Microsoft Windows HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907 Cybersecurity Update
The Microsoft Windows HTTP Protocol Stack Remote Code Execution vulnerability can potentially affect the Microsoft Windows 10 operating system (OS) by requiring no authentication before processing incoming HTTP requests in various system services and subsystems. A remote code-execution issue in the HTTP protocol stack stands out for researchers, given that it is wormable. It can self-propagate specially crafted packets through a network using the HTTP protocol stack (http.sys) to process packets.
The vulnerability does not affect safety and performance on any of the ZEISS devices. However, ZEISS recommends updating devices with the Microsoft patch and/or registry settings, as applicable, to ensure continued cybersecurity.
ZEISS has assessed the impact of the vulnerability and recommends installing the updates listed for each device as indicated below.
Refer to the table for the respective update instructions to close this vulnerability for your corresponding ZEISS device. Please contact your local service team if you need support updating your device.
Begin the process by first installing the following patch:
Link to instructions for updating ZEISS device
|
Link to download patch
|
|
---|---|---|
All
|
||
Upon completion of the KB5005698 patch, please continue the update for your device:
Link to instructions for updating ZEISS device
|
Link to download patch
|
|
---|---|---|
Atlas
|
||
Cirrus
|
||
Cirrus Photo
|
||
Clarus
|
1. KB5010790 |
|
HFA3
|
||
Plex
|
1. KB5010359 |
|