{"vulnerability": "CVE-2022-3471", "sightings": [{"uuid": "703d9cb4-6dd5-44cc-9f4a-f91e61e9a166", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34718", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7591", "content": "#exploit\n1. CVE-2022-41033:\nType confusion in Windows COM+ Event System Service\nhttps://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2022/CVE-2022-41033.html\n\n2. CVE-2022-34718:\nDissecting and Exploiting TCP/IP RCE Vulnerability \"EvilESP\"\nhttps://securityintelligence.com/posts/dissecting-exploiting-tcp-ip-rce-vulnerability-evilesp\n\n3. CVE-2023-0297:\nPre-auth RCE in pyLoad\nhttps://github.com/bAuh0lz/CVE-2023-0297_Pre-auth_RCE_in_pyLoad", "creation_timestamp": "2023-01-21T12:55:20.000000Z"}, {"uuid": "aa0bd6f3-0510-431d-8a2b-24e746084b19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34715", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/6753", "content": "#exploit\n1. CVE-2018-12613:\nPhpMyAdmin 4.8.1 RCE\nhttps://blog.securelayer7.net/vulnerability-analysis-of-phpmyadmin-remote-code-execution\n\n2. CVE-2022-34715:\nMicrosoft Windows NFS v4 RCE\nhttps://www.zerodayinitiative.com/blog/2022/8/31/cve-2022-34715-more-microsoft-windows-nfs-v4-remote-code-execution", "creation_timestamp": "2022-09-07T13:15:55.000000Z"}, {"uuid": "bdae48b8-3f46-4a83-b141-0ffe5b5f4534", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34713", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:04.000000Z"}, {"uuid": "3a59856f-b8e2-469b-a949-43b5cb426c66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34713", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971677", "content": "", "creation_timestamp": "2024-12-24T20:32:41.183828Z"}, {"uuid": "71c69f15-df19-45c1-90b7-5325f381765e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34713", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/c8c14150-49f1-4775-9a83-e18b45574ee6", "content": "", "creation_timestamp": "2026-02-02T12:27:17.942202Z"}, {"uuid": "2474eaa1-8966-47a4-a9e6-f92ed03434bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34718", "type": "published-proof-of-concept", "source": "https://t.me/cKure/10486", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 TCP/IP Vulnerability CVE-2022\u201334718 PoC Restoration and Analysis.\n\nhttps://medium.com/numen-cyber-labs/analysis-and-summary-of-tcp-ip-protocol-remote-code-execution-vulnerability-cve-2022-34718-8fcc28538acf", "creation_timestamp": "2022-11-27T11:12:24.000000Z"}, {"uuid": "dc8cf82f-40ae-4ed6-b5bf-ba4c292ad3a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34713", "type": "seen", "source": "https://t.me/poxek/2460", "content": "#Windows #CVE\n\nMicrosoft Windows Support Diagnostic Tool (MSDT) RCE\nCVE-2022-34713\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Microsoft Windows Support Diagnostic Tool (MSDT), \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430. \u0414\u043b\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u0434\u043e\u043b\u0436\u0435\u043d \u043e\u0431\u043c\u0430\u043d\u043e\u043c \u0437\u0430\u0441\u0442\u0430\u0432\u0438\u0442\u044c \u0446\u0435\u043b\u044c \u043e\u0442\u043a\u0440\u044b\u0442\u044c \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0439 \u0444\u0430\u0439\u043b (\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0439 \u043f\u043e \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u043e\u0439 \u043f\u043e\u0447\u0442\u0435 \u0438\u043b\u0438 \u0437\u0430\u0433\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0439 \u0441 \u0432\u0435\u0431-\u0441\u0430\u0439\u0442\u0430).", "creation_timestamp": "2022-09-06T15:00:04.000000Z"}, {"uuid": "83586f5f-5cf4-42ab-9386-0535ad517e7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34715", "type": "seen", "source": "https://t.me/avleonovrus/67", "content": "\u0414\u0430\u0432\u0430\u0439\u0442\u0435 \u0433\u043b\u044f\u043d\u0435\u043c \u0447\u0442\u043e \u0442\u0430\u043c \u0432 \u0430\u0432\u0433\u0443\u0441\u0442\u043e\u0432\u0441\u043a\u043e\u043c Microsoft Patch Tuesday. 147 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439.\n\nUrgent: 1\nCritical: 0\nHigh: 36\nMedium: 108\nLow: 2\n\n\u0415\u0441\u0442\u044c \u0441\u0443\u043f\u0435\u0440-\u044d\u043a\u0448\u043d: \n\nRemote Code Execution - Microsoft Windows Support Diagnostic Tool (MSDT) (CVE-2022-34713) - Urgent [843]. \u042d\u0442\u043e \u043e\u0434\u0438\u043d \u0438\u0437 \u0432\u0430\u0440\u0438\u0430\u043d\u0442\u043e\u0432 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \"DogWalk\". \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0438 \u043e\u0442\u043a\u0440\u044b\u0442\u0438\u0438 \u0444\u0430\u0439\u043b\u0430, \u043e\u0431\u044b\u0447\u043d\u043e Microsoft Word. \u0422.\u0435. \u0437\u0430\u043b\u0435\u0442\u0438\u0442 \u0447\u0435\u0440\u0435\u0437 \u0444\u0438\u0448\u0438\u043d\u0433. \u0422\u0443\u0442 \u0438 \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u044b\u0439 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442 (\u0433\u0434\u0435-\u0442\u043e) \u0435\u0441\u0442\u044c, \u0438 \u043f\u0440\u0438\u0437\u043d\u0430\u043a \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0432\u0436\u0438\u0432\u0443\u044e. \u041f\u043e\u0445\u043e\u0436\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0436\u0435 \u0444\u0438\u043a\u0441\u0438\u043b\u0438 \u0432 \u043c\u0430\u0435. \u0422\u043e \u043b\u0438 \u043d\u0435 \u0434\u043e\u0444\u0438\u043a\u0441\u0438\u043b\u0438, \u0442\u043e \u043b\u0438 \u043f\u043e\u0445\u043e\u0436\u0443\u044e \u043d\u0430\u0448\u043b\u0438. \u042d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u0430 \u0432 \u043f\u0430\u0431\u043b\u0438\u043a\u0435 \u043f\u043e\u043a\u0430 \u043d\u0435\u0442.