{"id":35490,"date":"2022-07-12T11:50:24","date_gmt":"2022-07-12T10:50:24","guid":{"rendered":"https:\/\/www.n-able.com\/?p=35490"},"modified":"2023-03-21T14:08:38","modified_gmt":"2023-03-21T14:08:38","slug":"july-2022-microsoft-patch-tuesday-critical-adobe-follina-fix","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/es\/blog\/july-2022-microsoft-patch-tuesday-critical-adobe-follina-fix","title":{"rendered":"July 2022 Patch Tuesday: Critical Adobe updates and another Follina fix"},"content":{"rendered":"<p class=\"p3\">While July\u2019s Microsoft Patch Tuesday didn\u2019t bring any named celebrity vulnerabilities this month it does still include one zero-day, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-22047\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">CVE-2022-22047<\/span><\/a> which is under active exploitation and allows for an attacker to gain SYSTEM privileges on the target system. With a severity rating of <i>Important,<\/i> this zero-day is another example of how defaulting to an \u201conly apply critical security patches\u201d policy can leave environments unnecessarily exposed to threats that can easily be defended against.<\/p>\n<p class=\"p3\">Microsoft also announced general availability of Windows Autopatch on July 11, 2022. While Windows Autopatch is a welcome tool for overextended internal IT departments it is not the best match for the multi-tenant and scalable functionality that MSPs need. You can read a deeper analysis of Windows Autopatch <a href=\"https:\/\/www.n-able.com\/blog\/windows-autopatch-will-msps-still-need-patch-management\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">here<\/span><\/a>.<\/p>\n<p class=\"p3\">Of note is also <a href=\"https:\/\/msrc-blog.microsoft.com\/2022\/05\/30\/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">updated guidance<\/span><\/a> from Microsoft on CVE-2022-30190, aka Follina. Luckily, the guidance from Microsoft is to apply July\u2019s cumulative update as soon as possible. Details are short on what additional fixes for Follina are included in the July Cumulative Update (CU), with it being referred to as a \u201cdefense in depth variant\u201d, but the message from Microsoft to update ASAP should be heeded.<\/p>\n<p class=\"p3\">Along with the one zero-day there are four vulnerabilities marked as Critical with 89 total vulnerabilities being addressed or receiving updated fixes. This is a slight uptick in the number of fixes from June, but there is not the same sense of urgency around any vulnerability addressed this month.<\/p>\n<h2 class=\"p4\">Microsoft Vulnerabilities<\/h2>\n<p class=\"p3\">This Microsoft Patch Tuesday brings a wide set of fixes for remote code execution, privilege elevation, and security feature bypass vulnerabilities. Each one of these represents a potential avenue a malicious actor can use as part of a future attack. Protecting against future attacks while old attacks are still being carried out might sound like chasing the wrong goal, but attackers don\u2019t care if vulnerabilities are old or new, they will use whatever is available to them. This is why having good <a href=\"https:\/\/www.n-able.com\/features\/patch-management?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">patch management<\/span><\/a> processes and quarterly or monthly auditing is so important.<\/p>\n<p class=\"p3\">Thirty-three of this month\u2019s fixes are for Azure. So, if you\u2019re not using Azure, you\u2019ll have a total of fifty-six to contend with. This lower number of vulnerabilities and only one zero-day should keep workloads low for teams responsible for Windows patching.<\/p>\n<h2 class=\"p1\">Microsoft Patch Tuesday <span class=\"s1\">Vulnerability Prioritization<\/span><\/h2>\n<p class=\"p3\">The zero-day CVE-2022-22047 should be a top item along with applying the July CU for most environments. There are also four critical updates that should be on your radar.<\/p>\n<p class=\"p3\">It is important to not just prioritize vulnerabilities based on their severity but also their exploitation likelihood. Vulnerabilities marked as <i>Exploitation More Likely <\/i>are as important, and some may say even more important, to address quickly due to their increased likelihood to cause actual impacts to an environment.<span class=\"Apple-converted-space\">\u00a0 <\/span>These CVEs from Microsoft should be top of the list as they are all marked as Exploitation More Likely, Exploitation Detected, or Critical.