{"id":36206,"date":"2022-08-10T12:55:13","date_gmt":"2022-08-10T11:55:13","guid":{"rendered":"https:\/\/www.n-able.com\/?p=36206"},"modified":"2023-03-21T14:08:08","modified_gmt":"2023-03-21T14:08:08","slug":"august-2022-patch-tuesday-msdt-update-dogwalk-exchange","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/august-2022-patch-tuesday-msdt-update-dogwalk-exchange","title":{"rendered":"August 2022 Patch Tuesday: MSDT update fixes zero-day DogWalk and Exchange\u00a0"},"content":{"rendered":"<p class=\"p1\"><span class=\"s1\">August brings fixes for a longstanding Microsoft Support Diagnostics Tool bug, a long list of Critical and <i>Exploitation More Likely<\/i> vulnerabilities, along with an Exchange Server zero-day. This is a lot for defenders to digest, but the good news is timely application of security updates and following the <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/exchange-team-blog\/released-august-2022-exchange-server-security-updates\/ba-p\/3593862\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">instructions<\/span><\/a> provided by Microsoft should make short work of this month\u2019s two zero-days. This hopefully brings an end to the DogWalk vulnerability and similar issues being a challenge to mitigate now that Microsoft has provided a fix rather than workaround guidance.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<h2 class=\"p5\"><span class=\"s1\">Microsoft Vulnerabilities Addressed<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">This Patch Tuesday brings an increase in the total number of fixes from the previous month and is one of the highest counts for the year\u2014121 different vulnerabilities have been addressed with two more receiving updates for previous fixes. <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-26832\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2022-26832<\/span><\/a> and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-30130\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2022-30130<\/span><\/a> have both received version updates, with Microsoft also recommending the application of <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/august-9-2022-security-and-quality-rollup-for-net-framework-3-5-for-windows-8-1-rt-8-1-and-windows-server-2012-r2-kb5016268-a0a81cf6-4887-4151-8f26-412da5274b00\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">KB5016268<\/span><\/a>.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">These vulnerabilities are rated as Low and Important, so they aren\u2019t going to be on many priority lists, but they do highlight that dealing with vulnerabilities is a continuous effort. Fixes applied to deal with a vulnerability may need tweaking as the vulnerability becomes better understood. It\u2019s not impossible to see the same vulnerability receive multiple fixes over an extended period<\/span><span class=\"s3\">\u2014<\/span><span class=\"s1\">another reason why having established processes and <a href=\"https:\/\/www.n-able.com\/features\/windows-patch-management?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">automated patching<\/span><\/a> in place is so important.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">There are also two MSDT-related fixes in this Patch Tuesday release: <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-35743\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2022-35743<\/span><\/a> and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-34713\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2022-34713<\/span><\/a>. When it was originally discovered two years ago, the MSDT vulnerability now referred to as <a href=\"https:\/\/irsl.medium.com\/the-trouble-with-microsofts-troubleshooters-6e32fc80b8bd\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">DogWalk<\/span><\/a> was considered a won\u2019t fix item by Microsoft. However, the Follina vulnerability from last month put the spotlight back on these previous MSDT vulnerabilities and this has resulted in fixes being issued this month. Combine the fact that CVE-2022-34713 is marked as <i>Exploitation Detected<\/i>, CVE-2022-35743 is <i>Exploitation More Likely, <\/i>and the large install base, basically every modern Windows OS should be putting these toward the top of priority lists.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">The Exchange zero-day, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-30134\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2022-30134<\/span><\/a>, is marked as <i>Exploitation Unlikely <\/i>with no publicly available proof of concept attack and designated as <i>Important <\/i>severity. What the vulnerability allows though\u2014for an attacker to read emails\u2014should raise it toward the top of any Exchange admins to-do list regardless of the likelihood of exploitation.<\/span><\/p>\n<h2 class=\"p1\">Microsoft Patch Tuesday <span class=\"s1\">Vulnerability Prioritization<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">CVE-2022-30134, CVE-2022-35743, and CVE-2022-34713 are some of the Windows vulnerabilities to prioritize this month. As always, it is important to not just prioritize vulnerabilities based on their severity but also their exploitation likelihood and the impact exploitation of the vulnerability will have on an environment. Vulnerabilities marked as <i>Exploitation More Likely <\/i>and <i>Exploitation Detected <\/i>are as important, and some may say even more important, to address quickly due to their increased likelihood to cause actual impacts to an environment. These CVEs from Microsoft should be top of the list as they are all marked as Exploitation More Likely, Exploitation Detected, or Critical.