{"id":40697,"date":"2022-12-14T13:28:14","date_gmt":"2022-12-14T13:28:14","guid":{"rendered":"https:\/\/www.n-able.com\/?p=40697"},"modified":"2023-03-21T14:05:39","modified_gmt":"2023-03-21T14:05:39","slug":"patch-tuesday-december-2022","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/pt-br\/blog\/patch-tuesday-december-2022","title":{"rendered":"Patch Tuesday December 2022: Mark of the Web zero-day fixed, and guidance on CVE-2022-37967 manual mitigation"},"content":{"rendered":"<p class=\"p2\"><span class=\"s1\">To close out the year, Patch Tuesday brings us the gift of fixes for two zero-day vulnerabilities and a collection of critical vulnerabilities. These vulnerabilities are lacking the \u201chair on fire\u201d responses from the community that vulnerabilities from earlier in the year generated, like <a href=\"https:\/\/www.n-able.com\/blog\/patch-tuesday-october-2022\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">ProxyNotShell<\/span><\/a> and a <a href=\"https:\/\/www.n-able.com\/blog\/january-2022-patch-tuesday\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">wormable<\/span><\/a> HTTP.sys flaw. However, as always, they should be addressed in a timely manner through a proper patching regime\u2014even if they lack the dire warnings that accompanied previous named vulnerabilities this year.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">This month also marks <a href=\"https:\/\/www.n-able.com\/blog\/prepare-for-windows-8-eol-and-windows-10-21h1-eos\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">End of Servicing for Windows 10 21H1<\/span><\/a>. <span class=\"s2\">Microsoft<\/span> has been <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/windows-it-pro-blog\/reminder-end-of-servicing-for-windows-10-version-21h1\/ba-p\/3671327\" target=\"_blank\" rel=\"noopener\">warning of the impending EOS<\/a> for a few months. Most patching solutions should be able to handle the update to 22H1 or 22H2 without it being a major time investment. January though brings <a href=\"https:\/\/www.n-able.com\/blog\/prepare-for-windows-8-eol-and-windows-10-21h1-eos\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">end of support for Windows 8.1<\/span><\/a>, which will be slightly more challenging to address. If you haven\u2019t started already, now is the time to audit your environments for Windows 8.1 systems and plan for their upgrade, replacement, or decommissioning. <\/span><\/p>\n<h2 class=\"p3\"><span class=\"s1\">Microsoft vulnerabilities <\/span><\/h2>\n<p class=\"p4\"><span class=\"s1\">There were only 49 total vulnerabilities addressed as part of Microsoft\u2019s December Patch Tuesday, about half of what we\u2019ve seen in previous months. Of these, six are rated as Critical with the two zero-day vulnerabilities that were addressed labeled as Moderate and Important. Even though labeling a vulnerability as a zero-day makes it sound so much worse than other vulnerabilities, don\u2019t let that label distract you from other vulnerabilities that carry higher severity ratings or are under active exploitation. <\/span><\/p>\n<p class=\"p4\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-44698\" target=\"_blank\" rel=\"noopener\">CVE-2022-44698<\/a><\/span><span class=\"s1\"> is the notable vulnerability of the month. This zero-day allows for specially crafted files to be downloaded to a device without the Mark of the Web flag on the file. This flag is what lets the Window OS, applications, and end-users know the file originated from the web and shouldn\u2019t be trusted by default. Even though it\u2019s carrying only a CVSS 5.4 the fact it us under active exploitation by threat actors in <a href=\"https:\/\/threatresearch.ext.hp.com\/magniber-ransomware-switches-to-javascript-targeting-home-users-with-fake-software-updates\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">ransomware attacks<\/span><\/a> should put it right on top of your to-do list.<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">The second zero-day of the month is <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-44710\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2022-44710<\/span><\/a>. This is an elevation of privilege vulnerability affecting DirectX that allows an attacker to gain SYSTEM privileges. There is no proof of concept exploiting this vulnerability publicly available yet, as such it only carries an Important severity rating and is marked as Exploitation Less Likely. So even though it carries the zero-day label, it sounds a lot less threatening than CVE-2022-44698, highlighting why understanding key metrics about vulnerabilities is an important part of proper risk evaluation and prioritization.<\/span><\/p>\n<p class=\"p4\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-37967\" target=\"_blank\" rel=\"noopener\">CVE-2022-37967<\/a><\/span><span class=\"s1\"> is an elevation of privilege vulnerability affecting Windows Kerberos that received an initial Phase 1 fix during November\u2019s Patch Tuesday, but requires additional mitigations as advised by Microsoft to address the security issue caused by CVE-2022-37967. If you are managing a Window\u2019s Domain then this <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/kb5020805-how-to-manage-kerberos-protocol-changes-related-to-cve-2022-37967-997e9acc-67c5-48e1-8d0d-190269bf4efb\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">KB<\/span><\/a> with instructions is essential reading as there are manual mitigations that must be made this month in addition to applying updates. <\/span><\/p>\n<h2 class=\"p1\">Microsoft Patch Tuesday <span class=\"s1\">Vulnerability Prioritization<\/span><\/h2>\n<p class=\"p4\"><span class=\"s1\">As always, prioritizing which vulnerabilities to address first is part following established best practices and a little bit of gut instinct. Critical severity, exploitation more likely and exploitation detected vulnerabilities as always should be ranking fairly high on your priority list. If you only patch based on severity you are leaving a lot of unnecessary risk exposure lying around.