{"id":10676,"date":"2022-05-16T13:13:48","date_gmt":"2022-05-16T10:13:48","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=10676"},"modified":"2022-05-16T13:13:48","modified_gmt":"2022-05-16T10:13:48","slug":"windows-actively-exploited-vulnerability-cve-2022-26925","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/windows-actively-exploited-vulnerability-cve-2022-26925\/10676\/","title":{"rendered":"Windows&#8217;ta aktif \u015fekilde k\u00f6t\u00fcye kullan\u0131lan g\u00fcvenlik a\u00e7\u0131\u011f\u0131"},"content":{"rendered":"<p>Microsoft en son Yama Per\u015fembesi\u2019nde (10 May\u0131s) 74 g\u00fcvenlik a\u00e7\u0131\u011f\u0131 i\u00e7in g\u00fcncelleme yay\u0131nlad\u0131. Bu g\u00fcvenlik a\u00e7\u0131klar\u0131ndan en az biri, sald\u0131rganlar taraf\u0131ndan aktif \u015fekilde k\u00f6t\u00fcye kullan\u0131l\u0131yor. Bu y\u00fczden yamalar\u0131 m\u00fcmk\u00fcn olan en k\u0131sa s\u00fcrede y\u00fcklemek gerekiyor.<\/p>\n<h2>CVE-2022-26925: Yama yay\u0131nlanan g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n en tehlikelisi<\/h2>\n<p>G\u00f6r\u00fcnen o ki, bu g\u00fcncelleme paketinde yama yay\u0131nlanan en tehlikeli g\u00fcvenlik a\u00e7\u0131\u011f\u0131, Windows Yerel G\u00fcvenlik Yetkilisi\u2019nde bulunan <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-26925\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2022-26925<\/a>. \u00d6te yandan bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131 CVSS \u00f6l\u00e7e\u011finde 8.1 puanla g\u00f6rece d\u00fc\u015f\u00fck \u015fiddette. Yine de Microsoft temsilcileri g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n Active Directory Sertifika Hizmetleri\u2019ne y\u00f6nelik <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/ADV210003\" target=\"_blank\" rel=\"noopener nofollow\">NTLM Ge\u00e7i\u015f sald\u0131r\u0131lar\u0131nda<\/a> kullan\u0131ld\u0131\u011f\u0131nda \u015fiddet d\u00fczeyinin CVSS 9.8\u2019e y\u00fckseldi\u011fine inan\u0131yor. \u015eiddet d\u00fczeyindeki bu y\u00fckseli\u015fin sebebi, b\u00f6yle bir senaryoda CVE-2022-26925\u2019in sald\u0131rgan\u0131n bir etki alan\u0131 denetleyicisinde kimlik do\u011frulamas\u0131 yapmas\u0131na izin vermesi.<\/p>\n<p>Bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131 Windows 7 (sunucu sistemleri i\u00e7in Windows Server 2008) ve sonras\u0131 t\u00fcm Windows i\u015fletim sistemlerini etkileyebiliyor. Microsoft bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n nas\u0131l k\u00f6t\u00fcye kullan\u0131ld\u0131\u011f\u0131na dair ayr\u0131nt\u0131lara girmese de, sorunla ilgili a\u00e7\u0131klamadan hareketle bilinmeyen sald\u0131rganlar\u0131n CVE-2022-26925\u2019i aktif olarak k\u00f6t\u00fcye kulland\u0131\u011f\u0131n\u0131 anl\u0131yoruz. \u0130yi haber, uzmanlara g\u00f6re ger\u00e7ek sald\u0131r\u0131larda bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 k\u00f6t\u00fcye kullanman\u0131n olduk\u00e7a zor olmas\u0131.<\/p>\n<p>Yama, Yerel G\u00fcvenlik Yetkilisi Uzaktan Protokol\u00fc\u2019ne anonim ba\u011flant\u0131 giri\u015fimlerini tespit edip reddediyor. Bununla birlikte, resmi <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-26925\" target=\"_blank\" rel=\"noopener nofollow\">SSS\u2019e<\/a> g\u00f6re Windows Server 2008 SP2\u2019de bu g\u00fcncellemeyi y\u00fcklemek yedekleme yaz\u0131l\u0131mlar\u0131n\u0131 etkileyebiliyor.<\/p>\n<h2>Di\u011fer g\u00fcvenlik a\u00e7\u0131klar\u0131<\/h2>\n<p>Son g\u00fcncelleme, CVE-2022-26925\u2019in yan\u0131 s\u0131ra \u201ckritik\u201d \u015fiddet d\u00fczeyindeki bir\u00e7ok ba\u015fka g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 da onar\u0131yor. Bunlar\u0131n aras\u0131nda Windows A\u011f Dosya Sistemi\u2019ndeki (NFS) RCE g\u00fcvenlik a\u00e7\u0131\u011f\u0131 olan <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-26937\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2022-26937<\/a>\u2018nin yan\u0131 s\u0131ra, LDAP servisindeki iki RCE g\u00fcvenlik a\u00e7\u0131\u011f\u0131 olan <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-22012\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2022-22012<\/a>\u00a0ve <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-29130\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2022-29130<\/a> da yer al\u0131yor.