{"id":37558,"date":"2022-09-14T08:32:59","date_gmt":"2022-09-14T07:32:59","guid":{"rendered":"https:\/\/www.n-able.com\/?p=37558"},"modified":"2023-03-21T14:07:18","modified_gmt":"2023-03-21T14:07:18","slug":"patch-tuesday-september-2022-spectre-bhb-on-arm","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-september-2022-spectre-bhb-on-arm","title":{"rendered":"Patch Tuesday September 2022: Spectre-BHB on ARM but fewer total fixes"},"content":{"rendered":"<p class=\"p2\"><span class=\"s1\">September\u2019s Microsoft Patch Tuesday release brings fewer total fixes than previous months\u2014just 64, with six marked as Critical and the rest as Important. That should put applying all Microsoft patches released this month, including cumulative updates, comfortably within established patching windows. The only vulnerability under active exploitation is an elevation of privilege, CVE-2022-37969, which could allow an attacker to run as SYSTEM. That should put it toward the top of any prioritization lists.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<h2 class=\"p4\"><span class=\"s1\">Microsoft Vulnerabilities<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">The lower number of total Microsoft fixes released, with no standout <i>celebrity vulnerabilities, <\/i>should take the pressure off teams responsible for applying patches this month. So, you should perhaps consider using this month\u2019s hopefully lower patching workload to audit your environments and make sure nothing has fallen off the radar and has not been getting appropriate updates.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Also, we have a Windows 11 for ARM64-based systems receiving a fix for <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-23960\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2022-23960<\/span><\/a>. Referred to as <a href=\"https:\/\/developer.arm.com\/Arm%20Security%20Center\/Spectre-BHB\"><span class=\"s2\">Spectre-BHB<\/span><\/a> this is a cache speculation vulnerability affecting ARM CPUs. If the Spectre name is familiar it\u2019s because this is similar to <a href=\"https:\/\/developer.arm.com\/Arm%20Security%20Center\/Speculative%20Processor%20Vulnerability\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Spectre<\/span><\/a> from 2018.<\/span><\/p>\n<h2 class=\"p1\">Microsoft Patch Tuesday <span class=\"s1\">Vulnerability Prioritization<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">There were only Critical and Important updates released for Patch Tuesday this month so they should be in your respective \u2018approved, awaiting install\u2019 list. The only zero-day for the month, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-37969\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2022-37969<\/span><\/a> Windows Common Log File System Driver, is an elevation of privilege vulnerability that can allow an attacker SYSTEM privileges. The likelihood of exploitation though is a little muted as it requires an attacker to already have a foothold on a Windows endpoint. However, it should still be on the top of your list.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">The six \u2018Exploitation More Likely\u2019 vulnerabilities listed below should also get some level of prioritization, even though some of them are only marked as Important. Of minor note are two Windows Common Log File System Driver elevation of privilege vulnerabilities, the aforementioned CVE-2022-37969 that is under active exploitation and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-35803\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2022-35803<\/span><\/a><\/span><span class=\"s3\">,<\/span><span class=\"s1\"> which is marked as \u2018Exploitation More Likely\u2019, should both be addressed.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">\u00a0<\/span><\/p>\n<table class=\"t1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td class=\"td1\" valign=\"top\" width=\"15%\">\n<p class=\"p5\"><strong><span class=\"s1\">CVE<\/span><\/strong><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td2\" valign=\"top\" width=\"50%\">\n<p class=\"p5\"><strong><span class=\"s1\">Description<\/span><\/strong><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td3\" valign=\"top\" width=\"20%\">\n<p class=\"p5\"><strong><span class=\"s1\">Exploitability<\/span><\/strong><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td4\" valign=\"top\" width=\"12%\">\n<p class=\"p5\"><strong><span class=\"s1\">Microsoft Severity<\/span><\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\" width=\"15%\">\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-37969\" target=\"_blank\" rel=\"noopener\">CVE-2022-37969<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"top\" width=\"50%\">\n<p class=\"p5\"><span class=\"s1\">Windows Common Log File System Driver EoP<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"top\" width=\"20%\">\n<p class=\"p5\"><span class=\"s1\">Exploitation Detected<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"top\" width=\"12%\">\n<p class=\"p5\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-35805\" target=\"_blank\" rel=\"noopener\">CVE-2022-35805<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p5\"><span class=\"s1\">Microsoft Dynamics CRM (on-premises) RCE<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p5\"><span class=\"s1\">Exploitation Less Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p5\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-34700\" target=\"_blank\" rel=\"noopener\">CVE-2022-34700<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p5\"><span class=\"s1\">Microsoft Dynamics CRM (on-premises) RCE<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p5\"><span class=\"s1\">Exploitation Less Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p5\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-34721\" target=\"_blank\" rel=\"noopener\">CVE-2022-34721<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p5\"><span class=\"s1\">Windows Internet Key Exchange (IKE) Protocol Extensions RCE<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"15%\">\n<p class=\"p5\"><span class=\"s1\">Exploitation Less Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p5\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-34722\" target=\"_blank\" rel=\"noopener\">CVE-2022-34722<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p5\"><span class=\"s1\">Windows Internet Key Exchange (IKE) Protocol Extensions RCE<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"15%\">\n<p class=\"p5\"><span class=\"s1\">Exploitation