{"vulnerability": "CVE-2022-2623", "sightings": [{"uuid": "f7d911c7-cbea-4162-9d65-cecef6658764", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26237", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lskgo6t4nh2p", "content": "", "creation_timestamp": "2025-06-27T00:57:09.007970Z"}, {"uuid": "59a11f8c-19d3-47fe-84aa-2b4dcbc534b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26233", "type": "seen", "source": "https://t.me/avleonovrus/67", "content": "\u0414\u0430\u0432\u0430\u0439\u0442\u0435 \u0433\u043b\u044f\u043d\u0435\u043c \u0447\u0442\u043e \u0442\u0430\u043c \u0432 \u0430\u0432\u0433\u0443\u0441\u0442\u043e\u0432\u0441\u043a\u043e\u043c Microsoft Patch Tuesday. 147 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439.\n\nUrgent: 1\nCritical: 0\nHigh: 36\nMedium: 108\nLow: 2\n\n\u0415\u0441\u0442\u044c \u0441\u0443\u043f\u0435\u0440-\u044d\u043a\u0448\u043d: \n\nRemote Code Execution - Microsoft Windows Support Diagnostic Tool (MSDT) (CVE-2022-34713) - Urgent [843]. \u042d\u0442\u043e \u043e\u0434\u0438\u043d \u0438\u0437 \u0432\u0430\u0440\u0438\u0430\u043d\u0442\u043e\u0432 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \"DogWalk\". \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0438 \u043e\u0442\u043a\u0440\u044b\u0442\u0438\u0438 \u0444\u0430\u0439\u043b\u0430, \u043e\u0431\u044b\u0447\u043d\u043e Microsoft Word. \u0422.\u0435. \u0437\u0430\u043b\u0435\u0442\u0438\u0442 \u0447\u0435\u0440\u0435\u0437 \u0444\u0438\u0448\u0438\u043d\u0433. \u0422\u0443\u0442 \u0438 \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u044b\u0439 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442 (\u0433\u0434\u0435-\u0442\u043e) \u0435\u0441\u0442\u044c, \u0438 \u043f\u0440\u0438\u0437\u043d\u0430\u043a \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0432\u0436\u0438\u0432\u0443\u044e. \u041f\u043e\u0445\u043e\u0436\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0436\u0435 \u0444\u0438\u043a\u0441\u0438\u043b\u0438 \u0432 \u043c\u0430\u0435. \u0422\u043e \u043b\u0438 \u043d\u0435 \u0434\u043e\u0444\u0438\u043a\u0441\u0438\u043b\u0438, \u0442\u043e \u043b\u0438 \u043f\u043e\u0445\u043e\u0436\u0443\u044e \u043d\u0430\u0448\u043b\u0438. \u042d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u0430 \u0432 \u043f\u0430\u0431\u043b\u0438\u043a\u0435 \u043f\u043e\u043a\u0430 \u043d\u0435\u0442.\n\n\u0415\u0441\u0442\u044c \u043a\u0440\u0438\u0442\u0438\u0447\u043d\u043e\u0435: \n\nElevation of Privilege - Microsoft Exchange (CVE-2022-21980) - \u0432\u043e \u043f\u0435\u0440\u0432\u044b\u0445 \u043d\u0430 \u043f\u0435\u0440\u0438\u043c\u0435\u0442\u0440\u0435 \u0442\u043e\u0440\u0447\u0438\u0442, \u0432\u043e \u0432\u0442\u043e\u0440\u044b\u0445 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u0441\u043c\u043e\u0436\u0435\u0442 \u0447\u0438\u0442\u0430\u0442\u044c \u0432\u0441\u0435 \u043f\u0438\u0441\u044c\u043c\u0430 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435 \u0438 \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u0442\u044c. \u0425\u043e\u0440\u043e\u0448\u043e, \u0447\u0442\u043e \u043f\u043e\u043a\u0430 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u0430 \u043d\u0435\u0442. \u0425\u043e\u0440\u043e\u0448\u0438\u0439 \u043f\u0440\u0438\u043c\u0435\u0440, \u0447\u0442\u043e \u043d\u0430 EoP-\u043a\u0438 \u0442\u043e\u0436\u0435 \u043c\u043e\u0436\u043d\u043e \u043e\u0431\u0440\u0430\u0449\u0430\u0442\u044c \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u0435. \n\n\u0415\u0441\u0442\u044c \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u043e\u0435: \n\nRemote Code Execution - Windows Point-to-Point Protocol (PPP) (CVE-2022-30133) - \u0442\u0443\u0442 \u0441\u043e\u0432\u0435\u0442\u0443\u044e\u0442 \u0442\u0440\u0430\u0444\u0438\u043a \u043f\u043e \u043f\u043e\u0440\u0442\u0443 1723 \u043f\u043e\u0438\u0441\u043a\u0430\u0442\u044c\nRemote Code Execution - Windows Secure Socket Tunneling Protocol (SSTP) (CVE-2022-35766) - \u0442\u043e\u0436\u0435 \u043d\u0435 \u0442\u0430\u043a \u0447\u0430\u0441\u0442\u043e \u0432 \u044d\u0442\u043e\u043c \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0435 \u043d\u0430\u0445\u043e\u0434\u044f\u0442\nRemote Code Execution - SMB Client and Server (CVE-2022-35804) - \u0437\u0434\u0435\u0441\u044c \u0435\u0441\u0442\u0435\u0441\u0442\u0432\u0435\u043d\u043d\u043e \u0441\u0440\u0430\u0437\u0443 \u0432\u0441\u043f\u043e\u043c\u0438\u043d\u0430\u044e\u0442 \u043f\u0440\u043e MS17-010\nRemote Code Execution - Visual Studio (CVE-2022-35827) - \u0442\u0430\u043a\u0438\u0445 3 \u0438 \u0435\u0441\u0442\u044c Proof-of-Concept Exploit, \u0432 \u0442\u0430\u0440\u0433\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c \u0444\u0438\u0448\u0438\u043d\u0433\u0435 \u043d\u0430 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0432 \u043c\u043e\u0436\u0435\u0442 \u0441\u0440\u0430\u0431\u043e\u0442\u0430\u0442\u044c? \nElevation of Privilege - Active Directory (CVE-2022-34691) - \u0434\u043e System \u043c\u043e\u0436\u043d\u043e \u043f\u043e\u0434\u043d\u044f\u0442\u044c \u043f\u0440\u0430\u0432\u0430. \u041d\u0443\u0436\u043d\u043e, \u0447\u0442\u043e\u0431\u044b \u0431\u044b\u043b\u0438 \u0437\u0430\u043f\u0443\u0449\u0435\u043d\u044b Active Directory Certificate Services\n\n\u0415\u0441\u0442\u044c \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u043e\u0435, \u0440\u0435\u0433\u0443\u043b\u044f\u0440\u043d\u043e \u0432\u0441\u0442\u0440\u0435\u0447\u0430\u044e\u0449\u0435\u0435\u0441\u044f \u0432 MSPT, \u043d\u043e \u0434\u043e \u0440\u0435\u0430\u043b\u044c\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043e\u0431\u044b\u0447\u043d\u043e \u043d\u0435 \u0434\u043e\u0445\u043e\u0434\u0438\u0442:\n\nRemote Code Execution - Windows Network File System (CVE-2022-34715) \nElevation of Privilege - Windows Print Spooler (CVE-2022-35793) \n\n\u0415\u0441\u0442\u044c \u043a\u0443\u0440\u044c\u0451\u0437\u044b: \n\nVulristics \u0432\u043d\u0435\u0437\u0430\u043f\u043d\u043e \u043f\u043e\u0434\u0441\u0432\u0435\u0442\u0438\u043b \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c Memory Corruption - Microsoft Edge (CVE-2022-2623), \u043f\u043e\u0442\u043e\u043c\u0443 \u0447\u0442\u043e \u0434\u043b\u044f \u043d\u0435\u0451 \u0435\u0441\u0442\u044c \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u044b\u0439 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442. \u041e\u043a\u0430\u0437\u0430\u043b\u043e\u0441\u044c, \u0447\u0442\u043e \u0442\u0443\u0442 \u043e\u0448\u0438\u0431\u043a\u0430 \u0432 \u0431\u0430\u0437\u0430\u0445 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u043e\u0432, \u0441\u0440\u0430\u0437\u0443 \u0432 \u0434\u0432\u0443\u0445 0day(.)today \u0438 packetstorm. \u0412\u043c\u0435\u0441\u0442\u043e CVE-2022-26233 \u043f\u043e \u043e\u0448\u0438\u0431\u043a\u0435 \u043f\u0440\u043e\u043f\u0438\u0441\u0430\u043b\u0438 