<\/span><\/p>\n<p><em><strong><span class=\"s1\">Table Key:\u00a0<\/span><\/strong><span class=\"s1\">Severity: <\/span><span class=\"s1\">C = Critical, I = Important, M = Moderate; <\/span><span class=\"s1\">Status: EML = Exploitation More Likely, ELL = Exploitation Less Likely, ED = Exploitation Detected<\/span><\/em><\/p>\n<table class=\"t1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td class=\"td1\" valign=\"top\" width=\"20%\">\n<p class=\"p7\"><span class=\"s4\"><b>CVE<\/b><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\" width=\"60%\">\n<p class=\"p7\"><span class=\"s1\"><b>Description<\/b><\/span><\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\" width=\"10%\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\"><b>Severity<\/b><\/span><\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\" width=\"10%\">\n<p class=\"p7\" style=\"text-align: center\"><span class=\"s1\"><b>Status<\/b><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-44698\" target=\"_blank\" rel=\"noopener\">CVE-2022-44698<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Windows SmartScreen Security Feature Bypass Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p5\" style=\"text-align: center\"><span class=\"s1\">M<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p5\" style=\"text-align: center\"><span class=\"s1\">ED<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-44704\" target=\"_blank\" rel=\"noopener\">CVE-2022-44704<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Microsoft Windows Sysmon Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p5\" style=\"text-align: center\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p5\" style=\"text-align: center\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-44683\" target=\"_blank\" rel=\"noopener\">CVE-2022-44683<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Windows Kernel Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p5\" style=\"text-align: center\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p5\" style=\"text-align: center\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-44675\" target=\"_blank\" rel=\"noopener\">CVE-2022-44675<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Windows Bluetooth Driver Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p5\" style=\"text-align: center\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td class=\"td8\" style=\"text-align: center\" valign=\"top\">\n<p class=\"p5\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: left\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-44673\" target=\"_blank\" rel=\"noopener\">CVE-2022-44673<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Windows Client Server Run-Time Subsystem (CSRSS) Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p5\" style=\"text-align: center\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p5\" style=\"text-align: center\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-44671\" target=\"_blank\" rel=\"noopener\">CVE-2022-44671<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Windows Graphics Component Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p5\" style=\"text-align: center\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p5\" style=\"text-align: center\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-41121\" target=\"_blank\" rel=\"noopener\">CVE-2022-41121<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"bottom\">\n<p class=\"p7\"><span class=\"s1\">Windows Graphics Component Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p5\" style=\"text-align: center\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p5\" style=\"text-align: center\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-41079\" target=\"_blank\" rel=\"noopener\">CVE-2022-41079<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Microsoft Exchange Server Spoofing Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p5\" style=\"text-align: center\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p5\" style=\"text-align: center\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-41076\" target=\"_blank\" rel=\"noopener\">CVE-2022-41076<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">PowerShell Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p5\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p5\" style=\"text-align: center\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-37967\" target=\"_blank\" rel=\"noopener\">CVE-2022-37967<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Windows Kerberos Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p5\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p5\" style=\"text-align: center\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p8\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-41127\" target=\"_blank\" rel=\"noopener\">CVE-2022-41127<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p7\"><span class=\"s1\">Microsoft Dynamics NAV and Microsoft Dynamics 365 Business Central (On Premises) Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p5\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p5\" style=\"text-align: center\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p8\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-44690\" target=\"_blank\" rel=\"noopener\">CVE-2022-44690<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p9\"><span class=\"s6\">Microsoft SharePoint