{"id":3017,"date":"2022-03-11T09:12:31","date_gmt":"2022-03-11T14:12:31","guid":{"rendered":"https:\/\/cert.pa\/?p=3017"},"modified":"2023-01-24T09:54:22","modified_gmt":"2023-01-24T14:54:22","slug":"csirt-panama-aviso-2022-mar-9-actualizaciones-de-seguridad-de-microsoft-para-marzo","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=3017","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2022-mar-9: Actualizaciones de seguridad de Microsoft para marzo."},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2022-mar-9: Actualizaciones de seguridad de Microsoft para marzo.<br>Gravedad: Alta<br>Fecha de publicaci\u00f3n: marzo 11, 2022<br>\u00daltima revisi\u00f3n: marzo 10, 2022<br>https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2022-Mar<\/p>\n\n\n\n<p>Sistemas Afectados:<br>.NET and Visual Studio<br>Azure Site Recovery<br>Microsoft Defender for Endpoint<br>Microsoft Defender for IoT<br>Microsoft Edge (Chromium-based)<br>Microsoft Exchange Server<br>Microsoft Intune<br>Microsoft Office Visio<br>Microsoft Office Word<br>Microsoft Windows ALPC<br>Microsoft Windows Codecs Library<br>Paint 3D<br>Role: Windows Hyper-V<br>Skype Extension for Chrome<br>Tablet Windows User Interface<br>Visual Studio Code<br>Windows Ancillary Function Driver for WinSock<br>Windows CD-ROM Driver<br>Windows Cloud Files Mini Filter Driver<br>Windows COM<br>Windows Common Log File System Driver<br>Windows DWM Core Library<br>Windows Event Tracing<br>Windows Fastfat Driver<br>Windows Fax and Scan Service<br>Windows HTML Platform<br>Windows Installer<br>Windows Kernel<br>Windows Media<br>Windows PDEV<br>Windows Point-to-Point Tunneling Protocol<br>Windows Print Spooler Components<br>Windows Remote Desktop<br>Windows Security Support Provider Interface<br>Windows SMB Server<br>Windows Update Stack<br>XBox<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>Microsoft ha liberado sus actualizaciones de seguridad correspondientes al mes de marzo.<br>Este conjunto de actualizaciones corrije 3 vulnerabilidades de dia cero y 71 otras fallas.<br>El detalle a continuacion:<br>25 Vulnerabilidades de elevaci\u00f3n de privilegios<br>3 Vulnerabilidades de omisi\u00f3n de funciones de seguridad<br>29 Vulnerabilidades de ejecuci\u00f3n remota de c\u00f3digo<br>6 Vulnerabilidades de divulgaci\u00f3n de informaci\u00f3n<br>4 Vulnerabilidades de denegaci\u00f3n de servicio<br>3 vulnerabilidades de suplantaci\u00f3n de identidad<br>21 Edge: vulnerabilidades de chromium<\/p>\n\n\n\n<p>II. Detalle<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>.NET and Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24512\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24512<\/a><\/td><td>.NET and Visual Studio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>.NET and Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24464\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24464<\/a><\/td><td>.NET and Visual Studio Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>.NET and Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-8927\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-8927<\/a><\/td><td>Brotli Library Buffer Overflow Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24506\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24506<\/a><\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24517\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24517<\/a><\/td><td>Azure Site Recovery Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24470\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24470<\/a><\/td><td>Azure Site Recovery Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24471\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24471<\/a><\/td><td>Azure Site Recovery Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24520\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24520<\/a><\/td><td>Azure Site Recovery Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24518\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24518<\/a><\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24519\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24519<\/a><\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24515\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24515<\/a><\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24467\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24467<\/a><\/td><td>Azure Site Recovery Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24468\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24468<\/a><\/td><td>Azure Site Recovery Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24469\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24469<\/a><\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Defender for Endpoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-23278\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-23278<\/a><\/td><td>Microsoft Defender for Endpoint Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Defender for IoT<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-23265\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-23265<\/a><\/td><td>Microsoft Defender for IoT Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Defender for IoT<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-23266\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-23266<\/a><\/td><td>Microsoft Defender for IoT Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-0790\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-0790<\/a><\/td><td>Chromium: CVE-2022-0790 Use after free in Cast UI<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-0789\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-0789<\/a><\/td><td>Chromium: CVE-2022-0789 Heap buffer overflow in ANGLE<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-0809\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-0809<\/a><\/td><td>Chromium: CVE-2022-0809 Out of bounds memory access in WebXR<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-0791\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-0791<\/a><\/td><td>Chromium: CVE-2022-0791 Use after free in Omnibox<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-0803\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-0803<\/a><\/td><td>Chromium: CVE-2022-0803 Inappropriate implementation in Permissions<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-0804\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-0804<\/a><\/td><td>Chromium: CVE-2022-0804 Inappropriate implementation in Full screen mode<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-0801\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-0801<\/a><\/td><td>Chromium: CVE-2022-0801 Inappropriate implementation in HTML parser<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-0802\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-0802<\/a><\/td><td>Chromium: CVE-2022-0802 Inappropriate implementation in Full screen mode<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-0807\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-0807<\/a><\/td><td>Chromium: CVE-2022-0807 Inappropriate implementation in Autofill<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-0808\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-0808<\/a><\/td><td>Chromium: CVE-2022-0808 Use after free in Chrome OS Shell<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-0805\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-0805<\/a><\/td><td>Chromium: CVE-2022-0805 Use after free in Browser Switcher<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-0806\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-0806<\/a><\/td><td>Chromium: CVE-2022-0806 Data leak in Canvas<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-0800\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-0800<\/a><\/td><td>Chromium: CVE-2022-0800 Heap buffer overflow in Cast UI<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-0794\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-0794<\/a><\/td><td>Chromium: CVE-2022-0794 Use after free in WebShare<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-0795\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-0795<\/a><\/td><td>Chromium: CVE-2022-0795 Type Confusion in Blink Layout<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-0792\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-0792<\/a><\/td><td>Chromium: CVE-2022-0792 Out of bounds read in ANGLE<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-0793\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-0793<\/a><\/td><td>Chromium: CVE-2022-0793 Use after free in Views<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-0796\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-0796<\/a><\/td><td>Chromium: CVE-2022-0796 Use after free in Media<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-0798\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-0798<\/a><\/td><td>Chromium: CVE-2022-0798 Use after free in MediaStream<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-0797\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-0797<\/a><\/td><td>Chromium: CVE-2022-0797 Out of bounds memory access in Mojo<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-0799\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-0799<\/a><\/td><td>Chromium: CVE-2022-0799 Insufficient policy enforcement in Installer<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-23277\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-23277<\/a><\/td><td>Microsoft Exchange Server Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24463\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24463<\/a><\/td><td>Microsoft Exchange Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Intune<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24465\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24465<\/a><\/td><td>Microsoft Intune Portal for iOS Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Visio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24510\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24510<\/a><\/td><td>Microsoft Office Visio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Visio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24509\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24509<\/a><\/td><td>Microsoft Office Visio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Visio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24461\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24461<\/a><\/td><td>Microsoft Office Visio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Word<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24462\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24462<\/a><\/td><td>Microsoft Word Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Word<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24511\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24511<\/a><\/td><td>Microsoft Office Word Tampering Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows ALPC<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-23287\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-23287<\/a><\/td><td>Windows ALPC Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows ALPC<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24505\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24505<\/a><\/td><td>Windows ALPC Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows ALPC<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-23283\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-23283<\/a><\/td><td>Windows ALPC Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24451\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24451<\/a><\/td><td>VP9 Video Extensions Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-22007\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-22007<\/a><\/td><td>HEVC Video Extensions Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-22006\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-22006<\/a><\/td><td>HEVC Video Extensions Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24452\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24452<\/a><\/td><td>HEVC Video Extensions Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24453\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24453<\/a><\/td><td>HEVC Video Extensions Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24501\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24501<\/a><\/td><td>VP9 Video Extensions Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24457\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24457<\/a><\/td><td>HEIF Image Extensions Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24456\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24456<\/a><\/td><td>HEVC Video Extensions Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-22010\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-22010<\/a><\/td><td>Media Foundation Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-21977\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-21977<\/a><\/td><td>Media Foundation Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-23295\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-23295<\/a><\/td><td>Raw Image Extension Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-23300\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-23300<\/a><\/td><td>Raw Image Extension Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-23301\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-23301<\/a><\/td><td>HEVC Video Extensions Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Paint 3D<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-23282\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-23282<\/a><\/td><td>Paint 3D Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Windows Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-21975\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-21975<\/a><\/td><td>Windows Hyper-V Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Skype Extension for Chrome<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24522\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24522<\/a><\/td><td>Skype Extension for Chrome Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Tablet Windows User Interface<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24460\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24460<\/a><\/td><td>Tablet Windows User Interface Application Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio