{"id":33486,"date":"2022-05-13T15:57:48","date_gmt":"2022-05-13T14:57:48","guid":{"rendered":"https:\/\/www.n-able.com\/?p=33486"},"modified":"2023-03-21T14:09:45","modified_gmt":"2023-03-21T14:09:45","slug":"may-2022-patch-tuesday-windows-lsa-spoofing-illustrates-why-patching-is-sometimes-not-enough","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/fr\/blog\/may-2022-patch-tuesday-windows-lsa-spoofing-illustrates-why-patching-is-sometimes-not-enough","title":{"rendered":"May 2022 Patch Tuesday: Windows LSA Spoofing Illustrates Why Patching Is Sometimes Not Enough"},"content":{"rendered":"<p class=\"p3\">Don\u2019t let big celebrity vulnerabilities suck all the oxygen out of the room. When news about <a href=\"https:\/\/support.f5.com\/csp\/article\/K23605346\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">CVE-2022-1388<\/span><\/a> with a 9.8 severity affecting F5\u2019s BIG-IP appliances started making the rounds, I had a lot of SMB\u2019s asking if they should be worried. Considering these appliances can cost hundreds of thousands of dollars it\u2019s safe to assume that most small and medium businesses won\u2019t be affected, but the question they were asking needed an answer, not an assumption.<\/p>\n<p class=\"p3\">This is why knowing your estate and being subscribed to alerts from your software and hardware vendors is so important. A team that\u2019s using resources figuring out the implications of a vulnerability for a system they aren\u2019t even using just isn\u2019t efficient. There\u2019s a reason why hardware and software asset-tracking are usually the first controls called for in security frameworks. You can\u2019t defend what you don\u2019t know about.<\/p>\n<p class=\"p3\">While CVE-2022-1388 is a significant vulnerability, most teams\u2019 attention needs to be on remediating vulnerabilities like <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-26925\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">CVE-2022-26925<\/span><\/a>, a Windows LSA Spoofing vulnerability that targets a NTLM relay attack vector that potentially affects all misconfigured Windows servers, that\u2019s already seeing active exploitation. Microsoft is providing additional mitigation instructions for this vulnerability as something that allows exploitation of the vulnerability that is a default configuration for Windows servers with specific roles enabled. If you manage Windows servers, be sure to read Microsoft\u2019s info on <a href=\"https:\/\/msrc-blog.microsoft.com\/2009\/12\/08\/extended-protection-for-authentication\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">applying mitigations<\/span><\/a><span class=\"s1\">.<\/span><\/p>\n<p class=\"p3\">This Patch Tuesday is a reminder that sometimes just applying a patch isn\u2019t enough. Sometimes it takes extra measures like updating firmware, rebuilding configurations, or applying other mitigations. Proper Patch Management is an important part of your vulnerability remediation and mitigation but it\u2019s not the only part.<\/p>\n<h2 class=\"p1\">Microsoft Patch Tuesday <span class=\"s1\">Vulnerability Prioritization<\/span><\/h2>\n<p class=\"p3\">With a total of 75 vulnerabilities being addressed and one zero-day under active exploitation, there aren\u2019t a lot of individual vulnerabilities that are going to require much attention. Approving CUs, Critical and Important severity patches, will get through the bulk. There are of course those that will require a little more effort from your patching team since they have additional mitigations advised by Microsoft that will take extra labor to implement this month.<\/p>\n<p class=\"p3\">It is important to not just prioritize vulnerabilities based on their severity but also their exploitation likelihood. Vulnerabilities marked as <i>Exploitation More Likely <\/i>are as important, and some may say even more important, to address quickly due to their increased likelihood to cause actual impacts to an environment.<span class=\"Apple-converted-space\">\u00a0 <\/span>These CVEs from Microsoft should be top of the list as they are all marked as Exploitation More Likely, Exploitation Detected, or Critical.<\/p>\n<table class=\"t1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p5\"><strong>CVE<\/strong><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\"><strong>Description<\/strong><\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\"><strong>Exploitability<\/strong><\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\"><strong>Severity<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-26925%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-26925\" target=\"_blank\" rel=\"noopener\">CVE-2022-26925<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Windows LSA Spoofing<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation Detected<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-26923%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-26923\" target=\"_blank\" rel=\"noopener\">CVE-2022-26923<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Active Directory Domain Services Elevation of Privilege<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-23279%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-23279\" target=\"_blank\" rel=\"noopener\">CVE-2022-23279<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Windows ALPC Elevation of Privilege<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-29142%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-29142\" target=\"_blank\" rel=\"noopener\">CVE-2022-29142<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Windows Kernel Elevation of