===================================================================== CERT-Renater Note d'Information No. 2021/VULN646 _____________________________________________________________________ DATE : 15/12/2021 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S): Systems running Apps, SDK Azure Bot Framework, ASP.NET Core et Visual Studio, BizTalk ESB Toolkit, Service iSNS (Internet Storage Name Service), Microsoft Defender pour IoT, Appareils Microsoft, Microsoft Edge (basé sur Chromium), Serveur d’autorité de sécurité locale Microsoft (lsasrv), Microsoft Message Queuing, Microsoft Office, Microsoft Office Access, Microsoft Office Excel, Microsoft Office SharePoint, Microsoft PowerShell, Bibliothèque de codecs Microsoft Windows, Plateforme de développement Office, Client Bureau à distance, Rôle : Windows Hyper-V , Rôle : Service Télécopie de Windows, Visual Studio Code, Visual Studio Code - WSL Extension, Pilote Windows Common Log File System, Tuner à TV numérique Windows, Windows DirectX, Système de fichiers EFS Windows, Suivi d’événements pour Windows, Windows Installer, Noyau Windows, Windows Media, Gestion des périphériques mobiles Windows, Windows NTFS, Composants du spouleur d’impression Windows, Gestionnaire des connexions d’accès à distance Windows, Windows Storage, Contrôleur des espaces de stockage Windows, Windows SymCrypt, Windows TCP/IP, Pile Windows Update. ===================================================================== _____________________________________________________________________ ******************************************************************** Microsoft Security Update Summary for December 14, 2021 Issued: December 14, 2021 ******************************************************************** This summary lists security updates released for December 14, 2021. Complete information for the December 2021 security update release Can be found at . IMPORTANT ANNOUNCEMENT: In the coming months we will be moving to a new, more user-friendly and flexible system for delivering Microsoft Technical Security Notifications. Upcoming information about how you can sign up for and receive these Technical Security Notifications will be coming soon. Please note the following information regarding the security updates: * For information regarding enabling Windows 10, version 1909 features, please see Windows 10, version 1909 delivery options: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10- version-1909-delivery-options/ba-p/1002660. Note that these versions of Windows 10 share a common core operating system with an identical set of system files: 1903 and 1909; 2004, 20H2,and 21H1. They will also share the same security update KBs. * Windows 10 updates are cumulative. The monthly security release includes all security fixes for vulnerabilities that affect Windows 10, in addition to non-security updates. The updates are available via the Microsoft Update Catalog: https://catalog.update.microsoft.com/v7/site/Home.aspx. * For information on lifecycle and support dates for Windows 10 operating systems, please see the Windows Lifecycle Facts Sheet: https://support.microsoft.com/en-us/help/13853/windows- lifecycle-fact-sheet). * A list of the latest servicing stack updates for each operating system can be found in ADV990001: https://msrc.microsoft.com/update- guide/vulnerability/ADV990001. This list will be updated whenever a new servicing stack update is released. It is important to install the latest servicing stack update. * In addition to security changes for the vulnerabilities, updates include defense-in-depth updates to help improve security-related features. * Customers running Windows 7, Windows Server 2008 R2, or Windows Server 2008 need to purchase the Extended Security Update to continue receiving security updates. See https://support.microsoft.com/en-us/help/4522133/procedure-to- continue-receiving-security-updates for more information. * There is a change coming with regards to Servicing Stack Updates. Please see Simplifying SSUs for more information. Critical Security Updates ============================ Windows 10 for 32-bit Systems Windows 10 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems Windows 10 Version 1809 for ARM64-based Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 1909 for 32-bit Systems Windows 10 Version 1909 for ARM64-based Systems Windows 10 Version 1909 for x64-based Systems Windows 10 Version 2004 for 32-bit Systems Windows 10 Version 2004 for ARM64-based Systems Windows 10 Version 2004 for x64-based Systems Windows 10 Version 20H2 for 32-bit Systems Windows 10 Version 20H2 for ARM64-based Systems Windows 10 Version 20H2 for x64-based Systems Windows 10 Version 21H1 for 32-bit Systems Windows 10 Version 21H1 for ARM64-based Systems Windows 10 Version 21H1 for x64-based Systems Windows 10 Version 21H2 for 32-bit Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for x64-based Systems Windows 11 for ARM64-based Systems Windows 11 for x64-based Systems Windows 8.1 for 32-bit systems Windows 8.1 for x64-based systems Windows RT 8.1 Windows Server 2012 Windows Server 2012 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 R2 (Server Core installation) Windows Server 2016 Windows Server 2016 (Server Core installation) Windows Server 2019 Windows Server 2019 (Server Core installation) Windows Server 2022 Windows Server 2022 (Server Core installation) Windows Server, version 2004 (Server Core installation) Windows Server, version 20H2 (Server Core Installation) Microsoft Defender for IoT Visual Studio Code WSL Extension Microsoft 4K Wireless Display Adapter Office app Important Security Updates ============================ Microsoft 365 Apps for Enterprise for 32-bit Systems Microsoft 365 Apps for Enterprise for 64-bit Systems Microsoft Excel 2013 RT Service Pack 1 Microsoft Excel 2013 Service Pack 1 (32-bit editions) Microsoft