{"id":3136,"date":"2022-09-16T14:22:52","date_gmt":"2022-09-16T19:22:52","guid":{"rendered":"https:\/\/cert.pa\/?p=3136"},"modified":"2022-09-16T14:22:52","modified_gmt":"2022-09-16T19:22:52","slug":"csirt-panama-aviso-2022-sep-15-microsoft-libera-actualizaciones-que-corrigen-63-fallas","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=3136","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2022-sep-15 Microsoft Libera actualizaciones que corrigen 63 fallas."},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2022-sep-15 Microsoft Libera actualizaciones que corrigen 63 fallas.<br>Gravedad: Alta<br>Fecha de publicaci\u00f3n: septiembre 16, 2022<br>\u00daltima revisi\u00f3n: septiembre 16, 2022<br>https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2022-Sep<\/p>\n\n\n\n<p>Sistemas Afectados:<br>.NET and Visual Studio<br>.NET Framework<br>Azure Arc<br>Cache Speculation<br>HTTP.sys<br>Microsoft Dynamics<br>Microsoft Edge (Chromium-based)<br>Microsoft Graphics Component<br>Microsoft Office<br>Microsoft Office SharePoint<br>Microsoft Office Visio<br>Microsoft Windows ALPC<br>Microsoft Windows Codecs Library<br>Network Device Enrollment Service (NDES)<br>Role: DNS Server<br>Role: Windows Fax Service<br>SPNEGO Extended Negotiation<br>Visual Studio Code<br>Windows Common Log File System Driver<br>Windows Credential Roaming Service<br>Windows Defender<br>Windows Distributed File System (DFS)<br>Windows DPAPI (Data Protection Application Programming Interface)<br>Windows Enterprise App Management<br>Windows Event Tracing<br>Windows Group Policy<br>Windows IKE Extension<br>Windows Kerberos<br>Windows Kernel<br>Windows LDAP &#8211; Lightweight Directory Access Protocol<br>Windows ODBC Driver<br>Windows OLE<br>Windows Photo Import API<br>Windows Print Spooler Components<br>Windows Remote Access Connection Manager<br>Windows Remote Procedure Call<br>Windows TCP\/IP<br>Windows Transport Security Layer (TLS)<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>Con el lanzamiento de las actualizaciones de seguridad de septiembre de 2022, Microsoft lanz\u00f3 correcciones para 63 vulnerabilidades en los productos de Microsoft.<\/p>\n\n\n\n<p>II. Detalle<br><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>.NET and Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-38013\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-38013<\/a><\/td><td>.NET Core and Visual Studio Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>.NET Framework<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-26929\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-26929<\/a><\/td><td>.NET Framework Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Arc<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-38007\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-38007<\/a><\/td><td>Azure Guest Configuration and Azure Arc-enabled servers Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Cache Speculation<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-23960\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-23960<\/a><\/td><td>Arm: CVE-2022-23960 Cache Speculation Restriction Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>HTTP.sys<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-35838\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-35838<\/a><\/td><td>HTTP V3 Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-35805\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-35805<\/a><\/td><td>Microsoft Dynamics CRM (on-premises) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-34700\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-34700<\/a><\/td><td>Microsoft Dynamics CRM (on-premises) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-3053\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-3053<\/a><\/td><td>Chromium: CVE-2022-3053 Inappropriate implementation in Pointer Lock<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-3047\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-3047<\/a><\/td><td>Chromium: CVE-2022-3047 Insufficient policy enforcement in Extensions API<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-3054\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-3054<\/a><\/td><td>Chromium: CVE-2022-3054 Insufficient policy enforcement in DevTools<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-3041\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-3041<\/a><\/td><td>Chromium: CVE-2022-3041 Use after free in WebSQL<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-3040\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-3040<\/a><\/td><td>Chromium: CVE-2022-3040 Use after free in Layout<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-3046\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-3046<\/a><\/td><td>Chromium: CVE-2022-3046 Use after free in Browser Tag<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-3039\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-3039<\/a><\/td><td>Chromium: CVE-2022-3039 Use after free in WebSQL<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-3045\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-3045<\/a><\/td><td>Chromium: CVE-2022-3045 Insufficient validation of untrusted input in V8<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-3044\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-3044<\/a><\/td><td>Chromium: CVE-2022-3044 Inappropriate implementation in Site Isolation<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-3057\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-3057<\/a><\/td><td>Chromium: CVE-2022-3057 Inappropriate implementation in iframe Sandbox<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-3075\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-3075<\/a><\/td><td>Chromium: CVE-2022-3075 Insufficient data validation in Mojo<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-3058\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-3058<\/a><\/td><td>Chromium: CVE-2022-3058 Use after free in Sign-In Flow<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-3038\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-3038<\/a><\/td><td>Chromium: CVE-2022-3038 Use after free in Network Service<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-3056\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-3056<\/a><\/td><td>Chromium: CVE-2022-3056 Insufficient policy enforcement in Content Security Policy<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-3055\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-3055<\/a><\/td><td>Chromium: CVE-2022-3055 Use after free in Passwords<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-38012\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-38012<\/a><\/td><td>Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability<\/td><td>Low<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-37954\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-37954<\/a><\/td><td>DirectX Graphics Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-38006\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-38006<\/a><\/td><td>Windows Graphics Component Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-34729\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-34729<\/a><\/td><td>Windows GDI Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-34728\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-34728<\/a><\/td><td>Windows Graphics Component Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-35837\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-35837<\/a><\/td><td>Windows Graphics Component Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-37962\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-37962<\/a><\/td><td>Microsoft PowerPoint Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-35823\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-35823<\/a><\/td><td>Microsoft SharePoint Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-38009\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-38009<\/a><\/td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-38008\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-38008<\/a><\/td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-37961\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-37961<\/a><\/td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Visio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-37963\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-37963<\/a><\/td><td>Microsoft Office Visio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Visio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-38010\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-38010<\/a><\/td><td>Microsoft Office Visio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows ALPC<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-34725\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-34725<\/a><\/td><td>Windows ALPC Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-38011\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-38011<\/a><\/td><td>Raw Image Extension Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-38019\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-38019<\/a><\/td><td>AV1 Video Extension Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Network Device Enrollment Service (NDES)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-37959\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-37959<\/a><\/td><td>Network Device Enrollment Service (NDES) Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: DNS Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-34724\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-34724<\/a><\/td><td>Windows DNS Server Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Windows Fax Service<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-38004\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-38004<\/a><\/td><td>Windows Fax Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SPNEGO Extended