CVE-2022-2623. \u0418 \u0442\u0430\u043a\u043e\u0435 \u0442\u043e\u0436\u0435 \u0431\u044b\u0432\u0430\u0435\u0442 \u0438 \u043d\u0438\u043a\u0442\u043e \u044d\u0442\u043e \u043d\u0435 \u043f\u0440\u043e\u0432\u0435\u0440\u044f\u0435\u0442. \u041a \u0441\u043b\u043e\u0432\u0443 \u043e \u043c\u043d\u0438\u043c\u043e\u0439 \u0432\u0441\u0435\u0441\u0438\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u043f\u0440\u0438\u043e\u0440\u0438\u0442\u0438\u0437\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043f\u043e \u0437\u0430\u043c\u0443\u0441\u043e\u0440\u0435\u043d\u043d\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c.\n\nDenial of Service - Microsoft Outlook (CVE-2022-35742) - \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u043f\u0438\u0441\u044c\u043c\u043e \u043d\u0430\u043c\u0435\u0440\u0442\u0432\u043e \u0443\u0431\u0438\u0432\u0430\u0435\u0442 Outlook, \u0440\u0435\u0441\u0442\u0430\u0440\u0442 \u043d\u0435 \u043f\u043e\u043c\u043e\u0433\u0430\u0435\u0442\n\n\u0415\u0441\u0442\u044c \u0437\u0430\u0433\u0430\u0434\u043e\u0447\u043d\u043e\u0435: \n\nCERT/CC: CVE-2022-34303 Crypto Pro Boot Loader Bypass\nCERT/CC: CVE-2022-34301 Eurosoft Boot Loader Bypass\nCERT/CC: CVE-2022-34302 New Horizon Data Systems Inc Boot Loader Bypass\n\n\u0412\u043e-\u043f\u0435\u0440\u0432\u044b\u0445 \u043e\u043d\u0438 \u043f\u0440\u0438\u0448\u043b\u0438 \u043f\u043e \u043b\u0438\u043d\u0438\u0438 \u0430\u043c\u0435\u0440\u0438\u043a\u0430\u043d\u0441\u043a\u043e\u0433\u043e CERT Coordination Center. \u0412\u043e-\u0432\u0442\u043e\u0440\u044b\u0445, \u043f\u043e \u043d\u0438\u043c \u043d\u0438\u043a\u0442\u043e \u043d\u0438\u0447\u0435\u0433\u043e \u043d\u0435 \u043f\u0438\u0448\u0435\u0442, \u0442\u043e\u043b\u044c\u043a\u043e Qualys. \"security bypass vulnerabilities in a third-party driver affecting Windows Secure Boot\". \u0412-\u0442\u0440\u0435\u0442\u044c\u0438\u0445, \u043c\u043e\u0436\u0435\u0442 \u044d\u0442\u043e \u043a\u043e\u043d\u0435\u0447\u043d\u043e \u0441\u043e\u0432\u043f\u0430\u0434\u0435\u043d\u0438\u0435 \u0438 \u0440\u0435\u0447\u044c \u043e \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u043e\u0444\u0442\u0430\u0445, \u043d\u043e Crypto Pro \u044d\u0442\u043e \u043d\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0439 \u043b\u0438 \u041a\u0440\u0438\u043f\u0442\u043e\u041f\u0440\u043e? \u0410 Eurosoft \u044d\u0442\u043e \u043d\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0439 \u043b\u0438 \u0415\u0432\u0440\u043e\u0441\u043e\u0444\u0442 \"\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e \u0432 \u043e\u0431\u043b\u0430\u0441\u0442\u0438 \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0435\u043a\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0438 \u0434\u0438\u0437\u0430\u0439\u043d\u0430\"? \u0412 \u043e\u0431\u0449\u0435\u043c, \u0441\u0438\u0433\u043d\u0430\u043b\u044c\u0447\u0438\u043a \u043b\u044e\u0431\u043e\u043f\u044b\u0442\u043d\u044b\u0439.\n\n\u041f\u043e\u043b\u043d\u044b\u0439 \u043e\u0442\u0447\u0435\u0442 Vulristics:  https://avleonov.com/vulristics_reports/ms_patch_tuesday_august2022_report_with_comments_ext_img.html\n\n@avleonovrus #Microsoft #PatchTuesday #Vulristics", "creation_timestamp": "2023-09-21T09:22:26.000000Z"}, {"uuid": "ca859185-9ba9-43d2-a653-754f8e9e2519", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26238", "type": "seen", "source": "https://t.me/cibsecurity/50940", "content": "\u203c CVE-2022-26238 \u203c\n\nThe default privileges for the running service Normand Service Manager in Beckman Coulter Remisol Advance v2.0.12.1 and prior allows non-privileged users to overwrite and manipulate executables and libraries. This allows attackers to access sensitive data.