\n\n\u0415\u0441\u0442\u044c \u043a\u0440\u0438\u0442\u0438\u0447\u043d\u043e\u0435: \n\nElevation of Privilege - Microsoft Exchange (CVE-2022-21980) - \u0432\u043e \u043f\u0435\u0440\u0432\u044b\u0445 \u043d\u0430 \u043f\u0435\u0440\u0438\u043c\u0435\u0442\u0440\u0435 \u0442\u043e\u0440\u0447\u0438\u0442, \u0432\u043e \u0432\u0442\u043e\u0440\u044b\u0445 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u0441\u043c\u043e\u0436\u0435\u0442 \u0447\u0438\u0442\u0430\u0442\u044c \u0432\u0441\u0435 \u043f\u0438\u0441\u044c\u043c\u0430 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435 \u0438 \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u0442\u044c. \u0425\u043e\u0440\u043e\u0448\u043e, \u0447\u0442\u043e \u043f\u043e\u043a\u0430 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u0430 \u043d\u0435\u0442. \u0425\u043e\u0440\u043e\u0448\u0438\u0439 \u043f\u0440\u0438\u043c\u0435\u0440, \u0447\u0442\u043e \u043d\u0430 EoP-\u043a\u0438 \u0442\u043e\u0436\u0435 \u043c\u043e\u0436\u043d\u043e \u043e\u0431\u0440\u0430\u0449\u0430\u0442\u044c \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u0435. \n\n\u0415\u0441\u0442\u044c \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u043e\u0435: \n\nRemote Code Execution - Windows Point-to-Point Protocol (PPP) (CVE-2022-30133) - \u0442\u0443\u0442 \u0441\u043e\u0432\u0435\u0442\u0443\u044e\u0442 \u0442\u0440\u0430\u0444\u0438\u043a \u043f\u043e \u043f\u043e\u0440\u0442\u0443 1723 \u043f\u043e\u0438\u0441\u043a\u0430\u0442\u044c\nRemote Code Execution - Windows Secure Socket Tunneling Protocol (SSTP) (CVE-2022-35766) - \u0442\u043e\u0436\u0435 \u043d\u0435 \u0442\u0430\u043a \u0447\u0430\u0441\u0442\u043e \u0432 \u044d\u0442\u043e\u043c \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0435 \u043d\u0430\u0445\u043e\u0434\u044f\u0442\nRemote Code Execution - SMB Client and Server (CVE-2022-35804) - \u0437\u0434\u0435\u0441\u044c \u0435\u0441\u0442\u0435\u0441\u0442\u0432\u0435\u043d\u043d\u043e \u0441\u0440\u0430\u0437\u0443 \u0432\u0441\u043f\u043e\u043c\u0438\u043d\u0430\u044e\u0442 \u043f\u0440\u043e MS17-010\nRemote Code Execution - Visual Studio (CVE-2022-35827) - \u0442\u0430\u043a\u0438\u0445 3 \u0438 \u0435\u0441\u0442\u044c Proof-of-Concept Exploit, \u0432 \u0442\u0430\u0440\u0433\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c \u0444\u0438\u0448\u0438\u043d\u0433\u0435 \u043d\u0430 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0432 \u043c\u043e\u0436\u0435\u0442 \u0441\u0440\u0430\u0431\u043e\u0442\u0430\u0442\u044c? \nElevation of Privilege - Active Directory (CVE-2022-34691) - \u0434\u043e System \u043c\u043e\u0436\u043d\u043e \u043f\u043e\u0434\u043d\u044f\u0442\u044c \u043f\u0440\u0430\u0432\u0430. \u041d\u0443\u0436\u043d\u043e, \u0447\u0442\u043e\u0431\u044b \u0431\u044b\u043b\u0438 \u0437\u0430\u043f\u0443\u0449\u0435\u043d\u044b Active Directory Certificate Services\n\n\u0415\u0441\u0442\u044c \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u043e\u0435, \u0440\u0435\u0433\u0443\u043b\u044f\u0440\u043d\u043e \u0432\u0441\u0442\u0440\u0435\u0447\u0430\u044e\u0449\u0435\u0435\u0441\u044f \u0432 MSPT, \u043d\u043e \u0434\u043e \u0440\u0435\u0430\u043b\u044c\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043e\u0431\u044b\u0447\u043d\u043e \u043d\u0435 \u0434\u043e\u0445\u043e\u0434\u0438\u0442:\n\nRemote Code Execution - Windows Network File System (CVE-2022-34715) \nElevation of Privilege - Windows Print Spooler (CVE-2022-35793) \n\n\u0415\u0441\u0442\u044c \u043a\u0443\u0440\u044c\u0451\u0437\u044b: \n\nVulristics \u0432\u043d\u0435\u0437\u0430\u043f\u043d\u043e \u043f\u043e\u0434\u0441\u0432\u0435\u0442\u0438\u043b \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c Memory Corruption - Microsoft Edge (CVE-2022-2623), \u043f\u043e\u0442\u043e\u043c\u0443 \u0447\u0442\u043e \u0434\u043b\u044f \u043d\u0435\u0451 \u0435\u0441\u0442\u044c \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u044b\u0439 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442. \u041e\u043a\u0430\u0437\u0430\u043b\u043e\u0441\u044c, \u0447\u0442\u043e \u0442\u0443\u0442 \u043e\u0448\u0438\u0431\u043a\u0430 \u0432 \u0431\u0430\u0437\u0430\u0445 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u043e\u0432, \u0441\u0440\u0430\u0437\u0443 \u0432 \u0434\u0432\u0443\u0445 0day(.)today \u0438 packetstorm. \u0412\u043c\u0435\u0441\u0442\u043e CVE-2022-26233 \u043f\u043e \u043e\u0448\u0438\u0431\u043a\u0435 \u043f\u0440\u043e\u043f\u0438\u0441\u0430\u043b\u0438 CVE-2022-2623. \u0418 \u0442\u0430\u043a\u043e\u0435 \u0442\u043e\u0436\u0435 \u0431\u044b\u0432\u0430\u0435\u0442 \u0438 \u043d\u0438\u043a\u0442\u043e \u044d\u0442\u043e \u043d\u0435 \u043f\u0440\u043e\u0432\u0435\u0440\u044f\u0435\u0442. \u041a \u0441\u043b\u043e\u0432\u0443 \u043e \u043c\u043d\u0438\u043c\u043e\u0439 \u0432\u0441\u0435\u0441\u0438\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u043f\u0440\u0438\u043e\u0440\u0438\u0442\u0438\u0437\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043f\u043e \u0437\u0430\u043c\u0443\u0441\u043e\u0440\u0435\u043d\u043d\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c.\n\nDenial of Service - Microsoft Outlook (CVE-2022-35742) - \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u043f\u0438\u0441\u044c\u043c\u043e \u043d\u0430\u043c\u0435\u0440\u0442\u0432\u043e \u0443\u0431\u0438\u0432\u0430\u0435\u0442 Outlook, \u0440\u0435\u0441\u0442\u0430\u0440\u0442 \u043d\u0435 \u043f\u043e\u043c\u043e\u0433\u0430\u0435\u0442\n\n\u0415\u0441\u0442\u044c \u0437\u0430\u0433\u0430\u0434\u043e\u0447\u043d\u043e\u0435: \n\nCERT/CC: CVE-2022-34303 Crypto Pro Boot Loader Bypass\nCERT/CC: CVE-2022-34301 Eurosoft Boot Loader Bypass\nCERT/CC: CVE-2022-34302 New Horizon Data Systems Inc Boot Loader Bypass\n\n\u0412\u043e-\u043f\u0435\u0440\u0432\u044b\u0445 \u043e\u043d\u0438 \u043f\u0440\u0438\u0448\u043b\u0438 \u043f\u043e \u043b\u0438\u043d\u0438\u0438 \u0430\u043c\u0435\u0440\u0438\u043a\u0430\u043d\u0441\u043a\u043e\u0433\u043e CERT Coordination Center. \u0412\u043e-\u0432\u0442\u043e\u0440\u044b\u0445, \u043f\u043e \u043d\u0438\u043c \u043d\u0438\u043a\u0442\u043e \u043d\u0438\u0447\u0435\u0433\u043e \u043d\u0435 \u043f\u0438\u0448\u0435\u0442, \u0442\u043e\u043b\u044c\u043a\u043e Qualys. \"security bypass vulnerabilities in a third-party driver affecting Windows Secure Boot\". \u0412-\u0442\u0440\u0435\u0442\u044c\u0438\u0445, \u043c\u043e\u0436\u0435\u0442 \u044d\u0442\u043e \u043a\u043e\u043d\u0435\u0447\u043d\u043e \u0441\u043e\u0432\u043f\u0430\u0434\u0435\u043d\u0438\u0435 \u0438 \u0440\u0435\u0447\u044c \u043e \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u043e\u0444\u0442\u0430\u0445, \u043d\u043e Crypto Pro \u044d\u0442\u043e \u043d\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0439 \u043b\u0438 \u041a\u0440\u0438\u043f\u0442\u043e\u041f\u0440\u043e? \u0410 Eurosoft \u044d\u0442\u043e \u043d\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0439 \u043b\u0438 \u0415\u0432\u0440\u043e\u0441\u043e\u0444\u0442 \"\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e \u0432 \u043e\u0431\u043b\u0430\u0441\u0442\u0438 \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0435\u043a\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0438 \u0434\u0438\u0437\u0430\u0439\u043d\u0430\"? \u0412 \u043e\u0431\u0449\u0435\u043c, \u0441\u0438\u0433\u043d\u0430\u043b\u044c\u0447\u0438\u043a \u043b\u044e\u0431\u043e\u043f\u044b\u0442\u043d\u044b\u0439.