{"id":3114,"date":"2022-08-11T08:44:08","date_gmt":"2022-08-11T13:44:08","guid":{"rendered":"https:\/\/cert.pa\/?p=3114"},"modified":"2023-01-24T09:54:07","modified_gmt":"2023-01-24T14:54:07","slug":"csirt-panama-aviso-2022-ago-10-actualizaciones-de-seguridad-de-microsoft-para-agosto","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=3114","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2022-ago-10 Actualizaciones de seguridad de Microsoft para agosto."},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2022-ago-10 Actualizaciones de seguridad de Microsoft para agosto.<br>Gravedad: Alta<br>Fecha de publicaci\u00f3n: agosto 11, 2022<br>\u00daltima revisi\u00f3n: agosto 11, 2022<br>https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2022-Aug<\/p>\n\n\n\n<p>Sistemas Afectados:<br>.NET Core<br>Active Directory Domain Services<br>Azure Batch Node Agent<br>Azure Real Time Operating System<br>Azure Site Recovery<br>Azure Sphere<br>Microsoft ATA Port Driver<br>Microsoft Bluetooth Driver<br>Microsoft Edge (Chromium-based)<br>Microsoft Exchange Server<br>Microsoft Office<br>Microsoft Office Excel<br>Microsoft Office Outlook<br>Microsoft Windows Support Diagnostic Tool (MSDT)<br>Remote Access Service Point-to-Point Tunneling Protocol<br>Role: Windows Fax Service<br>Role: Windows Hyper-V<br>System Center Operations Manager<br>Visual Studio<br>Windows Bluetooth Service<br>Windows Canonical Display Driver<br>Windows Cloud Files Mini Filter Driver<br>Windows Defender Credential Guard<br>Windows Digital Media<br>Windows Error Reporting<br>Windows Hello<br>Windows Internet Information Services<br>Windows Kerberos<br>Windows Kernel<br>Windows Local Security Authority (LSA)<br>Windows Network File System<br>Windows Partition Management Driver<br>Windows Point-to-Point Tunneling Protocol<br>Windows Print Spooler Components<br>Windows Secure Boot<br>Windows Secure Socket Tunneling Protocol (SSTP)<br>Windows Storage Spaces Direct<br>Windows Unified Write Filter<br>Windows WebBrowser Control<br>Windows Win32K<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>Microsoft ha liberado sus actualizaciones de seguridad correspondientes al mes de agosto.<br>Este conjunto de actualizaciones corrije 121 vulnerabilidades y algunso de dia cero.<br>El detalle a continuacion:<br>64 Elevation of Privilege Vulnerabilities<br>6 Security Feature Bypass Vulnerabilities<br>31 Remote Code Execution Vulnerabilities<br>12 Information Disclosure Vulnerabilities<br>7 Denial of Service Vulnerabilities<br>1 Spoofing Vulnerability<\/p>\n\n\n\n<p>II. Detalle<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>.NET Core<\/td><td>CVE-2022-34716<\/td><td>.NET Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Active Directory Domain Services<\/td><td>CVE-2022-34691<\/td><td>Active Directory Domain Services Elevation of Privilege Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Azure Batch Node Agent<\/td><td>CVE-2022-33646<\/td><td>Azure Batch Node Agent Elevation of Privilege Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Azure Real Time Operating System<\/td><td>CVE-2022-34685<\/td><td>Azure RTOS GUIX Studio Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Real Time Operating System<\/td><td>CVE-2022-34686<\/td><td>Azure RTOS GUIX Studio Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Real Time Operating System<\/td><td>CVE-2022-35773<\/td><td>Azure RTOS GUIX Studio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Real Time Operating System<\/td><td>CVE-2022-35779<\/td><td>Azure RTOS GUIX Studio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Real Time Operating System<\/td><td>CVE-2022-35806<\/td><td>Azure RTOS GUIX Studio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Real Time Operating System<\/td><td>CVE-2022-34687<\/td><td>Azure RTOS GUIX Studio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Real Time Operating System<\/td><td>CVE-2022-30176<\/td><td>Azure RTOS GUIX Studio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Real Time Operating System<\/td><td>CVE-2022-30175<\/td><td>Azure RTOS GUIX Studio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td>CVE-2022-35791<\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td>CVE-2022-35818<\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td>CVE-2022-35809<\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td>CVE-2022-35789<\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td>CVE-2022-35815<\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td>CVE-2022-35817<\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td>CVE-2022-35816<\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td>CVE-2022-35814<\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td>CVE-2022-35785<\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td>CVE-2022-35812<\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td>CVE-2022-35811<\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td>CVE-2022-35784<\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td>CVE-2022-35810<\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