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-07T02:16:48.000000Z"}, {"uuid": "ac6eb882-6964-419d-ade9-53461ff6870f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26236", "type": "seen", "source": "https://t.me/cibsecurity/50939", "content": "\u203c CVE-2022-26236 \u203c\n\nThe default privileges for the running service Normand Remisol Advance Launcher in Beckman Coulter Remisol Advance v2.0.12.1 and prior allows non-privileged users to overwrite and manipulate executables and libraries. This allows attackers to access sensitive data.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-07T02:16:47.000000Z"}, {"uuid": "828d15ec-e165-4cf6-a48a-ca5320f0bc62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26239", "type": "seen", "source": "https://t.me/cibsecurity/50902", "content": "\u203c CVE-2022-26239 \u203c\n\nThe default privileges for the running service Normand License Manager in Beckman Coulter Remisol Advance v2.0.12.1 and prior allows unprivileged users to overwrite and manipulate executables and libraries. This allows attackers to access sensitive data.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-06T22:16:53.000000Z"}, {"uuid": "842dd391-3cd0-44d0-a46b-129de6fedfc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-2623", "type": "published-proof-of-concept", "source": "https://t.me/avleonovrus/79", "content": "Hello everyone! In this episode, let\u2019s take a look at the Microsoft Patch Tuesday August 2022 vulnerabilities. I use my Vulristics vulnerability prioritization tool as usual. I take comments for vulnerabilities from Tenable, Qualys, Rapid7, ZDI and Kaspersky blog posts. Also, as usual, I take into account the vulnerabilities added between the July and August Patch Tuesdays.\n\nThere were 147 vulnerabilities. Urgent: 1, Critical: 0, High: 36, Medium: 108, Low: 2.\n\nThere was a lot of great stuff this Patch Tuesday. There was a critical exploited in the wild MSDT DogWalk vulnerability, 3 critical Exchange vulnerabilities that could be easily missed in prioritization, 13 potentially dangerous vulnerabilities, 2 funny vulnerabilities and 3 mysterious ones. Let\u2019s take a closer look.\n\n01:02 MSDT RCE DogWalk CVE-2022-34713\n02:38 3 Microsoft Exchange EOPs  (CVE-2022-21980, CVE-2022-24516, CVE-2022-24477)\n04:23 13 potentially dangerous vulnerabilities (PPP, SSTP, SMB,  Visual Studio, AD, NFS, Print Spooler) \n11:06 2 funny vulnerabilities (Edge CVE-2022-2623, Outlook CVE-2022-35742)\n12:46 3 mysterious vulnerabilities (CryptoPro, Eurosoft, New Horizon Data Systems)\n\nVideo:  https://youtu.be/gSC8ExHUtt8\nVideo2 (for Russia): https://vk.com/video-149273431_456239098\nBlogpost: https://avleonov.com/2022/08/23/microsoft-patch-tuesday-august-2022-dogwalk-exchange-eops-13-potentially-dangerous-2-funny-3-mysterious-vulnerabilities/\nFull report: https://avleonov.com/vulristics_reports/ms_patch_tuesday_august2022_report_with_comments_ext_img.html\n\n#microsoft #patchtuesday\n\n@avleonovcom", "creation_timestamp": "2022-08-29T20:46:30.000000Z"}, {"uuid": "27fcdd71-f5c3-4380-83dc-433465652f5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-2623", "type": "seen", "source": "https://t.me/avleonovrus/67", "content": "\u0414\u0430\u0432\u0430\u0439\u0442\u0435 \u0433\u043b\u044f\u043d\u0435\u043c \u0447\u0442\u043e \u0442\u0430\u043c \u0432 \u0430\u0432\u0433\u0443\u0441\u0442\u043e\u0432\u0441\u043a\u043e\u043c Microsoft Patch Tuesday. 