Microsoft Patch Day June 2022
Microsoft closes 3 critical gaps and the Internet Explorer chapter
providers on the topic
Microsoft releases 55 updates for patch day in June, 3 of which are classified as critical. The good news: None of the new vulnerabilities are currently public knowledge. The bad news: There is no update for the print spooler vulnerability on this patch day either.
(Logo: Microsoft)
In addition to the usual and obligatory cumulative updates for all supported Windows versions, there are three critical vulnerabilities this month that should be closed as soon as possible. This also affects the latest Windows versions Windows 11 and Windows Server 2022. The vulnerabilities affect Hyper-V, LDAP in Active Directory and NFS in Windows.

With the patch day in June 2022, the official support for Internet Explorer will also end. Internet Explorer mode in Microsoft Edge ensures IE dependent applications will work until 2029.
Several critical vulnerabilities allow remote code execution
The three vulnerabilities CVE-2022-30163, CVE-2022-30139 and CVE-2022-30136 are classified as critical and have one thing in common: They allow remote code execution on Windows systems. Basically, all current operating systems are affected, including Windows 11 and Windows Server 2022. The updates for these three gaps should therefore be closed as soon as possible.
Takeover of Hyper-V hosts possible – also from VMS: CVE-2022-30163
The CVE-2022-30163 vulnerability is one of the three vulnerabilities mentioned above that should be closed as soon as possible. A bug in Hyper-V makes it possible to run code from a VM on the Hyoer-V host. This of course puts all other VMs at risk as well as the rest of the network. Attacks of this type are more common, which is why the vulnerability is also defined as critical.

LDAP under attack when MaxReceiveBuffer was adjusted in LDAP policy
Anyone who has increased the value of MaxReceiveBuffer via the LDAP policy should install the update as a matter of urgency, because the change also enables remote code execution on the affected servers. According to Microsoft, anyone who has left the value on the standard is not in danger. More about the guidelines can be found in the Microsoft documentation.
We want your opinion on the patch day news!
For many years we have been regularly publishing reports on Microsoft Patchday. We would like to know from you today how we can make the reports even more useful for your daily work. What additional information would you like, what can we make clearer, what can we leave out? Write us an eMail! We read every letter, I promise!
(ID:48402993)
#Microsoft #closes #critical #gaps #Internet #Explorer #chapter