Excel 2013 Service Pack 1 (64-bit editions) Microsoft Excel 2016 (32-bit edition) Microsoft Excel 2016 (64-bit edition) Microsoft Office 2013 RT Service Pack 1 Microsoft Office 2013 Service Pack 1 (32-bit editions) Microsoft Office 2013 Service Pack 1 (64-bit editions) Microsoft Office 2016 (32-bit edition) Microsoft Office 2016 (64-bit edition) Microsoft Office 2019 for 32-bit editions Microsoft Office 2019 for 64-bit editions Microsoft Office 2019 for Mac Microsoft Office LTSC 2021 for 32-bit editions Microsoft Office LTSC 2021 for 64-bit editions Microsoft Office LTSC for Mac 2021 Microsoft Office Web Apps Server 2013 Service Pack 1 Microsoft SharePoint Enterprise Server 2013 Service Pack 1 Microsoft SharePoint Enterprise Server 2016 Microsoft SharePoint Foundation 2013 Service Pack 1 Microsoft SharePoint Server 2019 Microsoft SharePoint Server Subscription Edition Office Online Server SharePoint Server Subscription Edition Language Pack Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Microsoft Visual Studio 2019 version 16.7 (includes 16.0 - 16.6) Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8) Microsoft Visual Studio 2022 version 17.0 ASP.NET Core 3.1 ASP.NET Core 5.0 ASP.NET Core 6.0 PowerShell 7.2 Visual Studio Code Bot Framework SDK for .NET Framework Microsoft BizTalk ESB Toolkit 2.2 Microsoft BizTalk ESB Toolkit 2.3 Microsoft BizTalk ESB Toolkit 2.4 HEVC Video Extensions Raw Image Extension VP9 Video Extensions App Installer Other Information ================= Recognize and avoid fraudulent email to Microsoft customers: ============================================================= If you receive an email message that claims to be distributing a Microsoft security update, it is a hoax that may contain malware or pointers to malicious websites. Microsoft does not distribute security updates via email. The Microsoft Security Response Center (MSRC) uses PGP to digitally sign all security notifications. However, PGP is not required for reading security notifications, reading security information, or installing security updates. You can obtain the MSRC public PGP key at . ******************************************************************** THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY. ******************************************************************** Microsoft respects your privacy. Please read our online Privacy Statement at . If you would prefer not to receive future technical security notification alerts by email from Microsoft and its family of companies please visit the following website to unsubscribe: . These settings will not affect any newsletters you've requested or any mandatory service communications that are considered part of certain Microsoft services. For legal Information, see: . This newsletter was sent by: Microsoft Corporation 1 Microsoft Way Redmond, Washington, USA 98052 _____________________________________________________________________ ************************************************************************************ Title: Microsoft Security Update Revisions Issued: December 14, 2021 ************************************************************************************ Summary ======= The following CVEs have undergone revision increments. ====================================================================================== * CVE-2019-0887 * CVE-2020-0655 * CVE-2021-1669 * CVE-2021-24084 - CVE-2019-0887 | Remote Desktop Services Remote Code Execution Vulnerability - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2019-0887 - Version: 2.0 - Reason for Revision: The following revisions have been made: 1) In the Security Updates table, added Windows 11 for x64-based Systems, Windows 11 for ARM64-based Systems, Windows Server 2022, and Windows Server 2022 (Server Core installation) as these versions of Windows are affected by this vulnerability. Customers running Windows 11 or Windows Server 2022 should install the December 2021 security updates to be protected from this vulnerability. 2) Added an acknowledgement. - Originally posted: July 9, 2019 - Updated: December 14, 2021 - Aggregate CVE Severity Rating: Important - CVE-2020-0655 | Remote Desktop Services Remote Code Execution Vulnerability - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-0655 - Version: 2.0 - Reason for Revision: The following revisions have been made: 1) In the Security Updates table, added Windows 11 for x64-based Systems, Windows 11 for ARM64-based Systems, Windows Server 2022, and Windows Server 2022 (Server Core installation) as these versions of Windows are affected by this vulnerability. Customers running Windows 11 or Windows Server 2022 should install the December 2021 security updates to be protected from this vulnerability. 2) Added an acknowledgement. - Originally posted: February 11, 2020 - Updated: December 14, 2021 - Aggregate CVE Severity Rating: Important - CVE-2021-1669 | Windows Remote Desktop Security Feature Bypass Vulnerability - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1669 - Version: 2.0 - Reason for Revision: The following revisions have been made: 1) In the Security Updates table, added Microsoft Remote Desktop for iOS and Microsoft Remote Desktop for Mac as these versions are affected by CVE-2021-1669. 