires an attacker to win a race condition.