Reports indicated that the technical details of multiple vulnerabilities in Microsoft Windows and Server (CVE-2021-22947, CVE-2021-36976, CVE-2022-21836, CVE-2022-21839, CVE-2022-21874 and CVE-2022-21919) were publicly disclosed and at a high risk of exploitation. System administrators are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
Further to our Security Alert (A22-01-07), Microsoft has released additional information on the remote code execution vulnerability (CVE-2022-21907) affecting a number of Windows 10 and 11, as well as Server 2019 and 2022 build versions. An unauthenticated remote attacker could send a specially crafted packet to the targeted server to exploit the vulnerability. System administrators are advised to take immediate actions to patch your affected systems to mitigate the elevated risk of cyber attacks.
For detailed information on the affected Windows and Server build versions and the corresponding security patches, please refer to the following vendor’s URL:
Please note that Windows Server 2019 and Windows 10 version 1809 are not vulnerable by default unless the registry value "EnableTrailerSupport" is enabled. System administrators are advised to confirm if the registry value “EnableTrailerSupport” is present under: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\HTTP\Parameters.
Microsoft Windows 7, 8.1, RT 8.1, 10, 11
Microsoft Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016, 2019, 2022
Microsoft Windows Server, version 20H2
Microsoft Office 2013, 2013 RT, 2016, 2019, 2019 for Mac, LTSC 2021, LTSC for Mac 2021
Microsoft Office Online Server
Microsoft Office Web Apps Server 2013
Microsoft Excel 2013, 2013 RT, 2016
Microsoft Word 2016
Microsoft SharePoint Enterprise Server 2013, 2016
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2019, Subscription Edition
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, denial of service, elevation of privilege, information disclosure, security feature bypass and spoofing.
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.