<\/p>\n<table class=\"t1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td class=\"td1\" valign=\"top\" width=\"15%\">\n<p class=\"p5\"><strong>CVE<\/strong><\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td2\" valign=\"top\" width=\"50%\">\n<p class=\"p5\"><strong>Description<\/strong><\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td3\" valign=\"top\" width=\"20%\">\n<p class=\"p5\"><strong>Exploitability<\/strong><\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td4\" valign=\"top\" width=\"12%\">\n<p class=\"p5\"><strong>Severity<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"middle\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-22047\" target=\"_blank\" rel=\"noopener\">CVE-2022-22047<\/a><\/span><\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td2\" valign=\"middle\">\n<p class=\"p7\">Windows CSRSS Elevation of Privilege Vulnerability<\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td3\" valign=\"middle\">\n<p class=\"p7\">Exploitation Detected<\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td4\" valign=\"middle\">\n<p class=\"p7\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"middle\">\n<p class=\"p8\"><span class=\"s2\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-30221\" target=\"_blank\" rel=\"noopener\">CVE-2022-30221<\/a><\/span><\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td2\" valign=\"middle\">\n<p class=\"p9\">Windows Graphics Component Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td3\" valign=\"middle\">\n<p class=\"p7\">Exploitation Less Likely<\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td4\" valign=\"middle\">\n<p class=\"p7\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"middle\">\n<p class=\"p10\"><span class=\"s2\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-22029\" target=\"_blank\" rel=\"noopener\">CVE-2022-22029<\/a><\/span><\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td2\" valign=\"middle\">\n<p class=\"p9\">Windows Network File System Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td3\" valign=\"middle\">\n<p class=\"p7\">Exploitation Less Likely<\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td4\" valign=\"middle\">\n<p class=\"p7\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"middle\">\n<p class=\"p10\"><span class=\"s2\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-22029\" target=\"_blank\" rel=\"noopener\">CVE-2022-22029<\/a><\/span><\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td2\" valign=\"middle\">\n<p class=\"p9\">Windows Network File System Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td3\" valign=\"middle\">\n<p class=\"p7\">Exploitation Less Likely<\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td4\" valign=\"middle\">\n<p class=\"p7\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"middle\">\n<p class=\"p8\"><span class=\"s2\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-22039\" target=\"_blank\" rel=\"noopener\">CVE-2022-22039<\/a><\/span><\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td2\" valign=\"middle\">\n<p class=\"p9\">Windows Network File System Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td3\" valign=\"middle\">\n<p class=\"p7\">Exploitation Less Likely<\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td4\" valign=\"middle\">\n<p class=\"p7\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"middle\">\n<p class=\"p8\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-22038\" target=\"_blank\" rel=\"noopener\"><br \/>\n<span class=\"s2\">CVE-2022-22038<\/span><\/a><\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td2\" valign=\"middle\">\n<p class=\"p9\">Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td3\" valign=\"middle\">\n<p class=\"p7\">Exploitation Less Likely<\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td4\" valign=\"middle\">\n<p class=\"p7\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"middle\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-30202%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-30202\" target=\"_blank\" rel=\"noopener\">CVE-2022-30202<\/a><\/span><\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td2\" valign=\"middle\">\n<p class=\"p7\">Windows Advanced Local Procedure Call Elevation of Privilege Vulnerability<\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td3\" valign=\"middle\">\n<p class=\"p7\">Exploitation More Likely<\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td4\" valign=\"middle\">\n<p class=\"p7\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"middle\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-30215%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-30215\" target=\"_blank\" rel=\"noopener\">CVE-2022-30215<\/a><\/span><\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td2\" valign=\"middle\">\n<p class=\"p7\">Active Directory Federation Services Elevation of Privilege Vulnerability<\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td3\" valign=\"middle\">\n<p class=\"p7\">Exploitation More Likely<\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td4\" valign=\"middle\">\n<p