<\/p>\n<p>Yamalar yay\u0131nland\u0131\u011f\u0131 s\u0131rada herkes\u00e7e bilinen iki di\u011fer g\u00fcvenlik a\u00e7\u0131\u011f\u0131 da, Insight Software\u2019in Magnitude Simba Amazon Redshift s\u00fcr\u00fcc\u00fcs\u00fcndeki bir hata olan <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-29972\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2022-29972<\/a> ve Windows Hyper-V\u2019deki bir DoS g\u00fcvenlik a\u00e7\u0131\u011f\u0131 olan <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-22713\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2022-22713<\/a>. Ancak bug\u00fcne kadar bunlar\u0131n k\u00f6t\u00fcye kullan\u0131m\u0131na y\u00f6nelik herhangi bir giri\u015fim tespit edilmedi.<\/p>\n<h2>Kendinizi koruman\u0131n yollar\u0131<\/h2>\n<p>\u00d6ncelikle, Microsoft\u2019un son g\u00fcncellemelerini y\u00fckleyin. Bir sebeple ortam\u0131n\u0131z i\u00e7in bu m\u00fcmk\u00fcn de\u011filse <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2022-May\" target=\"_blank\" rel=\"noopener nofollow\">Microsoft\u2019un resmi May\u0131s 2022 G\u00fcvenlik G\u00fcncellemeleri rehberindeki<\/a> <em>S\u0131k Sorulan Sorular, Risk Azaltma Y\u00f6ntemleri ve Ge\u00e7ici \u00c7\u00f6z\u00fcmler<\/em> b\u00f6l\u00fcm\u00fcne g\u00f6z at\u0131n. Burada anlat\u0131lan y\u00f6ntemlerden biri, altyap\u0131n\u0131zla ilgili g\u00fcvenli a\u00e7\u0131klar\u0131ndan korunman\u0131za yard\u0131mc\u0131 olabilir.<\/p>\n<p>Kendi ad\u0131m\u0131za, \u00f6nceden bilinmeyen g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n k\u00f6t\u00fcye kullan\u0131m\u0131n\u0131 tespit edebilen <a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">g\u00fcvenilir bir \u00e7\u00f6z\u00fcmle<\/a> internete ba\u011fl\u0131 t\u00fcm cihazlar\u0131 koruman\u0131z\u0131 \u00f6neriyoruz.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial-leadgen\">\n","protected":false},"excerpt":{"rendered":"<p>Windows&#8217;u g\u00fcncelleme zaman\u0131! Microsoft onlarca g\u00fcvenlik a\u00e7\u0131\u011f\u0131 i\u00e7in yama yay\u0131nlad\u0131. Bu g\u00fcvenlik a\u00e7\u0131klar\u0131ndan biri siber su\u00e7lular taraf\u0131nda aktif \u015fekilde kullan\u0131l\u0131yor.<\/p>\n","protected":false},"author":2706,"featured_media":10677,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194,1727],"tags":[1886,790,38,2157,113],"class_list":{"0":"post-10676","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"category-smb","10":"tag-guncellemeler","11":"tag-guvenlik-aciklari","12":"tag-microsoft","13":"tag-sifir-gun","14":"tag-windows"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/windows-actively-exploited-vulnerability-cve-2022-26925\/10676\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/windows-actively-exploited-vulnerability-cve-2022-26925\/24144\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/windows-actively-exploited-vulnerability-cve-2022-26925\/19627\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/windows-actively-exploited-vulnerability-cve-2022-26925\/9912\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/windows-actively-exploited-vulnerability-cve-2022-26925\/26466\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/windows-actively-exploited-vulnerability-cve-2022-26925\/24412\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/windows-actively-exploited-vulnerability-cve-2022-26925\/24776\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/windows-actively-exploited-vulnerability-cve-2022-26925\/27152\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/windows-actively-exploited-vulnerability-cve-2022-26925\/26700\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/windows-actively-exploited-vulnerability-cve-2022-26925\/44305\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/windows-actively-exploited-vulnerability-cve-2022-26925\/18884\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/windows-actively-exploited-vulnerability-cve-2022-26925\/19406\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/windows-actively-exploited-vulnerability-cve-2022-26925\/28539\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/windows-actively-exploited-vulnerability-cve-2022-26925\/30505\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/windows-actively-exploited-vulnerability-cve-2022-26925\/30258\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/guvenlik-aciklari\/","name":"g\u00fcvenlik a\u00e7\u0131klar\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10676","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=10676"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10676\/revisions"}],"predecessor-version":[{"id":10678,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10676\/revisions\/10678"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/10677"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=10676"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=10676"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=10676"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}