{"id":27597,"date":"2022-01-13T11:07:14","date_gmt":"2022-01-13T11:07:14","guid":{"rendered":"https:\/\/www.n-able.com\/?p=27597"},"modified":"2022-06-10T18:03:07","modified_gmt":"2022-06-10T17:03:07","slug":"january-2022-patch-tuesday","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/it\/blog\/january-2022-patch-tuesday","title":{"rendered":"January 2022 Patch Tuesday: Wormable HTTP.SYS vulnerability rings in the new year"},"content":{"rendered":"<p class=\"p3\">Welcome to the first Patch Tuesday of 2022! Microsoft may have been a little stingy with our December presents, but they\u2019ve made up for it this month with a substantial increase in the number of flaws addressed, including a potentially devastating wormable flaw in the HTTP Protocol Stack (HTTP.sys) used by the Windows Internet Information Services (IIS) that has the potential to be quickly weaponized and deployed by threat actors. We\u2019ll dive deeper into that in a moment.<\/p>\n<p class=\"p3\">In this edition, Microsoft has released fixes for 97 vulnerabilities that include nine Critical and 88 Important classifications. There are also six zero-day vulnerabilities that were publicly disclosed and will need patching. Luckily, none of them is under active exploitation, which gives defenders an opportunity to patch systems before any exploits begin. However, most have proof-of-concept exploits already available, so there is only a narrow window of opportunity to get ahead of attackers.<\/p>\n<h2 class=\"p4\">Microsoft vulnerabilities<\/h2>\n<p class=\"p3\">It\u2019s going to be another busy month for teams dedicated to patching. Not only is there an increase in vulnerabilities being addressed, but there should also be a sense of urgency behind getting two of the potentially more damaging vulnerabilities addressed quickly, with a total of 14 being marked as Exploitation More Likely that should not be escaping your attention.<\/p>\n<p class=\"p3\">The two most notable vulnerabilities for the month are <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21907\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">CVE-2022-21907<\/span><\/a>, the previously mentioned HTTP.sys vulnerability, and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-21840\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">CVE-2022-21840<\/span><\/a><span class=\"s1\">,<\/span> which is a Microsoft Office remote code execution vulnerability that only requires a user to open an office file or view the file in Windows Explorer\u2019s preview pane.<\/p>\n<p class=\"p3\">CVE-2022-21907 HTTP.sys vulnerability is marked as Exploitation More Likely and has the potential to be wormable based on how it works. An attacker who successfully sends a specially crafted packet to a target Windows server and executes an attack can use the affected system to replicate the attack on other targets. The vulnerability affects Windows 10, Windows 11, Server 2019, and Server 2022, so even though IIS is typically only in use on Windows servers, there is still the chance that workstations may be leveraging IIS, meaning an audit of both server and workstation Windows OS is warranted.<\/p>\n<p class=\"p3\">Microsoft also issued fixes for three remote code execution vulnerabilities (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21846\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">CVE-2022-21846<\/span><\/a>, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21855\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">CVE-2022-21855<\/span><\/a>, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21969\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">CVE-2022-21969<\/span><\/a>) in Exchange Server. While these are marked as Exploitation More Likely, they all appear to require an attacker to already have a substantial foothold in or access to an environment prior to exploitation. This is in stark contrast to ProxyShell from last year, which was an RCE, so these don\u2019t have the same level of urgency. Nonetheless, it should still be a priority item for the month.<\/p>\n<h2 class=\"p4\">Vulnerability prioritization<\/h2>\n<p class=\"p3\">As always, it is important to not just prioritize vulnerabilities based on their severity but also their exploitation likelihood. Vulnerabilities marked Exploitation More Likely<i> <\/i>are as important, and some may say even more important, to address quickly due to their increased likelihood to cause actual impacts to an environment. These CVEs from Microsoft should be top of the list as they are all marked as Exploitation More Likely, Exploitation Detected, or Critical.<\/p>\n<table class=\"t1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td class=\"td1\" valign=\"top\" width=\"15%\">\n<p class=\"p5\"><strong>CVE<\/strong><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\" width=\"35%\">\n<p class=\"p5\"><strong>Description<\/strong><\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\" width=\"25%\">\n<p class=\"p5\"><strong>Exploitability<\/strong><\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\" width=\"25%\">\n<p class=\"p5\"><strong>Severity<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21969%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-21969\" target=\"_blank\" rel=\"noopener\">CVE-2022-21969<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Microsoft Exchange Server