Description
Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, cause denial of service.
Below is a complete list of vulnerabilities:
- An elevation of privilege vulnerability in Windows Print Spooler can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Common Log File System Driver can be exploited remotely to obtain sensitive information.
- An information disclosure vulnerability in Windows Remote Access Connection Manager can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
- A denial of service vulnerability in Windows Common Log File System Driver can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
Original advisories
- CVE-2022-21998
- CVE-2022-21997
- CVE-2022-22718
- CVE-2022-21985
- CVE-2022-21981
- CVE-2022-22710
- CVE-2022-21999
- CVE-2022-21989
- CVE-2022-22000
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-8
- Microsoft-Windows-7
- Microsoft-Windows-Server-2008
- Windows-RT
- Microsoft-Windows-10
- Microsoft-Azure
- Microsoft-Windows-Server-2016
- Microsoft-Windows-Server-2019
CVE list
- CVE-2022-22717 high
- CVE-2022-21998 high
- CVE-2022-22718 critical
- CVE-2022-21981 critical
- CVE-2022-22710 high
- CVE-2022-21997 high
- CVE-2022-21985 high
- CVE-2022-21999 critical
- CVE-2022-21989 critical
- CVE-2022-22000 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!