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<table class=\"t1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td class=\"td1\" valign=\"top\" width=\"15%\">\n<p class=\"p6\"><span class=\"s1\">CVE<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p6\"><span class=\"s1\">Description<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td3\" valign=\"top\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Exploitability<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td4\" valign=\"top\" width=\"12%\">\n<p class=\"p6\"><span class=\"s1\">Severity<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p7\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-33646\" target=\"_blank\" rel=\"noopener\">CVE-2022-33646<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p6\"><span class=\"s1\">Azure Batch Node Agent Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p6\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p7\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-33670\" target=\"_blank\" rel=\"noopener\">CVE-2022-33670<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p6\"><span class=\"s1\">Windows Partition Management Driver Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p6\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p7\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-34699\" target=\"_blank\" rel=\"noopener\">CVE-2022-34699<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p6\"><span class=\"s1\">Windows Win32k Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p7\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-34703\" target=\"_blank\" rel=\"noopener\">CVE-2022-34703<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p6\"><span class=\"s1\">Windows Partition Management Driver Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p6\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p7\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-34713\" target=\"_blank\" rel=\"noopener\">CVE-2022-34713<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p8\"><span class=\"s1\">Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p6\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p7\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-35743\" target=\"_blank\" rel=\"noopener\">CVE-2022-35743<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p6\"><span class=\"s1\">Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p6\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p7\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-35748\" target=\"_blank\" rel=\"noopener\">CVE-2022-35748<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p6\"><span class=\"s1\">HTTP.sys Denial of Service Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p6\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p7\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-35750\" target=\"_blank\" rel=\"noopener\">CVE-2022-35750<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p6\"><span class=\"s1\">Win32k Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p6\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p9\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-35751\" target=\"_blank\" rel=\"noopener\">CVE-2022-35751<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p6\"><span class=\"s1\">Windows Hyper-V Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p6\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p9\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-35755\" target=\"_blank\" rel=\"noopener\">CVE-2022-35755<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p6\"><span class=\"s1\">Windows Print Spooler Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p6\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p9\"><span class=\"s4\">CVE-2022-35756<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p6\"><span class=\"s1\">Windows Kerberos Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p6\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p9\"><span class=\"s4\">CVE-2022-35761<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p6\"><span class=\"s1\">Windows Kernel Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p6\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\">\n<p class=\"p9\"><span class=\"s4\">CVE-2022-34303<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p6\"><span class=\"s1\">CERT\/CC: CVE-20220-34303 Crypto Pro Boot Loader Bypass<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p6\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p9\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-34301\" target=\"_blank\" rel=\"noopener\">CVE-2022-34301<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p6\"><span class=\"s1\">CERT\/CC: CVE-2022-34301 Eurosoft Boot Loader Bypass<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p6\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p9\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-35804\" target=\"_blank\" rel=\"noopener\">CVE-2022-35804<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p6\"><span class=\"s1\">SMB Client and Server Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p6\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p9\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21980\" target=\"_blank\" rel=\"noopener\">CVE-2022-21980<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p6\"><span class=\"s1\">Microsoft Exchange Server Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p6\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p9\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-24516\" target=\"_blank\" rel=\"noopener\">CVE-2022-24516<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p6\"><span class=\"s1\">Microsoft Exchange Server Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p6\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p9\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-24477\" target=\"_blank\" rel=\"noopener\">CVE-2022-24477<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p6\"><span class=\"s1\">Microsoft Exchange