{"id":38819,"date":"2022-10-17T12:06:54","date_gmt":"2022-10-17T11:06:54","guid":{"rendered":"https:\/\/www.n-able.com\/?p=38819"},"modified":"2023-03-21T14:06:33","modified_gmt":"2023-03-21T14:06:33","slug":"patch-tuesday-october-2022","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-october-2022","title":{"rendered":"Patch Tuesday October 2022: ProxyNotShell, Fortinet and enough Zero-days to keep everyone busy"},"content":{"rendered":"<p class=\"p2\"><span class=\"s1\">Before October\u2019s Patch Tuesday even arrived, earlier in the week there was a rush of mitigations for FortiOS, FortiProxy, FortiSwitchManager, and Microsoft Exchange Server Zero-Days being implemented by admins and security teams. Add to this two new Zero-Days addressed by Microsoft updates, previous Zero-Days remaining unpatched, Zero-Days under active exploitation, 13 Microsoft vulnerabilities marked critical, and 15 marked as exploitation more likely and it\u2019s likely IT teams will need a little hustle in their step to keep up this month.<\/span><\/p>\n<h2 class=\"p4\"><span class=\"s1\">Microsoft Vulnerabilities<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">A total of 84 vulnerabilities are addressed within this Microsoft Patch Tuesday. While this represents a slight uptick compared to last month, the risk exposure created by newly announced Zero-Days and un-patched Zero-Day vulnerabilites is quite an escalation. This is one of those months where just applying all available updates isn\u2019t going to be enough to see you through.<\/span><\/p>\n<p class=\"p3\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-41043\" target=\"_blank\" rel=\"noopener\">CVE-2022-41043<\/a><\/span><span class=\"s1\"> is a Microsoft Office Information Disclosure Vulnerability Zero-Day. Since it\u2019s rated as low severity, exploitation is less likely, a fix was issued for it this month and it apparently only affects Microsoft Office 2019 and 2021 for Mac, there isn\u2019t too much to be concerned about around this vulnerability.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<p class=\"p3\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-41033\" target=\"_blank\" rel=\"noopener\">CVE-2022-41033<\/a><\/span><span class=\"s1\"> is an escalation of privilege vulnerability under active exploitation that allows an attacker to gain SYSTEM privilege. There is not much additional information on this vulnerability as yet, outside of it being the only actively exploited vulnerability receiving a patch this month.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">The big headliners for the month though are <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-41040\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">CVE-2022-41040<\/span><\/a> and <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-41082\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">CVE-2022-41082<\/span><\/a>. These can be chained together to allow remote code execution against Microsoft Exchange Servers. The \u2018celebrity\u2019 name for the vulnerabilities is ProxyNotShell\u2014this may be a familiar to some because of ProxyShell, a similar vulnerability from 2021. Just as ProxyShell caused a lot of havoc, ProxyNotShell looks likely to follow in its footsteps as it is currently under active exploitation. ProxyNotShell did not receive any security updates or fixes as part of October\u2019s Patch Tuesday, so if you\u2019re looking for a better understanding of what it is and what you should do, check out Kevin Beaumont\u2019s (<a href=\"https:\/\/mobile.twitter.com\/GossiTheDog\/status\/1575762721353916417\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">@GossiTheDog<\/span><\/a>) great write-up <a href=\"https:\/\/doublepulsar.com\/proxynotshell-the-story-of-the-claimed-zero-day-in-microsoft-exchange-5c63d963a9e9\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">here<\/span><\/a>. Microsoft\u2019s current guidance is to apply their recommended <a href=\"https:\/\/msrc-blog.microsoft.com\/2022\/09\/29\/customer-guidance-for-reported-zero-day-vulnerabilities-in-microsoft-exchange-server\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">mitigations<\/span><\/a>. If you were waiting for Microsoft to release a fix via Windows Update you\u2019re out of luck and should be prioritizing applying mitigations today.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">There are also three escalation of privilege vulnerabilities affecting Microsoft Exchange Server that received fixes this month. Your Exchange admins have quite a prioritization list this month.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<h2 class=\"p1\">Microsoft Patch Tuesday <span class=\"s1\">Vulnerability Prioritization<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">October\u2019s Patch Tuesday is a great reminder that sometimes you can\u2019t just wait for an automated fix to come down the line. At times you\u2019ve got to roll-up your sleeves and apply manual remediations. <a href=\"https:\/\/www.n-able.com\/products\/n-central-rmm\/patch-management\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">Patch management solutions<\/span><\/a> can make our lives easier, but they can\u2019t handle dealing with all vulnerabilities. ProxyNotShell should be priority one for any Exchange admins, with the other Exchange vulnerabilities being addressed with regular security updates.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Critical Severity, Exploitation More Likely, and Exploitation Detected vulnerabilities as always should be ranking fairly high on your priority list. If you only patch based on severity you are leaving a lot of unnecessary risk exposure lying around.