Server Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p5\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p5\" style=\"text-align: center\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p8\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-44693\" target=\"_blank\" rel=\"noopener\">CVE-2022-44693<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p9\"><span class=\"s6\">Microsoft SharePoint Server Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p5\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p5\" style=\"text-align: center\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p8\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-44670\" target=\"_blank\" rel=\"noopener\">CVE-2022-44670<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p9\"><span class=\"s6\">Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p5\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p5\" style=\"text-align: center\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p8\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-44676\" target=\"_blank\" rel=\"noopener\">CVE-2022-44676<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p9\"><span class=\"s6\">Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p5\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p5\" style=\"text-align: center\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 class=\"p3\"><span class=\"s1\">Other vendors<\/span><\/h2>\n<p class=\"p4\"><span class=\"s1\">Fortinet announced <a href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-22-398\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2022-42475<\/span><\/a>, which affects FortiOS SLL-VPN. Upgrading to the newest FortiOS should address this vulnerability. Citrix also released a <a href=\"https:\/\/www.citrix.com\/blogs\/2022\/12\/13\/critical-security-update-now-available-for-citrix-adc-citrix-gateway\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">security update<\/span><\/a> to address CVE-2022-27518 affecting Citrix ADC and Citrix Gateways. It\u2019s just as important\u2014some say more important\u2014to keep apprised of security bulletins and new firmware from network appliance vendors as it is to keep up to date with endpoints. So, if you\u2019re not subscribed to alerts from your network appliance vendors it would make for a good New Year\u2019s resolution. <\/span><\/p>\n<h2 class=\"p3\"><span class=\"s1\">Summary<\/span><\/h2>\n<p class=\"p4\"><span class=\"s1\">As always make sure you have established patching processes for evaluation, testing, and pushing into production. If you have traditionally only dealt with patches by applying them based on their severity, consider including prioritization of patches for Zero-Days, Exploitation Detected and Exploitation More Likely vulnerabilities in your <a href=\"https:\/\/www.n-able.com\/features\/windows-patch-management\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Patch Management<\/span><\/a> routines. <\/span><span class=\"s1\">\u00a0<\/span><\/p>\n<p class=\"p4\"><strong><span class=\"s1\">Looking for more blogs on patching, or looking for previous Microsoft Patch Tuesday Review, then check out <a href=\"https:\/\/www.n-able.com\/blog\/patch-management?filter_products=all#filtered\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">this section of our blog<\/span><\/a>.<\/span><\/strong><\/p>\n<p class=\"p10\"><span class=\"s1\"><i>\u00a0<\/i><\/span><\/p>\n<p class=\"p10\"><span class=\"s1\"><i>Lewis Pope is the Head Security Nerd at N&#8209;able. You can follow him on Twitter:\u00a0<\/i><a href=\"https:\/\/twitter.com\/cybersec_nerd\"><span class=\"s7\"><i>@cybersec_nerd<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p11\"><span class=\"s8\"><i>LinkedIn:\u00a0<\/i><a href=\"https:\/\/www.linkedin.com\/in\/thesecuritypope\"><span class=\"s9\"><i>thesecuritypope<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p11\"><span class=\"s8\"><i>Twitch:\u00a0<\/i><a href=\"https:\/\/www.twitch.tv\/cybersec_nerd\"><span class=\"s9\"><i>cybersec_nerd<\/i><\/span><\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft rounds up 2022 by addressing fewer vulnerabilities than in previous months. Lewis Pope looks at the patches you should be prioritizing!<\/p>\n","protected":false},"author":62,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-40697","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Patch Tuesday December 2022: Mark of the Web zero-day fixed, and guidance on CVE-2022-37967 manual mitigation - N-able<\/title>\n<meta name=\"description\" content=\"Microsoft rounds up 2022 by addressing fewer vulnerabilities than in previous months. Find out what patches you should be prioritizing!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/pt-br\/blog\/patch-tuesday-december-2022\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Patch Tuesday December 2022: Mark of the Web zero-day fixed, and guidance on CVE-2022-37967 manual mitigation - N-able\" \/>\n<meta property=\"og:description\" content=\"Microsoft rounds up 2022 by addressing fewer vulnerabilities than in previous months. Find out what patches you should be prioritizing!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/pt-br\/blog\/patch-tuesday-december-2022\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-14T13:28:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-21T14:05:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-02.