{"id":39774,"date":"2022-11-15T15:58:18","date_gmt":"2022-11-15T15:58:18","guid":{"rendered":"https:\/\/www.n-able.com\/?p=39774"},"modified":"2023-03-21T14:06:05","modified_gmt":"2023-03-21T14:06:05","slug":"patch-tuesday-november-2022","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2022","title":{"rendered":"Patch Tuesday November 2022: ProxyNotShell and other zero-days receive fixes"},"content":{"rendered":"<p class=\"p2\"><span class=\"s1\">November\u2019s Patch Tuesday is starting the holiday season a little early with gifts of zero-day fixes for Microsoft Exchange ProxyNotShell vulnerabilities, which sysadmins and security teams have patiently\u2014or impatiently as is more likely the case\u2014been waiting well over a month for. This moves the response from mitigation to remediation, which is going to be easier for most teams to implement via preferred patching methods.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">There are also fixes for OpenSSL vulnerabilities, which had initially stoked fears of far-reaching impact similar to Log4j due to OpenSSL\u2019s widespread distribution. However, since it only affected a small number of versions of OpenSSL 3.0.0 to 3.6.0, the impact has been nowhere near as large as Log4j. At <a href=\"https:\/\/www.n-able.com\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">N&#8209;able<\/span><\/a> we were fortunate that this vulnerability <a href=\"https:\/\/status.n-able.com\/2022\/11\/01\/openssl-critical-vulnerability\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">did not impact<\/span><\/a> any of our products.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<h2 class=\"p5\"><span class=\"s1\">Microsoft Vulnerabilities<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/h2>\n<p class=\"p6\"><span class=\"s1\">A total of 82 vulnerabilities received fixes or updates to previous fixes this month: 62 were new vulnerabilities with 11 marked as critical, 6 under active exploitation, and 17 marked as exploitation more likely. This should put quite a few fixes on the top of prioritization lists this month.<\/span><\/p>\n<p class=\"p6\"><span class=\"s1\">The biggest notable fixes from Microsoft are the aforementioned fixes for <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vhttps:\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-41082ulnerability\/CVE-2022-41082\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2022-41082<\/span><\/a> and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-41040\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2022-41040<\/span><\/a>, collectively referred to as <a href=\"https:\/\/doublepulsar.com\/proxynotshell-the-story-of-the-claimed-zero-day-in-microsoft-exchange-5c63d963a9e9\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">ProxyNotShell<\/span><\/a>. The journey on these vulnerabilities has been far from typical for announced zero-days that carry critical severity ratings and are under active exploitation. Microsoft initially released guidance that had to be updated multiple times as workarounds for the mitigations were quickly <a href=\"https:\/\/twitter.com\/testanull\/status\/1576774007826718720\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">discovered<\/span><\/a> by security researchers. With this Patch Tuesday multiple Security Updates have been made available for Microsoft Exchange Server 2013, Microsoft Exchange Server 2016, and Microsoft Exchange Server 2019 that address the ProxyNotShell vulnerabilities, and it\u2019s recommended by Microsoft that they be <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/exchange-team-blog\/released-november-2022-exchange-server-security-updates\/ba-p\/3669045\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">applied immediately<\/span><\/a>.<\/span><\/p>\n<p class=\"p4\"><span class=\"s3\">While ProxyNotShell is this month&#8217;s celebrity,<\/span><span class=\"s1\"> other zero-days that received fixes also deserve attention. <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-41128\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2022-41128<\/span><\/a> is one of the zero-days that are under active exploitation and carries a critical severity rating. It\u2019s ease of use is also trivial for attackers, only requiring an end-user to visit a malicious website that leverages the vulnerability. It also appears to affect all Windows OS versions from Windows 7 and up. This should be getting as much, if not more of your attention than ProxyNotShell.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">There is also a fix for a zero-day Windows Print Spooler vulnerability, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-41073\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2022-41073<\/span><\/a>, which I\u2019m noting simply because Windows Print Spooler has been a popular source of Windows vulnerabilities over the past few months. \u00a0<\/span><\/p>\n<h2 class=\"p1\">Microsoft Patch Tuesday <span class=\"s1\">Vulnerability Prioritization<\/span><\/h2>\n<p class=\"p6\"><span class=\"s1\">As always, prioritizing which vulnerabilities to address first is part following established best practices and a little bit of gut instinct. Critical severity, exploitation more likely, and exploitation detected vulnerabilities as always should be ranking fairly high on priority list. If you only patch based on severity you are leaving a lot of unnecessary risk exposure lying around.