td>CVE-2022-35813<\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td>CVE-2022-35788<\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td>CVE-2022-35783<\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td>CVE-2022-35786<\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td>CVE-2022-35787<\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td>CVE-2022-35819<\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td>CVE-2022-35781<\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td>CVE-2022-35775<\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td>CVE-2022-35790<\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td>CVE-2022-35780<\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td>CVE-2022-35799<\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td>CVE-2022-35772<\/td><td>Azure Site Recovery Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td>CVE-2022-35800<\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td>CVE-2022-35774<\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td>CVE-2022-35802<\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td>CVE-2022-35782<\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td>CVE-2022-35824<\/td><td>Azure Site Recovery Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td>CVE-2022-35801<\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td>CVE-2022-35808<\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td>CVE-2022-35776<\/td><td>Azure Site Recovery Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Site Recovery<\/td><td>CVE-2022-35807<\/td><td>Azure Site Recovery Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Sphere<\/td><td>CVE-2022-35821<\/td><td>Azure Sphere Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft ATA Port Driver<\/td><td>CVE-2022-35760<\/td><td>Microsoft ATA Port Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Bluetooth Driver<\/td><td>CVE-2022-35820<\/td><td>Windows Bluetooth Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td>CVE-2022-35796<\/td><td>Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability<\/td><td>Low<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td>CVE-2022-33649<\/td><td>Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td>CVE-2022-2618<\/td><td>Chromium: CVE-2022-2618 Insufficient validation of untrusted input in Internals<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td>CVE-2022-2616<\/td><td>Chromium: CVE-2022-2616 Inappropriate implementation in Extensions API<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td>CVE-2022-2617<\/td><td>Chromium: CVE-2022-2617 Use after free in Extensions API<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td>CVE-2022-2619<\/td><td>Chromium: CVE-2022-2619 Insufficient validation of untrusted input in Settings<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td>CVE-2022-2622<\/td><td>Chromium: CVE-2022-2622 Insufficient validation of untrusted input in Safe Browsing<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td>CVE-2022-2623<\/td><td>Chromium: CVE-2022-2623 Use after free in Offline<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td>CVE-2022-33636<\/td><td>Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td>CVE-2022-2621<\/td><td>Chromium: CVE-2022-2621 Use after free in Extensions<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td>CVE-2022-2615<\/td><td>Chromium: CVE-2022-2615 Insufficient policy enforcement in Cookies<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td>CVE-2022-2604<\/td><td>Chromium: CVE-2022-2604 Use after free in Safe Browsing<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td>CVE-2022-2605<\/td><td>Chromium: CVE-2022-2605 Out of bounds read in Dawn<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td>CVE-2022-2624<\/td><td>Chromium: CVE-2022-2624 Heap buffer overflow in PDF<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td>CVE-2022-2603<\/td><td>Chromium: CVE-2022-2603 Use after free in Omnibox<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td>CVE-2022-2606<\/td><td>Chromium: CVE-2022-2606 Use after free in Managed devices API<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td>CVE-2022-2612<\/td><td>Chromium: CVE-2022-2612 Side-channel information leakage in Keyboard input<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td>CVE-2022-2614<\/td><td>Chromium: CVE-2022-2614 Use after free in Sign-In Flow<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td>CVE-2022-2610<\/td><td>Chromium: CVE-2022-2610 Insufficient policy enforcement in Background Fetch<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td>CVE-2022-2611<\/td><td>Chromium: CVE-2022-2611 Inappropriate implementation in Fullscreen API<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td>CVE-2022-34692<\/td><td>Microsoft Exchange Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td>CVE-2022-21980<\/td><td>Microsoft Exchange Server Elevation of Privilege Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td>CVE-2022-21979<\/td><td>Microsoft Exchange Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td>CVE-2022-24516<\/td><td>Microsoft