RCE<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21919%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-21919\" target=\"_blank\" rel=\"noopener\">CVE-2022-21919<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Windows User Profile Service Elevation of Privilege<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21916%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-21916\" target=\"_blank\" rel=\"noopener\">CVE-2022-21916<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p7\">Windows Common Log File System Driver Elevation of Privilege<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21914%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-21914\" target=\"_blank\" rel=\"noopener\">CVE-2022-21914<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Windows Remote Access Connection Manager Elevation of Privilege<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21908%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-21908\" target=\"_blank\" rel=\"noopener\">CVE-2022-21908<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Windows Installer Elevation of Privilege<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21907%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-21907\" target=\"_blank\" rel=\"noopener\">CVE-2022-21907<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">HTTP Protocol Stack Remote Code Execution<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21903%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-21903\" target=\"_blank\" rel=\"noopener\">CVE-2022-21903<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Windows GDI Elevation of Privilege<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21897%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-21897\" target=\"_blank\" rel=\"noopener\">CVE-2022-21897<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Windows Common Log File System Driver Elevation of Privilege<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21887%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-21887\" target=\"_blank\" rel=\"noopener\">CVE-2022-21887<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Win32k Elevation of Privilege<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21885%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-21885\" target=\"_blank\" rel=\"noopener\">CVE-2022-21885<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Windows Remote Access Connection Manager Elevation of Privilege<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21882%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-21882\" target=\"_blank\" rel=\"noopener\">CVE-2022-21882<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Win32k Elevation of Privilege<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21881%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-21881\" target=\"_blank\" rel=\"noopener\">CVE-2022-21881<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Windows Kernel Elevation of Privilege<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21855%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-21855\" target=\"_blank\" rel=\"noopener\">CVE-2022-21855<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Microsoft Exchange Server Remote Code Execution<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21846%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-21846\" target=\"_blank\" rel=\"noopener\">CVE-2022-21846<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Microsoft Exchange Server Remote Code Execution<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p8\"><span class=\"s2\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-21840\" target=\"_blank\" rel=\"noopener\">CVE-2022-21840<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Microsoft Remote Code Execution<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation Less Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p8\"><span class=\"s2\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-21917\" target=\"_blank\" rel=\"noopener\">CVE-2022-21917<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">HEVC Video Extensions Remote Code Execution<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation Less Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p8\"><span class=\"s2\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-22947\" target=\"_blank\" rel=\"noopener\">CVE-2021-22947<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Open Source Curl Remote Code Execution<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation Less Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p8\"><span class=\"s2\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-21857\" target=\"_blank\" rel=\"noopener\">CVE-2022-21857<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Active Directory Domain Services Elevation of Privilege<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation Less Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p8\"><span class=\"s2\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-21898\" target=\"_blank\" rel=\"noopener\">CVE-2022-21898<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">DirectX Graphics Kernel Remote Code Execution<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation Less Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p8\"><span class=\"s2\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-21912\" target=\"_blank\" rel=\"noopener\">CVE-2022-21912<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">DirectX Graphics Kernel Remote Code