This month’s Patch Tuesday has seen Microsoft unveil fixes to dozens of vulnerabilities, some of which are critical, and one of which is being actively exploited in the wild.
The flaws are found in various versions of Windows, .NET and Visual Studio, Office, Exchange Server, BitLocker, Remote Desktop Client, NTFS, and the Microsoft Edge browser.
The issue being exploited in the wild is tracked as CVE-2022-26925, and is described as a Windows LSA spoofing vulnerability. According to Microsoft’s security advisory, an authenticated threat actor could abuse the flaw by calling a method on the LSARPC interface and forcing the domain controller to authenticate the attacker using NTLM. It has a severity score of 8.1
As for the critical issues, there are five remote code execution (RCE) flaws, and two elevation of privilege (EoP) vulnerabilities. Among these is CVE-2022-26923, a critical flaw that exploits how certificates are issued, by injecting data into a certificate request. That way, the threat actor can get a certificate able to authenticate a domain controller with high privileges. In other words, the threat actor can gain admin privileges on any domain running Active Directory Certificate Services. This one has a severity score of 8.8.
Denial of service, spoofing, and more
The cumulative update also fixes 67 exploits, most of which are RCE and EoP flaws, denial of service flaws, spoofing issues, and defense bypasses.
Given that the update addresses a couple of high-severity flaws, Windows OS admins are urged to patch their endpoints immediately.
This is probably going to be one of the last Patch Tuesday cumulative updates, as Microsoft is planning on killing the practice altogether.
Last month, the company announced that it will strive to update all Windows corporate endpoints automatically, with the new scheme kicking off in July this year.
The updates will be rolled out in three phases, to minimize the chances of bricking all of the devices found in a corporate network at once.