Privilege<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-29132%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-29132\" target=\"_blank\" rel=\"noopener\">CVE-2022-29132<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Windows Print Spooler Elevation of Privilege<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-29108%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-29108\" target=\"_blank\" rel=\"noopener\">CVE-2022-29108<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Microsoft SharePoint Server Remote Code Execution<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-29104%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-29104\" target=\"_blank\" rel=\"noopener\">CVE-2022-29104<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Windows Print Spooler Elevation of Privilege<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-22017%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-22017\" target=\"_blank\" rel=\"noopener\">CVE-2022-22017<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Remote Desktop Client Remote Code Execution<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-26937%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-26937\" target=\"_blank\" rel=\"noopener\">CVE-2022-26937<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Windows Network File System Remote Code Execution<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-23270%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-23270\" target=\"_blank\" rel=\"noopener\">CVE-2022-23270<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Point-to-Point Tunneling Protocol Remote Code Execution<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-29972%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-29972\" target=\"_blank\" rel=\"noopener\">CVE-2022-29972<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Insight Software: CVE-2022-29972 Magnitude Simba Amazon Redshift ODBC Driver<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p8\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-26931\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2022-26931<\/span><\/a><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Windows Kerberos Elevation of Privilege<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p9\"><span class=\"s2\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-26937\" target=\"_blank\" rel=\"noopener\">CVE-2022-26937<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Windows Network File System Remote Code Execution<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation Less Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p10\"><span class=\"s2\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-21972\" target=\"_blank\" rel=\"noopener\">CVE-2022-21972<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Point-to-Point Tunneling Protocol RCE<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation Less Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Critical<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 class=\"p4\">Cumulative Updates<\/h2>\n<p class=\"p3\">May marks the second cumulative update available for Windows 11 with <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/may-10-2022-kb5013943-os-build-22000-675-14aa767a-aa87-414e-8491-b6e845541755\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">KB5013943<\/span><\/a>. This CU provides fixes for screen flickering and a fix for certain apps using older .Net Framework 3.5 not running. However, it appears that this CU has introduced <a href=\"https:\/\/answers.microsoft.com\/en-us\/windows\/forum\/all\/cumulative-updates-for-windows-10-and-windows-11\/6d7fccc6-e125-4ae4-9fbb-db7077065c31?page=1\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">new complications<\/span><\/a> preventing other .Net Framework 3.5 applications from running as well as other applications crashing due to certain GPUs. These complications may warrant more robust testing and caution before applying to production environments.<\/p>\n<p class=\"p3\"><span class=\"s1\"><a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/may-10-2022-kb5013942-os-builds-19042-1706-19043-1706-and-19044-1706-60b51119-85be-4a34-9e21-8954f6749504\" target=\"_blank\" rel=\"noopener\">KB5013942<\/a><\/span> and <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/may-10-2022-kb5013945-os-build-18363-2274-2b351461-a751-42a1-940a-6057d504137e\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">KB5013945<\/span><\/a> were also released. Some complications similar to KB5013943\u2019s are also seen in these CUs along with some additional issues such as Snip and Sketch app failures. While none of these complications should be hard stops against applying these CUs, due care and testing is warranted before applying to production.<\/p>\n<h2 class=\"p4\">Known Complications of Note<\/h2>\n<p class=\"p3\">Aside from the previously mentioned CU issues and the need to apply <a href=\"https:\/\/msrc-blog.microsoft.com\/2009\/12\/08\/extended-protection-for-authentication\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">additional mitigations<\/span><\/a> in response to <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-26925\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">CVE-2022-26925<\/span><\/a><span class=\"s1\">,<\/span> this month\u2019s Patch Tuesday brings complications for Windows AD servers. When installed on domain controllers, the May 10 updates are causing active directory authentication failures. Since this is only affecting domain controllers, it should not influence the decision making on installing the updates to non-DC servers or workstations.