- Buy Microsoft Visio Professional or Microsoft Project Professional 2024 for just $80
- Get Microsoft Office Pro and Windows 11 Pro for 87% off with this bundle
- Buy or gift a Babbel subscription for 78% off to learn a new language - new low price
- Join BJ's Wholesale Club for just $20 right now to save on holiday shopping
- This $28 'magic arm' makes taking pictures so much easier (and it's only $20 for Black Friday)
Tripwire Patch Priority Index for August 2022 | The State of Security
Tripwire’s August 2022 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft.
First on the patch priority list this month are patches for Microsoft Office, Outlook, and Excel that resolve 4 vulnerabilities, including denial of service, remote code execution, and security feature bypass.
Up next are patches that affect components of the Windows operating systems. These patches resolve over 55 vulnerabilities, including elevation of privilege, information disclosure, security feature bypass, remote code execution, and denial of service vulnerabilities. These vulnerabilities affect core Windows, Kernel, Secure Socket Tunneling Protocol, Windows Support Diagnostic Tools, Bluetooth Driver, point-to-point protocol, and others.
Next are patches for .NET Core and Visual Studio that resolve spoofing and remote code execution vulnerabilities.
Lastly, administrators should focus on server-side patches for Hyper-V, Active Directory Domain Services, IIS, System Center Operations Manager, and Exchange. These patches resolve remote code execution, elevation of privilege, Information Disclosure, Tampering, and Denial of Service vulnerabilities.
BULLETIN | CVE |
Microsoft Office Outlook | CVE-2022-35742 |
Microsoft Office | CVE-2022-34717 |
Microsoft Office Excel | CVE-2022-33648, CVE-2022-33631 |
Microsoft Windows | CVE-2022-30194, CVE-2022-34701, CVE-2022-35745, CVE-2022-35767, CVE-2022-35766, CVE-2022-35794, CVE-2022-34702, CVE-2022-34714, CVE-2022-35743, CVE-2022-34713, CVE-2022-35760, CVE-2022-35797, CVE-2022-35750, CVE-2022-35820, CVE-2022-35769, CVE-2022-35752, CVE-2022-35753, CVE-2022-34715, CVE-2022-35757, CVE-2022-35771, CVE-2022-34705, CVE-2022-34704, CVE-2022-34710, CVE-2022-34712, CVE-2022-34709, CVE-2022-35804, CVE-2022-35768, CVE-2022-35761, CVE-2022-34707, CVE-2022-34708, CVE-2022-30197, CVE-2022-35758, CVE-2022-35747, CVE-2022-35744, CVE-2022-30133, CVE-2022-33670, CVE-2022-34703, CVE-2022-35759, CVE-2022-34706, CVE-2022-35763, CVE-2022-35762, CVE-2022-35765, CVE-2022-35764, CVE-2022-35792, CVE-2022-34699, CVE-2022-35756, CVE-2022-30144, CVE-2022-35755, CVE-2022-35793, CVE-2022-35795, CVE-2022-34690, CVE-2022-34301, CVE-2022-34302, CVE-2022-34303, CVE-2022-35746, CVE-2022-35749, CVE-2022-35754 |
Visual Studio | CVE-2022-35825, CVE-2022-35826, CVE-2022-35777, CVE-2022-35827 |
.NET Core | CVE-2022-34716 |
IIS | CVE-2022-35748 |
System Center Operations Manager | CVE-2022-33640 |
Active Directory Domain Services | CVE-2022-34691 |
Windows Hyper-V | CVE-2022-35751, CVE-2022-34696 |
Microsoft Exchange Server | CVE-2022-34692, CVE-2022-21979, CVE-2022-30134, CVE-2022-24477, CVE-2022-24516, CVE-2022-21980 |