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2501\" \/>\n\t<meta property=\"og:image:height\" content=\"1309\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Lewis Pope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-02.png\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lewis Pope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/patch-tuesday-december-2022#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/patch-tuesday-december-2022\"},\"author\":{\"name\":\"Lewis Pope\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\"},\"headline\":\"Patch Tuesday December 2022: Mark of the Web zero-day fixed, and guidance on CVE-2022-37967 manual mitigation\",\"datePublished\":\"2022-12-14T13:28:14+00:00\",\"dateModified\":\"2023-03-21T14:05:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/patch-tuesday-december-2022\"},\"wordCount\":959,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"articleSection\":[\"Head Nerds\",\"Patch Management\",\"Security\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/patch-tuesday-december-2022\",\"url\":\"https:\/\/www.n-able.com\/pt-br\/blog\/patch-tuesday-december-2022\",\"name\":\"Patch Tuesday December 2022: Mark of the Web zero-day fixed, and guidance on CVE-2022-37967 manual mitigation - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\"},\"datePublished\":\"2022-12-14T13:28:14+00:00\",\"dateModified\":\"2023-03-21T14:05:39+00:00\",\"description\":\"Microsoft rounds up 2022 by addressing fewer vulnerabilities than in previous months. Find out what patches you should be prioritizing!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/patch-tuesday-december-2022#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/pt-br\/blog\/patch-tuesday-december-2022\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/patch-tuesday-december-2022#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Head Nerds\",\"item\":\"https:\/\/www.n-able.com\/pt-br\/blog\/category\/head-nerds-pt-br\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Patch Tuesday December 2022: Mark of the Web zero-day fixed, and guidance on CVE-2022-37967 manual mitigation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/pt-br?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\",\"name\":\"Lewis Pope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"caption\":\"Lewis Pope\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Patch Tuesday December 2022: Mark of the Web zero-day fixed, and guidance on CVE-2022-37967 manual mitigation - N-able","description":"Microsoft rounds up 2022 by addressing fewer vulnerabilities than in previous months. Find out what patches you should be prioritizing!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/pt-br\/blog\/patch-tuesday-december-2022","og_locale":"pt_BR","og_type":"article","og_title":"Patch Tuesday December 2022: Mark of the Web zero-day fixed, and guidance on CVE-2022-37967 manual mitigation - N-able","og_description":"Microsoft rounds up 2022 by addressing fewer vulnerabilities than in previous months. Find out what patches you should be prioritizing!","og_url":"https:\/\/www.n-able.com\/pt-br\/blog\/patch-tuesday-december-2022","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2022-12-14T13:28:14+00:00","article_modified_time":"2023-03-21T14:05:39+00:00","og_image":[{"width":2501,"height":1309,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-02.png","type":"image\/png"}],"author":"Lewis Pope","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-02.png","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"Lewis Pope","Est. tempo de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/patch-tuesday-december-2022#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/patch-tuesday-december-2022"},"author":{"name":"Lewis Pope","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae"},"headline":"Patch Tuesday December 2022: Mark of the Web zero-day fixed, and guidance on CVE-2022-37967 manual mitigation","datePublished":"2022-12-14T13:28:14+00:00","dateModified":"2023-03-21T14:05:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/patch-tuesday-december-2022"},"wordCount":959,"publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"articleSection":["Head Nerds","Patch Management","Security"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/patch-tuesday-december-2022","url":"https:\/\/www.n-able.com\/pt-br\/blog\/patch-tuesday-december-2022","name":"Patch Tuesday December 2022: Mark of the Web zero-day fixed, and guidance on CVE-2022-37967 manual mitigation - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br#website"},"datePublished":"2022-12-14T13:28:14+00:00","dateModified":"2023-03-21T14:05:39+00:00","description":"Microsoft rounds up 2022 by addressing fewer vulnerabilities than in previous months. Find out what patches you should be prioritizing!","breadcrumb":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/patch-tuesday-december-2022#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/pt-br\/blog\/patch-tuesday-december-2022"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/patch-tuesday-december-2022#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Head Nerds","item":"https:\/\/www.n-able.com\/pt-br\/blog\/category\/head-nerds-pt-br"},{"@type":"ListItem","position":2,"name":"Patch Tuesday December 2022: Mark of the Web zero-day fixed, and guidance on CVE-2022-37967 manual mitigation"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/pt-br#website","url":"https:\/\/www.n-able.com\/pt-br","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/pt-br?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/pt-br#organization","name":"N-able","url":"https:\/\/www.n-able.com\/pt-br","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae","name":"Lewis Pope","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","caption":"Lewis Pope"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/40697","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/comments?post=40697"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/40697\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/media?parent=40697"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}