Server Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p6\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p9\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-34302\" target=\"_blank\" rel=\"noopener\">CVE-2022-34302<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p6\"><span class=\"s1\">CERT\/CC: CVE-2022-34302 New Horizon Data Systems Inc Boot Loader Bypass<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p6\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p9\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-35793\" target=\"_blank\" rel=\"noopener\">CVE-2022-35793<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p6\"><span class=\"s1\">Windows Print Spooler Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p6\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p9\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-35820\" target=\"_blank\" rel=\"noopener\">CVE-2022-35820<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p6\"><span class=\"s1\">Windows Bluetooth Driver Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p6\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p9\"><span class=\"s4\">CVE-2022-34691<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p10\"><span class=\"s5\">Active Directory Domain Services Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Exploitation Less Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p6\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p11\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-24477\" target=\"_blank\" rel=\"noopener\">CVE-2022-24477<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p6\"><span class=\"s1\">Microsoft Exchange Server Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p6\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p11\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-35752\" target=\"_blank\" rel=\"noopener\">CVE-2022-35752<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p6\"><span class=\"s1\">Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Exploitation Less Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p6\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p11\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-35753\" target=\"_blank\" rel=\"noopener\">CVE-2022-35753<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p6\"><span class=\"s1\">Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Exploitation Less Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p6\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p11\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-34696\" target=\"_blank\" rel=\"noopener\">CVE-2022-34696<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p6\"><span class=\"s1\">Windows Hyper-V Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Exploitation Less Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p6\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p11\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-30133\" target=\"_blank\" rel=\"noopener\">CVE-2022-30133<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p6\"><span class=\"s1\">Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Exploitation Less Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p6\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p11\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-35744\" target=\"_blank\" rel=\"noopener\">CVE-2022-35744<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p6\"><span class=\"s1\">Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Exploitation Less Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p6\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p11\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-35745\" target=\"_blank\" rel=\"noopener\">CVE-2022-35745<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p6\"><span class=\"s1\">Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Exploitation Less Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p6\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p9\"><span class=\"s4\">CVE-2022-35766<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p6\"><span class=\"s1\">Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Exploitation Less Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p6\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p11\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-35794\" target=\"_blank\" rel=\"noopener\">CVE-2022-35794<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p6\"><span class=\"s1\">Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Exploitation Less Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p6\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p11\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-34714\" target=\"_blank\" rel=\"noopener\">CVE-2022-34714<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p6\"><span class=\"s1\">Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Exploitation Less Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p6\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p11\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-34702\" target=\"_blank\" rel=\"noopener\">CVE-2022-34702<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\">\n<p class=\"p6\"><span class=\"s1\">Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Exploitation Less Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p6\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p11\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-35767\" target=\"_blank\" rel=\"noopener\">CVE-2022-35767<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p6\"><span class=\"s1\">Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\">Exploitation Less Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p6\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 class=\"p2\"><span class=\"s1\">Cumulative Updates<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">The