Description
Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to obtain sensitive information, cause denial of service, execute arbitrary code, gain privileges, bypass security restrictions.
Below is a complete list of vulnerabilities:
- An information disclosure vulnerability in Windows Common Log File System Driver can be exploited remotely to obtain sensitive information.
- A denial of service vulnerability in Windows Media Center Update can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Remote Desktop Client can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Security Support Provider Interface can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Fast FAT File System Driver can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Remote Desktop Protocol Client can be exploited remotely to obtain sensitive information.
- A security feature bypass vulnerability in Windows HTML Platforms can be exploited remotely to bypass security restrictions.
- An information disclosure vulnerability in Windows NT Lan Manager Datagram Receiver Driver can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows NT OS Kernel can be exploited remotely to gain privileges.
- A denial of service vulnerability in Point-to-Point Tunneling Protocol can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows ALPC can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Fax and Scan Service can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows PDEV can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Inking COM can be exploited remotely to gain privileges.
Original advisories
- CVE-2022-21973
- CVE-2022-23285
- CVE-2022-23296
- CVE-2022-24454
- CVE-2022-23293
- CVE-2022-24503
- CVE-2022-24502
- CVE-2022-23297
- CVE-2022-23298
- CVE-2022-23253
- CVE-2022-23283
- CVE-2022-24459
- CVE-2022-21990
- CVE-2022-23299
- CVE-2022-23290
Exploitation
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-8
- Microsoft-Windows-7
- Microsoft-Windows-Server-2008
- Windows-RT
- Microsoft-Windows-10
- Microsoft-Windows-Server-2016
- Microsoft-Windows-Server-2019
CVE list
- CVE-2022-23281 high
- CVE-2022-21973 high
- CVE-2022-23285 critical
- CVE-2022-23296 critical
- CVE-2022-24454 critical
- CVE-2022-23293 critical
- CVE-2022-24503 high
- CVE-2022-24502 warning
- CVE-2022-23297 high
- CVE-2022-23298 high
- CVE-2022-23253 high
- CVE-2022-23283 high
- CVE-2022-24459 critical
- CVE-2022-21990 critical
- CVE-2022-23299 critical
- CVE-2022-23290 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!