class=\"p7\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"middle\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-30220%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-30220\" target=\"_blank\" rel=\"noopener\">CVE-2022-30220<\/a><\/span><\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td2\" valign=\"middle\">\n<p class=\"p7\">Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td3\" valign=\"middle\">\n<p class=\"p7\">Exploitation More Likely<\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td4\" valign=\"middle\">\n<p class=\"p7\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"middle\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-22034%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-22034\" target=\"_blank\" rel=\"noopener\">CVE-2022-22034<\/a><\/span><\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td2\" valign=\"middle\">\n<p class=\"p7\">Windows Graphics Component Elevation of Privilege Vulnerability<\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td3\" valign=\"middle\">\n<p class=\"p7\">Exploitation More Likely<\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td4\" valign=\"middle\">\n<p class=\"p7\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"middle\">\n<p class=\"p12\"><span class=\"s2\">CVE-2022-30216<\/span><\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td2\" valign=\"middle\">\n<p class=\"p7\">Windows Server Service Tampering Vulnerability<\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td3\" valign=\"middle\">\n<p class=\"p7\">Exploitation More Likely<\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td class=\"td4\" valign=\"middle\">\n<p class=\"p7\">Important<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 class=\"p4\">Cumulative Updates<\/h2>\n<p class=\"p3\"><span class=\"s1\"><a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/july-12-2022-kb5015807-os-builds-19042-1826-19043-1826-and-19044-1826-8c8ea8fe-ec83-467d-86fb-a2f48a85eb41\" target=\"_blank\" rel=\"noopener\">KB5015807<\/a><\/span> and <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/july-12-2022-kb5015811-os-build-17763-3165-f3bdb13c-d767-47dc-a077-0ea0e9421a96\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">KB5015811<\/span><\/a> both bring the normal collection of roll-up security fixes and features from previous months\u2019 updates for Windows 10. KB5015807 includes fixes for touchpad right-click functionality and Wi-Fi connectivity issues so if you have seen these issues in your environment, this CU may resolve them. KB501581 also provides roll-ups and includes update servicing stack updates.<\/p>\n<p class=\"p3\"><span class=\"s1\"><a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/july-12-2022-kb5015814-os-build-22000-795-74e7676e-4182-4747-8f73-bbe0c497dc2a\" target=\"_blank\" rel=\"noopener\">KB5015814<\/a><\/span> for Windows 11 includes update servicing stack updates and previous <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/june-23-2022-kb5014668-os-build-22000-778-preview-2b5f1da6-d602-48b4-b443-96b460e3c38d\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">KB5014668<\/span><\/a> improvements.<\/p>\n<h2 class=\"p4\">Known Complications of Note<\/h2>\n<p class=\"p3\">This month\u2019s <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/june-23-2022-kb5014668-os-build-22000-778-preview-2b5f1da6-d602-48b4-b443-96b460e3c38d\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">KB5015814<\/span><\/a> cumulative update for Windows 11 continues to seem to be introducing issues with applications requiring 3.5 and older .NET Framework. Microsoft has guidance available <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/june-23-2022-kb5014668-os-build-22000-778-preview-2b5f1da6-d602-48b4-b443-96b460e3c38d\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">here<\/span><\/a> in the Known Issues section.<\/p>\n<h2 class=\"p4\">Other Vendors<\/h2>\n<p class=\"p3\">Adobe released <a href=\"https:\/\/helpx.adobe.com\/security\/products\/acrobat\/apsb22-32.html\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">updates<\/span><\/a> for their Adobe Acrobat and Reader applications. With Adobe Reader\u2019s widespread use, it\u2019s important to include applying timely updates as part of your monthly patching processes. It is also important to have awareness of old versions of Adobe Reader still in circulation in environments as their presence provides an avenue for old vulnerabilities to be exploited.<\/p>\n<p class=\"p3\">Google also provided a stable channel update for <a href=\"https:\/\/chromereleases.googleblog.com\/2022\/07\/stable-channel-update-for-desktop.html\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">Google Chrome<\/span><\/a> on July 4, 2022 that includes four security fixes for high severity vulnerabilities. Browsers\u2019 ubiquity and position of being a major vector for threats requires they receive just as much attention as operating system updates. If updating browsers isn\u2019t part of your patch management policies today, it should be part of your policies tomorrow.