Exchange Server Elevation of Privilege Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td>CVE-2022-30134<\/td><td>Microsoft Exchange Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td>CVE-2022-24477<\/td><td>Microsoft Exchange Server Elevation of Privilege Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2022-34717<\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td>CVE-2022-33648<\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td>CVE-2022-33631<\/td><td>Microsoft Excel Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Outlook<\/td><td>CVE-2022-35742<\/td><td>Microsoft Outlook Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Support Diagnostic Tool (MSDT)<\/td><td>CVE-2022-34713<\/td><td>Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Support Diagnostic Tool (MSDT)<\/td><td>CVE-2022-35743<\/td><td>Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Remote Access Service Point-to-Point Tunneling Protocol<\/td><td>CVE-2022-35752<\/td><td>Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Remote Access Service Point-to-Point Tunneling Protocol<\/td><td>CVE-2022-35753<\/td><td>Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Remote Access Service Point-to-Point Tunneling Protocol<\/td><td>CVE-2022-35769<\/td><td>Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Windows Fax Service<\/td><td>CVE-2022-34690<\/td><td>Windows Fax Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Windows Hyper-V<\/td><td>CVE-2022-34696<\/td><td>Windows Hyper-V Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Role: Windows Hyper-V<\/td><td>CVE-2022-35751<\/td><td>Windows Hyper-V Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>System Center Operations Manager<\/td><td>CVE-2022-33640<\/td><td>System Center Operations Manager: Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td>CVE-2022-35827<\/td><td>Visual Studio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td>CVE-2022-35777<\/td><td>Visual Studio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td>CVE-2022-35825<\/td><td>Visual Studio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td>CVE-2022-35826<\/td><td>Visual Studio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Bluetooth Service<\/td><td>CVE-2022-30144<\/td><td>Windows Bluetooth Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Canonical Display Driver<\/td><td>CVE-2022-35750<\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Cloud Files Mini Filter Driver<\/td><td>CVE-2022-35757<\/td><td>Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Defender Credential Guard<\/td><td>CVE-2022-35771<\/td><td>Windows Defender Credential Guard Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Defender Credential Guard<\/td><td>CVE-2022-34705<\/td><td>Windows Defender Credential Guard Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Defender Credential Guard<\/td><td>CVE-2022-34710<\/td><td>Windows Defender Credential Guard Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Defender Credential Guard<\/td><td>CVE-2022-34709<\/td><td>Windows Defender Credential Guard Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Defender Credential Guard<\/td><td>CVE-2022-34704<\/td><td>Windows Defender Credential Guard Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Defender Credential Guard<\/td><td>CVE-2022-34712<\/td><td>Windows Defender Credential Guard Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Digital Media<\/td><td>CVE-2022-35746<\/td><td>Windows Digital Media Receiver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Digital Media<\/td><td>CVE-2022-35749<\/td><td>Windows Digital Media Receiver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Error Reporting<\/td><td>CVE-2022-35795<\/td><td>Windows Error Reporting Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Hello<\/td><td>CVE-2022-35797<\/td><td>Windows Hello Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Internet Information Services<\/td><td>CVE-2022-35748<\/td><td>HTTP.sys Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kerberos<\/td><td>CVE-2022-35756<\/td><td>Windows Kerberos Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td>CVE-2022-35761<\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td>CVE-2022-35768<\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td>CVE-2022-34708<\/td><td>Windows Kernel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td>CVE-2022-34707<\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td>CVE-2022-35804<\/td><td>SMB Client and Server Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Kernel<\/td><td>CVE-2022-30197<\/td><td>Windows Kernel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td>CVE-2022-35758<\/td><td>Windows Kernel Memory Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Local Security Authority (LSA)<\/td><td>CVE-2022-34706<\/td><td>Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Local Security Authority (LSA)<\/td><td>CVE-2022-35759<\/td><td>Windows Local Security Authority (LSA) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Network File