cumulative updates <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/august-9-2022-kb5016616-os-builds-19042-1889-19043-1889-and-19044-1889-67412989-3b5f-4443-89b4-f743382ab970\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">KB5016616<\/span><\/a>, <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/august-9-2022-kb5016623-os-build-17763-3287-c7a0bb3a-4083-4cd0-b9ad-119d9267628b\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">KB5016623<\/span><\/a>, <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/august-9-2022-kb5016622-os-build-14393-5291-19fa46af-be4b-4717-b711-8499777e13a8\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">KB5016622<\/span><\/a><\/span><span class=\"s6\">,<\/span><span class=\"s1\"> and <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/august-9-2022-kb5016639-os-build-10240-19387-e91da780-e973-4388-97af-04f456f20a68\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">KB5016639<\/span><\/a> were released for various builds of Windows 10 and <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/august-9-2022-kb5016629-os-build-22000-856-a9f7a399-be3b-4dcf-ba1b-df9f178e29fc\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">KB5016629<\/span><\/a> for Windows 11 as well this month. Containing the usual rollup of fixes from previous months and new features there is not much to highlight with CUs this month. \u00a0<\/span><\/p>\n<h2 class=\"p5\"><span class=\"s1\">Known Complications of Note<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">There are no major complications being reported as of this blog being published. It is worth highlighting though that the Exchange vulnerabilities being addressed this month has additional guidance by Microsoft detailing the need to manually enable <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/exchange-team-blog\/released-august-2022-exchange-server-security-updates\/ba-p\/3593862\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Windows Extended Protection<\/span><\/a> to block exploitation.<\/span><\/p>\n<h2 class=\"p5\"><span class=\"s1\">Other Vendors<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">VMware released fixes for <a href=\"https:\/\/kb.vmware.com\/s\/article\/89096\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2022-31656<\/span><\/a> and <a href=\"https:\/\/www.vmware.com\/security\/advisories\/VMSA-2022-0021.html\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2022-31659<\/span><\/a> in recent weeks. With exploit code already available for one and PoCs likely coming soon, any VMware admins should be ensuring updates are applied and that plans to replace EOS versions of VMware is an action item.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<h2 class=\"p5\"><span class=\"s1\">Summary<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">As always make sure you have established patching processes for evaluation, testing, and pushing into production. If you have traditionally only dealt with patches by applying them based on their severity consider including prioritization of patches for Zero-Days, Exploitation Detected, and Exploitation More Likely vulnerabilities in your <a href=\"https:\/\/www.n-able.com\/features\/windows-patch-management\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Patch Management<\/span><\/a> routines.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">\u00a0<\/span><\/p>\n<p class=\"p12\"><span class=\"s1\"><b>Looking for more information on the Patch Management section? Check out\u00a0<\/b><a href=\"https:\/\/www.n-able.com\/blog\/patch-management\" target=\"_blank\" rel=\"noopener\"><span class=\"s7\"><b>this section<\/b><\/span><\/a><b>\u00a0on our blog.<\/b><\/span><\/p>\n<p class=\"p12\"><span class=\"s1\"><i>Lewis Pope is the Head Security Nerd at N&#8209;able. You can follow him on Twitter:\u00a0<\/i><a href=\"https:\/\/twitter.com\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s7\"><i>@cybersec_nerd<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p13\"><span class=\"s8\"><i>LinkedIn:\u00a0<\/i><a href=\"https:\/\/www.linkedin.com\/in\/thesecuritypope\" target=\"_blank\" rel=\"noopener\"><span class=\"s9\"><i>thesecuritypope<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p13\"><span class=\"s8\"><i>Twitch:\u00a0<\/i><a href=\"https:\/\/www.twitch.tv\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s9\"><i>cybersec_nerd<\/i><\/span><\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This month\u2019s patch Tuesday puts a lot on the plate of defenders, with 121 different vulnerabilities have been addressed with two more receiving updates for previous fixes. Lewis Pope gives&#8230;<\/p>\n","protected":false},"author":62,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-36206","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>August 2022 Patch Tuesday: MSDT update fixes zero-day DogWalk and Exchange\u00a0 - N-able<\/title>\n<meta name=\"description\" content=\"This month\u2019s Patch Tuesday puts a lot on the plate of defenders, with 121 different vulnerabilities addressed and more. We take a deep dive.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/august-2022-patch-tuesday-msdt-update-dogwalk-exchange\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"August 2022 Patch Tuesday: MSDT update fixes zero-day DogWalk and Exchange\u00a0 - N-able\" \/>\n<meta property=\"og:description\" content=\"This month\u2019s Patch Tuesday puts a lot on the plate of defenders, with 121 different vulnerabilities addressed and more. We take a deep dive.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/august-2022-patch-tuesday-msdt-update-dogwalk-exchange\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-10T11:55:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-21T14:08:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-03.