Negotiation<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-37958\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-37958<\/a><\/td><td>SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio Code<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-38020\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-38020<\/a><\/td><td>Visual Studio Code Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Common Log File System Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-35803\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-35803<\/a><\/td><td>Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Common Log File System Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-37969\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-37969<\/a><\/td><td>Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Credential Roaming Service<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-30170\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-30170<\/a><\/td><td>Windows Credential Roaming Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Defender<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-35828\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-35828<\/a><\/td><td>Microsoft Defender for Endpoint for Mac Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Distributed File System (DFS)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-34719\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-34719<\/a><\/td><td>Windows Distributed File System (DFS) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DPAPI (Data Protection Application Programming Interface)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-34723\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-34723<\/a><\/td><td>Windows DPAPI (Data Protection Application Programming Interface) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Enterprise App Management<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-35841\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-35841<\/a><\/td><td>Windows Enterprise App Management Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Event Tracing<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-35832\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-35832<\/a><\/td><td>Windows Event Tracing Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Group Policy<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-37955\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-37955<\/a><\/td><td>Windows Group Policy Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows IKE Extension<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-34722\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-34722<\/a><\/td><td>Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows IKE Extension<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-34720\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-34720<\/a><\/td><td>Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows IKE Extension<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-34721\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-34721<\/a><\/td><td>Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Kerberos<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-33647\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-33647<\/a><\/td><td>Windows Kerberos Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kerberos<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-33679\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-33679<\/a><\/td><td>Windows Kerberos Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-37964\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-37964<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-37956\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-37956<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-37957\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-37957<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows LDAP &#8211; Lightweight Directory Access Protocol<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-30200\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-30200<\/a><\/td><td>Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows ODBC Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-34726\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-34726<\/a><\/td><td>Microsoft ODBC Driver Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows ODBC Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-34730\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-34730<\/a><\/td><td>Microsoft ODBC Driver Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows ODBC Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-34727\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-34727<\/a><\/td><td>Microsoft ODBC Driver Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows ODBC Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-34732\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-34732<\/a><\/td><td>Microsoft ODBC Driver Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows ODBC Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-34734\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-34734<\/a><\/td><td>Microsoft ODBC Driver Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows OLE<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-35834\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-35834<\/a><\/td><td>Microsoft OLE DB Provider for SQL Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows OLE<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-35835\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-35835<\/a><\/td><td>Microsoft OLE DB Provider for SQL Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows OLE<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-35836\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-35836<\/a><\/td><td>Microsoft OLE DB Provider for SQL Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows OLE<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-35840\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-35840<\/a><\/td><td>Microsoft OLE DB Provider for SQL Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows OLE<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-34733\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-34733<\/a><\/td><td>Microsoft OLE DB Provider for SQL Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows OLE<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-34731\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-34731<\/a><\/td><td>Microsoft OLE DB Provider for SQL Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Photo Import API<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-26928\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-26928<\/a><\/td><td>Windows Photo Import API Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Print Spooler Components<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-38005\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-38005<\/a><\/td><td>Windows Print Spooler Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Access Connection Manager<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-35831\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-35831<\/a><\/td><td>Windows Remote Access Connection Manager Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Procedure Call<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-35830\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-35830<\/a><\/td><td>Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows TCP\/IP<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-34718\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-34718<\/a><\/td><td>Windows TCP\/IP Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Transport Security Layer (TLS)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-35833\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-35833<\/a><\/td><td>Windows Secure Channel Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Transport Security Layer (TLS)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-30196\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-30196<\/a><\/td><td>Windows Secure Channel Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>Actualizar utilizando Microsoft Windows Update o herramientas de administracion de actualizaciones centralizadas.<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>CSIRT PANAMA<br>Computer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>E-Mail: info@cert.pa<br>Phone: +507 520-CERT (2378)<br>Web: https:\/\/cert.pa<br>Twitter: @CSIRTPanama<br>Facebook: http:\/\/www.facebook.com\/CSIRTPanama<br>Key ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2022-sep-15 Microsoft Libera actualizaciones que corrigen 63 fallas.Gravedad: AltaFecha de publicaci\u00f3n: septiembre 16, 2022\u00daltima revisi\u00f3n: septiembre 16, 2022https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2022-Sep Sistemas Afectados:.NET and Visual Studio.NET FrameworkAzure ArcCache SpeculationHTTP.sysMicrosoft DynamicsMicrosoft Edge (Chromium-based)Microsoft Graphics ComponentMicrosoft OfficeMicrosoft&#8230;<\/p>\n","protected":false},"author":4,"featured_media":1847,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,43,8,72,9,73,80,68,45,94],"class_list":["post-3136","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-alertas","tag-avisos","tag-avisos-de-seguridad","tag-microsoft","tag-parches","tag-vulnerabilidad","tag-vulnerabilidades","tag-windows","tag-windows-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3136","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3136"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3136\/revisions"}],"predecessor-version":[{"id":3137,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3136\/revisions\/3137"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1847"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3136"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3136"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}