{"id":10629,"date":"2022-04-15T14:16:22","date_gmt":"2022-04-15T11:16:22","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=10629"},"modified":"2022-04-15T14:16:22","modified_gmt":"2022-04-15T11:16:22","slug":"microsoft-patches-128-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/microsoft-patches-128-vulnerabilities\/10629\/","title":{"rendered":"Windows&#8217;ta bir dizi g\u00fcvenlik a\u00e7\u0131\u011f\u0131, bir tanesinden aktif olarak yararlan\u0131l\u0131yor"},"content":{"rendered":"<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2022-Apr\" target=\"_blank\" rel=\"noopener nofollow\">Her zamanki gibi Sal\u0131 g\u00fcn\u00fc yay\u0131nlanan yama g\u00fcncellemesiyle<\/a> Microsoft, \u00e7e\u015fitli \u00fcr\u00fcn ve bile\u015fenlerde toplam 128 g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 d\u00fczeltti. Bu g\u00fcvenlik a\u00e7\u0131klar\u0131ndan en az 10 tanesi kritik ve en az iki tanesi, yamalar yay\u0131nlanmadan \u00f6nce biliniyordu. En az bir tanesinden de, kimli\u011fi belirsiz sald\u0131rganlar aktif olarak yararlan\u0131yor. Bu y\u00fczden, i\u015fletim sistemini ve di\u011fer \u00fcr\u00fcnleri m\u00fcmk\u00fcn olan en k\u0131sa s\u00fcrede g\u00fcncellemek iyi bir fikir.<\/p>\n<h2>En tehlikeli g\u00fcvenlik a\u00e7\u0131klar\u0131<\/h2>\n<p>\u015eu anda sahip olunan bilgilere g\u00f6re, aralar\u0131nda en tehlikelisi <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-24521\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2022-24521<\/a>. Bu, Windows Common Log File System (CLFS) s\u00fcr\u00fcc\u00fcs\u00fcndeki bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 ve ayr\u0131cal\u0131k y\u00fckselmesiyle ilgili. \u00c7ok da etkileyici olmayan CVSS:3.1 derecesine (7.8) ra\u011fmen, a\u00e7\u0131\u011f\u0131n\u0131 bulmas\u0131 olduk\u00e7a kolay. Baz\u0131 kimli\u011fi belirsiz sald\u0131rganlar, zaten bu a\u00e7\u0131klardan faydalan\u0131yor.<\/p>\n<p>Ba\u015fka bir ayr\u0131cal\u0131k y\u00fckselmesi g\u00fcvenlik a\u00e7\u0131\u011f\u0131 olan <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-26904\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2022-26904<\/a> , Windows Kullan\u0131c\u0131 Profilleri (Windows User Profiles) sistem hizmetinde yer al\u0131yor. Ayr\u0131ca CVSS:3.1 \u00f6l\u00e7e\u011finde, nispeten d\u00fc\u015f\u00fck bir dereceye (7.0) sahip. Ancak bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131, g\u00fcncelleme yay\u0131nlanmadan \u00f6nce de biliniyordu. Dolay\u0131s\u0131yla, potansiyel sald\u0131rganlar\u0131n bu a\u00e7\u0131\u011f\u0131ndan, di\u011ferlerinden daha \u00f6nce yararlanmaya ba\u015flam\u0131\u015f oldu\u011funu varsayabiliriz.<\/p>\n<p>Windows b\u00fcy\u00fck g\u00fcncelleme adreslerindeki t\u00fcm kritik d\u00fczey g\u00fcvenlik a\u00e7\u0131klar\u0131, uzaktan kod y\u00fcr\u00fctme (RCE) ile ilgili. Bunlardan, Windows Uzaktan Yordam \u00c7a\u011fr\u0131s\u0131 (RPC) \u00c7al\u0131\u015fma Zaman\u0131 Kitapl\u0131\u011f\u0131\u2019ndaki <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-26809\" target=\"_blank\" rel=\"noopener nofollow\">CVE<\/a> -2022-26809 ile A\u011f Dosyas\u0131 Eri\u015fim Protokol\u00fc\u2019ndeki <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-24491\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2022-24491<\/a> ve <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-24497\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2022-24497<\/a>, en y\u00fcksek \u00f6nem derecesine sahip: 9,8 puan.<\/p>\n<p>Baz\u0131 uzmanlar, son \u00fc\u00e7 g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n solucanla\u015ft\u0131r\u0131labilir olabilece\u011fine, yani a\u011f \u00fczerinden kendili\u011finden yay\u0131lan a\u00e7\u0131klar yaratmak i\u00e7in kullan\u0131labilece\u011fine <a href=\"https:\/\/threatpost.com\/microsoft-zero-days-wormable-bugs\/179273\/\" target=\"_blank\" rel=\"noopener nofollow\">inan\u0131yor.