<\/p>\n<h2 class=\"p4\">Summary<\/h2>\n<p class=\"p3\">As always make sure you have established patching processes for evaluation, testing and pushing into production. If you have traditionally only dealt with patches by applying them based on their severity consider including prioritization of patches for Zero-Days, Exploitation Detected, and Exploitation More Likely vulnerabilities in your Windows <a href=\"https:\/\/www.n-able.com\/features\/windows-patch-management\"><span class=\"s1\">Patch Management<\/span><\/a> routines.<\/p>\n<p class=\"p13\"><b>Looking for more information on the Patch Management section? Check out\u00a0<\/b><a href=\"https:\/\/www.n-able.com\/blog\/patch-management\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\"><b>this section<\/b><\/span><\/a><b>\u00a0on our blog.<\/b><\/p>\n<p class=\"p13\"><i>Lewis Pope is the Head Security Nerd at N&#8209;able. You can follow him on Twitter:\u00a0<\/i><a href=\"https:\/\/twitter.com\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\"><i>@cybersec_nerd<\/i><\/span><\/a><\/p>\n<p class=\"p14\"><span class=\"s6\"><i>LinkedIn:\u00a0<\/i><a href=\"https:\/\/www.linkedin.com\/in\/thesecuritypope\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\"><i>thesecuritypope<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p14\"><span class=\"s6\"><i>Twitch:\u00a0<\/i><a href=\"https:\/\/www.twitch.tv\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\"><i>cybersec_nerd<\/i><\/span><\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This month\u2019s Patch Tuesday sees a total of 89 vulnerabilities addressed, including one zero-day and four marked as Critical. Lewis Pope takes a deep dive.<\/p>\n","protected":false},"author":62,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-35490","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>July 2022 Patch Tuesday: Critical Adobe Updates &amp; Follina Fix - N-able<\/title>\n<meta name=\"description\" content=\"July\u2019s Microsoft Patch Tuesday sees a total of 89 vulnerabilities addressed, including one zero-day and four marked Critical. Read more here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/es\/blog\/july-2022-microsoft-patch-tuesday-critical-adobe-follina-fix\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"July 2022 Patch Tuesday: Critical Adobe Updates &amp; Follina Fix - N-able\" \/>\n<meta property=\"og:description\" content=\"July\u2019s Microsoft Patch Tuesday sees a total of 89 vulnerabilities addressed, including one zero-day and four marked Critical. Read more here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/es\/blog\/july-2022-microsoft-patch-tuesday-critical-adobe-follina-fix\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-12T10:50:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-21T14:08:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/07\/220622_Blogbanner_Headnerds_socials_V1_ss.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Lewis Pope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/07\/220622_Blogbanner_Headnerds_socials_V1_ss.png\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lewis Pope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/july-2022-microsoft-patch-tuesday-critical-adobe-follina-fix#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/july-2022-microsoft-patch-tuesday-critical-adobe-follina-fix\"},\"author\":{\"name\":\"Lewis Pope\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\"},\"headline\":\"July 2022 Patch Tuesday: Critical Adobe updates and another Follina fix\",\"datePublished\":\"2022-07-12T11:50:24+01:00\",\"dateModified\":\"2023-03-21T14:08:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/july-2022-microsoft-patch-tuesday-critical-adobe-follina-fix\"},\"wordCount\":971,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"articleSection\":[\"Head Nerds\",\"Patch Management\",\"Security\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/july-2022-microsoft-patch-tuesday-critical-adobe-follina-fix\",\"url\":\"https:\/\/www.n-able.com\/es\/blog\/july-2022-microsoft-patch-tuesday-critical-adobe-follina-fix\",\"name\":\"July 2022 Patch Tuesday: Critical Adobe Updates & Follina Fix - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es#website\"},\"datePublished\":\"2022-07-12T11:50:24+01:00\",\"dateModified\":\"2023-03-21T14:08:38+00:00\",\"description\":\"July\u2019s Microsoft Patch Tuesday sees a total of 89 vulnerabilities addressed, including one zero-day and four marked Critical. Read more here.