The security firm Tenable said it had omitted one fix, CVE-2022-23960, a cache speculation restriction vulnerability as it was issued by MITRE and applied to Arm CPUs.
Tenable staff research engineer Satnam Narang said Microsoft had patched CVE-2022-37969, an elevation of privilege vulnerability in the Windows Common Log File System (CLFS) Driver.
"According to Microsoft, this flaw has been exploited in the wild as a zero-day," he added. "However, exploiting this vulnerability requires an attacker to have already gained access to a vulnerable target system via other means, such as exploiting a separate vulnerability or [through] social engineering.
"CVE-2022-24521, a similar vulnerability in CLFS, was patched earlier this year as part of Microsoft’s April Patch Tuesday release and was also exploited in the wild. CVE-2022-37969 was disclosed by several groups, though it’s unclear if CVE-2022-37969 is a patch-bypass for CVE-2022-24521 at this point."
Graphic courtesy Tenable
Greg Wiseman, product manager at security firm Rapid7, pointed out that the September Patch Tuesday was on the lighter side. He included the 16 CVEs affecting Google's Chromium browser, as these also affect Microsoft's Edge browser, bringing the total to 79.
"Some of the more noteworthy vulnerabilities this month affect Windows systems with IPSec enabled," Wiseman said. "CVE-2022-34718 allows Remote Code Execution (RCE) on any Windows system reachable via IPv6, while CVE-2022-34721 and CVE-2022-34722 are RCE vulnerabilities in the Windows Internet Key Exchange (IKE) Protocol Extensions.
"All three CVEs are considered critical and carry a CVSSv3 base score of 9.8. Rounding out the critical RCEs this month are CVE-2022-35805 and CVE-2022-34700, both of which affect Microsoft Dynamics (on-premise) and have a CVSSv3 base score of 8.8. Any such systems should be updated immediately."
Wiseman said SharePoint administrators should also be aware of four separate RCEs being addressed this month.
"They’re considered important, meaning Microsoft recommends applying the updates at the earliest opportunity," he noted.
"Finally, a large swath of CVEs affecting OLE DB Provider for SQL Server and the Microsoft ODBC Driver were also fixed. These require some social engineering to exploit, by convincing a user to either connect to a malicious SQL Server or open a maliciously crafted .mdb (Access) file."