Critical zero-days make September’s Patch Tuesday a ‘Patch

With 63 updates affecting Windows, Microsoft Office environment and the Visual Studio and .Web platforms — and reports of three publicly exploited vulnerabilities (CVE-2022-37969, CVE-2022-34713, CVE-2021-40444) — this month’s Patch Tuesday release receives a “Patch Now” precedence. Important screening regions include things like printing, Microsoft Term, and in basic application un-installations. (The Microsoft Office environment, .Web and browser updates can be additional to your common launch schedules.)

You can locate far more data on the possibility of deploying these Patch Tuesday updates with this practical infographic.

Crucial tests situations

Offered the big quantity of variations incorporated in the September patch cycle, I have damaged down the screening situations into superior-danger and common-hazard groups:

Significant Risk: These adjustments are most likely to contain functionality modifications, may deprecate current performance, and will very likely demand the generation of new testing ideas:

  • Exam these newly-unveiled functionality updates. Please connect a digicam or mobile phone to your Laptop and use the Pics import function to import visuals and videos.
  • Simple printing assessments are essential this thirty day period due to operation adjustments in the Home windows spooler controller.

The subsequent updates are not documented as practical variations, but nonetheless need a comprehensive test cycle:

  • Microsoft Office: Perform fundamental testing on Phrase, PowerPoint, and Excel with a focus on SmartArt, diagrams, and legacy files.
  • Take a look at your Home windows mistake logs, as the Windows Widespread Log File method has been updated.
  • Validate domain controller authentication and area relevant companies this sort of Group Managed Service accounts. Include on-premise and off-premise tests as well.
  • Substantial-period VPN screening is essential, with VPN screening cycles that have to have to exceed 8 hrs on both servers and desktops. Take note: you will need to have to guarantee that PKE fragmentation is enabled. We suggest the subsequent PowerShell command: “HKLM:SYSTEMCurrentControlSetServicesRemoteAccessParametersIkev2” -Name EnableServerFragmentation -PropertyType DWORD -Price 1 -Force Restart-Services remoteaccess

In addition to these modifications and testing requirements, I have involved some of the much more challenging tests scenarios for this update:

  • Examination any software utilizing the OLE DB interface and sqloledb.dll to make database connections. This system will have to have an evaluation of your software portfolio, on the lookout for dependencies on the SQL OLE libraries and parts and concentrated screening on software performance that makes use of these up to date capabilities.
  • Application un-installations will call for testing thanks to improvements in the Organization Application Management windows element. The significant challenge right here is to test that an application deal has been absolutely uninstalled from a machine, that means all the information, registry, products and services and shortcuts have been eradicated. This consists of all the to start with-operate options and configuration information relevant to application. This is a rough, time-consuming endeavor that will involve some automation to ensure constant outcomes.

Testing these critical and usually up-to-date attributes is now a simple fact of lifetime for most IT departments, necessitating devoted time, individual and specialised procedures to ensure repeatable consistent results.

Known issues

Each and every month, Microsoft incorporates a list of regarded issues that relate to the operating method and platforms integrated in this update cycle.

  • Microsoft SharePoint Server: Nintex Workflow shoppers have to just take additional motion following this security update is put in to make sure workflows can be posted and operate. For additional information and facts, make sure you refer to this Microsoft help doc. 
  • Just after setting up KB5001342 or later on, the Cluster Services may fail to start out for the reason that a Cluster Community Driver is not observed. For a lot more info about the certain glitches, induce, and workaround, see KB5003571.
  • Some enterprise buyers may nonetheless be going through troubles with XPS Viewers. A guide re-set up will possible resolve the difficulty.

Starting at 12 a.m. Saturday, Sept.10, the official time in Chile advanced 60 minutes in accordance with the Aug. 9 announcement by the Chilean governing administration of a daylight-conserving time (DST) time zone change. This moved the DST change from Sept. 4 to Sept. 10 the time transform will have an impact on Windows apps, timestamps, automation, workflows, and scheduled duties. (Authentication processes that depend on Kerberos might also be influenced.)

Important revisions

As of Sept. 16, Microsoft has not released any main revisions to its security advisories.

Mitigations and workarounds

There are 4 mitigations and workarounds integrated in this Patch Tuesday launch, like:

Every thirty day period, we break down the update cycle into product or service households (as described by Microsoft) with the subsequent simple groupings:

  • Browsers (Microsoft IE and Edge)
  • Microsoft Windows (both equally desktop and server)
  • Microsoft Place of work
  • Microsoft Trade
  • Microsoft Development platforms ( ASP.Web Main, .Net Core and Chakra Core)
  • Adobe (retired???, maybe following calendar year).


Microsoft has produced a solitary update to the Edge browser (CVE-2022-38012) that has been rated as very low ,even though it could lead to distant code execution scenario owing to its challenging exploitation chain. In addition, there are 15 updates to the Chromium task. Slightly out of sync with Patch Tuesday, Microsoft unveiled the latest model of the Edge Steady channel on Sept. 15 that incorporates a deal with for CVE-2022-3075. You can go through a lot more about this update’s release notes and can obtain out additional about Chromium updates. Include these low-profile browser updates to your common launch program.

Take note: you will have to deploy a individual software update to Edge — this may well call for extra software packaging, screening, and deployment.


Microsoft dealt with three significant difficulties (CVE-2022-34718, CVE-2022-34721 and CVE-2022-34722) and 50 difficulties rated significant this month. This is one more broad update that addresses the adhering to key Home windows functions:

  • Windows Networking (DNS, TLS and the TCP/IP stack)
  • Cryptography (IKE extensions and Kerberos)
  • Printing (once more)
  • Microsoft OLE
  • Distant Desktop (Relationship Supervisor and API’s).

For Windows 11 end users, here is this month’s Home windows 11 video clip update. The three crucial updates all have NIST rankings of 9.8 (out of 10). Coupled with the 3 exploited vulnerabilities (CVE-2022-37969, CVE-2022-34713, CVE-2021-40444) these make this month’s Windows update a “Patch Now” launch.

Microsoft Office

Microsoft launched seven safety patches to the Office environment platform affecting Visio, PowerPoint, SharePoint and SharePoint Server. The Microsoft Visio and PowerPoint updates are very low-profile deployments that need to be included to your conventional Office update schedules. The SharePoint Server updates (CVE-2022-38008 and CVE-2022-37961) are not rated significant, but they could lead to a remote code execution circumstance (however challenging to exploit). We advocate introducing these two updates to your server update plan, noting that all patched SharePoint Servers will need a restart.

Microsoft Exchange Server

The good news is for us (and all IT admins) Microsoft has not revealed any stability advisories for Microsoft Exchange products this month.

Microsoft Growth Platforms

Microsoft released 3 updates rated essential for their developer resources platform (CVE-2022-26929, CVE-2022-38013 and CVE-2022-38020) impacting Microsoft .Web and the Visible Studio system. These a few updates are relatively very low risk to deploy and need to be additional to your common developer release routine.

Adobe (genuinely just Reader)

Adobe revealed 6 security bulletins affecting: Animate, Bridge, Illustrator, InCopy, InDesign and RoboHelp. On the other hand, there had been no updates to Adobe Reader or other related PDF goods. This may well be the final result of Adobe staying normally engaged with the $20 billion invest in of Figma.

Copyright © 2022 IDG Communications, Inc.