2) New updates are available that comprehensively address this vulnerability for the following: Microsoft Remote Desktop, Microsoft Remote Desktop for Android, and Remote Desktop client for Windows Desktop. Customers running any of these versions of Remote Desktop should check for updates and ensure that they have the most recent update installed. Links to the updates on the respective app stores are listed in the Security Updates table. - Originally posted: January 12, 2021 - Updated: December 14, 2021 - Aggregate CVE Severity Rating: Important - CVE-2021-24084 | Windows Mobile Device Management Information Disclosure Vulnerability - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-24084 - Version: 2.0 - Reason for Revision: To comprehensively address CVE-2021-24084, Microsoft has released December 2021 security updates for all supported editions of Microsoft Windows. Microsoft strongly recommends that customers install the updates to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action. - Originally posted: February 9, 2021 - Updated: December 14, 2021 - Aggregate CVE Severity Rating: Important Other Information ================= Recognize and avoid fraudulent email to Microsoft customers: ============================================================= If you receive an email message that claims to be distributing a Microsoft security update, it is a hoax that may contain malware or pointers to malicious websites. Microsoft does not distribute security updates via email. The Microsoft Security Response Center (MSRC) uses PGP to digitally sign all security notifications. However, PGP is not required for reading security notifications, reading security bulletins, or installing security updates. You can obtain the MSRC public PGP key at . ******************************************************************** THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY. ******************************************************************** Microsoft respects your privacy. Please read our online Privacy Statement at . These settings will not affect any newsletters you’ve requested or any mandatory service communications that are considered part of certain Microsoft services. For legal Information, see: . This newsletter was sent by: Microsoft Corporation 1 Microsoft Way Redmond, Washington, USA 98052 We would love to get your feedback on your experience with these security notifications. Please help us improve your security notifications experience by filling out the form here: https://forms.office.com/Pages/ResponsePage.aspx?id=v4j5cvGGr0GRqy180BHbR4ekF0eHYitGhfGrzmE_ydpUQUdMQUkzMFQwQzdYSjFBOTlXTjZWMDRRTi4u If you would prefer not to receive future technical security notification alerts by email from Microsoft and its family of companies please visit the following website to unsubscribe: https://account.microsoft.com/profile/unsubscribe?CTID=0&ECID=GIMSabX%2B53509ms9vf2tvHK35D5ZpylO9AEAA35BArM%3D&K=ebc7ebc8-85e7-48e5-ae52-923c05c5e1ae&CMID=null&D=637751135075917360&PID=18015&TID=adfd46f4-992a-45ec-935c-4c9bc4baf506 _____________________________________________________________________ ************************************************************************************** Title: Microsoft Security Update Releases Issued: December 14, 2021 ************************************************************************************** Summary ======= The following CVEs were assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses these vulnerabilities. Please see Google Chrome Releases (https://chromereleases.googleblog.com/2021) for more information. See https://msrc-blog.microsoft.com/2021/01/13/security-update-guide-supports-cves-assigned-by-industry-partners/ for more information about third-party CVEs in the Security Update Guide. * CVE-2021-4098 * CVE-2021-4099 * CVE-2021-4100 * CVE-2021-4101 * CVE-2021-4102 Revision Information: ===================== - Version 1.0 - Reason for Revision: Information published. - Originally posted: December 14, 2021 ************************************************************************************** Other Information ================= Recognize and avoid fraudulent email to Microsoft customers: ====================================================================================== If you receive an email message that claims to be distributing a Microsoft security update, it is a hoax that may contain malware or pointers to malicious websites. Microsoft does not distribute security updates via email. The Microsoft Security Response Center (MSRC) uses PGP to digitally sign all security notifications. However, PGP is not required for reading security notifications, reading security bulletins, or installing security updates. You can obtain the MSRC public PGP key at . ************************************************************************************** THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY. ************************************************************************************** Microsoft respects your privacy. Please read our online Privacy Statement at . If you would prefer not to receive future technical security notification alerts by email from Microsoft and its family of companies please visit the following website to unsubscribe: . These settings will not affect any newsletters you’ve requested or any mandatory service communications that are considered part of certain Microsoft services. For legal Information, see: . This newsletter was sent by: Microsoft Corporation 1 Microsoft Way Redmond, Washington, USA 98052 IMPORTANT ANNOUNCEMENT: In the coming months we will be moving to a new, more user-friendly and flexible system for delivering Microsoft Technical Security Notifications. Upcoming information about how you can sign up for and receive these Technical Security Notifications will be coming soon. If you would prefer not to receive future technical security notification alerts by email from Microsoft and its family of companies please visit the following website to unsubscribe: https://account.microsoft.com/profile/unsubscribe?CTID=0&ECID=GIMSabX%2B53509ms9vf2tvHK35D5ZpylO9AEAA35BArM%3D&K=ebc7ebc8-85e7-48e5-ae52-923c05c5e1ae&CMID=null&D=637751135075917360&PID=18015&TID=adfd46f4-992a-45ec-935c-4c9bc4baf506 ========================================================= + CERT-RENATER | tel : 01-53-94-20-44 + + 23/25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email:cert@support.renater.fr + =========================================================