Microsoft’s most recent round of its monthly security updates included fixes for a record 141 security vulnerabilities, including another Zero-Day in the Microsoft Support Diagnostics Tool (MSDT). This latest bug, tracked as CVE-2022-34713 with a CVSS of 7.8, could be exploited by a malicious hacker to remotely execute arbitrary code on a user’s system. The attack vector involves the victim opening a malicious office file, probably sent over email.
Microsft also released a security update for Exchange Server, fixing a trio of CVEs (1, 2, 3) found in the 2013, 2016, and 2019 versions of the software. Although no in-the-wild exploitation has been identified, Microsoft recommends immediately updating the affected systems. The tech giant has highlighted that administrators are required to enable Windows Extended Protection on affected servers as part of the fix for this patch. These vulnerabilities affect only the local versions of Exchange Server, with no action required from Exchange Online customers.