Code<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24526\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24526<\/a><\/td><td>Visual Studio Code Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Ancillary Function Driver for WinSock<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24507\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24507<\/a><\/td><td>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows CD-ROM Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24455\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24455<\/a><\/td><td>Windows CD-ROM Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Cloud Files Mini Filter Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-23286\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-23286<\/a><\/td><td>Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows COM<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-23290\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-23290<\/a><\/td><td>Windows Inking COM Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Common Log File System Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-23281\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-23281<\/a><\/td><td>Windows Common Log File System Driver Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DWM Core Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-23291\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-23291<\/a><\/td><td>Windows DWM Core Library Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DWM Core Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-23288\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-23288<\/a><\/td><td>Windows DWM Core Library Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Event Tracing<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-23294\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-23294<\/a><\/td><td>Windows Event Tracing Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Fastfat Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-23293\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-23293<\/a><\/td><td>Windows Fast FAT File System Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Fax and Scan Service<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24459\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24459<\/a><\/td><td>Windows Fax and Scan Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows HTML Platform<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24502\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24502<\/a><\/td><td>Windows HTML Platforms Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Installer<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-23296\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-23296<\/a><\/td><td>Windows Installer Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-23297\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-23297<\/a><\/td><td>Windows NT Lan Manager Datagram Receiver Driver Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-23298\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-23298<\/a><\/td><td>Windows NT OS Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Media<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-21973\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-21973<\/a><\/td><td>Windows Media Center Update Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows PDEV<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-23299\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-23299<\/a><\/td><td>Windows PDEV Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Point-to-Point Tunneling Protocol<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-23253\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-23253<\/a><\/td><td>Point-to-Point Tunneling Protocol Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Print Spooler Components<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-23284\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-23284<\/a><\/td><td>Windows Print Spooler Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Desktop<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-21990\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-21990<\/a><\/td><td>Remote Desktop Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Desktop<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-23285\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-23285<\/a><\/td><td>Remote Desktop Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Desktop<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24503\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24503<\/a><\/td><td>Remote Desktop Protocol Client Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Security Support Provider Interface<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24454\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24454<\/a><\/td><td>Windows Security Support Provider Interface Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows SMB Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24508\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24508<\/a><\/td><td>Windows SMBv3 Client\/Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Update Stack<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24525\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-24525<\/a><\/td><td>Windows Update Stack Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>XBox<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-21967\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-21967<\/a><\/td><td>Xbox Live Auth Manager for Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>Actualizar utilizando Microsoft Windows Update o herramientas de administracion de actualizaciones centralizadas.<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>CSIRT PANAMA<br>Computer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>E-Mail: info@cert.pa<br>Phone: +507 520-CERT (2378)<br>Web: https:\/\/cert.pa<br>Twitter: @CSIRTPanama<br>Key ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2022-mar-9: Actualizaciones de seguridad de Microsoft para marzo.Gravedad: AltaFecha de publicaci\u00f3n: marzo 11, 2022\u00daltima revisi\u00f3n: marzo 10, 2022https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2022-Mar Sistemas Afectados:.NET and Visual StudioAzure Site RecoveryMicrosoft Defender for EndpointMicrosoft Defender for IoTMicrosoft Edge&#8230;<\/p>\n","protected":false},"author":4,"featured_media":1847,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,9,73,94],"class_list":["post-3017","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-microsoft","tag-parches","tag-windows-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3017","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3017"}],"version-history":[{"count":2,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3017\/revisions"}],"predecessor-version":[{"id":3019,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3017\/revisions\/3019"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1847"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3017"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3017"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3017"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}