【漏洞详情】
微软于本周发布了2022年10月安全补丁,微软共发布了85个漏洞的补丁程序,其中Microsoft Office等产品中的15个漏洞被微软官方标记为Critical。
Critical漏洞清单如下:
序号 | CVE 编号 | CVE 标题 | 严重程度 |
1 | CVE-2022-37976 | Active Directory Certificate Services Elevation of Privilege Vulnerability | Critical |
2 | CVE-2022-37968 | Azure Arc-enabled Kubernetes cluster Connect Elevation of Privilege Vulnerability | Critical |
3 | CVE-2022-38049 | Microsoft Office Graphics Remote Code Execution Vulnerability | Critical |
4 | CVE-2022-38048 | Microsoft Office Remote Code Execution Vulnerability | Critical |
5 | CVE-2022-41038 | Microsoft SharePoint Server Remote Code Execution Vulnerability | Critical |
6 | CVE-2022-34689 | Windows CryptoAPI Spoofing Vulnerability | Critical |
7 | CVE-2022-41031 | Microsoft Word Remote Code Execution Vulnerability | Critical |
8 | CVE-2022-37979 | Windows Hyper-V Elevation of Privilege Vulnerability | Critical |
9 | CVE-2022-30198 | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | Critical |
10 | CVE-2022-24504 | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | Critical |
11 | CVE-2022-33634 | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | Critical |
12 | CVE-2022-22035 | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | Critical |
13 | CVE-2022-38047 | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | Critical |
14 | CVE-2022-38000 | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | Critical |
15 | CVE-2022-41081 | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | Critical |
【风险评级】
高危
【影响范围】
l Windows系统及相关产品
【修复建议】
建议受影响的用户结合实际业务评估漏洞风险影响,可通过如下方案避免安全风险:
修复方法:打开 Windows Update 更新功能,点击“检查更新”按钮,依据业务需求下载安装相关安全补丁,安装完毕后重启系统,并检查系统运行情况。
【参考链接】
https://msrc.microsoft.com/update-guide/releaseNote/2022-Oct
特别提醒:修复漏洞前请进行充分测试,并务必做好数据备份和快照,防止出现意外。
平安云
2022年10月12日