<\/a><\/p>\n<p>\u00d6zetle Microsoft; Edge web taray\u0131c\u0131s\u0131, Defender, Office, Exchange, Sharepoint Server, Visual Studio ve \u00e7ok daha fazlas\u0131 dahil, \u00e7e\u015fitli \u00fcr\u00fcn ve bile\u015fenlerde toplam 128 g\u00fcvenlik a\u00e7\u0131\u011f\u0131 i\u00e7in g\u00fcncelleme yay\u0131nlad\u0131. Etkilenen \u00fcr\u00fcnlerin <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2022-Apr\" target=\"_blank\" rel=\"noopener nofollow\">tam listesini<\/a> (spoiler: uzun bir liste) incelemenizi ve kulland\u0131\u011f\u0131n\u0131z \u00fcr\u00fcnler i\u00e7in en kritik g\u00fcncellemelere \u00f6ncelik vermenizi \u00f6neriyoruz.<\/p>\n<h2>Kendinizi koruman\u0131n yollar\u0131<\/h2>\n<p>Olmas\u0131 gereken ve kula\u011fa mant\u0131kl\u0131 gelen \u015fey, t\u00fcm g\u00fcncellemeleri hemen y\u00fcklemek. Tabii ki, ger\u00e7ek hayatta bu her zaman m\u00fcmk\u00fcn de\u011fil \u2014 baz\u0131 \u015firketlerin, g\u00fcncellemeleri, altyap\u0131lar\u0131nda kullan\u0131ma sunmadan \u00f6nce test etmesi gerekiyor. Bu durumda, resmi Microsoft b\u00fcltenlerindeki Mitigations (Etki Azaltmalar\u0131) b\u00f6l\u00fcmlerini incelemenizi \u00f6neriyoruz. G\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n tam listesi ve bunlarla ilgili daha ayr\u0131nt\u0131l\u0131 bilgiler, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2022-Apr\" target=\"_blank\" rel=\"noopener nofollow\">\u015firketin internet sitesindeki g\u00fcncelleme a\u00e7\u0131klamas\u0131nda<\/a> yer al\u0131yor.<\/p>\n<p>Biz, internete ba\u011fl\u0131 t\u00fcm bilgisayar ve sunucularda, \u00f6ncelikli olarak, ke\u015ffedilmi\u015f ve hen\u00fcz bilinmeyen g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 <a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">tespit edebilen teknolojileri kullanan g\u00fcvenilir g\u00fcvenlik \u00e7\u00f6z\u00fcmlerini<\/a> tercih etmenizi \u00f6neriyoruz.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial-leadgen\">\n","protected":false},"excerpt":{"rendered":"<p>Microsoft, Windows ve bile\u015fenlerinin de dahil oldu\u011fu bir \u00fcr\u00fcn listesinde 128 g\u00fcvenlik a\u00e7\u0131\u011f\u0131 i\u00e7in yama yay\u0131nl\u0131yor.<\/p>\n","protected":false},"author":2698,"featured_media":10630,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194,1727,1351],"tags":[2517,1970,1886,790,38,113],"class_list":{"0":"post-10629","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"category-smb","10":"category-threats","11":"tag-0days","12":"tag-edge","13":"tag-guncellemeler","14":"tag-guvenlik-aciklari","15":"tag-microsoft","16":"tag-windows"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/microsoft-patches-128-vulnerabilities\/10629\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/microsoft-patches-128-vulnerabilities\/24042\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/microsoft-patches-128-vulnerabilities\/19529\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/microsoft-patches-128-vulnerabilities\/9875\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/microsoft-patches-128-vulnerabilities\/26367\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/microsoft-patches-128-vulnerabilities\/24311\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/microsoft-patches-128-vulnerabilities\/33077\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/microsoft-patches-128-vulnerabilities\/44099\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/microsoft-patches-128-vulnerabilities\/15915\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/microsoft-patches-128-vulnerabilities\/24949\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/microsoft-patches-128-vulnerabilities\/30391\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/microsoft-patches-128-vulnerabilities\/30159\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/guvenlik-aciklari\/","name":"g\u00fcvenlik a\u00e7\u0131klar\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10629","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2698"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=10629"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10629\/revisions"}],"predecessor-version":[{"id":10633,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10629\/revisions\/10633"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/10630"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=10629"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=10629"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=10629"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}