\n\n\u041f\u043e\u043b\u043d\u044b\u0439 \u043e\u0442\u0447\u0435\u0442 Vulristics:  https://avleonov.com/vulristics_reports/ms_patch_tuesday_august2022_report_with_comments_ext_img.html\n\n@avleonovrus #Microsoft #PatchTuesday #Vulristics", "creation_timestamp": "2023-09-21T09:22:26.000000Z"}, {"uuid": "4f772373-9a1e-4c66-8f02-29f4908a83ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34713", "type": "seen", "source": "https://t.me/avleonovrus/67", "content": "\u0414\u0430\u0432\u0430\u0439\u0442\u0435 \u0433\u043b\u044f\u043d\u0435\u043c \u0447\u0442\u043e \u0442\u0430\u043c \u0432 \u0430\u0432\u0433\u0443\u0441\u0442\u043e\u0432\u0441\u043a\u043e\u043c Microsoft Patch Tuesday. 147 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439.\n\nUrgent: 1\nCritical: 0\nHigh: 36\nMedium: 108\nLow: 2\n\n\u0415\u0441\u0442\u044c \u0441\u0443\u043f\u0435\u0440-\u044d\u043a\u0448\u043d: \n\nRemote Code Execution - Microsoft Windows Support Diagnostic Tool (MSDT) (CVE-2022-34713) - Urgent [843]. \u042d\u0442\u043e \u043e\u0434\u0438\u043d \u0438\u0437 \u0432\u0430\u0440\u0438\u0430\u043d\u0442\u043e\u0432 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \"DogWalk\". \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0438 \u043e\u0442\u043a\u0440\u044b\u0442\u0438\u0438 \u0444\u0430\u0439\u043b\u0430, \u043e\u0431\u044b\u0447\u043d\u043e Microsoft Word. \u0422.\u0435. \u0437\u0430\u043b\u0435\u0442\u0438\u0442 \u0447\u0435\u0440\u0435\u0437 \u0444\u0438\u0448\u0438\u043d\u0433. \u0422\u0443\u0442 \u0438 \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u044b\u0439 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442 (\u0433\u0434\u0435-\u0442\u043e) \u0435\u0441\u0442\u044c, \u0438 \u043f\u0440\u0438\u0437\u043d\u0430\u043a \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0432\u0436\u0438\u0432\u0443\u044e. \u041f\u043e\u0445\u043e\u0436\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0436\u0435 \u0444\u0438\u043a\u0441\u0438\u043b\u0438 \u0432 \u043c\u0430\u0435. \u0422\u043e \u043b\u0438 \u043d\u0435 \u0434\u043e\u0444\u0438\u043a\u0441\u0438\u043b\u0438, \u0442\u043e \u043b\u0438 \u043f\u043e\u0445\u043e\u0436\u0443\u044e \u043d\u0430\u0448\u043b\u0438. \u042d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u0430 \u0432 \u043f\u0430\u0431\u043b\u0438\u043a\u0435 \u043f\u043e\u043a\u0430 \u043d\u0435\u0442.\n\n\u0415\u0441\u0442\u044c \u043a\u0440\u0438\u0442\u0438\u0447\u043d\u043e\u0435: \n\nElevation of Privilege - Microsoft Exchange (CVE-2022-21980) - \u0432\u043e \u043f\u0435\u0440\u0432\u044b\u0445 \u043d\u0430 \u043f\u0435\u0440\u0438\u043c\u0435\u0442\u0440\u0435 \u0442\u043e\u0440\u0447\u0438\u0442, \u0432\u043e \u0432\u0442\u043e\u0440\u044b\u0445 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u0441\u043c\u043e\u0436\u0435\u0442 \u0447\u0438\u0442\u0430\u0442\u044c \u0432\u0441\u0435 \u043f\u0438\u0441\u044c\u043c\u0430 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435 \u0438 \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u0442\u044c. \u0425\u043e\u0440\u043e\u0448\u043e, \u0447\u0442\u043e \u043f\u043e\u043a\u0430 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u0430 \u043d\u0435\u0442. \u0425\u043e\u0440\u043e\u0448\u0438\u0439 \u043f\u0440\u0438\u043c\u0435\u0440, \u0447\u0442\u043e \u043d\u0430 EoP-\u043a\u0438 \u0442\u043e\u0436\u0435 \u043c\u043e\u0436\u043d\u043e \u043e\u0431\u0440\u0430\u0449\u0430\u0442\u044c \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u0435. \n\n\u0415\u0441\u0442\u044c \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u043e\u0435: \n\nRemote Code Execution - Windows Point-to-Point Protocol (PPP) (CVE-2022-30133) - \u0442\u0443\u0442 \u0441\u043e\u0432\u0435\u0442\u0443\u044e\u0442 \u0442\u0440\u0430\u0444\u0438\u043a \u043f\u043e \u043f\u043e\u0440\u0442\u0443 1723 \u043f\u043e\u0438\u0441\u043a\u0430\u0442\u044c\nRemote Code Execution - Windows Secure Socket Tunneling Protocol (SSTP) (CVE-2022-35766) - \u0442\u043e\u0436\u0435 \u043d\u0435 \u0442\u0430\u043a \u0447\u0430\u0441\u0442\u043e \u0432 \u044d\u0442\u043e\u043c \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0435 \u043d\u0430\u0445\u043e\u0434\u044f\u0442\nRemote Code Execution - SMB Client and Server (CVE-2022-35804) - \u0437\u0434\u0435\u0441\u044c \u0435\u0441\u0442\u0435\u0441\u0442\u0432\u0435\u043d\u043d\u043e \u0441\u0440\u0430\u0437\u0443 \u0432\u0441\u043f\u043e\u043c\u0438\u043d\u0430\u044e\u0442 \u043f\u0440\u043e MS17-010\nRemote Code Execution - Visual Studio (CVE-2022-35827) - \u0442\u0430\u043a\u0438\u0445 3 \u0438 \u0435\u0441\u0442\u044c Proof-of-Concept Exploit, \u0432 \u0442\u0430\u0440\u0433\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c \u0444\u0438\u0448\u0438\u043d\u0433\u0435 \u043d\u0430 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0432 \u043c\u043e\u0436\u0435\u0442 \u0441\u0440\u0430\u0431\u043e\u0442\u0430\u0442\u044c? \nElevation of Privilege - Active Directory (CVE-2022-34691) - \u0434\u043e System \u043c\u043e\u0436\u043d\u043e \u043f\u043e\u0434\u043d\u044f\u0442\u044c \u043f\u0440\u0430\u0432\u0430. \u041d\u0443\u0436\u043d\u043e, \u0447\u0442\u043e\u0431\u044b \u0431\u044b\u043b\u0438 \u0437\u0430\u043f\u0443\u0449\u0435\u043d\u044b Active Directory Certificate Services\n\n\u0415\u0441\u0442\u044c \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u043e\u0435, \u0440\u0435\u0433\u0443\u043b\u044f\u0440\u043d\u043e \u0432\u0441\u0442\u0440\u0435\u0447\u0430\u044e\u0449\u0435\u0435\u0441\u044f \u0432 MSPT, \u043d\u043e \u0434\u043e \u0440\u0435\u0430\u043b\u044c\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043e\u0431\u044b\u0447\u043d\u043e \u043d\u0435 \u0434\u043e\u0445\u043e\u0434\u0438\u0442:\n\nRemote Code Execution - Windows Network File System (CVE-2022-34715) \nElevation of Privilege - Windows Print Spooler (CVE-2022-35793) \n\n\u0415\u0441\u0442\u044c \u043a\u0443\u0440\u044c\u0451\u0437\u044b: \n\nVulristics \u0432\u043d\u0435\u0437\u0430\u043f\u043d\u043e \u043f\u043e\u0434\u0441\u0432\u0435\u0442\u0438\u043b \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c Memory Corruption - Microsoft Edge (CVE-2022-2623), \u043f\u043e\u0442\u043e\u043c\u0443 \u0447\u0442\u043e \u0434\u043b\u044f \u043d\u0435\u0451 \u0435\u0441\u0442\u044c \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u044b\u0439 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442. \u041e\u043a\u0430\u0437\u0430\u043b\u043e\u0441\u044c, \u0447\u0442\u043e \u0442\u0443\u0442 \u043e\u0448\u0438\u0431\u043a\u0430 \u0432 \u0431\u0430\u0437\u0430\u0445 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u043e\u0432, \u0441\u0440\u0430\u0437\u0443 \u0432 \u0434\u0432\u0443\u0445 0day(.)today \u0438 packetstorm. \u0412\u043c\u0435\u0441\u0442\u043e CVE-2022-26233 \u043f\u043e \u043e\u0448\u0438\u0431\u043a\u0435 \u043f\u0440\u043e\u043f\u0438\u0441\u0430\u043b\u0438 CVE-2022-2623. \u0418 \u0442\u0430\u043a\u043e\u0435 \u0442\u043e\u0436\u0435 \u0431\u044b\u0432\u0430\u0435\u0442 \u0438 \u043d\u0438\u043a\u0442\u043e \u044d\u0442\u043e \u043d\u0435 \u043f\u0440\u043e\u0432\u0435\u0440\u044f\u0435\u0442. \u041a \u0441\u043b\u043e\u0432\u0443 \u043e \u043c\u043d\u0438\u043c\u043e\u0439 \u0432\u0441\u0435\u0441\u0438\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u043f\u0440\u0438\u043e\u0440\u0438\u0442\u0438\u0437\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043f\u043e \u0437\u0430\u043c\u0443\u0441\u043e\u0440\u0435\u043d\u043d\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c.