Further to our High Threat Security Alert (A22-05-17), Microsoft has released the patch for the remote code execution vulnerability (CVE-2022-30190). In addition, reports indicated that multiple vulnerabilities (CVE-2022-30136, CVE-2022-30139 and CVE-2022-30163) in Microsoft Windows and Server are at a high risk of exploitation. System administrators are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks. If the security patch for CVE-2022-30190 could not be applied immediately, administrators of affected systems should ensure the temporary workaround recommended by Microsoft has been implemented.
Microsoft Windows 7, 8.1, RT 8.1, 10, 11
Microsoft Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016, 2019, 2022, 2022 Azure Edition Core Hotpatch
Microsoft Windows Server, version 20H2
Microsoft Edge (Chromium-based) prior to version 102.0.1245.41
Microsoft Office LTSC 2021
Microsoft Office Online Server
Microsoft Office Web Apps Server 2013
Microsoft Excel 2013, 2013 RT, 2016
Microsoft 365 Apps for Enterprise
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Enterprise Server 2013, 2016
Microsoft SharePoint Server 2013, 2019, Subscription Edition
Microsoft SQL Server 2014, 2016, 2017, 2019
Microsoft Visual Studio 2019, 2022
Visual Studio 2019 for Mac version 8.10, 2022 for Mac version 17.0
.NET Core 3.1
AV1 Video Extension
HEVC Video Extensions
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, denial of service, elevation of privilege, information disclosure, security feature bypass and spoofing.
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.