<\/p>\n<h2 class=\"p4\">The Patch Tuesday Megathread<\/h2>\n<p class=\"p3\">On occasion I get asked where I discover all this information that is included in these Patch Tuesday blogs. One source is directly from Microsoft themselves through the <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-26925\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">Security Update Guide<\/span><\/a>. Another is the <a href=\"https:\/\/www.reddit.com\/r\/sysadmin\/comments\/um9qur\/patch_tuesday_megathread_20220510\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">Patch Tuesday Megathread<\/span><\/a> on Reddit. It is a great place to get immediate feedback about complications or surprises presented by Patch Tuesday from a community of your peers instead of vendors. There are a few brave souls in those threads who push out updates to thousands of endpoints as soon as they are released and share the lessons they learn with the community. If there are any major issues arising because of Patch Tuesday, you\u2019ll likely hear it there first.<\/p>\n<h2 class=\"p4\">Summary<\/h2>\n<p class=\"p3\">This Patch Tuesday has illustrated how quickly things can get a lot more complicated when patches don\u2019t provide full mitigation for a vulnerability, requiring additional mitigations and resources. Even though patch management solutions make the job easier, every once in a while the team responsible for patching may need a little additional resources to contend with months like this.<\/p>\n<p class=\"p3\">As always, make sure you have established patching processes for evaluation, testing and pushing into production. If you have traditionally only dealt with patches by applying them based on their severity consider including prioritization of patches for Zero-Days, Exploitation Detected, and Exploitation More Likely vulnerabilities in your <a href=\"https:\/\/www.n-able.com\/features\/windows-patch-management?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">Patch Management<\/span><\/a> routines.<\/p>\n<p class=\"p11\"><i>Lewis Pope is the Head Security Nerd at N&#8209;able. You can follow him on Twitter:\u00a0<\/i><a href=\"https:\/\/twitter.com\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s4\"><i>@cybersec_nerd<\/i><\/span><\/a><\/p>\n<p class=\"p12\"><span class=\"s5\"><i>LinkedIn:\u00a0<\/i><a href=\"https:\/\/www.linkedin.com\/in\/thesecuritypope\" target=\"_blank\" rel=\"noopener\"><span class=\"s4\"><i>thesecuritypope<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p12\"><span class=\"s5\"><i>Twitch:\u00a0<\/i><a href=\"https:\/\/www.twitch.tv\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s4\"><i>cybersec_nerd<\/i><\/span><\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This Patch Tuesday has illustrated how quickly things can get a lot more complicated when patches don\u2019t provide full mitigation for a vulnerability. Lewis Pope helps provide some answers.<\/p>\n","protected":false},"author":62,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-33486","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>May 2022 Patch Tuesday: Windows LSA Spoofing Illustrates Why Patching Is Sometimes Not Enough - N-able<\/title>\n<meta name=\"description\" content=\"This Patch Tuesday shows how quickly things can get complicated when patches don\u2019t provide full mitigation resources. Read on for some answers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/fr\/blog\/may-2022-patch-tuesday-windows-lsa-spoofing-illustrates-why-patching-is-sometimes-not-enough\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"May 2022 Patch Tuesday: Windows LSA Spoofing Illustrates Why Patching Is Sometimes Not Enough - N-able\" \/>\n<meta property=\"og:description\" content=\"This Patch Tuesday shows how quickly things can get complicated when patches don\u2019t provide full mitigation resources. Read on for some answers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/fr\/blog\/may-2022-patch-tuesday-windows-lsa-spoofing-illustrates-why-patching-is-sometimes-not-enough\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-13T14:57:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-21T14:09:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope-white.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"356\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lewis Pope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope-white.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lewis Pope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/may-2022-patch-tuesday-windows-lsa-spoofing-illustrates-why-patching-is-sometimes-not-enough#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/may-2022-patch-tuesday-windows-lsa-spoofing-illustrates-why-patching-is-sometimes-not-enough\"},\"author\":{\"name\":\"Lewis Pope\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\"},\"headline\":\"May 2022 Patch Tuesday: Windows LSA Spoofing Illustrates Why Patching Is Sometimes Not Enough\",\"datePublished\":\"2022-05-13T15:57:48+01:00\",\"dateModified\":\"2023-03-21T14:09:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/may-2022-patch-tuesday-windows-lsa-spoofing-illustrates-why-patching-is-sometimes-not-enough\"},\"wordCount\":1073,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"articleSection\":[\"Head Nerds\",\"Patch Management\",\"Security\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/may-2022-patch-tuesday-windows-lsa-spoofing-illustrates-why-patching-is-sometimes-not-enough\",\"url\":\"https:\/\/www.n-able.com\/fr\/blog\/may-2022-patch-tuesday-windows-lsa-spoofing-illustrates-why-patching-is-sometimes-not-enough\",\"name\":\"May 2022 Patch Tuesday: Windows LSA Spoofing Illustrates Why Patching Is Sometimes Not Enough - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr#website\"},\"datePublished\":\"2022-05-13T15:57:48+01:00\",\"dateModified\":\"2023-03-21T14:09:45+00:00\",\"description\":\"This Patch Tuesday shows how quickly things can get complicated when patches don\u2019t provide full mitigation resources. Read on for some answers.