Doubts over mitigation advice for remotely exploitable Microsoft flaw

New questions have arisen about one of the remotely exploitable flaws in Microsoft products that was revealed during the Monthly Patch Tuesday announcement.

The questions revolve around whether the company’s initial advice to mitigate the vulnerability was sufficient. The number of vulnerabilities patched on Tuesday was the highest in a single month since September 2020.

The flaw in question, CVE-2022-26809, a remote code execution vulnerability in the RPC runtime library, received a CVSS rating of 9.8 and required no user interaction to exploit. meaning she was dewormed.

Microsoft mitigation tips was to block TCP port 445 at the corporate perimeter firewall. But the company later added that the systems could still be vulnerable to attack from the perimeter of their business.

Marcus Hutchins, Security Researcher mentioned on Twitter: “With CVE-2022-26809, I’m not sure what is needed to reach the vulnerable code, but I was able to reach the container function via RPC (135) as well as SMB (445).

“So unless the exploit condition is protocol dependent, blocking just 445 may not be enough.”

Asked if the advice might not be enough, Tenable’s staff research engineer, Satnam Narang, replied, “Based on what has been shared so far, Microsoft asserts that as As a mitigation measure, blocking port 445 is sufficient to thwart Internet-based attacks.

“Clever researchers like Marcus Hutchins, who investigated this bug, think it might be possible to reach the vulnerable code through other ports like 135.

“However, we don’t know for sure if it’s possible to create the conditions to exploit the vulnerability on other ports/protocols. This is definitely a vulnerability to keep an eye on for further research. .”


The last year has seen a meteoric rise in ransomware incidents around the world.

Over the past 12 months, threat researchers at SonicWall Capture Labs have diligently tracked the meteoric rise in cyberattacks, as well as trends and activity across all threat vectors, including:

Encrypted threats
IoT malware
Zero-day attacks and more

These exclusive findings are now available through the SonicWall Cyber ​​Threat Report 2022, which ensures SMBs, government agencies, enterprises and other organizations have the actionable threat intelligence needed to combat the growing wave of cybercrime.

Click the button below to get the report.



It’s all about webinars.

Marketing budgets are now focused on webinars combined with lead generation.

If you want to promote a webinar, we recommend at least a 3-4 week campaign before your event.

The iTWire campaign will include numerous advertisements on our news site and a major newsletter promotion and promotional and editorial news. Plus a keynote speaker video interview on iTWire TV which will be used in promotional messages on the iTWire homepage.

Now that we are coming out of Lockdown, iTWire will focus on supporting your webinars and campaigns and providing support through partial payments and extended terms, a Webinar Business Booster pack and other support programs. We can also create your advertisements and written content and coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.


Previous PrintWeek-HP webinar to focus on digital labels in India
Next Hispanic Heritage Programs and Courses — CNM