147 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439.\n\nUrgent: 1\nCritical: 0\nHigh: 36\nMedium: 108\nLow: 2\n\n\u0415\u0441\u0442\u044c \u0441\u0443\u043f\u0435\u0440-\u044d\u043a\u0448\u043d: \n\nRemote Code Execution - Microsoft Windows Support Diagnostic Tool (MSDT) (CVE-2022-34713) - Urgent [843]. \u042d\u0442\u043e \u043e\u0434\u0438\u043d \u0438\u0437 \u0432\u0430\u0440\u0438\u0430\u043d\u0442\u043e\u0432 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \"DogWalk\". \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0438 \u043e\u0442\u043a\u0440\u044b\u0442\u0438\u0438 \u0444\u0430\u0439\u043b\u0430, \u043e\u0431\u044b\u0447\u043d\u043e Microsoft Word. \u0422.\u0435. \u0437\u0430\u043b\u0435\u0442\u0438\u0442 \u0447\u0435\u0440\u0435\u0437 \u0444\u0438\u0448\u0438\u043d\u0433. \u0422\u0443\u0442 \u0438 \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u044b\u0439 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442 (\u0433\u0434\u0435-\u0442\u043e) \u0435\u0441\u0442\u044c, \u0438 \u043f\u0440\u0438\u0437\u043d\u0430\u043a \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0432\u0436\u0438\u0432\u0443\u044e. \u041f\u043e\u0445\u043e\u0436\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0436\u0435 \u0444\u0438\u043a\u0441\u0438\u043b\u0438 \u0432 \u043c\u0430\u0435. \u0422\u043e \u043b\u0438 \u043d\u0435 \u0434\u043e\u0444\u0438\u043a\u0441\u0438\u043b\u0438, \u0442\u043e \u043b\u0438 \u043f\u043e\u0445\u043e\u0436\u0443\u044e \u043d\u0430\u0448\u043b\u0438. \u042d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u0430 \u0432 \u043f\u0430\u0431\u043b\u0438\u043a\u0435 \u043f\u043e\u043a\u0430 \u043d\u0435\u0442.\n\n\u0415\u0441\u0442\u044c \u043a\u0440\u0438\u0442\u0438\u0447\u043d\u043e\u0435: \n\nElevation of Privilege - Microsoft Exchange (CVE-2022-21980) - \u0432\u043e \u043f\u0435\u0440\u0432\u044b\u0445 \u043d\u0430 \u043f\u0435\u0440\u0438\u043c\u0435\u0442\u0440\u0435 \u0442\u043e\u0440\u0447\u0438\u0442, \u0432\u043e \u0432\u0442\u043e\u0440\u044b\u0445 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u0441\u043c\u043e\u0436\u0435\u0442 \u0447\u0438\u0442\u0430\u0442\u044c \u0432\u0441\u0435 \u043f\u0438\u0441\u044c\u043c\u0430 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435 \u0438 \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u0442\u044c. \u0425\u043e\u0440\u043e\u0448\u043e, \u0447\u0442\u043e \u043f\u043e\u043a\u0430 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u0430 \u043d\u0435\u0442. \u0425\u043e\u0440\u043e\u0448\u0438\u0439 \u043f\u0440\u0438\u043c\u0435\u0440, \u0447\u0442\u043e \u043d\u0430 EoP-\u043a\u0438 \u0442\u043e\u0436\u0435 \u043c\u043e\u0436\u043d\u043e \u043e\u0431\u0440\u0430\u0449\u0430\u0442\u044c \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u0435. \n\n\u0415\u0441\u0442\u044c \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u043e\u0435: \n\nRemote Code Execution - Windows Point-to-Point Protocol (PPP) (CVE-2022-30133) - \u0442\u0443\u0442 \u0441\u043e\u0432\u0435\u0442\u0443\u044e\u0442 \u0442\u0440\u0430\u0444\u0438\u043a \u043f\u043e \u043f\u043e\u0440\u0442\u0443 1723 \u043f\u043e\u0438\u0441\u043a\u0430\u0442\u044c\nRemote Code Execution - Windows Secure Socket Tunneling Protocol (SSTP) (CVE-2022-35766) - \u0442\u043e\u0436\u0435 \u043d\u0435 \u0442\u0430\u043a \u0447\u0430\u0441\u0442\u043e \u0432 \u044d\u0442\u043e\u043c \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0435 \u043d\u0430\u0445\u043e\u0434\u044f\u0442\nRemote Code Execution - SMB Client and Server (CVE-2022-35804) - \u0437\u0434\u0435\u0441\u044c \u0435\u0441\u0442\u0435\u0441\u0442\u0432\u0435\u043d\u043d\u043e \u0441\u0440\u0430\u0437\u0443 \u0432\u0441\u043f\u043e\u043c\u0438\u043d\u0430\u044e\u0442 \u043f\u0440\u043e MS17-010\nRemote Code Execution - Visual Studio (CVE-2022-35827) - \u0442\u0430\u043a\u0438\u0445 3 \u0438 \u0435\u0441\u0442\u044c Proof-of-Concept Exploit, \u0432 \u0442\u0430\u0440\u0433\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c \u0444\u0438\u0448\u0438\u043d\u0433\u0435 \u043d\u0430 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0432 \u043c\u043e\u0436\u0435\u0442 \u0441\u0440\u0430\u0431\u043e\u0442\u0430\u0442\u044c? \nElevation of Privilege - Active Directory (CVE-2022-34691) - \u0434\u043e System \u043c\u043e\u0436\u043d\u043e \u043f\u043e\u0434\u043d\u044f\u0442\u044c \u043f\u0440\u0430\u0432\u0430. \u041d\u0443\u0436\u043d\u043e, \u0447\u0442\u043e\u0431\u044b \u0431\u044b\u043b\u0438 \u0437\u0430\u043f\u0443\u0449\u0435\u043d\u044b Active Directory Certificate Services\n\n\u0415\u0441\u0442\u044c \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u043e\u0435, \u0440\u0435\u0433\u0443\u043b\u044f\u0440\u043d\u043e \u0432\u0441\u0442\u0440\u0435\u0447\u0430\u044e\u0449\u0435\u0435\u0441\u044f \u0432 MSPT, \u043d\u043e \u0434\u043e \u0440\u0435\u0430\u043b\u044c\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043e\u0431\u044b\u0447\u043d\u043e \u043d\u0435 \u0434\u043e\u0445\u043e\u0434\u0438\u0442:\n\nRemote Code Execution - Windows Network File System (CVE-2022-34715) \nElevation of Privilege - Windows Print Spooler (CVE-2022-35793) \n\n\u0415\u0441\u0442\u044c \u043a\u0443\u0440\u044c\u0451\u0437\u044b: \n\nVulristics \u0432\u043d\u0435\u0437\u0430\u043f\u043d\u043e \u043f\u043e\u0434\u0441\u0432\u0435\u0442\u0438\u043b \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c Memory Corruption - Microsoft Edge (CVE-2022-2623), \u043f\u043e\u0442\u043e\u043c\u0443 \u0447\u0442\u043e \u0434\u043b\u044f \u043d\u0435\u0451 \u0435\u0441\u0442\u044c \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u044b\u0439 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442. \u041e\u043a\u0430\u0437\u0430\u043b\u043e\u0441\u044c, \u0447\u0442\u043e \u0442\u0443\u0442 \u043e\u0448\u0438\u0431\u043a\u0430 \u0432 \u0431\u0430\u0437\u0430\u0445 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u043e\u0432, \u0441\u0440\u0430\u0437\u0443 \u0432 \u0434\u0432\u0443\u0445 0day(.)today \u0438 packetstorm. \u0412\u043c\u0435\u0441\u0442\u043e CVE-2022-26233 \u043f\u043e \u043e\u0448\u0438\u0431\u043a\u0435 \u043f\u0440\u043e\u043f\u0438\u0441\u0430\u043b\u0438 CVE-2022-2623. \u0418 \u0442\u0430\u043a\u043e\u0435 \u0442\u043e\u0436\u0435 \u0431\u044b\u0432\u0430\u0435\u0442 \u0438 \u043d\u0438\u043a\u0442\u043e \u044d\u0442\u043e \u043d\u0435 \u043f\u0440\u043e\u0432\u0435\u0440\u044f\u0435\u0442. \u041a \u0441\u043b\u043e\u0432\u0443 \u043e \u043c\u043d\u0438\u043c\u043e\u0439 \u0432\u0441\u0435\u0441\u0438\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u043f\u0440\u0438\u043e\u0440\u0438\u0442\u0438\u0437\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043f\u043e \u0437\u0430\u043c\u0443\u0441\u043e\u0440\u0435\u043d\u043d\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c.