- This 5-in-1 charging station replaced several desk accessories for me (and it's 33% off for Black Friday))
- The best Galaxy Z Flip 6 cases of 2024
- This retractable USB-C charger is my new favorite travel accessory (and it's on sale for Black Friday)
- Skip the iPad: This tablet is redefining what a kids tablet can do, and it's 42% off for Black Friday
- Why the iPad Mini 7 is the ultraportable tablet to beat this holiday travel season - and it's $50 off
VERT Threat Alert: January 2022 Patch Tuesday Analysis | The State of Security
Today’s VERT Alert addresses Microsoft’s January 2022 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-981 on Wednesday, January 12th.
In-The-Wild & Disclosed CVEs
This vulnerability was a bypass to CVE-2021-34484, released by the same researcher, Abdelhamid Naceri. The researcher first tweeted about the bypass on October 22 and shared a blog post with details and links to a proof of concept. According to Naceri, the initial fix only removed CDirectoryRemove based on the original proof of concept that was provided, it did not resolve the underlying issue, which has been fixed with today’s update.
Microsoft has rated this as Exploitation More Likely on the latest software release on the Exploitability Index.
This vulnerability describes an issue in the libarchive library which is used by Windows. The vulnerability was found by OSS-Fuzz in March 2021 and disclosed in June 2021. The libarchive library was updated in August 2021 and Microsoft is now issuing an update in January 2022. Details around the OSS-Fuzz reported issue can be found here.
Microsoft has rated this as Exploitation Less Likely on the latest software release on the Exploitability Index.
This vulnerability was first disclosed in a blog post from Eclypsium on September 23, 2021. Expired and revoked certificates could be used to bypass binary verification in the Windows Platform Binary Table (WPBT). According to Microsoft, “The primary purpose of WPBT is to allow critical software to persist even when the operating system has changed or been reinstalled in a “clean” configuration.” This patch and advisory do two things. First, the patch adds compromised certificates to the Windows kernel driver block list (driver.stl) to block the compromised signing certificates. Second, the advisory also advises that people setup Windows Defender Application Control (WDAC) to restrict which binaries can be executed on a system.
Microsoft has rated this as Exploitation Less Likely on the latest software release on the Exploitability Index.
This vulnerability describes a local denial of service vulnerability with Windows Event Tracing Discretionary Access Control Lists (DACLs). DACLs are Access Control Lists that identify who can access a Windows object. If the object does not have a DACL, the system will provide everyone access to it.
Microsoft has rated this as Exploitation Less Likely on the latest software release on the Exploitability Index.
A code execution vulnerability exists within the Windows Security Center API. The local vulnerability requires user interaction but could allow for a full compromise of confidentiality, integrity, and availability.
Microsoft has rated this as Exploitation Less Likely on the latest software release on the Exploitability Index.
CVE-2021-22947 is a vulnerability in curl that was introduced in 2009 and fixed in September 2021. The fix was released in curl 7.79.0 on September 15, 2021 and a security advisory was published. Windows uses the curl library and Microsoft has patched it as part of the January 2022 patch drop. The vulnerability itself is a man-in-the-middle, where traffic not protected by TLS can be injected into communication between the client and server that will be processed by curl as if it came from a TLS-protected connection.
Microsoft has rated this as Exploitation Less Likely on the latest software release on the Exploitability Index.
CVE Breakdown by Tag
While historical Microsoft Security Bulletin groupings are gone, Microsoft vulnerabilities are tagged with an identifier. This list provides a breakdown of the CVEs on a per tag basis. Vulnerabilities are also colour coded to aid with identifying key issues.