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<table class=\"t1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td class=\"td1\" valign=\"top\" width=\"20%\">\n<p class=\"p7\"><span class=\"s4\"><b>CVE<\/b><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\" width=\"60%\">\n<p class=\"p7\"><span class=\"s1\"><b>Description<\/b><\/span><\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\" width=\"10%\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\"><b>Severity<\/b><\/span><\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\" width=\"10%\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\"><b>Status<\/b><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p8\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-41040\" target=\"_blank\" rel=\"noopener\">CVE-2022-41040<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Microsoft Exchange Server Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\">ED<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p8\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-41082\" target=\"_blank\" rel=\"noopener\">CVE-2022-41082<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Microsoft Exchange Server Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\">ED<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p8\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-41128\" target=\"_blank\" rel=\"noopener\">CVE-2022-41128<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Windows Scripting Languages Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\">ED<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p8\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-41091\" target=\"_blank\" rel=\"noopener\">CVE-2022-41091<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Windows Mark of the Web Security Feature Bypass Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\">ED<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p8\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-41073\" target=\"_blank\" rel=\"noopener\">CVE-2022-41073<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Windows Print Spooler Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\">ED<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p8\"><span class=\"s4\">CVE-2022-41125<\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Windows CNG Key Isolation Service Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">ED<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"bottom\">\n<p class=\"p9\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-38015\" target=\"_blank\" rel=\"noopener\">CVE-2022-38015<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"bottom\">\n<p class=\"p10\"><span class=\"s7\">Windows Hyper-V Denial of Service Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p9\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-39327\" target=\"_blank\" rel=\"noopener\">CVE-2022-39327<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">GitHub: CVE-2022-39327 Improper Control of Generation of Code (&#8216;Code Injection&#8217;) in Azure CLI<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\">ELL<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p11\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-41080\" target=\"_blank\" rel=\"noopener\">CVE-2022-41080<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Microsoft Exchange Server Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p9\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-37966\" target=\"_blank\" rel=\"noopener\">CVE-2022-37966<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p11\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-37967\" target=\"_blank\" rel=\"noopener\">CVE-2022-37967<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Windows Kerberos Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p9\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-41044\" target=\"_blank\" rel=\"noopener\">CVE-2022-41044<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p11\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-41039\" target=\"_blank\" rel=\"noopener\">CVE-2022-41039<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p9\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-41088\" target=\"_blank\" rel=\"noopener\">CVE-2022-41088<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p9\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-41118\" target=\"_blank\" rel=\"noopener\">CVE-2022-41118<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Windows Scripting Languages Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\">EML<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><em>Key: C = Critical; I = Important; EML = Exploitation More Likely; ELL = Exploitation Less Likely; ED = Exploitation Detected<\/em><\/p>\n<h2 class=\"p5\"><span class=\"s1\">Cumulative Updates<\/span><\/h2>\n<p class=\"p6\"><span class=\"s1\">The cumulative updates for the month bring the typical rollup of fixes from previous months and include Servicing Stack Updates. The <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/october-25-2022-kb5018482-os-builds-19042-2193-19043-2193-and-19044-2193-preview-42a9588e-da20-4de4-aad3-053fa32c03c1\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Windows 10 CUs<\/span><\/a> includes numerous fixes for Windows OS upgrades failing and other bugs, while at the same time introducing a new known bug that is causing issues with Microsoft OneDrive unlinking from Microsoft accounts. <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/november-8-2022-kb5019980-os-build-22621-819-b503e08b-b850-469a-8de9-74df8aebd5f4\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Windows 11 CUs<\/span><\/a> brings improvements that were a part of <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/october-25-2022-kb5018496-os-build-22621-755-preview-64040bea-1e02-4b6d-bad1-b036200c2cb3\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">KB5018496<\/span><\/a> preview build, multiple new Windows 11 features have been added and bugs fixed. There continue to be issues with copying large files with the Microsoft recommended workaround being the use of robocopy or xcopy.