\n\nDenial of Service - Microsoft Outlook (CVE-2022-35742) - \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u043f\u0438\u0441\u044c\u043c\u043e \u043d\u0430\u043c\u0435\u0440\u0442\u0432\u043e \u0443\u0431\u0438\u0432\u0430\u0435\u0442 Outlook, \u0440\u0435\u0441\u0442\u0430\u0440\u0442 \u043d\u0435 \u043f\u043e\u043c\u043e\u0433\u0430\u0435\u0442\n\n\u0415\u0441\u0442\u044c \u0437\u0430\u0433\u0430\u0434\u043e\u0447\u043d\u043e\u0435: \n\nCERT/CC: CVE-2022-34303 Crypto Pro Boot Loader Bypass\nCERT/CC: CVE-2022-34301 Eurosoft Boot Loader Bypass\nCERT/CC: CVE-2022-34302 New Horizon Data Systems Inc Boot Loader Bypass\n\n\u0412\u043e-\u043f\u0435\u0440\u0432\u044b\u0445 \u043e\u043d\u0438 \u043f\u0440\u0438\u0448\u043b\u0438 \u043f\u043e \u043b\u0438\u043d\u0438\u0438 \u0430\u043c\u0435\u0440\u0438\u043a\u0430\u043d\u0441\u043a\u043e\u0433\u043e CERT Coordination Center. \u0412\u043e-\u0432\u0442\u043e\u0440\u044b\u0445, \u043f\u043e \u043d\u0438\u043c \u043d\u0438\u043a\u0442\u043e \u043d\u0438\u0447\u0435\u0433\u043e \u043d\u0435 \u043f\u0438\u0448\u0435\u0442, \u0442\u043e\u043b\u044c\u043a\u043e Qualys. \"security bypass vulnerabilities in a third-party driver affecting Windows Secure Boot\". \u0412-\u0442\u0440\u0435\u0442\u044c\u0438\u0445, \u043c\u043e\u0436\u0435\u0442 \u044d\u0442\u043e \u043a\u043e\u043d\u0435\u0447\u043d\u043e \u0441\u043e\u0432\u043f\u0430\u0434\u0435\u043d\u0438\u0435 \u0438 \u0440\u0435\u0447\u044c \u043e \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u043e\u0444\u0442\u0430\u0445, \u043d\u043e Crypto Pro \u044d\u0442\u043e \u043d\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0439 \u043b\u0438 \u041a\u0440\u0438\u043f\u0442\u043e\u041f\u0440\u043e? \u0410 Eurosoft \u044d\u0442\u043e \u043d\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0439 \u043b\u0438 \u0415\u0432\u0440\u043e\u0441\u043e\u0444\u0442 \"\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e \u0432 \u043e\u0431\u043b\u0430\u0441\u0442\u0438 \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0435\u043a\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0438 \u0434\u0438\u0437\u0430\u0439\u043d\u0430\"? \u0412 \u043e\u0431\u0449\u0435\u043c, \u0441\u0438\u0433\u043d\u0430\u043b\u044c\u0447\u0438\u043a \u043b\u044e\u0431\u043e\u043f\u044b\u0442\u043d\u044b\u0439.\n\n\u041f\u043e\u043b\u043d\u044b\u0439 \u043e\u0442\u0447\u0435\u0442 Vulristics:  https://avleonov.com/vulristics_reports/ms_patch_tuesday_august2022_report_with_comments_ext_img.html\n\n@avleonovrus #Microsoft #PatchTuesday #Vulristics", "creation_timestamp": "2023-09-21T09:22:26.000000Z"}, {"uuid": "00dfd969-cf62-4702-9475-0ca187c245f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26233", "type": "seen", "source": "https://t.me/cibsecurity/40083", "content": "\u203c CVE-2022-26233 \u203c\n\nBarco Control Room Management through Suite 2.9 Build 0275 was discovered to be vulnerable to directory traversal, allowing attackers to access sensitive information and components. Requests must begin with the \"GET /..\\..\" substring.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-04T02:27:12.000000Z"}]}