On Tuesday, April 12, Microsoft released scheduled monthly security updates for its products. The April patches fix 128 vulnerabilities in Windows Defender, Office, Exchange Server, Visual Studio, Print Queue Manager, etc.
Ten vulnerabilities are marked as critical, 115 – dangerous and three – medium danger. One of the fixed vulnerabilities is already being exploited by hackers. We are talking about increasing privileges in the Windows Common Log File System (CLFS), discovered by specialists of the US National Security Agency and the information security company CrowdStrike. The problem received the identifier CVE-2022-24521 and a score of 7.8 points out of the maximum 10 on the CVSS vulnerability Risk assessment scale.
Another fixed vulnerability is already known to the public, as it was disclosed earlier. CVE-2022-26904 (7.0 points on the CVSS scale) represents an elevation of privileges in the Windows User Profile Service.
Other critical vulnerabilities include code execution in Runtime Library (CVE-2022-26809), Windows Network File System (CVE-2022-24491 and CVE-2022-24497), Windows Server Service (CVE-2022-24541), Windows SMB (CVE-2022-24500) and Microsoft Dynamics 365 (CVE-2022-23259).
Microsoft has also fixed 18 vulnerabilities in Windows DNS Server, including one disclosure vulnerability and 17 remote code execution vulnerabilities. Another 15 issues have been fixed in the Print queue manager.
Recall that Microsoft recently announced a new AutoPatch feature, which will be available in July 2022. With its help, enterprises will be able to accelerate the timely application of security fixes, paying special attention to scalability and stability.