\n\nDenial of Service - Microsoft Outlook (CVE-2022-35742) - \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u043f\u0438\u0441\u044c\u043c\u043e \u043d\u0430\u043c\u0435\u0440\u0442\u0432\u043e \u0443\u0431\u0438\u0432\u0430\u0435\u0442 Outlook, \u0440\u0435\u0441\u0442\u0430\u0440\u0442 \u043d\u0435 \u043f\u043e\u043c\u043e\u0433\u0430\u0435\u0442\n\n\u0415\u0441\u0442\u044c \u0437\u0430\u0433\u0430\u0434\u043e\u0447\u043d\u043e\u0435: \n\nCERT/CC: CVE-2022-34303 Crypto Pro Boot Loader Bypass\nCERT/CC: CVE-2022-34301 Eurosoft Boot Loader Bypass\nCERT/CC: CVE-2022-34302 New Horizon Data Systems Inc Boot Loader Bypass\n\n\u0412\u043e-\u043f\u0435\u0440\u0432\u044b\u0445 \u043e\u043d\u0438 \u043f\u0440\u0438\u0448\u043b\u0438 \u043f\u043e \u043b\u0438\u043d\u0438\u0438 \u0430\u043c\u0435\u0440\u0438\u043a\u0430\u043d\u0441\u043a\u043e\u0433\u043e CERT Coordination Center. \u0412\u043e-\u0432\u0442\u043e\u0440\u044b\u0445, \u043f\u043e \u043d\u0438\u043c \u043d\u0438\u043a\u0442\u043e \u043d\u0438\u0447\u0435\u0433\u043e \u043d\u0435 \u043f\u0438\u0448\u0435\u0442, \u0442\u043e\u043b\u044c\u043a\u043e Qualys. \"security bypass vulnerabilities in a third-party driver affecting Windows Secure Boot\". \u0412-\u0442\u0440\u0435\u0442\u044c\u0438\u0445, \u043c\u043e\u0436\u0435\u0442 \u044d\u0442\u043e \u043a\u043e\u043d\u0435\u0447\u043d\u043e \u0441\u043e\u0432\u043f\u0430\u0434\u0435\u043d\u0438\u0435 \u0438 \u0440\u0435\u0447\u044c \u043e \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u043e\u0444\u0442\u0430\u0445, \u043d\u043e Crypto Pro \u044d\u0442\u043e \u043d\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0439 \u043b\u0438 \u041a\u0440\u0438\u043f\u0442\u043e\u041f\u0440\u043e? \u0410 Eurosoft \u044d\u0442\u043e \u043d\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0439 \u043b\u0438 \u0415\u0432\u0440\u043e\u0441\u043e\u0444\u0442 \"\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e \u0432 \u043e\u0431\u043b\u0430\u0441\u0442\u0438 \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0435\u043a\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0438 \u0434\u0438\u0437\u0430\u0439\u043d\u0430\"? \u0412 \u043e\u0431\u0449\u0435\u043c, \u0441\u0438\u0433\u043d\u0430\u043b\u044c\u0447\u0438\u043a \u043b\u044e\u0431\u043e\u043f\u044b\u0442\u043d\u044b\u0439.\n\n\u041f\u043e\u043b\u043d\u044b\u0439 \u043e\u0442\u0447\u0435\u0442 Vulristics:  https://avleonov.com/vulristics_reports/ms_patch_tuesday_august2022_report_with_comments_ext_img.html\n\n@avleonovrus #Microsoft #PatchTuesday #Vulristics", "creation_timestamp": "2023-09-21T09:22:26.000000Z"}, {"uuid": "b5737b5b-c2fc-4ce8-920d-ea9b8d307059", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34718", "type": "published-proof-of-concept", "source": "Telegram/H2tnJ1Y2riiqlo_bmFxs1J45-Mdt_jfxoGNilYlD4PJ5QKI", "content": "", "creation_timestamp": "2023-01-24T18:29:00.000000Z"}, {"uuid": "724b8fcf-c577-40ca-bfbd-a2ff53f51a3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34718", "type": "published-proof-of-concept", "source": "Telegram/jmPw-ARI55ivTppvLht5sb0Zn7m1PTUSt-ZxlZoHpfKICLM", "content": "", "creation_timestamp": "2023-01-24T18:28:12.000000Z"}, {"uuid": "2c07de7d-909b-4439-a458-a256f7c0904e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34718", "type": "seen", "source": "https://t.me/Almagd77/228", "content": "\ud83d\udca2 \u0627\u0644\u0645\u062c\u062f\u0648\u0627\u0644\u062a\u0648\u0639\u064a\u0629 \u0627\u0644\u0623\u0644\u0643\u062a\u0631\u0648\u0646\u064a\u0629|\n\u062a\u0648\u062c\u062f \u062b\u063a\u0631\u0629 \u0641\u064a \u0646\u0638\u0627\u0645 \u0627\u0644\u0648\u064a\u0646\u062f\u0648\u0632 \u0641\u064a \u0628\u0631\u0648\u062a\u0648\u0643\u0648\u0644 \u0627\u0644\u0634\u0628\u0643\u0629 TCP/IP\n\u0648\u062a\u0642\u064a\u064a\u0645 \u0627\u0644\u062b\u063a\u0631\u0629 9.8 \u0645\u0646 10 \n\u064a\u0639\u0646\u064a \u0643\u0627\u0631\u062b\u0629 \u2620\ufe0f\u2620\ufe0f\n\nCVE-2022-34718\n\n\u0637\u0644\u0639 \u0627\u0644\u062a\u062d\u062f\u064a\u062b \u0627\u0644\u0628\u0627\u0631\u062d\u0629 \u0627\u0644\u062b\u0644\u0627\u062b\u0627\u0621. \u0641\u0627\u064a \u0627\u062d\u062f \u0645\u0627 \u062d\u062f\u062b \u0646\u0638\u0627\u0645\u0647 \u0645\u0645\u0643\u0646 \u064a\u062e\u062a\u0631\u0642 \u0645\u0646 \u0627\u064a \u0647\u0627\u0643\u0631 \u0645\u062a\u0635\u0644 \u0648\u064a\u0627\u0647 \u0641\u064a \u0646\u0641\u0633 \u0627\u0644\u0634\u0628\u0643\u0629 \u0627\u0630\u0627 \u0643\u0627\u0646 \u0645\u0641\u0639\u0644 IPSec \u0648 IPv6.\n\u0648\u0627\u0644\u062b\u063a\u0631\u0629 \u0645\u0648\u062c\u0648\u062f\u0629 \u0628\u0643\u0644 \u0627\u0635\u062f\u0627\u0631\u0627\u062a \u0627\u0644\u0648\u064a\u0646\u062f\u0648\u0632\n\u0646\u062d\u0648\u0648\u0639\u064a \u0627\u0645\u0646\u064a\n\u0627\u0644\u0645\u062c\u062f \u0648\u0627\u0644\u062a\u0648\u0639\u064a\u0629 \u0627\u0644\u0627\u0644\u0643\u062a\u0631\u0648\u0646\u064a\u0629\nhttps://t.me/Almagd77", "creation_timestamp": "2022-09-19T19:35:31.000000Z"}, {"uuid": "f6f8b6ea-c8da-4995-8ec8-47d9aabd7539", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34718", "type": "published-proof-of-concept", "source": "Telegram/aba3xjh40u4OiC0HBIvmL4fKM-CkMVsB80n1CLfDc34QPMk", "content": "", "creation_timestamp": "2022-11-05T15:35:33.000000Z"}, {"uuid": "87d46a4f-9d80-4a65-9318-31a849b1edb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34718", "type": "published-proof-of-concept", "source": "https://t.me/MITERRED/115698", "content": "TCP/IP Vulnerability CVE-2022\u201334718 PoC Restoration and