Reports indicated that a spoofing vulnerability (CVE-2022-26925) in Microsoft Windows and Server is being actively exploited in the wild and the technical details of another denial of service vulnerability (CVE-2022-22713) in Microsoft Windows and Server was publicly disclosed. In addition, multiple vulnerabilities (CVE-2022-21972, CVE-2022-22017, CVE-2022-23270, CVE-2022-26923, CVE-2022-26931 and CVE-2022-26937) are also at a high risk of exploitation. System administrators are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
Microsoft Windows 7, 8.1, RT 8.1, 10, 11
Microsoft Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016, 2019, 2022
Microsoft Windows Server, version 20H2
Microsoft Office 2019, LTSC 2021
Microsoft Office Online Server
Microsoft Office Web Apps Server 2013
Microsoft Excel 2013, 2013 RT, 2016
Microsoft Word 2013, 2013 RT, 2016
Microsoft 365 Apps for Enterprise
Microsoft Exchange Server 2013, 2016, 2019
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Enterprise Server 2016
Microsoft SharePoint Server 2019, Subscription Edition
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, denial of service, elevation of privilege, information disclosure, security feature bypass and spoofing.
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.