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1309\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Lewis Pope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-03.png\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lewis Pope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"6\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/august-2022-patch-tuesday-msdt-update-dogwalk-exchange#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/august-2022-patch-tuesday-msdt-update-dogwalk-exchange\"},\"author\":{\"name\":\"Lewis Pope\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\"},\"headline\":\"August 2022 Patch Tuesday: MSDT update fixes zero-day DogWalk and Exchange\u00a0\",\"datePublished\":\"2022-08-10T12:55:13+01:00\",\"dateModified\":\"2023-03-21T14:08:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/august-2022-patch-tuesday-msdt-update-dogwalk-exchange\"},\"wordCount\":1219,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"Head Nerds\",\"Patch Management\",\"Security\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/august-2022-patch-tuesday-msdt-update-dogwalk-exchange\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/august-2022-patch-tuesday-msdt-update-dogwalk-exchange\",\"name\":\"August 2022 Patch Tuesday: MSDT update fixes zero-day DogWalk and Exchange\u00a0 - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2022-08-10T12:55:13+01:00\",\"dateModified\":\"2023-03-21T14:08:08+00:00\",\"description\":\"This month\u2019s Patch Tuesday puts a lot on the plate of defenders, with 121 different vulnerabilities addressed and more. We take a deep dive.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/august-2022-patch-tuesday-msdt-update-dogwalk-exchange#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/august-2022-patch-tuesday-msdt-update-dogwalk-exchange\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/august-2022-patch-tuesday-msdt-update-dogwalk-exchange#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Head Nerds\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/head-nerds-de\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"August 2022 Patch Tuesday: MSDT update fixes zero-day DogWalk and Exchange\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\",\"name\":\"Lewis Pope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"caption\":\"Lewis Pope\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"August 2022 Patch Tuesday: MSDT update fixes zero-day DogWalk and Exchange\u00a0 - N-able","description":"This month\u2019s Patch Tuesday puts a lot on the plate of defenders, with 121 different vulnerabilities addressed and more. We take a deep dive.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/august-2022-patch-tuesday-msdt-update-dogwalk-exchange","og_locale":"de_DE","og_type":"article","og_title":"August 2022 Patch Tuesday: MSDT update fixes zero-day DogWalk and Exchange\u00a0 - N-able","og_description":"This month\u2019s Patch Tuesday puts a lot on the plate of defenders, with 121 different vulnerabilities addressed and more. We take a deep dive.","og_url":"https:\/\/www.n-able.com\/de\/blog\/august-2022-patch-tuesday-msdt-update-dogwalk-exchange","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2022-08-10T11:55:13+00:00","article_modified_time":"2023-03-21T14:08:08+00:00","og_image":[{"width":2500,"height":1309,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-03.png","type":"image\/png"}],"author":"Lewis Pope","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-03.png","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"Lewis Pope","Gesch\u00e4tzte Lesezeit":"6\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/august-2022-patch-tuesday-msdt-update-dogwalk-exchange#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/august-2022-patch-tuesday-msdt-update-dogwalk-exchange"},"author":{"name":"Lewis Pope","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae"},"headline":"August 2022 Patch Tuesday: MSDT update fixes zero-day DogWalk and Exchange\u00a0","datePublished":"2022-08-10T12:55:13+01:00","dateModified":"2023-03-21T14:08:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/august-2022-patch-tuesday-msdt-update-dogwalk-exchange"},"wordCount":1219,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["Head Nerds","Patch Management","Security"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/august-2022-patch-tuesday-msdt-update-dogwalk-exchange","url":"https:\/\/www.n-able.com\/de\/blog\/august-2022-patch-tuesday-msdt-update-dogwalk-exchange","name":"August 2022 Patch Tuesday: MSDT update fixes zero-day DogWalk and Exchange\u00a0 - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2022-08-10T12:55:13+01:00","dateModified":"2023-03-21T14:08:08+00:00","description":"This month\u2019s Patch Tuesday puts a lot on the plate of defenders, with 121 different vulnerabilities addressed and more. We take a deep dive.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/august-2022-patch-tuesday-msdt-update-dogwalk-exchange#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/august-2022-patch-tuesday-msdt-update-dogwalk-exchange"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/august-2022-patch-tuesday-msdt-update-dogwalk-exchange#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Head Nerds","item":"https:\/\/www.n-able.com\/de\/blog\/category\/head-nerds-de"},{"@type":"ListItem","position":2,"name":"August 2022 Patch Tuesday: MSDT update fixes zero-day DogWalk and Exchange\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae","name":"Lewis Pope","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","caption":"Lewis Pope"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/36206","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=36206"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/36206\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=36206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}