Analysis\n\nhttps://medium.com/numen-cyber-labs/analysis-and-summary-of-tcp-ip-protocol-remote-code-execution-vulnerability-cve-2022-34718-8fcc28538acf", "creation_timestamp": "2022-10-31T15:46:03.000000Z"}, {"uuid": "b89fd8e6-cdd8-4d16-8dd3-6579a3ad5171", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34718", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/571", "content": "CVE-2022-34718 : Windows TCP/IP Remote Code Execution\n\"An unauthenticated attacker could send a specially crafted IPv6 packet to a Windows node where IPSec is enabled, which could enable a remote code execution exploitation on that machine\"\nPOC : https://github.com/SecLabResearchBV/CVE-2022-34718-PoC", "creation_timestamp": "2022-11-07T09:30:12.000000Z"}, {"uuid": "9f113aad-8663-4c95-9f49-1905f14aec3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34718", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/2352", "content": "#exploit\n1. CVE-2022-41033:\nType confusion in Windows COM+ Event System Service\nhttps://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2022/CVE-2022-41033.html\n\n2. CVE-2022-34718:\nDissecting and Exploiting TCP/IP RCE Vulnerability \"EvilESP\"\nhttps://securityintelligence.com/posts/dissecting-exploiting-tcp-ip-rce-vulnerability-evilesp\n\n3. CVE-2023-0297:\nPre-auth RCE in pyLoad\nhttps://github.com/bAuh0lz/CVE-2023-0297_Pre-auth_RCE_in_pyLoad", "creation_timestamp": "2023-01-21T13:09:37.000000Z"}, {"uuid": "0213347b-1b1b-4dea-b92d-cd3dd6cab51f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34713", "type": "seen", "source": "https://t.me/true_secator/3274", "content": "\u034f\u0412 \u0440\u0430\u043c\u043a\u0430\u0445 \u0435\u0436\u0435\u043c\u0435\u0441\u044f\u0447\u043d\u043e\u0433\u043e PatchTuesday \u0437\u0430 \u0430\u0432\u0433\u0443\u0441\u0442 2022 \u0433\u043e\u0434\u0430 Microsoft \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f 121 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0434\u0432\u0435 0-day.\n\n\u041e\u0434\u043d\u0430 \u0438\u0437 \u043d\u0438\u0445 - DogWalk \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435.\n\n\u041e\u043d\u0430 \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u0442\u0441\u044f Microsoft \u043a\u0430\u043a CVE-2022-34713. RCE-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0434\u0438\u0430\u0433\u043d\u043e\u0441\u0442\u0438\u043a\u0438 Microsoft Windows MSDT.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u0418\u043c\u0440\u0435 \u0420\u0430\u0434 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0435\u0449\u0451 \u0432 \u044f\u043d\u0432\u0430\u0440\u0435 2020 \u0433\u043e\u0434\u0430, \u0442\u043e\u0433\u0434\u0430  Microsoft \u0440\u0435\u0448\u0438\u043b\u0430 \u043d\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u044f\u0442\u044c \u0435\u0435, \u043f\u043e\u0441\u0447\u0438\u0442\u0430\u0432, \u0447\u0442\u043e \u043e\u043d\u0430 \u043d\u0435 \u043e\u0442\u043d\u043e\u0441\u0438\u0442\u0441\u044f \u043a \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.\n\n\u041e\u0434\u043d\u0430\u043a\u043e \u043f\u043e\u0441\u043b\u0435 \u0432\u0441\u0435\u043e\u0431\u0449\u0435\u0433\u043e \u043d\u0435\u0433\u043e\u0434\u043e\u0432\u0430\u043d\u0438\u044f \u0438\u043d\u0444\u043e\u0441\u0435\u043a-\u0441\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u0430, \u043e\u0448\u0438\u0431\u043a\u0430 \u0431\u044b\u043b\u0430 \u0432\u0441\u0435 \u0436\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 Microsoft \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 \u043e\u0442\u043c\u0435\u0447\u0435\u043d\u043d\u044b\u0445 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439. \u0425\u043e\u0442\u044f, \u043a\u0430\u043a \u043c\u044b \u0443\u0436\u0435 \u043d\u0435 \u0440\u0430\u0437 \u043d\u0430\u0431\u043b\u044e\u0434\u0430\u043b\u0438, \u0441\u043a\u0430\u0437\u0430\u0442\u044c \u0438 \u0441\u0434\u0435\u043b\u0430\u0442\u044c - \u043d\u0435 \u043e\u0434\u043d\u043e \u0438 \u0442\u043e\u0436\u0435, \u043a\u043e\u0433\u0434\u0430 \u0440\u0435\u0447\u044c \u0438\u0434\u0451\u0442 \u043e \u043c\u0438\u043a\u0440\u043e\u043c\u044f\u0433\u043a\u0438\u0445 \u043f\u0430\u0442\u0447\u0430\u0445.\n\n\u0414\u0440\u0443\u0433\u0430\u044f 0-day \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a CVE-2022-30134\u00a0\u0438 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 Microsoft Exchange, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0447\u0438\u0442\u0430\u0442\u044c \u0446\u0435\u043b\u0435\u0432\u044b\u0435 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u043e\u0439 \u043f\u043e\u0447\u0442\u044b.\n\nMicrosoft \u0437\u0430\u044f\u0432\u043b\u044f\u0435\u0442, \u0447\u0442\u043e \u0431\u0430\u0433\u0430 \u043d\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445. \u0422\u0443\u0442 \u043c\u044b \u0431\u044b \u0442\u0430\u043a\u0436\u0435 \u0434\u043e\u0431\u0430\u0432\u0438\u043b\u0438 \u00ab\u043f\u043e\u043a\u0430\u00bb.\n\n\u0422\u0440\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2022-30133, CVE-2022-35744\u00a0\u0438\u00a0CVE-2022-34691, \u0437\u0430\u043a\u0440\u044b\u0442\u044b\u0435 Microsoft, \u043e\u0446\u0435\u043d\u0438\u0432\u0430\u044e\u0442\u0441\u044f \u043a\u0430\u043a \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0438 \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0438 \u043e\u0446\u0435\u043d\u043a\u0443 CVSS 9,8.\n\n\u041f\u0435\u0440\u0432\u044b\u0435 \u0434\u0432\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 - \u044d\u0442\u043e \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0441 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435\u043c \u043a\u043e\u0434\u0430, \u0432\u043b\u0438\u044f\u044e\u0449\u0438\u0435 \u043d\u0430 Windows Point-to-Point Protocol (PPP), \u0442\u0440\u0435\u0442\u044c\u044f \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435\u043c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0438 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u043c \u0434\u043e\u043c\u0435\u043d\u043d\u044b\u0435 \u0441\u043b\u0443\u0436\u0431\u044b Active Directory.\n\n\u0412 \u0446\u0435\u043b\u043e\u043c \u0436\u0435, \u043e\u0442\u0440\u0430\u0431\u043e\u0442\u0430\u043d\u043d\u044b\u0439 Microsoft \u043f\u0435\u0440\u0435\u0447\u0435\u043d\u044c \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442: 64 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439, 6 - \u043e\u0431\u0445\u043e\u0434\u0430 \u0444\u0443\u043d\u043a\u0446\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, 31 -  RCE, 12 - \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438, 7 - DoS \u0438 1 -  \u0441\u043f\u0443\u0444\u0438\u043d\u0433\u0430.