- Traditional Software
- Mobile Software
- Cloud or Cloud Adjacent
- Vulnerabilities that are being exploited or that have been disclosed will be bold
Tag | CVE Count | CVEs |
Windows IKE Extension | 6 | CVE-2022-21843, CVE-2022-21883, CVE-2022-21848, CVE-2022-21849, CVE-2022-21889, CVE-2022-21890 |
Windows HTTP Protocol Stack | 1 | CVE-2022-21907 |
Windows Storage | 1 | CVE-2022-21875 |
Open Source Software | 1 | CVE-2021-22947 |
Tablet Windows User Interface | 1 | CVE-2022-21870 |
Windows Clipboard User Service | 1 | CVE-2022-21869 |
Windows Workstation Service Remote Protocol | 1 | CVE-2022-21924 |
Windows Application Model | 1 | CVE-2022-21862 |
Windows Cryptographic Services | 1 | CVE-2022-21835 |
Windows Installer | 1 | CVE-2022-21908 |
Microsoft Dynamics | 2 | CVE-2022-21932, CVE-2022-21891 |
Windows Storage Spaces Controller | 1 | CVE-2022-21877 |
Windows Secure Boot | 1 | CVE-2022-21894 |
Windows DirectX | 3 | CVE-2022-21918, CVE-2022-21912, CVE-2022-21898 |
Windows Kerberos | 1 | CVE-2022-21920 |
Windows Local Security Authority Subsystem Service | 1 | CVE-2022-21884 |
Microsoft Office SharePoint | 1 | CVE-2022-21837 |
Microsoft Windows Codecs Library | 1 | CVE-2022-21917 |
Windows User-mode Driver Framework | 1 | CVE-2022-21834 |
Windows Task Flow Data Engine | 1 | CVE-2022-21861 |
Microsoft Office Excel | 1 | CVE-2022-21841 |
Microsoft Graphics Component | 4 | CVE-2022-21915, CVE-2022-21880, CVE-2022-21903, CVE-2022-21904 |
Windows Event Tracing | 2 | CVE-2022-21839, CVE-2022-21872 |
Windows Cleanup Manager | 1 | CVE-2022-21838 |
Windows Kernel | 2 | CVE-2022-21879, CVE-2022-21881 |
Windows DWM Core Library | 3 | CVE-2022-21852, CVE-2022-21902, CVE-2022-21896 |
Windows User Profile Service | 2 | CVE-2022-21919, CVE-2022-21895 |
Microsoft Office Word | 1 | CVE-2022-21842 |
Windows Remote Access Connection Manager | 2 | CVE-2022-21885, CVE-2022-21914 |
Windows Push Notifications | 1 | CVE-2022-21867 |
Microsoft Office | 1 | CVE-2022-21840 |
Windows Remote Procedure Call Runtime | 1 | CVE-2022-21922 |
Windows Defender | 2 | CVE-2022-21906, CVE-2022-21921 |
Windows Remote Desktop | 1 | CVE-2022-21964 |
Windows Bind Filter Driver | 1 | CVE-2022-21858 |
Windows Active Directory | 1 | CVE-2022-21857 |
Windows Certificates | 1 | CVE-2022-21836 |
Microsoft Exchange Server | 3 | CVE-2022-21846, CVE-2022-21855, CVE-2022-21969 |
Windows RDP | 3 | CVE-2022-21893, CVE-2022-21850, CVE-2022-21851 |
Windows Geolocation Service | 1 | CVE-2022-21878 |
.NET Framework | 1 | CVE-2022-21911 |
Windows StateRepository API | 1 | CVE-2022-21863 |
Windows Common Log File System Driver | 2 | CVE-2022-21916, CVE-2022-21897 |
Windows BackupKey Remote Protocol | 1 | CVE-2022-21925 |
Windows System Launcher | 1 | CVE-2022-21866 |
Windows Libarchive | 1 | CVE-2021-36976 |
Windows Win32K | 3 | CVE-2022-21876, CVE-2022-21882, CVE-2022-21887 |
Windows Resilient File System (ReFS) | 8 | CVE-2022-21892, CVE-2022-21958, CVE-2022-21959, CVE-2022-21960, CVE-2022-21961, CVE-2022-21962, CVE-2022-21963, CVE-2022-21928 |
Windows Connected Devices Platform Service | 1 | CVE-2022-21865 |
Windows Modern Execution Server | 1 | CVE-2022-21888 |
Windows Local Security Authority | 1 | CVE-2022-21913 |
Role: Windows Hyper-V | 4 | CVE-2022-21900, CVE-2022-21901, CVE-2022-21905, CVE-2022-21847 |
Windows Diagnostic Hub | 1 | CVE-2022-21871 |
Windows Devices Human Interface | 1 | CVE-2022-21868 |
Microsoft Edge (Chromium-based) | 29 | CVE-2022-21929, CVE-2022-21930, CVE-2022-21931, CVE-2022-21954, CVE-2022-21970, CVE-2022-0096, CVE-2022-0097, CVE-2022-0098, CVE-2022-0099, CVE-2022-0100, CVE-2022-0101, CVE-2022-0102, CVE-2022-0103, CVE-2022-0104, CVE-2022-0105, CVE-2022-0106, CVE-2022-0107, CVE-2022-0108, CVE-2022-0109, CVE-2022-0110, CVE-2022-0111, CVE-2022-0112, CVE-2022-0113, CVE-2022-0114, CVE-2022-0115, CVE-2022-0116, CVE-2022-0117, CVE-2022-0118, CVE-2022-0120 |
Windows UI Immersive Server | 1 | CVE-2022-21864 |
Windows AppContracts API Server | 1 | CVE-2022-21860 |
Windows UEFI | 1 | CVE-2022-21899 |
Windows Tile Data Repository | 1 | CVE-2022-21873 |
Windows Cluster Port Driver | 1 | CVE-2022-21910 |
Windows Virtual Machine IDE Drive | 1 | CVE-2022-21833 |
Windows Account Control | 1 | CVE-2022-21859 |
Windows Security Center | 1 | CVE-2022-21874 |
Other Information
There were no new advisories included with the January Security Guidance.