Kaspersky ID:
KLA12479
Erkennungsdatum:
03/08/2022
Aktualisiert:
01/28/2026

Beschreibung

Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to obtain sensitive information, cause denial of service, execute arbitrary code, gain privileges, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. An information disclosure vulnerability in Windows Common Log File System Driver can be exploited remotely to obtain sensitive information.
  2. A denial of service vulnerability in Windows Media Center Update can be exploited remotely to cause denial of service.
  3. A remote code execution vulnerability in Remote Desktop Client can be exploited remotely to execute arbitrary code.
  4. An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
  5. An elevation of privilege vulnerability in Windows Security Support Provider Interface can be exploited remotely to gain privileges.
  6. An elevation of privilege vulnerability in Windows Fast FAT File System Driver can be exploited remotely to gain privileges.
  7. An information disclosure vulnerability in Remote Desktop Protocol Client can be exploited remotely to obtain sensitive information.
  8. A security feature bypass vulnerability in Windows HTML Platforms can be exploited remotely to bypass security restrictions.
  9. An information disclosure vulnerability in Windows NT Lan Manager Datagram Receiver Driver can be exploited remotely to obtain sensitive information.
  10. An elevation of privilege vulnerability in Windows NT OS Kernel can be exploited remotely to gain privileges.
  11. A denial of service vulnerability in Point-to-Point Tunneling Protocol can be exploited remotely to cause denial of service.
  12. An elevation of privilege vulnerability in Windows ALPC can be exploited remotely to gain privileges.
  13. An elevation of privilege vulnerability in Windows Fax and Scan Service can be exploited remotely to gain privileges.
  14. An elevation of privilege vulnerability in Windows PDEV can be exploited remotely to gain privileges.
  15. An elevation of privilege vulnerability in Windows Inking COM can be exploited remotely to gain privileges.
  16. An elevation of privilege vulnerability in Windows CD-ROM Driver can be exploited remotely to gain privileges.
  17. A remote code execution vulnerability in Windows Event Tracing can be exploited remotely to execute arbitrary code.
  18. An information disclosure vulnerability in Media Foundation can be exploited remotely to obtain sensitive information.
  19. A denial of service vulnerability in Windows Hyper-V can be exploited remotely to cause denial of service.
  20. An elevation of privilege vulnerability in Windows Print Spooler can be exploited remotely to gain privileges.

Ursprüngliche Informationshinweise

Ausnutzung

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Betroffene Produkte

CVE Liste

  • CVE-2022-23281
    high
  • CVE-2022-21973
    high
  • CVE-2022-23285
    critical
  • CVE-2022-23296
    critical
  • CVE-2022-24454
    critical
  • CVE-2022-23293
    critical
  • CVE-2022-24503
    high
  • CVE-2022-24502
    high
  • CVE-2022-23297
    high
  • CVE-2022-23298
    high
  • CVE-2022-23253
    high
  • CVE-2022-23283
    high
  • CVE-2022-24459
    critical
  • CVE-2022-21990
    critical
  • CVE-2022-23299
    critical
  • CVE-2022-23290
    critical
  • CVE-2022-23294
    critical
  • CVE-2022-22010
    high
  • CVE-2022-21977
    warning
  • CVE-2022-24455
    critical
  • CVE-2022-21975
    warning
  • CVE-2022-23284
    high

KB Liste

Mehr erfahren

Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com

Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!
Kaspersky Next
Let´s go Next: Cybersicherheit neu gedacht
Erfahren Sie mehr
Neu: Kaspersky!
Dein digitales Leben verdient umfassenden Schutz!
Erfahren Sie mehr
Do you want to save your changes?
Your message has been sent successfully.