\n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c 17 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043e\u0442\u043d\u043e\u0441\u044f\u0442\u0441\u044f \u043a \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0438 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043a\u043e\u0434 \u0438\u043b\u0438 \u043f\u043e\u0432\u044b\u0448\u0430\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438.\n\n\u041f\u043e\u043b\u043d\u044b\u0439 \u0441\u043f\u0438\u0441\u043e\u043a \u043f\u0440\u043e\u043f\u0430\u0442\u0447\u0435\u043d\u043d\u044b\u0445 \u0434\u044b\u0440 \u0438 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 PatchTuesday \u0437\u0430 \u0430\u0432\u0433\u0443\u0441\u0442 2022 \u0433\u043e\u0434\u0430 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u044b \u0432\u00a0\u043f\u043e\u043b\u043d\u043e\u043c \u043e\u0442\u0447\u0435\u0442\u0435.", "creation_timestamp": "2022-08-10T12:05:04.000000Z"}, {"uuid": "2e7412a8-c562-4039-a8ad-ff147786a8b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34715", "type": "seen", "source": "https://t.me/cibsecurity/47799", "content": "\u203c CVE-2022-34715 \u203c\n\nWindows Network File System Remote Code Execution Vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-10T00:24:57.000000Z"}, {"uuid": "5d4e381a-5f68-416e-aa40-6ea0adc74423", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34719", "type": "seen", "source": "https://t.me/cibsecurity/49712", "content": "\u203c CVE-2022-34719 \u203c\n\nWindows Distributed File System (DFS) Elevation of Privilege Vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-13T22:31:58.000000Z"}, {"uuid": "08b0ca1a-ea96-4794-881b-ddc8c2435467", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34713", "type": "seen", "source": "https://t.me/cibsecurity/47814", "content": "\u203c CVE-2022-34713 \u203c\n\nMicrosoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-35743.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-10T00:30:56.000000Z"}, {"uuid": "8a1675ab-81e6-4d9b-8c04-351251a9bdea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34711", "type": "seen", "source": "https://t.me/cibsecurity/48194", "content": "\u203c CVE-2022-34711 \u203c\n\nWindows Defender Credential Guard Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-34705, CVE-2022-35771.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-16T00:38:34.000000Z"}, {"uuid": "d6228ffd-246a-4ce2-ad8f-e5a7186524d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34718", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/6623", "content": "TCP/IP Vulnerability CVE-2022\u201334718 PoC Restoration and Analysis\n\nhttps://medium.com/numen-cyber-labs/analysis-and-summary-of-tcp-ip-protocol-remote-code-execution-vulnerability-cve-2022-34718-8fcc28538acf", "creation_timestamp": "2022-10-30T22:11:18.000000Z"}, {"uuid": "cb2d21d2-fa37-40e2-aa69-c72fe6b28bca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34718", "type": "seen", "source": "https://t.me/avleonovrus/102", "content": "\u0414\u0430\u0432\u0430\u0439\u0442\u0435 \u043f\u043e\u0441\u043c\u043e\u0442\u0440\u0438\u043c \u043d\u0430 \u0441\u0435\u043d\u0442\u044f\u0431\u0440\u044c\u0441\u043a\u0438\u0439 Microsoft Patch Tuesday. \u0412 \u044d\u0442\u043e\u0442 \u0440\u0430\u0437 \u043a\u043e\u043c\u043f\u0430\u043a\u0442\u043d\u0435\u043d\u044c\u043a\u043e. \u0412\u0441\u0435\u0433\u043e 63 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438. \u0421 \u0443\u0447\u0435\u0442\u043e\u043c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432\u044b\u0448\u0435\u0434\u0448\u0438\u0445 \u043c\u0435\u0436\u0434\u0443 \u0430\u0432\u0433\u0443\u0441\u0442\u043e\u0432\u0441\u043a\u0438\u043c \u0438 \u0441\u0435\u043d\u0442\u044f\u0431\u0440\u044c\u0441\u043a\u0438\u043c Patch Tuesday (\u043a\u0430\u043a \u043e\u0431\u044b\u0447\u043d\u043e, \u0432 Microsoft Edge), \u043f\u043e\u043b\u0443\u0447\u0430\u0435\u0442\u0441\u044f 90. \u0412\u0435\u0441\u044c\u043c\u0430 \u0438 \u0432\u0435\u0441\u044c\u043c\u0430 \u043d\u0435\u043c\u043d\u043e\u0433\u043e.\n\n1. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0441 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u044b\u043c\u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u0430\u043c\u0438 \u043f\u043e\u043a\u0430 \u043d\u0435\u0442. \u0415\u0441\u0442\u044c 3 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 Proof-of-Concept Exploit \u043f\u043e \u0434\u0430\u043d\u043d\u044b\u043c \u0438\u0437 CVSS\n\nElevation of Privilege - Kerberos (CVE-2022-33679)\nElevation of Privilege - Azure Guest Configuration and Azure Arc-enabled servers (CVE-2022-38007)\nElevation of Privilege - Windows GDI (CVE-2022-34729)\n\n\u041d\u043e \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e\u0441\u0442\u044c, \u0447\u0442\u043e \u044d\u0442\u043e \u0434\u043e\u043a\u0440\u0443\u0442\u044f\u0442 \u0434\u043e \u0431\u043e\u0435\u0432\u043e\u0433\u043e \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u044f \u043d\u0435\u0432\u044b\u0441\u043e\u043a\u0430.\n\n2. \u0415\u0441\u0442\u044c 3 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0441 \u043f\u0440\u0438\u0437\u043d\u0430\u043a\u043e\u043c \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0432\u0436\u0438\u0432\u0443\u044e\n\nElevation of Privilege - Windows Common Log File System Driver (CVE-2022-37969). \u041c\u043e\u0436\u043d\u043e \u043f\u043e\u0434\u043d\u044f\u0442\u044c \u043f\u0440\u0430\u0432\u0430 \u0434\u043e SYSTEM. \u0417\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u043c\u0430\u0441\u0441\u0443 \u0432\u0435\u0440\u0441\u0438\u0439 Windows, \u0435\u0441\u0442\u044c \u043f\u0430\u0442\u0447\u0438 \u0434\u0430\u0436\u0435 \u043f\u043e\u0434 EOL \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043a\u0438. \u041a\u0440\u043e\u043c\u0435 \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0431\u044b\u043b \u043f\u0443\u0447\u043e\u043a \u0432\u0438\u043d\u0434\u043e\u0432\u044b\u0445 EoP-\u0448\u0435\u043a \u0431\u0435\u0437 \u043f\u0440\u0438\u0437\u043d\u0430\u043a\u043e\u0432 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438, \u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440 Elevation of Privilege - Windows Kernel (CVE-2022-37956, CVE-2022-37957, CVE-2022-37964)\n\nSecurity Feature Bypass - Microsoft Edge (CVE-2022-2856, CVE-2022-3075). \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 Edge \u044d\u0442\u043e \u043f\u043e \u0444\u0430\u043a\u0442\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 Chromium. \u041e\u0431\u0440\u0430\u0442\u043d\u0430\u044f \u0441\u0442\u043e\u0440\u043e\u043d\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u043e\u0434\u043d\u043e\u0433\u043e \u0438 \u0442\u043e\u0433\u043e \u0436\u0435 \u0434\u0432\u0438\u0436\u043a\u0430. