


An attacker would have no way to force users to visit this specially crafted server share or website, but would have to convince them to visit the server share or website, typically by way of an enticement in an email or chat message. An attacker would have to host a specially crafted server share or website. This vulnerability requires that a user with an affected version of Windows access a malicious server. NOTE: This vulnerability is only exploitable for systems that have the NFS role enabled.Įxploitability Assessment: Exploitation More Likely.ĬVE-2022-24500 | Windows SMB Remote Code Execution (RCE) Vulnerability This vulnerability has a CVSSv3.1 score of 9.8/10.Īn attacker could send a specially crafted NFS protocol network message to a vulnerable Windows machine, which could enable remote code execution. From there the attacker could escalate and execute commands as db_owner within their Dynamics 356 database.Įxploitability Assessment: Exploitation Less Likely.ĬVE-2022-24491 and CVE-2022-24497 | Windows Network File System Remote Code Execution (RCE) Vulnerability This vulnerability has a CVSSv3.1 score of 8.8/10.Īn authenticated user could run a specially crafted trusted solution package to execute arbitrary SQL commands. This month’s advisory covers multiple Microsoft products, including, but not limited to, Azure, Browser (Edge – Chromium), Developer Tools, Extended Security Update (ESU), Microsoft Dynamics, Microsoft Office, SQL Server, System Center, and Windows.ĬVE-2022-23259 | Microsoft Dynamics 365 (on-premises) Remote Code Execution (RCE) Vulnerability Notable Microsoft Vulnerabilities Patched

Microsoft has fixed several problems in their software, including Denial of Service, Elevation of Privilege, Information Disclosure, Remote Code Execution, and Spoofing vulnerabilities. This month’s Patch Tuesday release includes fixes for two (2) zero-day vulnerabilities as well, one (1) known to be actively exploited ( CVE-2022-24521) and the other to be publicly exposed ( CVE-2022-26904). Microsoft has fixed 145 vulnerabilities, including 17 Microsoft Edge vulnerabilities, in the April 2022 update, with ten (10) classified as Critical as they allow Remote Code Execution (RCE).
