Description
Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to obtain sensitive information, cause denial of service, execute arbitrary code, gain privileges, bypass security restrictions.
Below is a complete list of vulnerabilities:
- An information disclosure vulnerability in Windows Common Log File System Driver can be exploited remotely to obtain sensitive information.
- A denial of service vulnerability in Windows Media Center Update can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Remote Desktop Client can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Security Support Provider Interface can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Fast FAT File System Driver can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Remote Desktop Protocol Client can be exploited remotely to obtain sensitive information.
- A security feature bypass vulnerability in Windows HTML Platforms can be exploited remotely to bypass security restrictions.
- An information disclosure vulnerability in Windows NT Lan Manager Datagram Receiver Driver can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows NT OS Kernel can be exploited remotely to gain privileges.
- A denial of service vulnerability in Point-to-Point Tunneling Protocol can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows ALPC can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Fax and Scan Service can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows PDEV can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Inking COM can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows CD-ROM Driver can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Event Tracing can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Media Foundation can be exploited remotely to obtain sensitive information.
- A denial of service vulnerability in Windows Hyper-V can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Print Spooler can be exploited remotely to gain privileges.
Original advisories
- CVE-2022-21973
- CVE-2022-23285
- CVE-2022-23296
- CVE-2022-24454
- CVE-2022-23293
- CVE-2022-24503
- CVE-2022-24502
- CVE-2022-23297
- CVE-2022-23298
- CVE-2022-23253
- CVE-2022-23283
- CVE-2022-24459
- CVE-2022-21990
- CVE-2022-23299
- CVE-2022-23290
- CVE-2022-24455
- CVE-2022-23294
- CVE-2022-21977
- CVE-2022-21975
- CVE-2022-22010
- CVE-2022-23284
Exploitation
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-7
- Microsoft-Windows-Server-2008
CVE list
- CVE-2022-23281 high
- CVE-2022-21973 high
- CVE-2022-23285 critical
- CVE-2022-23296 critical
- CVE-2022-24454 critical
- CVE-2022-23293 critical
- CVE-2022-24503 high
- CVE-2022-24502 high
- CVE-2022-23297 high
- CVE-2022-23298 high
- CVE-2022-23253 high
- CVE-2022-23283 high
- CVE-2022-24459 critical
- CVE-2022-21990 critical
- CVE-2022-23299 critical
- CVE-2022-23290 critical
- CVE-2022-23294 critical
- CVE-2022-22010 high
- CVE-2022-21977 warning
- CVE-2022-24455 critical
- CVE-2022-21975 warning
- CVE-2022-23284 high
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!