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<h2 class=\"p5\"><span class=\"s1\">Other Vendors<\/span><\/h2>\n<p class=\"p6\"><span class=\"s1\">Citrix is encouraging admins to apply updates to address four vulnerabilities affecting Citrix ADC and Citrix Gateway. <a href=\"https:\/\/support.citrix.com\/article\/CTX463706\/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Guidance<\/span><\/a> is to upgrade to the latest versions of both asap. In other network appliances, Cisco also released security updates for <a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-asafdt-webvpn-dos-tzPSYern\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">multiple vulnerabilities<\/span><\/a> this November that can be addressed through software updates.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<p class=\"p6\"><span class=\"s1\">With respect to the aforementioned OpenSSL vulnerabilities\u2014<a href=\"https:\/\/www.openssl.org\/news\/secadv\/20221101.txt\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2022-3602<\/span><\/a> and <a href=\"https:\/\/www.openssl.org\/news\/secadv\/20221101.txt\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2022-3786<\/span><\/a>\u2014even though they have high severity ratings, the fact the vulnerabilities only exist in OpenSSL versions 3.0.0 to 3.0.6 means the install base is relatively low. Most environments won\u2019t need to worry about this vulnerability, but you\u2019ll need to verify if and where OpenSSL is in use to be sure.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<h2 class=\"p5\"><span class=\"s1\">Summary<\/span><\/h2>\n<p class=\"p6\"><span class=\"s1\">As always make sure you have established patching processes for evaluation, testing and pushing into production. If you have traditionally only dealt with patches by applying them based on their severity consider including prioritization of patches for Zero-Days, Exploitation Detected, and Exploitation More Likely vulnerabilities in your <a href=\"https:\/\/www.n-able.com\/features\/windows-patch-management\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Patch Management<\/span><\/a> routines.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<p class=\"p6\"><span class=\"s1\"><b>Looking for more information on Patch Management? Check out\u00a0<\/b><a href=\"https:\/\/www.n-able.com\/blog\/patch-management\" target=\"_blank\" rel=\"noopener\"><span class=\"s11\"><b>this section<\/b><\/span><\/a><b>\u00a0on our blog.<\/b><\/span><\/p>\n<p class=\"p12\"><span class=\"s1\"><i>Lewis Pope is the Head Security Nerd at N&#8209;able. You can follow him on Twitter:\u00a0<\/i><a href=\"https:\/\/twitter.com\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s11\"><i>@cybersec_nerd<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p13\"><span class=\"s12\"><i>LinkedIn:\u00a0<\/i><a href=\"https:\/\/www.linkedin.com\/in\/thesecuritypope\" target=\"_blank\" rel=\"noopener\"><span class=\"s13\"><i>thesecuritypope<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p13\"><span class=\"s12\"><i>Twitch:\u00a0<\/i><a href=\"https:\/\/www.twitch.tv\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s13\"><i>cybersec_nerd<\/i><\/span><\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this month\u2019s Patch Tuesday, Microsoft addresses the OpenSSL vulnerability as well as providing long-awaited ProxyNotShell fixes. Lewis Pope investigates.<\/p>\n","protected":false},"author":62,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-39774","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Patch Tuesday November 2022: ProxyNotShell and other zero-days receive fixes - N-able<\/title>\n<meta name=\"description\" content=\"In this month\u2019s Patch Tuesday, Microsoft addresses the OpenSSL vulnerability as well as providing long-awaited ProxyNotShell fixes. Read more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2022\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Patch Tuesday November 2022: ProxyNotShell and other zero-days receive fixes - N-able\" \/>\n<meta property=\"og:description\" content=\"In this month\u2019s Patch Tuesday, Microsoft addresses the OpenSSL vulnerability as well as providing long-awaited ProxyNotShell fixes. Read more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2022\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-15T15:58:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-21T14:06:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-01.