Less Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p5\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-34718\" target=\"_blank\" rel=\"noopener\">CVE-2022-34718<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p7\"><span class=\"s1\">Windows TCP\/IP RCE<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p5\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p5\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p6\"><span class=\"s4\">CVE-2022-35803<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p5\"><span class=\"s1\">Windows Common Log File System Driver EoP<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p5\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p5\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-34725\" target=\"_blank\" rel=\"noopener\">CVE-2022-34725<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p5\"><span class=\"s1\">Windows ALPC EoP<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p5\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p5\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-34729\" target=\"_blank\" rel=\"noopener\">CVE-2022-34729<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p5\"><span class=\"s1\">Windows GDI EoP<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p5\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p5\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p8\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-37954\" target=\"_blank\" rel=\"noopener\">CVE-2022-37954<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p5\"><span class=\"s1\">DirectX Graphics Kernel EoP<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p5\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p5\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p8\"><span class=\"s4\">CVE-2022-37957<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p5\"><span class=\"s1\">Windows Kernel Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p5\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p5\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"middle\" width=\"15%\">\n<p class=\"p8\"><span class=\"s4\">CVE-2022-23960<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td6\" valign=\"middle\" width=\"50%\">\n<p class=\"p5\"><span class=\"s1\">Arm: CVE-2022-23960 Cache Speculation Restriction Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td7\" valign=\"middle\" width=\"20%\">\n<p class=\"p5\"><span class=\"s1\">Exploitation Less Likely<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\"><\/td>\n<td class=\"td8\" valign=\"middle\" width=\"12%\">\n<p class=\"p5\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 class=\"p4\"><span class=\"s1\">Cumulative Updates<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">The cumulative updates were released for current builds of Windows 10 with <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/september-13-2022-kb5017308-os-builds-19042-2006-19043-2006-and-19044-2006-e4ea187e-28e8-4d4b-808b-2794babdce4c\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">KB5017308<\/span><\/a>, Windows 10 version 1809 and Windows Server 2019 with <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/september-13-2022-kb5017315-os-build-17763-3406-926525b2-750e-42e2-9845-49924d97281c\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">KB5017315<\/span><\/a>, and <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/september-13-2022-kb5017328-os-build-22000-978-40843fca-a0be-4a60-b68b-6cb23a73a5aa\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">KB5017328<\/span><\/a> for Windows 11. Containing the usual rollup of fixes from previous months and including Servicing Stack Updates in the CU, these should be these easy to rollout, with the exception of KB5017328. If you have out-of-date systems needing this CU you may need to apply <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/kb5005112-servicing-stack-update-for-windows-10-version-1809-august-10-2021-df6a9e0d-8012-41f4-ae74-b79f1c1940b2\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">KB5005112<\/span><\/a> before installing.<\/span><\/p>\n<h2 class=\"p4\"><span class=\"s1\">Known Complications of Note<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">There are no major complications being reported as of print.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<h2 class=\"p4\"><span class=\"s1\">Other Vendors<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">Apple released its third zero-day fix in the past two months on September 12<\/span><span class=\"s5\"><sup>th<\/sup><\/span><span class=\"s1\">, 2022. You can read more on CVE-2022-32917 <a href=\"https:\/\/support.apple.com\/en-us\/HT213445\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">here<\/span><\/a>. It appears to be under active exploitation according to Apple, with recommendations being immediate upgrade to iOS 15.7 and iPadOS 15.7.<\/span><\/p>\n<h2 class=\"p4\"><span class=\"s1\">Summary<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">As always make sure you have established patching processes for evaluation, testing, and pushing into production. If you have traditionally only dealt with patches by applying them based on their severity consider including prioritization of patches for Zero-Days, Exploitation Detected and, Exploitation More Likely vulnerabilities in your <a href=\"https:\/\/www.n-able.com\/features\/windows-patch-management\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Patch Management<\/span><\/a> routines.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\"><b>Looking for more information on Patch Management? Check out\u00a0<\/b><a href=\"https:\/\/www.n-able.com\/blog\/patch-management\" target=\"_blank\" rel=\"noopener\"><span class=\"s6\"><b>this section<\/b><\/span><\/a><b>\u00a0on our blog.<\/b><\/span><\/p>\n<p class=\"p9\"><span class=\"s1\"><i>Lewis Pope is the Head Security Nerd at N&#8209;able. You can follow him on Twitter:\u00a0<\/i><a href=\"https:\/\/twitter.com\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s6\"><i>@cybersec_nerd<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p10\"><span class=\"s7\"><i>LinkedIn:\u00a0<\/i><a href=\"https:\/\/www.linkedin.com\/in\/thesecuritypope\" target=\"_blank\" rel=\"noopener\"><span class=\"s8\"><i>thesecuritypope<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p10\"><span class=\"s7\"><i>Twitch:\u00a0<\/i><a href=\"https:\/\/www.twitch.tv\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s8\"><i>cybersec_nerd<\/i><\/span><\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A light month of fixes for September means extra time to make sure nothing is getting overlooked in your environments. Lewis Pope takes a look at this month\u2019s vulnerabilities.