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 Chrome \u0430\u0444\u0444\u0435\u043a\u0442\u044f\u0442 \u0442\u0430\u043a\u0436\u0435 Edge, Opera, Brave, Vivaldi \u0438 \u043f\u0440\u043e\u0447\u0435\u0435.\n\n3. RCE \u043e\u0442 \u043f\u043e\u0441\u043b\u0430\u043d\u043d\u043e\u0433\u043e IP \u043f\u0430\u043a\u0435\u0442\u0430 \ud83d\ude31\n\nRemote Code Execution - Windows TCP/IP (CVE-2022-34718). \"An unauthorized attacker can use it to execute arbitrary code on the attacked Windows computer with the IPSec service enabled by sending a specially crafted IPv6 packet to it. This vulnerability can only be exploited against systems with Internet Protocol Security (IPsec) enabled.\" IPsec \u0438 IPv6 \u0437\u043b\u043e, \u043b\u043e\u043b. \ud83d\ude42 \u041d\u043e \u0435\u0441\u043b\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e, \u0442\u043e \u0441\u043a\u0432\u0435\u0440\u043d\u043e, \u0447\u0442\u043e \u0442\u0430\u043a\u043e\u0435 \u0432\u043e\u043e\u0431\u0449\u0435 \u0431\u044b\u0432\u0430\u0435\u0442.\n\n\u0418 \u044d\u0442\u043e \u0435\u0449\u0451 \u043d\u0435 \u0432\u0441\u0435, \u0435\u0441\u0442\u044c \u0435\u0449\u0451 Remote Code Execution - Windows Internet Key Exchange (IKE) Protocol Extensions (CVE-2022-34721, CVE-2022-34722). \"An unauthenticated attacker could send a specially crafted IP packet to a target machine that is running Windows and has IPSec enabled, which could enable a remote code execution exploitation.\"\n\n4. Denial of Service - Windows DNS Server (CVE-2022-34724). \u0421 \u043e\u0434\u043d\u043e\u0439 \u0441\u0442\u043e\u0440\u043e\u043d\u044b \u0442\u043e\u043b\u044c\u043a\u043e DoS, \u0441 \u0434\u0440\u0443\u0433\u043e\u0439 \u0441\u0442\u043e\u0440\u043e\u043d\u044b \u0440\u0430\u0431\u043e\u0442\u0443 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u043c\u043e\u0436\u043d\u043e \u043d\u0435\u043f\u043b\u043e\u0445\u043e \u0442\u0430\u043a \u043f\u0430\u0440\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u0442\u044c.\n\n5. Memory Corruption - ARM processor (CVE-2022-23960). \u0424\u0438\u043a\u0441 \u0434\u043b\u044f \u043e\u0447\u0435\u0440\u0435\u0434\u043d\u043e\u0433\u043e Spectre, \u043d\u0430 \u044d\u0442\u043e\u0442 \u0440\u0430\u0437 Spectre-BHB. \u041f\u0440\u043e \u043f\u0440\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0431\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u044c \u0432\u0438\u0434\u0438\u043c\u043e \u0433\u043e\u0432\u043e\u0440\u0438\u0442\u044c \u043d\u0435 \u043f\u0440\u0438\u0445\u043e\u0434\u0438\u0442\u0441\u044f, \u0442\u0430\u043a \u0436\u0435 \u043a\u0430\u043a \u0438 \u0432 \u0441\u043b\u0443\u0447\u0430\u0435 \u043e\u0441\u0442\u0430\u043b\u044c\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0442\u0438\u043f\u0430 Spectre, \u043d\u043e \u043f\u0440\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0432\u0441\u0435 \u043e\u0431\u0437\u043e\u0440\u0449\u0438\u043a\u0438 \u043d\u0430 \u044d\u0442\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u0435 \u043e\u0431\u0440\u0430\u0442\u0438\u043b\u0438.\n\n\u041f\u043e\u043b\u043d\u044b\u0439 \u043e\u0442\u0447\u0435\u0442 Vulristics: https://avleonov.com/vulristics_reports/ms_patch_tuesday_september2022_report_with_comments_ext_img.html\n\n@avleonovrus #Microsoft #PatchTuesday #Vulristics", "creation_timestamp": "2023-09-21T09:16:46.000000Z"}, {"uuid": "de6a3f97-7e0e-40be-9f3b-b7855476aade", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34713", "type": "published-proof-of-concept", "source": "https://t.me/avleonovrus/79", "content": "Hello everyone! In this episode, let\u2019s take a look at the Microsoft Patch Tuesday August 2022 vulnerabilities. I use my Vulristics vulnerability prioritization tool as usual. I take comments for vulnerabilities from Tenable, Qualys, Rapid7, ZDI and Kaspersky blog posts. Also, as usual, I take into account the vulnerabilities added between the July and August Patch Tuesdays.\n\nThere were 147 vulnerabilities. Urgent: 1, Critical: 0, High: 36, Medium: 108, Low: 2.\n\nThere was a lot of great stuff this Patch Tuesday. There was a critical exploited in the wild MSDT DogWalk vulnerability, 3 critical Exchange vulnerabilities that could be easily missed in prioritization, 13 potentially dangerous vulnerabilities, 2 funny vulnerabilities and 3 mysterious ones. Let\u2019s take a closer look.\n\n01:02 MSDT RCE DogWalk CVE-2022-34713\n02:38 3 Microsoft Exchange EOPs  (CVE-2022-21980, CVE-2022-24516, CVE-2022-24477)\n04:23 13 potentially dangerous vulnerabilities (PPP, SSTP, SMB,  Visual Studio, AD, NFS, Print Spooler) \n11:06 2 funny vulnerabilities (Edge CVE-2022-2623, Outlook CVE-2022-35742)\n12:46 3 mysterious vulnerabilities (CryptoPro, Eurosoft, New Horizon Data Systems)\n\nVideo:  https://youtu.be/gSC8ExHUtt8\nVideo2 (for Russia): https://vk.com/video-149273431_456239098\nBlogpost: https://avleonov.com/2022/08/23/microsoft-patch-tuesday-august-2022-dogwalk-exchange-eops-13-potentially-dangerous-2-funny-3-mysterious-vulnerabilities/\nFull report: https://avleonov.com/vulristics_reports/ms_patch_tuesday_august2022_report_with_comments_ext_img.html\n\n#microsoft #patchtuesday\n\n@avleonovcom", "creation_timestamp": "2022-08-29T20:46:30.000000Z"}, {"uuid": "70b1eb15-3b83-439c-b60c-f192e80de7cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34718", "type": "published-proof-of-concept", "source": "Telegram/ZJUOBIMzRritneBVOIcc62b0008HZw4NzcI3Rlf5A7e1g3I", "content": "", "creation_timestamp": "2023-03-23T06:15:51.000000Z"}, {"uuid": "b87f96fe-2774-44d8-932e-2e96a0dbdbc1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34718", "type": "published-proof-of-concept", "source": "https://t.me/WARLOCK_DARK_ARMY_OFFICIALS/542", "content": "CVE-2022\u201334718\n\nTCP/IP RCE Vulnerability (CVE-2022\u201334718) PoC Restoration and Analysis.