Microsoft Vulnerabilities Report 2022
Access new vulnerabilities listed by category, and find expert advice for best practices moving forward.
The ninth annual Microsoft Vulnerabilities Report returns to provide a digestible analysis of the current Microsoft vulnerabilities landscape — even after recent changes in vulnerability reporting.
Two years ago, Microsoft announced changes to their Microsoft Security Update Guide, and a switch to the industry-standard Common Vulnerability Scoring System (CVSS). While the new reporting system brings benefits, it also creates some visibility challenges.
As with prior versions, this year’s Microsoft Vulnerability report is designed to help you better understand and address risks within the Microsoft ecosystem.
Read the full report for a deeper dive into these findings. You’ll also gain prescriptive advice for effectively addressing vulnerabilities, alongside access to the expert commentary of noteworthy industry leaders.
Access new vulnerabilities listed by category, and find expert advice for best practices moving forward.
Find out how vulnerability categories, including Elevation of Privilege, Denial of Service, Remote Code Execution, and more have trended over the last decade, which categories are the most prominent today, and why.
Discover the latest reported vulnerabilities for products including, Internet Explorer, Edge, Windows, Microsoft Office, Windows Server, and Azure.
Review how the most significant vulnerabilities – measured at a CVSS score of 9.0+ – have impacted deployments of Microsoft Exchange Server, Windows DNS, and more.
Hear from notable industry figures such as Sami Laiho, Senior Technical Fellow, MVP; Russell Smith, Editorial Director, Petri IT Knowledgebase; and Paula Januszkiewicz, Security Expert & Penetration Tester. Plus, BeyondTrust’s security leaders Morey Haber, Chief Security Officer, and James Maude, Lead Cyber Security Researcher offer insight.
Patching vulnerabilities is not always straightforward, or even desirable based on an organization’s environment, so removing admin rights remains a longstanding best practice. Many exploits depend on the presence of admin rights to execute or perform lateral movements.
Removing admin rights is a proactive way to vastly reduce the attack surface and provide protection against potential zero-day threats before a patch is even available. In addition to compliance initiatives, removing admin rights is now often specifically called out by cyber insurers, and is a control consistent with zero trust principles.
BeyondTrust Endpoint Privilege Management is a best-in-class solution designed to to reduce the risks associated with admin rights and many of Microsoft’s Critical vulnerabilities. Use Endpoint Privilege Management to elevate privileges to trusted applications that require them, control application usage, and log and report on privileged activities.
BeyondTrust protects privileged identities, right-sizes privileges, and secures and audits privileged access across the enterprise.
Our intelligent identity and access security platform combines comprehensive privileged access management (PAM) capabilities with cloud infrastructure entitlements management (CIEM) capabilities. The BeyondTrust platform is comprised of four integrated solutions: Secure Remote Access, Endpoint Privilege Management, Privileged Password Management, and Cloud Security Management. Together, these integrated solutions provide powerful, blended protection that proactively minimizes the attack surface and threat windows.