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/july-2022-microsoft-patch-tuesday-critical-adobe-follina-fix#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/es\/blog\/july-2022-microsoft-patch-tuesday-critical-adobe-follina-fix\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/july-2022-microsoft-patch-tuesday-critical-adobe-follina-fix#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Patch Management\",\"item\":\"https:\/\/www.n-able.com\/es\/blog\/category\/patch-management\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"July 2022 Patch Tuesday: Critical Adobe updates and another Follina fix\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/es#website\",\"url\":\"https:\/\/www.n-able.com\/es\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/es?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/es#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/es\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\",\"name\":\"Lewis Pope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"caption\":\"Lewis Pope\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"July 2022 Patch Tuesday: Critical Adobe Updates & Follina Fix - N-able","description":"July\u2019s Microsoft Patch Tuesday sees a total of 89 vulnerabilities addressed, including one zero-day and four marked Critical. Read more here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/es\/blog\/july-2022-microsoft-patch-tuesday-critical-adobe-follina-fix","og_locale":"es_ES","og_type":"article","og_title":"July 2022 Patch Tuesday: Critical Adobe Updates & Follina Fix - N-able","og_description":"July\u2019s Microsoft Patch Tuesday sees a total of 89 vulnerabilities addressed, including one zero-day and four marked Critical. Read more here.","og_url":"https:\/\/www.n-able.com\/es\/blog\/july-2022-microsoft-patch-tuesday-critical-adobe-follina-fix","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2022-07-12T10:50:24+00:00","article_modified_time":"2023-03-21T14:08:38+00:00","og_image":[{"width":2500,"height":1310,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/07\/220622_Blogbanner_Headnerds_socials_V1_ss.png","type":"image\/png"}],"author":"Lewis Pope","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/07\/220622_Blogbanner_Headnerds_socials_V1_ss.png","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"Lewis Pope","Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/es\/blog\/july-2022-microsoft-patch-tuesday-critical-adobe-follina-fix#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/es\/blog\/july-2022-microsoft-patch-tuesday-critical-adobe-follina-fix"},"author":{"name":"Lewis Pope","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae"},"headline":"July 2022 Patch Tuesday: Critical Adobe updates and another Follina fix","datePublished":"2022-07-12T11:50:24+01:00","dateModified":"2023-03-21T14:08:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/july-2022-microsoft-patch-tuesday-critical-adobe-follina-fix"},"wordCount":971,"publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"articleSection":["Head Nerds","Patch Management","Security"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/es\/blog\/july-2022-microsoft-patch-tuesday-critical-adobe-follina-fix","url":"https:\/\/www.n-able.com\/es\/blog\/july-2022-microsoft-patch-tuesday-critical-adobe-follina-fix","name":"July 2022 Patch Tuesday: Critical Adobe Updates & Follina Fix - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/es#website"},"datePublished":"2022-07-12T11:50:24+01:00","dateModified":"2023-03-21T14:08:38+00:00","description":"July\u2019s Microsoft Patch Tuesday sees a total of 89 vulnerabilities addressed, including one zero-day and four marked Critical. Read more here.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/es\/blog\/july-2022-microsoft-patch-tuesday-critical-adobe-follina-fix#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/es\/blog\/july-2022-microsoft-patch-tuesday-critical-adobe-follina-fix"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/es\/blog\/july-2022-microsoft-patch-tuesday-critical-adobe-follina-fix#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Patch Management","item":"https:\/\/www.n-able.com\/es\/blog\/category\/patch-management"},{"@type":"ListItem","position":2,"name":"July 2022 Patch Tuesday: Critical Adobe updates and another Follina fix"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/es#website","url":"https:\/\/www.n-able.com\/es","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/es?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/es#organization","name":"N-able","url":"https:\/\/www.n-able.com\/es","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae","name":"Lewis Pope","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","caption":"Lewis Pope"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/35490","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/comments?post=35490"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/35490\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/media?parent=35490"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}