System<\/td><td>CVE-2022-34715<\/td><td>Windows Network File System Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Partition Management Driver<\/td><td>CVE-2022-33670<\/td><td>Windows Partition Management Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Partition Management Driver<\/td><td>CVE-2022-34703<\/td><td>Windows Partition Management Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Point-to-Point Tunneling Protocol<\/td><td>CVE-2022-30133<\/td><td>Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Point-to-Point Tunneling Protocol<\/td><td>CVE-2022-35747<\/td><td>Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Point-to-Point Tunneling Protocol<\/td><td>CVE-2022-35744<\/td><td>Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Print Spooler Components<\/td><td>CVE-2022-35793<\/td><td>Windows Print Spooler Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Print Spooler Components<\/td><td>CVE-2022-35755<\/td><td>Windows Print Spooler Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Boot<\/td><td>CVE-2022-34301<\/td><td>CERT\/CC: CVE-2022-34301 Eurosoft Boot Loader Bypass<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Boot<\/td><td>CVE-2022-34302<\/td><td>CERT\/CC: CVE-2022-34302 New Horizon Data Systems Inc Boot Loader Bypass<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Boot<\/td><td>CVE-2022-34303<\/td><td>CERT\/CC: CVE-20220-34303 Crypto Pro Boot Loader Bypass<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Socket Tunneling Protocol (SSTP)<\/td><td>CVE-2022-35745<\/td><td>Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Secure Socket Tunneling Protocol (SSTP)<\/td><td>CVE-2022-35766<\/td><td>Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Secure Socket Tunneling Protocol (SSTP)<\/td><td>CVE-2022-35794<\/td><td>Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Secure Socket Tunneling Protocol (SSTP)<\/td><td>CVE-2022-34701<\/td><td>Windows Secure Socket Tunneling Protocol (SSTP) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Socket Tunneling Protocol (SSTP)<\/td><td>CVE-2022-34714<\/td><td>Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Secure Socket Tunneling Protocol (SSTP)<\/td><td>CVE-2022-34702<\/td><td>Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Secure Socket Tunneling Protocol (SSTP)<\/td><td>CVE-2022-35767<\/td><td>Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Storage Spaces Direct<\/td><td>CVE-2022-35762<\/td><td>Storage Spaces Direct Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Storage Spaces Direct<\/td><td>CVE-2022-35765<\/td><td>Storage Spaces Direct Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Storage Spaces Direct<\/td><td>CVE-2022-35792<\/td><td>Storage Spaces Direct Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Storage Spaces Direct<\/td><td>CVE-2022-35763<\/td><td>Storage Spaces Direct Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Storage Spaces Direct<\/td><td>CVE-2022-35764<\/td><td>Storage Spaces Direct Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Unified Write Filter<\/td><td>CVE-2022-35754<\/td><td>Unified Write Filter Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows WebBrowser Control<\/td><td>CVE-2022-30194<\/td><td>Windows WebBrowser Control Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Win32K<\/td><td>CVE-2022-34699<\/td><td>Windows Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>Actualizar utilizando Microsoft Windows Update o herramientas de administracion de actualizaciones centralizadas.<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>CSIRT PANAMA<br>Computer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>E-Mail: info@cert.pa<br>Phone: +507 520-CERT (2378)<br>Web: https:\/\/cert.pa<br>Twitter: @CSIRTPanama<br>Key ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2022-ago-10 Actualizaciones de seguridad de Microsoft para agosto.Gravedad: AltaFecha de publicaci\u00f3n: agosto 11, 2022\u00daltima revisi\u00f3n: agosto 11, 2022https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2022-Aug Sistemas Afectados:.NET CoreActive Directory Domain ServicesAzure Batch Node AgentAzure Real Time Operating SystemAzure Site&#8230;<\/p>\n","protected":false},"author":4,"featured_media":1847,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,43,8,72,9,73,80,68,45,94],"class_list":["post-3114","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-alertas","tag-avisos","tag-avisos-de-seguridad","tag-microsoft","tag-parches","tag-vulnerabilidad","tag-vulnerabilidades","tag-windows","tag-windows-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3114","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3114"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3114\/revisions"}],"predecessor-version":[{"id":3115,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3114\/revisions\/3115"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1847"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3114"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3114"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}