<\/p>\n","protected":false},"author":62,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-37558","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Patch Tuesday September 2022: Spectre-BHB on ARM but fewer total fixes - N-able<\/title>\n<meta name=\"description\" content=\"A light month of fixes for September means extra time to make sure nothing is getting overlooked in your environments. Find out more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-september-2022-spectre-bhb-on-arm\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Patch Tuesday September 2022: Spectre-BHB on ARM but fewer total fixes - N-able\" \/>\n<meta property=\"og:description\" content=\"A light month of fixes for September means extra time to make sure nothing is getting overlooked in your environments. Find out more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-september-2022-spectre-bhb-on-arm\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-14T07:32:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-21T14:07:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-01.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1309\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Lewis Pope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-01.png\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lewis Pope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"3\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-september-2022-spectre-bhb-on-arm#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-september-2022-spectre-bhb-on-arm\"},\"author\":{\"name\":\"Lewis Pope\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\"},\"headline\":\"Patch Tuesday September 2022: Spectre-BHB on ARM but fewer total fixes\",\"datePublished\":\"2022-09-14T08:32:59+01:00\",\"dateModified\":\"2023-03-21T14:07:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-september-2022-spectre-bhb-on-arm\"},\"wordCount\":698,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"Head Nerds\",\"Patch Management\",\"Security\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-september-2022-spectre-bhb-on-arm\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-september-2022-spectre-bhb-on-arm\",\"name\":\"Patch Tuesday September 2022: Spectre-BHB on ARM but fewer total fixes - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2022-09-14T08:32:59+01:00\",\"dateModified\":\"2023-03-21T14:07:18+00:00\",\"description\":\"A light month of fixes for September means extra time to make sure nothing is getting overlooked in your environments. Find out more.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-september-2022-spectre-bhb-on-arm#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-september-2022-spectre-bhb-on-arm\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-september-2022-spectre-bhb-on-arm#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Head Nerds\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/head-nerds-de\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Patch Tuesday September 2022: Spectre-BHB on ARM but fewer total fixes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\",\"name\":\"Lewis Pope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"caption\":\"Lewis Pope\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Patch Tuesday September 2022: Spectre-BHB on ARM but fewer total fixes - N-able","description":"A light month of fixes for September means extra time to make sure nothing is getting overlooked in your environments. Find out more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-september-2022-spectre-bhb-on-arm","og_locale":"de_DE","og_type":"article","og_title":"Patch Tuesday September 2022: Spectre-BHB on ARM but fewer total fixes - N-able","og_description":"A light month of fixes for September means extra time to make sure nothing is getting overlooked in your environments. Find out more.","og_url":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-september-2022-spectre-bhb-on-arm","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2022-09-14T07:32:59+00:00","article_modified_time":"2023-03-21T14:07:18+00:00","og_image":[{"width":2500,"height":1309,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-01.png","type":"image\/png"}],"author":"Lewis Pope","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-01.png","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"Lewis Pope","Gesch\u00e4tzte Lesezeit":"3\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-september-2022-spectre-bhb-on-arm#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-september-2022-spectre-bhb-on-arm"},"author":{"name":"Lewis Pope","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae"},"headline":"Patch Tuesday September 2022: Spectre-BHB on ARM but fewer total fixes","datePublished":"2022-09-14T08:32:59+01:00","dateModified":"2023-03-21T14:07:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-september-2022-spectre-bhb-on-arm"},"wordCount":698,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["Head Nerds","Patch Management","Security"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-september-2022-spectre-bhb-on-arm","url":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-september-2022-spectre-bhb-on-arm","name":"Patch Tuesday September 2022: Spectre-BHB on ARM but fewer total fixes - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2022-09-14T08:32:59+01:00","dateModified":"2023-03-21T14:07:18+00:00","description":"A light month of fixes for September means extra time to make sure nothing is getting overlooked in your environments. Find out more.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-september-2022-spectre-bhb-on-arm#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-september-2022-spectre-bhb-on-arm"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-september-2022-spectre-bhb-on-arm#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Head Nerds","item":"https:\/\/www.n-able.com\/de\/blog\/category\/head-nerds-de"},{"@type":"ListItem","position":2,"name":"Patch Tuesday September 2022: Spectre-BHB on ARM but fewer total fixes"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae","name":"Lewis Pope","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","caption":"Lewis Pope"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/37558","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=37558"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/37558\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=37558"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}