Execution<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation Less Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p8\"><span class=\"s2\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-21833\" target=\"_blank\" rel=\"noopener\">CVE-2022-21833<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Virtual Machine IDE Drive Elevation of Privilege<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation Less Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Critical<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 class=\"p4\">Cumulative updates<\/h2>\n<p class=\"p3\"><span class=\"s1\"><a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/january-11-2022-kb5009566-os-build-22000-434-eee797fa-5ee3-4501-aeec-db3bc73b2c7b\" target=\"_blank\" rel=\"noopener\">KB5009566<\/a><\/span> for Windows 11 includes a servicing stack update to resolve problems with Windows Updates. There is a known issue with some image editing software not rendering colors correctly on HDR displays, so any media\/content creation workstations may need to defer this cumulative update until resolved in late January. <a href=\"https:\/\/support.microsoft.com\/topic\/b763552f-73bd-435a-b220-fc3e0bc9765b\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">KB5009543<\/span><\/a> and <a href=\"https:\/\/support.microsoft.com\/topic\/585a5a21-b1a9-43e8-b720-90719d35615e\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">KB500945<\/span><\/a> for Windows 10 also include a servicing stack update for Windows Update.<\/p>\n<h2 class=\"p4\">End of service for Windows 10 2004<\/h2>\n<p class=\"p3\">Here is a final reminder that Windows 10 Version 2004 received its last security update in December 2021 because it has now hit EOS. Looking for this and other end-of-service builds of Windows 10 should be a part of regular audits of environments.<\/p>\n<h2 class=\"p4\">Log4j still lingers<\/h2>\n<p class=\"p3\">The fallout from <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-44228\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">CVE-2021-44228<\/span><\/a> carries on as threat actors continue to leverage it to deliver both old and <a href=\"https:\/\/research.checkpoint.com\/2022\/apt35-exploits-log4j-vulnerability-to-distribute-new-modular-powershell-toolkit\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">new payloads<\/span><\/a>. Because of how easy the Log4j vulnerability is to exploit, this isn\u2019t something attackers will stop using anytime soon. Unfortunately, there are still a large number of vulnerable systems out there with enterprise, SMB, and even federal agencies still <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">struggling<\/span><\/a> to identify at-risk systems. The FTC is even <a href=\"https:\/\/www.ftc.gov\/news-events\/blogs\/techftc\/2022\/01\/ftc-warns-companies-remediate-log4j-security-vulnerability\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">warning<\/span><\/a> those who fail to take due care when addressing Log4j vulnerabilities may be falling foul of the Gramm Leach Bliley Act and face legal action.<\/p>\n<h2 class=\"p4\">Summary<\/h2>\n<p class=\"p3\">As always, make sure you have established patching processes for evaluation, testing, and pushing into production. If you have traditionally only dealt with patches by applying them based on their severity, consider including prioritization of patches for Zero-Days, Exploitation Detected and Exploitation More Likely vulnerabilities in your <a href=\"https:\/\/www.n-able.com\/features\/windows-patch-management\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">Patch Management<\/span><\/a> routines.<\/p>\n<p class=\"p10\"><i>Lewis Pope is the head security nerd at N&#8209;able. You can follow him on:<\/i><\/p>\n<p class=\"p11\"><span class=\"s4\"><i>Twitter:\u00a0<\/i><a href=\"https:\/\/twitter.com\/cybersec_nerd%22%20%5Ct%20%22_blank\"><span class=\"s5\"><i>@cybersec_nerd<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p11\"><span class=\"s4\"><i>LinkedIn:\u00a0<\/i><a href=\"https:\/\/www.linkedin.com\/in\/thesecuritypope%22%20%5Ct%20%22_blank\"><span class=\"s5\"><i>thesecuritypope<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p11\"><span class=\"s4\"><i>Twitch:\u00a0<\/i><a href=\"https:\/\/www.twitch.tv\/cybersec_nerd%22%20%5Ct%20%22_blank\"><span class=\"s5\"><i>cybersec_nerd<\/i><\/span><\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Potentially devastating flaw in the HTTP Protocol Stack used by Windows IIS is the center point of 2022\u2019s first Patch Tuesday. Lewis Pope takes a deep dive into this month\u2019s&#8230;<\/p>\n","protected":false},"author":62,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-27597","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>January 2022 Patch Tuesday: Wormable HTTP.SYS vulnerability rings in the new year - N-able<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/it\/blog\/january-2022-patch-tuesday\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"January 2022 Patch Tuesday: Wormable HTTP.SYS vulnerability rings in the new year - N-able\" \/>\n<meta property=\"og:description\" content=\"Potentially devastating flaw in the HTTP Protocol Stack used by Windows IIS is the center point of 2022\u2019s first Patch Tuesday. Lewis Pope takes a deep dive into this month\u2019s...