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1309\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Lewis Pope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-01.png\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lewis Pope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2022#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2022\"},\"author\":{\"name\":\"Lewis Pope\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\"},\"headline\":\"Patch Tuesday November 2022: ProxyNotShell and other zero-days receive fixes\",\"datePublished\":\"2022-11-15T15:58:18+00:00\",\"dateModified\":\"2023-03-21T14:06:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2022\"},\"wordCount\":970,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"articleSection\":[\"Head Nerds\",\"Patch Management\",\"Security\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2022\",\"url\":\"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2022\",\"name\":\"Patch Tuesday November 2022: ProxyNotShell and other zero-days receive fixes - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es#website\"},\"datePublished\":\"2022-11-15T15:58:18+00:00\",\"dateModified\":\"2023-03-21T14:06:05+00:00\",\"description\":\"In this month\u2019s Patch Tuesday, Microsoft addresses the OpenSSL vulnerability as well as providing long-awaited ProxyNotShell fixes. Read more.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2022#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2022\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2022#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Head Nerds\",\"item\":\"https:\/\/www.n-able.com\/es\/blog\/category\/head-nerds-es\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Patch Tuesday November 2022: ProxyNotShell and other zero-days receive fixes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/es#website\",\"url\":\"https:\/\/www.n-able.com\/es\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/es?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/es#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/es\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\",\"name\":\"Lewis Pope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"caption\":\"Lewis Pope\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Patch Tuesday November 2022: ProxyNotShell and other zero-days receive fixes - N-able","description":"In this month\u2019s Patch Tuesday, Microsoft addresses the OpenSSL vulnerability as well as providing long-awaited ProxyNotShell fixes. Read more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2022","og_locale":"es_ES","og_type":"article","og_title":"Patch Tuesday November 2022: ProxyNotShell and other zero-days receive fixes - N-able","og_description":"In this month\u2019s Patch Tuesday, Microsoft addresses the OpenSSL vulnerability as well as providing long-awaited ProxyNotShell fixes. Read more.","og_url":"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2022","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2022-11-15T15:58:18+00:00","article_modified_time":"2023-03-21T14:06:05+00:00","og_image":[{"width":2500,"height":1309,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-01.png","type":"image\/png"}],"author":"Lewis Pope","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-01.png","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"Lewis Pope","Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2022#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2022"},"author":{"name":"Lewis Pope","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae"},"headline":"Patch Tuesday November 2022: ProxyNotShell and other zero-days receive fixes","datePublished":"2022-11-15T15:58:18+00:00","dateModified":"2023-03-21T14:06:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2022"},"wordCount":970,"publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"articleSection":["Head Nerds","Patch Management","Security"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2022","url":"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2022","name":"Patch Tuesday November 2022: ProxyNotShell and other zero-days receive fixes - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/es#website"},"datePublished":"2022-11-15T15:58:18+00:00","dateModified":"2023-03-21T14:06:05+00:00","description":"In this month\u2019s Patch Tuesday, Microsoft addresses the OpenSSL vulnerability as well as providing long-awaited ProxyNotShell fixes. Read more.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2022#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2022"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2022#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Head Nerds","item":"https:\/\/www.n-able.com\/es\/blog\/category\/head-nerds-es"},{"@type":"ListItem","position":2,"name":"Patch Tuesday November 2022: ProxyNotShell and other zero-days receive fixes"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/es#website","url":"https:\/\/www.n-able.com\/es","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/es?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/es#organization","name":"N-able","url":"https:\/\/www.n-able.com\/es","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae","name":"Lewis Pope","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","caption":"Lewis Pope"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/39774","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/comments?post=39774"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/39774\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/media?parent=39774"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}