Kaspersky ID:
KLA12457
Detect Date:
02/08/2022
Updated:
01/25/2024

Description

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, execute arbitrary code, cause denial of service.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability in Windows Print Spooler can be exploited remotely to gain privileges.
  2. An information disclosure vulnerability in Windows Common Log File System Driver can be exploited remotely to obtain sensitive information.
  3. A remote code execution vulnerability in HEVC Video Extensions can be exploited remotely to execute arbitrary code.
  4. An elevation of privilege vulnerability in Windows Remote Access Connection Manager can be exploited remotely to gain privileges.
  5. An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
  6. An elevation of privilege vulnerability in Named Pipe File System can be exploited remotely to gain privileges.
  7. A remote code execution vulnerability in Windows Hyper-V can be exploited remotely to execute arbitrary code.
  8. A denial of service vulnerability in Windows Common Log File System Driver can be exploited remotely to cause denial of service.
  9. An elevation of privilege vulnerability in Windows DWM Core Library can be exploited remotely to gain privileges.
  10. A remote code execution vulnerability in Roaming Security Rights Management Services can be exploited remotely to execute arbitrary code.
  11. A denial of service vulnerability in Windows User Account Profile Picture can be exploited remotely to cause denial of service.
  12. An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
  13. A remote code execution vulnerability in Windows Mobile Device Management can be exploited remotely to execute arbitrary code.
  14. An information disclosure vulnerability in Windows Remote Access Connection Manager can be exploited remotely to obtain sensitive information.
  15. A denial of service vulnerability in Windows Hyper-V can be exploited remotely to cause denial of service.
  16. A remote code execution vulnerability in Windows Runtime can be exploited remotely to execute arbitrary code.
  17. A remote code execution vulnerability in Windows DNS Server can be exploited remotely to execute arbitrary code.
  18. An information disclosure vulnerability in Windows Services for NFS ONCRPC XDR Driver can be exploited remotely to obtain sensitive information.
  19. An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
  20. A remote code execution vulnerability in VP9 Video Extensions can be exploited remotely to execute arbitrary code.

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2022-22717
    high
  • CVE-2022-21998
    high
  • CVE-2022-22718
    critical
  • CVE-2022-21926
    critical
  • CVE-2022-22001
    critical
  • CVE-2022-21981
    critical
  • CVE-2022-22715
    critical
  • CVE-2022-21995
    critical
  • CVE-2022-22710
    high
  • CVE-2022-21994
    critical
  • CVE-2022-21974
    critical
  • CVE-2022-21927
    critical
  • CVE-2022-22002
    high
  • CVE-2022-21997
    high
  • CVE-2022-21996
    critical
  • CVE-2022-21992
    critical
  • CVE-2022-21985
    high
  • CVE-2022-22712
    high
  • CVE-2022-21971
    critical
  • CVE-2022-21844
    critical
  • CVE-2022-21984
    critical
  • CVE-2022-21999
    critical
  • CVE-2022-21993
    critical
  • CVE-2022-21989
    critical
  • CVE-2022-22709
    critical
  • CVE-2022-22000
    critical

KB list

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.