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<table class=\"t1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p5\" style=\"text-align: center\"><span class=\"s4\"><b>CVE<\/b><\/span><\/p>\n<\/td>\n<td class=\"td2\" style=\"text-align: center\" valign=\"top\">\n<p class=\"p5\"><span class=\"s1\"><b>Description<\/b><\/span><\/p>\n<\/td>\n<td class=\"td3\" style=\"text-align: center\" valign=\"top\">\n<p class=\"p5\"><span class=\"s1\"><b>Severity<\/b><\/span><\/p>\n<\/td>\n<td class=\"td4\" style=\"text-align: center\" valign=\"top\">\n<p class=\"p5\"><span class=\"s1\"><b>\u00a0Exploitability<\/b><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21980\" target=\"_blank\" rel=\"noopener\">CVE-2022-21980<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Microsoft Exchange Server Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">\u00a0Exploitation More Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-24516\" target=\"_blank\" rel=\"noopener\">CVE-2022-24516<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Microsoft Exchange Server Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">\u00a0Exploitation More Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-24477\" target=\"_blank\" rel=\"noopener\">CVE-2022-24477<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Microsoft Exchange Server Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-34689\" target=\"_blank\" rel=\"noopener\">CVE-2022-34689<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Windows CryptoAPI Spoofing Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-37970\" target=\"_blank\" rel=\"noopener\">CVE-2022-37970<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Windows DWM Core Library Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-37987\" target=\"_blank\" rel=\"noopener\">CVE-2022-37987<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Windows Client Server Run-time Subsystem (CSRSS)<br \/>\nElevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-38050\" target=\"_blank\" rel=\"noopener\">CVE-2022-38050<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Win32k Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-38051\" target=\"_blank\" rel=\"noopener\">CVE-2022-38051<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Windows Graphics Component Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-41036\" target=\"_blank\" rel=\"noopener\">CVE-2022-41036<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Microsoft SharePoint Server Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-37974\" target=\"_blank\" rel=\"noopener\">CVE-2022-37974<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Windows Mixed Reality Developer Tools Information Disclosure Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-38028\" target=\"_blank\" rel=\"noopener\">CVE-2022-38028<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Windows Print Spooler Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-37989\" target=\"_blank\" rel=\"noopener\">CVE-2022-37989<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Windows Client Server Run-time Subsystem (CSRSS)<br \/>\nElevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-37997\" target=\"_blank\" rel=\"noopener\">CVE-2022-37997<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Windows Graphics Component Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-38053\" target=\"_blank\" rel=\"noopener\">CVE-2022-38053<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Microsoft SharePoint Server Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Important<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-41038\" target=\"_blank\" rel=\"noopener\">CVE-2022-41038<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Microsoft SharePoint Server Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-37968\" target=\"_blank\" rel=\"noopener\">CVE-2022-37968<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Azure Arc-enabled Kubernetes cluster Connect<br \/>\nElevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Exploitation<br \/>\nLess Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-38048\" target=\"_blank\" rel=\"noopener\">CVE-2022-38048<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Microsoft Office Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Exploitation<br \/>\nLess Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-37979\" target=\"_blank\" rel=\"noopener\">CVE-2022-37979<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Windows Hyper-V Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Exploitation<br \/>\nLess Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-37976\" target=\"_blank\" rel=\"noopener\">CVE-2022-37976<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Active Directory Certificate Services<br \/>\nElevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Exploitation<br \/>\nLess Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-33634\" target=\"_blank\" rel=\"noopener\">CVE-2022-33634<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Windows Point-to-Point Tunneling Protocol<br \/>\nRemote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Exploitation<br \/>\nLess Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-22035\" target=\"_blank\" rel=\"noopener\">CVE-2022-22035<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Windows Point-to-Point Tunneling Protocol<br \/>\nRemote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Exploitation<br \/>\nLess Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-24504\" target=\"_blank\" rel=\"noopener\">CVE-2022-24504<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Windows Point-to-Point Tunneling Protocol<br \/>\nRemote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Exploitation<br \/>\nLess Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-38047\" target=\"_blank\" rel=\"noopener\">CVE-2022-38047<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Windows Point-to-Point Tunneling Protocol<br \/>\nRemote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Exploitation<br \/>\nLess Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-41081\" target=\"_blank\" rel=\"noopener\">CVE-2022-41081<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Windows Point-to-Point Tunneling Protocol<br \/>\nRemote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Exploitation<br \/>\nLess Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p8\" style=\"text-align: center\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-30198\" target=\"_blank\" rel=\"noopener\">CVE-2022-30198<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Windows Point-to-Point Tunneling Protocol<br \/>\nRemote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Exploitation<br \/>\nLess Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" style=\"text-align: center\" valign=\"top\">\n<p class=\"p8\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-38000\" target=\"_blank\" rel=\"noopener\">CVE-2022-38000<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" style=\"text-align: center\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Windows Point-to-Point Tunneling Protocol<br \/>\nRemote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" style=\"text-align: center\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Critical<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\">Exploitation<br \/>\nLess Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 class=\"p3\"><span class=\"s1\">Cumulative Updates<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">The cumulative updates were released for current builds of Windows 10 with\u00a0<a href=\"https:\/\/support.microsoft.com\/help\/5018410\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">KB5018410<\/span><\/a> and <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/october-11-2022-kb5018427-os-build-22621-674-f14ec4b2-1901-42e9-94cb-015169c49b62\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">KB5018427<\/span><\/a> for Windows 11. Containing the usual rollup of fixes from previous months and including Servicing Stack Updates in the CU should make these easy to rollout. The Windows 11 CU includes numerous fixes for 30 bugs, but fails to resolve a performance issue that occurs when copying files over SMB that was first introduced with Windows 11 22H2 update. Go old-school and use xcopy or robocopy as a workaround if you are still seeing this performance impact.<\/span><\/p>\n<h2 class=\"p4\"><span class=\"s1\">Other Vendors<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">Fortinet also announced an authentication bypass affecting FortiGate firewalls, FortiProxy, and FortiSwitchManager. <a href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-22-377\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">CVE-2022-40684<\/span><\/a> allows an attacker to perform administrative actions on those devices. This is under active exploitation and affects multiple versions of FortiOS, FortiProxy, and FortiSwitchManager. If you have Fortinet appliances deployed then updating firmware should be high on your prioritization list.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<h2 class=\"p4\"><span class=\"s1\">Summary<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">As always make sure you have established patching processes for evaluation, testing and pushing into production. If you have traditionally only dealt with patches by applying them based on their severity consider including prioritization of patches for Zero-Days, Exploitation Detected, and Exploitation More Likely vulnerabilities in your <a href=\"https:\/\/www.n-able.com\/features\/windows-patch-management\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">Patch Management<\/span><\/a> routines.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">\u00a0<\/span><\/p>\n<p class=\"p9\"><span class=\"s1\"><b>Looking for more information on Patch Management? Check out\u00a0<\/b><a href=\"https:\/\/www.n-able.com\/blog\/patch-management\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\"><b>this section<\/b><\/span><\/a><b>\u00a0on our blog.<\/b><\/span><\/p>\n<p class=\"p9\"><span class=\"s1\"><i>Lewis Pope is the Head Security Nerd at N&#8209;able. You can follow him on Twitter:\u00a0<\/i><a href=\"https:\/\/twitter.com\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\"><i>@cybersec_nerd<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p10\"><span class=\"s6\"><i>LinkedIn:\u00a0<\/i><a href=\"https:\/\/www.linkedin.com\/in\/thesecuritypope\" target=\"_blank\" rel=\"noopener\"><span class=\"s7\"><i>thesecuritypope<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p10\"><span class=\"s6\"><i>Twitch:\u00a0<\/i><a href=\"https:\/\/www.twitch.tv\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s7\"><i>cybersec_nerd<\/i><\/span><\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This month\u2019s Microsoft Patch Tuesday sees a small uptick in actual vulnerabilities addressed, but a big escalation in risk exposure. Lewis Pope looks takes a detailed look.<\/p>\n","protected":false},"author":62,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-38819","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Patch Tuesday October 2022: ProxyNotShell, Fortinet and enough Zero-days to keep everyone busy - N-able<\/title>\n<meta name=\"description\" content=\"October&#039;s Microsoft Patch Tuesday sees a small uptick in actual vulnerabilities addressed, but a big escalation in risk exposure. Read more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-october-2022\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Patch Tuesday October 2022: ProxyNotShell, Fortinet and enough Zero-days to keep everyone busy - N-able\" \/>\n<meta property=\"og:description\" content=\"October&#039;s Microsoft Patch Tuesday sees a small uptick in actual vulnerabilities addressed, but a big escalation in risk exposure. Read more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-october-2022\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-17T11:06:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-21T14:06:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-03.