{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Windows Server 2022","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows Server 2012","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows 10 Version 21H1 for ARM64-based Systems","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows 8.1 for 32-bit systems","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows Server 2019 (Server Core installation)","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows Server 2019","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows Server 2012 R2","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows 10 Version 21H2 for x64-based Systems","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows 7 for 32-bit Systems Service Pack 1","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows Server 2022 (Server Core installation)","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows 10 Version 20H2 for ARM64-based Systems","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows 10 Version 21H1 for x64-based Systems","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows 11 for x64-based Systems","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows Server 2016 (Server Core installation)","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows Server 2008 R2 for x64-based Systems Service Pack 1","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows 10 Version 20H2 for x64-based Systems","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows Server 2008 for 32-bit Systems Service Pack 2","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows RT 8.1","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows 8.1 for x64-based systems","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows 10 Version 1809 for x64-based Systems","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows 10 Version 20H2 for 32-bit Systems","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows Server 2022 Azure Edition Core Hotpatch","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows Server 2012 (Server Core installation)","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows 10 Version 21H1 for 32-bit Systems","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows 10 Version 1809 for ARM64-based Systems","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows 10 Version 21H2 for ARM64-based Systems","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows 10 Version 1607 for 32-bit Systems","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows Server 2008 for x64-based Systems Service Pack 2","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows Server 2016","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows 10 Version 1607 for x64-based Systems","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows 10 Version 1809 for 32-bit Systems","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows 11 for ARM64-based Systems","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows 10 Version 21H2 for 32-bit Systems","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows 10 for x64-based Systems","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows Server 2012 R2 (Server Core installation)","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows 10 for 32-bit Systems","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows 7 for x64-based Systems Service Pack 1","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}}],"affected_systems_content":null,"closed_at":"2023-03-14","content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2022-34718","url":"https://www.cve.org/CVERecord?id=CVE-2022-34718"},{"name":"CVE-2022-34721","url":"https://www.cve.org/CVERecord?id=CVE-2022-34721"},{"name":"CVE-2022-34722","url":"https://www.cve.org/CVERecord?id=CVE-2022-34722"}],"links":[],"reference":"CERTFR-2022-ALE-007","revisions":[{"description":"Version initiale","revision_date":"2022-09-16T00:00:00.000000"},{"description":"Une preuve de concept est publiquement disponible.","revision_date":"2022-10-31T00:00:00.000000"},{"description":"Cl\u00f4ture de l'alerte. Cela ne signifie pas la fin d'une menace. Seule l'application de la mise \u00e0 jour permet de vous pr\u00e9munir contre l'exploitation de la vuln\u00e9rabilit\u00e9 correspondante.","revision_date":"2023-03-14T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"}],"summary":"\\[M\u00e0J du 31 octobre 2022\\]\n\nUne preuve de concept est publiquement disponible.\n\n\\[Publication initiale\\]\n\nDans le cadre de son *Patch Tuesday*, en date du 13 septembre 2022,\nMicrosoft a indiqu\u00e9 l'existence de multiples vuln\u00e9rabilit\u00e9s au sein de\nplusieurs versions de Windows. Trois d'entre elles doivent faire l'objet\nd'une attention particuli\u00e8re car consid\u00e9r\u00e9es comme critiques. Elles\nposs\u00e8dent un score CVSSv3 de 9.8 et sont respectivement r\u00e9f\u00e9renc\u00e9es par\nles num\u00e9ros suivants : CVE-2022-34718,\u00a0CVE-2022-34721 et CVE-2022-34722.\n\nLa vuln\u00e9rabilit\u00e9 CVE-2022-34718 permet \u00e0 un attaquant non authentifi\u00e9\nd'envoyer un paquet IPv6 sp\u00e9cialement con\u00e7u \u00e0 destination d'un n\u0153ud\nWindows, provoquant une ex\u00e9cution de code arbitraire \u00e0 distance.\n\nLes vuln\u00e9rabilit\u00e9s CVE-2022-34721 et CVE-2022-34722 affectent les\nextensions du protocole Windows Internet Key Exchange (IKE). Elles\npermettent \u00e0 un attaquant non authentifi\u00e9 de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance. D'apr\u00e8s l'\u00e9diteur, bien que ces deux\nvuln\u00e9rabilit\u00e9s n'affectent que le protocole IKEv1, tous les serveurs\nWindows seraient concern\u00e9s car ils acceptent par d\u00e9faut les paquets des\nversions 1 et 2.\n\nPar ailleurs, il est \u00e0 noter que Microsoft a \u00e9galement mis \u00e0 disposition\ndes correctifs de s\u00e9curit\u00e9 pour des syst\u00e8mes qui ne sont plus support\u00e9s\n(Windows 7 et Windows Server 2008R2).\n\nLe CERT-FR a connaissance de r\u00e9f\u00e9rences publiques mettant en exergue des\ntravaux ayant potentiellement d\u00e9bouch\u00e9 sur l'\u00e9laboration d'un code\nd'exploitation pour l'une de ces vuln\u00e9rabilit\u00e9s, et citant une intention\nde publication prochaine d'un article. Le CERT-FR recommande fortement\nd'appliquer les correctifs et, le cas \u00e9ch\u00e9ant, de mettre en \u0153uvre les\nmoyens d'att\u00e9nuation propos\u00e9s par l'\u00e9diteur.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-34722 du 13 septembre 2022","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34722"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-34718 du 13 septembre 2022","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34718"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-34721 du 13 septembre 2022","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34721"}]}
