July 2022 Patch Tuesday: Four Critical CVEs and a Zero-Day Bug Under Active Exploitation

Microsoft has released 84 security patches for its July 2022 Patch Tuesday rollout. Four vulnerabilities are rated Critical in severity and the rest are classified as Important, with one (CVE-2022-22047) under active exploitation. In this blog, the CrowdStrike Falcon® Spotlight™ team offers an analysis of this month’s vulnerabilities, as well as insights into the vulnerabilities and patches affecting Microsoft products in the first half of this year. We highlight the CVEs in this month’s update that are most severe and recommend how to prioritize patching.

July 2022 Risk Analysis

The top three attack types — elevation of privilege, remote code execution (RCE) and information disclosure — continue to dominate, with denial of service following at almost 6%.

Figure 1. Breakdown of July 2022 Patch Tuesday attack types

Microsoft Windows received the most patches this month, with Extended Security Updates (ESUs) following close behind. There are also patches for 33 Azure vulnerabilities this month and a couple for Microsoft Office products.

Figure 2. Breakdown of July 2022 Patch Tuesday affected product families

Zero-Day CSRSS Vulnerability Under Active Exploitation

CVE-2022-22047 is listed as being under active attack, but there’s no information from Microsoft on where, or how widely, the vulnerability is being exploited. This vulnerability allows an attacker to execute code as SYSTEM, provided they can execute other code on the target. Bugs of this type are typically paired with a code execution bug, usually a specially crafted Office or Adobe document, to take over a system. These attacks often rely on macros, which are now disabled by default.

 

RankCVSS ScoreCVEDescription
Important7.8CVE-2022-22047Windows CSRSS Elevation of Privilege

CrowdStrike recommends that you monitor your environment to see if it is affected by this vulnerability and apply the fix offered. For CrowdStrike customers using Falcon Spotlight, this CVE is ranked as Critical.

Critical Vulnerabilities in Network File System and RPC

Four vulnerabilities ranked as Critical received patches this month. Affected products are Remote Procedure Call (RPC), Windows Network File System (NFS) and Windows Graphics Component. Let’s review a couple of these vulnerabilities and how they could affect an organization’s environment.

CVE-2022-22038: This vulnerability could allow a remote, unauthenticated attacker to exploit code on an affected system. While not specified in the bulletin, the assumption is that, with elevated privileges, code execution would occur. By combining these attributes, you may end up with a potentially wormable bug. Microsoft rates the attack complexity as high since an attacker would need to make “multiple exploitation attempts” to take advantage of this vulnerability, but again, unless you are actively blocking RPC activity, you may not see these attempts. If the exploit complexity were rated low, which some would argue it should be since the attempts could likely be scripted, the CVSS would be 9.8. CrowdStrike recommends that you test and deploy this patch quickly.

CVE-2022-22029: This is the third month in a row with a Critical-rated NFS vulnerability, and while this one has a lower CVSS than the previously listed vulnerabilities, it could still allow a remote, unauthenticated attacker to execute their code on an affected system with no user interaction. Microsoft notes multiple exploit attempts may be required to do this, but unless you are specifically auditing for this, you may not notice. If you’re running NFS, make sure you don’t ignore this patch.

RankCVSS ScoreCVEDescription
Critical8.8CVE-2022-30221Windows Graphics Component Remote Code Execution Vulnerability
Critical8.1CVE-2022-22038Remote Procedure Call Runtime Remote Code Execution Vulnerability
Critical8.1CVE-2022-22029Windows Network File System Remote Code Execution Vulnerability
Critical7.5CVE-2022-22039Windows Network File System Remote Code Execution Vulnerability

Important Azure Site Recovery Service Vulnerabilities

Based on the total count of Azure vulnerabilities addressed this month, this set of CVEs should be prioritized. Azure Site Recovery is primarily a cloud-based service, but there are some on-premises components. An automatic update for these vulnerabilities is very unlikely to happen. Microsoft recommends upgrading to version 9.49 to remediate these vulnerabilities. Instructions can be found in this article. It’s incredibly unusual to see so many CVEs addressed in a single month for a single component.

RankCVSS ScoreCVE
Important8.3CVE-2022-33674
Important7.8CVE-2022-33675
Important7.2CVE-2022-33677
Important7.2CVE-2022-33676
Important7.2CVE-2022-33678
Important6.5CVE-2022-30181
Important6.5CVE-2022-33641
Important6.5CVE-2022-33643
Important6.5CVE-2022-33655
Important6.5CVE-2022-33656
Important6.5CVE-2022-33657
Important6.5CVE-2022-33661
Important6.5CVE-2022-33662
Important6.5CVE-2022-33663
Important6.5CVE-2022-33665
Important6.5CVE-2022-33666
Important6.5CVE-2022-33667
Important6.5CVE-2022-33672
Important6.5CVE-2022-33673
Important4.9CVE-2022-33642
Important4.9CVE-2022-33650
Important4.9CVE-2022-33651
Important4.9CVE-2022-33653
Important4.9CVE-2022-33654
Important4.9CVE-2022-33659
Important4.9CVE-2022-33660
Important4.9CVE-2022-33664
Important4.9CVE-2022-33668
Important4.9CVE-2022-33669
Important4.9CVE-2022-33671
Important4.4CVE-2022-33652
Important4.4CVE-2022-33658

Falcon Spotlight provides the visibility SecOps teams need to quickly identify which vulnerabilities are prevalent in your organization’s environment. Since Falcon Spotlight is completely integrated within the CrowdStrike Falcon® platform, IT staff are able to take swift action by isolating potentially compromised hosts from exploited vulnerabilities. Additionally, the Falcon platform mitigates the risk from vulnerabilities that cannot be patched rapidly by detecting and automatically preventing exploitation attempts and post-exploitation activity.

Managing Vulnerabilities Is Ultimately about the Long Game

As evident in these monthly patch rollouts, no product is safe from vulnerabilities. Attackers will use any weakness to gain access, exploit flaws and move laterally to take advantage of your organization. While prioritization and patching are vital for immediately addressing critical issues, what makes a vulnerability management program successful is planning for the long term.

When your organization is planning for the long term, reviewing everything within your environment is important. Patching should not be done in a vacuum — it requires open communication with other parts of your cybersecurity organization and cross-collaboration with IT hygiene, threat intelligence and compliance teams to fully understand which areas of risk your organization might be exposed to and the types of threats or attackers are more likely to take advantage.

Organizations rely on full-suite platforms that offer comprehensive solutions to do this in a timely manner. Your staff should be able to make accurate and actionable recommendations based on any kind of suspicious activity surrounding the assets and entities in your environment while having access to relevant contextual data to provide the insight needed to make appropriate decisions to protect your environment. CrowdStrike stands resolutely behind this. When we say “We stop breaches,” we offer a holistic approach to creating a defensible security posture — and we do it in a way that is relevant, timely and accessible to all who are responsible for keeping your defenses strong. Beyond Falcon Spotlight, we suggest you try our Falcon platform to see how CrowdStrike can enable your team for success.

Learn More

This video on Falcon Spotlight™ vulnerability management shows how you can quickly monitor and prioritize vulnerabilities within the systems and applications in your organization.

About CVSS Scores

The Common Vulnerability Scoring System (CVSS) is a free and open industry standard that CrowdStrike and many other cybersecurity organizations use to assess and communicate software vulnerabilities’ severity and characteristics. The CVSS Base Score ranges from 0.0 to 10.0, and the National Vulnerability Database (NVD) adds a severity rating for CVSS scores. Learn more about vulnerability scoring in this article.

Additional Resources