\n\nhttps://github.com/numencyber/VulnerabilityPoC\n\nDetails:\nhttps://medium.com/@numencyberlabs/analysis-and-summary-of-tcp-ip-protocol-remote-code-execution-vulnerability-cve-2022-34718-8fcc28538acf\n\n#cve #poc", "creation_timestamp": "2022-11-28T19:07:05.000000Z"}, {"uuid": "c6143ce7-7020-4591-bd0a-3f18c81224b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34718", "type": "published-proof-of-concept", "source": "https://t.me/AnonCyberWarrior/469", "content": "CVE-2022\u201334718 : TCP/IP Protocol Remote Code Execution Vulnerability \n\nhttps://medium.com/numen-cyber-labs/analysis-and-summary-of-tcp-ip-protocol-remote-code-execution-vulnerability-cve-2022-34718-8fcc28538acf\n\n\n| @AnonCyberWarrior |", "creation_timestamp": "2023-11-23T10:10:42.000000Z"}, {"uuid": "a5572dc8-0c9e-4e5a-b4f7-7a9e6e903133", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34718", "type": "published-proof-of-concept", "source": "https://t.me/MITERRED/224", "content": "TCP/IP Vulnerability CVE-2022\u201334718 PoC Restoration and Analysis\n\nhttps://medium.com/numen-cyber-labs/analysis-and-summary-of-tcp-ip-protocol-remote-code-execution-vulnerability-cve-2022-34718-8fcc28538acf", "creation_timestamp": "2022-10-31T15:46:03.000000Z"}, {"uuid": "5228e85d-0ec6-43dc-9a41-105b8acb6d02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3471", "type": "seen", "source": "https://t.me/cibsecurity/51308", "content": "\u203c CVE-2022-3471 \u203c\n\nA vulnerability was found in SourceCodester Human Resource Management System. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file city.php. The manipulation of the argument searccity leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-210715.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-13T07:27:29.000000Z"}, {"uuid": "56076ff7-60f0-435f-b2b8-bc8025813b98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34714", "type": "seen", "source": "https://t.me/cibsecurity/47821", "content": "\u203c CVE-2022-34714 \u203c\n\nWindows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34702, CVE-2022-35745, CVE-2022-35752, CVE-2022-35753, CVE-2022-35766, CVE-2022-35767, CVE-2022-35794.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-10T00:31:05.000000Z"}, {"uuid": "709087a5-f77e-4ff6-a774-d597200205d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34712", "type": "seen", "source": "https://t.me/cibsecurity/47810", "content": "\u203c CVE-2022-34710 \u203c\n\nWindows Defender Credential Guard Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-34704, CVE-2022-34712.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-10T00:30:52.000000Z"}, {"uuid": "b1764c4c-0b41-4303-8e1e-86c27d205f58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34713", "type": "exploited", "source": "https://t.me/thehackernews/2457", "content": "Patch Tuesday, August 2022 \u2014 Microsoft releases security updates to address 121 newly reported vulnerabilities, including a zero-day (CVE-2022-34713) bug that the company says is being actively exploited.\n\nRead details: https://thehackernews.com/2022/08/microsoft-issues-patches-for-121-flaws.html", "creation_timestamp": "2022-09-09T03:43:52.000000Z"}, {"uuid": "24609588-2533-4711-9284-fcdeef17c495", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34713", "type": "exploited", "source": "https://t.me/xakep_ru/12762", "content": "Microsoft \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 RCE-\u0431\u0430\u0433 \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 \u00ab\u0432\u0442\u043e\u0440\u043d\u0438\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439\u00bb\n\n\u0412 \u044d\u0442\u043e\u043c \u043c\u0435\u0441\u044f\u0446\u0435, \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 \u0442\u0440\u0430\u0434\u0438\u0446\u0438\u043e\u043d\u043d\u043e\u0433\u043e \u00ab\u0432\u0442\u043e\u0440\u043d\u0438\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439\u00bb \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Microsoft \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0431\u043e\u043b\u0435\u0435 120 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439. \u041e\u0434\u043d\u043e\u0439 \u0438\u0437 \u0441\u0430\u043c\u044b\u0445 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0445 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u0441\u0442\u0430\u043b\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f DogWalk (CVE-2022-34713), \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u0438 \u0443\u0436\u0435 \u043d\u0430\u0445\u043e\u0434\u0438\u0442\u0441\u044f \u043f\u043e\u0434 \u0430\u0442\u0430\u043a\u0430\u043c\u0438.\n\nhttps://xakep.ru/2022/08/10/august-patch-tuesday-3/", "creation_timestamp": "2022-08-10T19:43:27.000000Z"}, {"uuid": "e2e3fd77-a6a2-4538-ac00-58610f2970ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34713", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:38.000000Z"}, {"uuid": "0898ea6c-68cd-4ae7-961d-61363fa5acab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2022-34718", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=870", "content": "", "creation_timestamp": "2022-09-14T04:00:00.000000Z"}, {"uuid": "5008ae9b-d24c-4fcd-9d05-16b9c26a0ffb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2022-34713", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=850", "content": "", "creation_timestamp": "2022-08-10T04:00:00.000000Z"}, {"uuid": "9b392c35-ddea-4992-9fe0-540f16fce796", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34713", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/c8c14150-49f1-4775-9a83-e18b45574ee6", "content": "", "creation_timestamp": "2026-02-02T12:27:17.942202Z"}, {"uuid": "027ff1c8-389c-4f1d-b586-c021f18158ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34713", "type": "exploited", "source": "https://t.me/poxek/2307", "content": "Microsoft Patches \u2018Dogwalk\u2019 Zero-Day and 17 Critical Flaws\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Microsoft \u043f\u0440\u0438\u0437\u044b\u0432\u0430\u0435\u0442 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c Dogwalk, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435. \u041e\u0448\u0438\u0431\u043a\u0430 (CVE-2022-34713) \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 Microsoft Windows Support Diagnostic Tool \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043a\u043e\u0434 \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435.", "creation_timestamp": "2022-08-19T09:00:23.000000Z"}, {"uuid": "832b830b-1ccf-4824-9498-52c6e41ba359", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34713", "type": "exploited", "source": "https://t.me/ctinow/57216", "content": "Microsoft fixes exploited zero-day in Windows Support Diagnostic Tool (CVE-2022-34713)\n\nhttps://ift.tt/CgwIVLQ", "creation_timestamp": "2022-08-09T23:04:14.000000Z"}, {"uuid": "a5523292-408f-44b7-8a6e-7ed98d723d6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34710", "type": "seen", "source": "https://t.me/cibsecurity/47810", "content": "\u203c CVE-2022-34710 \u203c\n\nWindows Defender Credential Guard Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-34704, CVE-2022-34712.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-10T00:30:52.000000Z"}]}