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1309\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Lewis Pope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-03.png\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lewis Pope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-october-2022#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-october-2022\"},\"author\":{\"name\":\"Lewis Pope\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\"},\"headline\":\"Patch Tuesday October 2022: ProxyNotShell, Fortinet and enough Zero-days to keep everyone busy\",\"datePublished\":\"2022-10-17T12:06:54+01:00\",\"dateModified\":\"2023-03-21T14:06:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-october-2022\"},\"wordCount\":1128,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"articleSection\":[\"Head Nerds\",\"Patch Management\",\"Security\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-october-2022\",\"url\":\"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-october-2022\",\"name\":\"Patch Tuesday October 2022: ProxyNotShell, Fortinet and enough Zero-days to keep everyone busy - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#website\"},\"datePublished\":\"2022-10-17T12:06:54+01:00\",\"dateModified\":\"2023-03-21T14:06:33+00:00\",\"description\":\"October's Microsoft Patch Tuesday sees a small uptick in actual vulnerabilities addressed, but a big escalation in risk exposure. Read more.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-october-2022#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-october-2022\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-october-2022#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Head Nerds\",\"item\":\"https:\/\/www.n-able.com\/it\/blog\/category\/head-nerds-it\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Patch Tuesday October 2022: ProxyNotShell, Fortinet and enough Zero-days to keep everyone busy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/it\/#website\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\",\"name\":\"Lewis Pope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"caption\":\"Lewis Pope\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Patch Tuesday October 2022: ProxyNotShell, Fortinet and enough Zero-days to keep everyone busy - N-able","description":"October's Microsoft Patch Tuesday sees a small uptick in actual vulnerabilities addressed, but a big escalation in risk exposure. Read more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-october-2022","og_locale":"it_IT","og_type":"article","og_title":"Patch Tuesday October 2022: ProxyNotShell, Fortinet and enough Zero-days to keep everyone busy - N-able","og_description":"October's Microsoft Patch Tuesday sees a small uptick in actual vulnerabilities addressed, but a big escalation in risk exposure. Read more.","og_url":"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-october-2022","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2022-10-17T11:06:54+00:00","article_modified_time":"2023-03-21T14:06:33+00:00","og_image":[{"width":2500,"height":1309,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-03.png","type":"image\/png"}],"author":"Lewis Pope","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-03.png","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Scritto da":"Lewis Pope","Tempo di lettura stimato":"5 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-october-2022#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-october-2022"},"author":{"name":"Lewis Pope","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae"},"headline":"Patch Tuesday October 2022: ProxyNotShell, Fortinet and enough Zero-days to keep everyone busy","datePublished":"2022-10-17T12:06:54+01:00","dateModified":"2023-03-21T14:06:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-october-2022"},"wordCount":1128,"publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"articleSection":["Head Nerds","Patch Management","Security"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-october-2022","url":"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-october-2022","name":"Patch Tuesday October 2022: ProxyNotShell, Fortinet and enough Zero-days to keep everyone busy - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/#website"},"datePublished":"2022-10-17T12:06:54+01:00","dateModified":"2023-03-21T14:06:33+00:00","description":"October's Microsoft Patch Tuesday sees a small uptick in actual vulnerabilities addressed, but a big escalation in risk exposure. Read more.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-october-2022#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-october-2022"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-october-2022#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Head Nerds","item":"https:\/\/www.n-able.com\/it\/blog\/category\/head-nerds-it"},{"@type":"ListItem","position":2,"name":"Patch Tuesday October 2022: ProxyNotShell, Fortinet and enough Zero-days to keep everyone busy"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/it\/#website","url":"https:\/\/www.n-able.com\/it\/","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/it\/#organization","name":"N-able","url":"https:\/\/www.n-able.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae","name":"Lewis Pope","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","caption":"Lewis Pope"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/38819","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/comments?post=38819"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/38819\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/media?parent=38819"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}