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/it\/blog\/january-2022-patch-tuesday\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-13T11:07:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-10T17:03:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"356\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lewis Pope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lewis Pope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/january-2022-patch-tuesday#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/january-2022-patch-tuesday\"},\"author\":{\"name\":\"Lewis Pope\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\"},\"headline\":\"January 2022 Patch Tuesday: Wormable HTTP.SYS vulnerability rings in the new year\",\"datePublished\":\"2022-01-13T11:07:14+00:00\",\"dateModified\":\"2022-06-10T17:03:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/january-2022-patch-tuesday\"},\"wordCount\":1072,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"articleSection\":[\"Head Nerds\",\"Patch Management\",\"Security\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/january-2022-patch-tuesday\",\"url\":\"https:\/\/www.n-able.com\/it\/blog\/january-2022-patch-tuesday\",\"name\":\"January 2022 Patch Tuesday: Wormable HTTP.SYS vulnerability rings in the new year - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#website\"},\"datePublished\":\"2022-01-13T11:07:14+00:00\",\"dateModified\":\"2022-06-10T17:03:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/january-2022-patch-tuesday#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/it\/blog\/january-2022-patch-tuesday\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/january-2022-patch-tuesday#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Head Nerds\",\"item\":\"https:\/\/www.n-able.com\/it\/blog\/category\/head-nerds-it\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"January 2022 Patch Tuesday: Wormable HTTP.SYS vulnerability rings in the new year\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/it\/#website\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\",\"name\":\"Lewis Pope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"caption\":\"Lewis Pope\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"January 2022 Patch Tuesday: Wormable HTTP.SYS vulnerability rings in the new year - N-able","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/it\/blog\/january-2022-patch-tuesday","og_locale":"it_IT","og_type":"article","og_title":"January 2022 Patch Tuesday: Wormable HTTP.SYS vulnerability rings in the new year - N-able","og_description":"Potentially devastating flaw in the HTTP Protocol Stack used by Windows IIS is the center point of 2022\u2019s first Patch Tuesday. Lewis Pope takes a deep dive into this month\u2019s...","og_url":"https:\/\/www.n-able.com\/it\/blog\/january-2022-patch-tuesday","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2022-01-13T11:07:14+00:00","article_modified_time":"2022-06-10T17:03:07+00:00","og_image":[{"width":720,"height":356,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope.jpg","type":"image\/jpeg"}],"author":"Lewis Pope","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope.jpg","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Scritto da":"Lewis Pope","Tempo di lettura stimato":"5 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/it\/blog\/january-2022-patch-tuesday#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/blog\/january-2022-patch-tuesday"},"author":{"name":"Lewis Pope","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae"},"headline":"January 2022 Patch Tuesday: Wormable HTTP.SYS vulnerability rings in the new year","datePublished":"2022-01-13T11:07:14+00:00","dateModified":"2022-06-10T17:03:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/january-2022-patch-tuesday"},"wordCount":1072,"publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"articleSection":["Head Nerds","Patch Management","Security"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/it\/blog\/january-2022-patch-tuesday","url":"https:\/\/www.n-able.com\/it\/blog\/january-2022-patch-tuesday","name":"January 2022 Patch Tuesday: Wormable HTTP.SYS vulnerability rings in the new year - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/#website"},"datePublished":"2022-01-13T11:07:14+00:00","dateModified":"2022-06-10T17:03:07+00:00","breadcrumb":{"@id":"https:\/\/www.n-able.com\/it\/blog\/january-2022-patch-tuesday#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/it\/blog\/january-2022-patch-tuesday"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/it\/blog\/january-2022-patch-tuesday#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Head Nerds","item":"https:\/\/www.n-able.com\/it\/blog\/category\/head-nerds-it"},{"@type":"ListItem","position":2,"name":"January 2022 Patch Tuesday: Wormable HTTP.SYS vulnerability rings in the new year"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/it\/#website","url":"https:\/\/www.n-able.com\/it\/","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/it\/#organization","name":"N-able","url":"https:\/\/www.n-able.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae","name":"Lewis Pope","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","caption":"Lewis Pope"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/27597","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/comments?post=27597"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/27597\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/media?parent=27597"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}