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/may-2022-patch-tuesday-windows-lsa-spoofing-illustrates-why-patching-is-sometimes-not-enough#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/fr\/blog\/may-2022-patch-tuesday-windows-lsa-spoofing-illustrates-why-patching-is-sometimes-not-enough\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/may-2022-patch-tuesday-windows-lsa-spoofing-illustrates-why-patching-is-sometimes-not-enough#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/fr\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"May 2022 Patch Tuesday: Windows LSA Spoofing Illustrates Why Patching Is Sometimes Not Enough\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/fr#website\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/fr?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/fr#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\",\"name\":\"Lewis Pope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"caption\":\"Lewis Pope\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"May 2022 Patch Tuesday: Windows LSA Spoofing Illustrates Why Patching Is Sometimes Not Enough - N-able","description":"This Patch Tuesday shows how quickly things can get complicated when patches don\u2019t provide full mitigation resources. Read on for some answers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/fr\/blog\/may-2022-patch-tuesday-windows-lsa-spoofing-illustrates-why-patching-is-sometimes-not-enough","og_locale":"fr_FR","og_type":"article","og_title":"May 2022 Patch Tuesday: Windows LSA Spoofing Illustrates Why Patching Is Sometimes Not Enough - N-able","og_description":"This Patch Tuesday shows how quickly things can get complicated when patches don\u2019t provide full mitigation resources. Read on for some answers.","og_url":"https:\/\/www.n-able.com\/fr\/blog\/may-2022-patch-tuesday-windows-lsa-spoofing-illustrates-why-patching-is-sometimes-not-enough","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2022-05-13T14:57:48+00:00","article_modified_time":"2023-03-21T14:09:45+00:00","og_image":[{"width":720,"height":356,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope-white.jpg","type":"image\/jpeg"}],"author":"Lewis Pope","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope-white.jpg","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"\u00c9crit par":"Lewis Pope","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/fr\/blog\/may-2022-patch-tuesday-windows-lsa-spoofing-illustrates-why-patching-is-sometimes-not-enough#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/may-2022-patch-tuesday-windows-lsa-spoofing-illustrates-why-patching-is-sometimes-not-enough"},"author":{"name":"Lewis Pope","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae"},"headline":"May 2022 Patch Tuesday: Windows LSA Spoofing Illustrates Why Patching Is Sometimes Not Enough","datePublished":"2022-05-13T15:57:48+01:00","dateModified":"2023-03-21T14:09:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/may-2022-patch-tuesday-windows-lsa-spoofing-illustrates-why-patching-is-sometimes-not-enough"},"wordCount":1073,"publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"articleSection":["Head Nerds","Patch Management","Security"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/fr\/blog\/may-2022-patch-tuesday-windows-lsa-spoofing-illustrates-why-patching-is-sometimes-not-enough","url":"https:\/\/www.n-able.com\/fr\/blog\/may-2022-patch-tuesday-windows-lsa-spoofing-illustrates-why-patching-is-sometimes-not-enough","name":"May 2022 Patch Tuesday: Windows LSA Spoofing Illustrates Why Patching Is Sometimes Not Enough - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr#website"},"datePublished":"2022-05-13T15:57:48+01:00","dateModified":"2023-03-21T14:09:45+00:00","description":"This Patch Tuesday shows how quickly things can get complicated when patches don\u2019t provide full mitigation resources. Read on for some answers.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/may-2022-patch-tuesday-windows-lsa-spoofing-illustrates-why-patching-is-sometimes-not-enough#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/fr\/blog\/may-2022-patch-tuesday-windows-lsa-spoofing-illustrates-why-patching-is-sometimes-not-enough"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/fr\/blog\/may-2022-patch-tuesday-windows-lsa-spoofing-illustrates-why-patching-is-sometimes-not-enough#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/fr\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"May 2022 Patch Tuesday: Windows LSA Spoofing Illustrates Why Patching Is Sometimes Not Enough"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/fr#website","url":"https:\/\/www.n-able.com\/fr","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/fr?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/fr#organization","name":"N-able","url":"https:\/\/www.n-able.com\/fr","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae","name":"Lewis Pope","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","caption":"Lewis Pope"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/33486","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/comments?post=33486"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/33486\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/media?parent=33486"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}