Description
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to cause denial of service, obtain sensitive information, gain privileges, execute arbitrary code, bypass security restrictions, spoof user interface.
Below is a complete list of vulnerabilities:
- A denial of service vulnerability in Windows Network Address Translation (NAT) can be exploited remotely to cause denial of service.
- Information disclosure vulnerability in microarchitectural fill buffers on some Intel Processors can be exploited to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Advanced Local Procedure Call can be exploited remotely to gain privileges.
- Information disclosure vulnerability in multi-core shared buffers for some Intel Processors can be exploited to obtain sensitive information.
- Information disclosure vulnerability in specific special register write operations for some Intel Processors can be exploited to obtain sensitive information.
- A remote code execution vulnerability in Windows Lightweight Directory Access Protocol (LDAP) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Ancillary Function Driver for WinSock can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows File History can be exploited remotely to execute arbitrary code.
- Information disclosure vulnerability in specific special register read operations for some Intel Processors can be exploited to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Local Security Authority Subsystem Service can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Hyper-V can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows Kernel can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Media Center can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows iSCSI Discovery Service can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in HEVC Video Extensions can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Container Isolation FS Filter Driver can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Defender Remote Credential Guard can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Network File System can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows SMB can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Kerberos can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Microsoft File Server Shadow Copy Agent Service (RVSS) can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in Kerberos AppContainer can be exploited remotely to bypass security restrictions.
- An information disclosure vulnerability in Windows Desired State Configuration (DSC) can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in AV1 Video Extension can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Container Manager Service can be exploited remotely to gain privileges.
- A spoofing vulnerability in Windows Autopilot Device Management and Enrollment Client can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in Windows Encrypting File System (EFS) can be exploited remotely to execute arbitrary code.
Original advisories
- CVE-2022-22018
- CVE-2022-21125
- CVE-2022-21123
- CVE-2022-30131
- CVE-2022-30162
- CVE-2022-30150
- CVE-2022-30151
- CVE-2022-30136
- CVE-2022-32230
- CVE-2022-30165
- CVE-2022-30154
- CVE-2022-30164
- CVE-2022-30163
- CVE-2022-30155
- CVE-2022-29119
- CVE-2022-30135
- CVE-2022-29111
- CVE-2022-30153
- CVE-2022-30140
- CVE-2022-30160
- CVE-2022-30148
- CVE-2022-30167
- CVE-2022-30132
- CVE-2022-21166
- CVE-2022-30149
- CVE-2022-30139
- CVE-2022-30142
- CVE-2022-30161
- CVE-2022-30146
- CVE-2022-21127
- CVE-2022-30193
- CVE-2022-30147
- CVE-2022-30166
- CVE-2022-30189
- CVE-2022-30145
- CVE-2022-30141
- CVE-2022-30188
- CVE-2022-30143
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-8
- Windows-RT
- Microsoft-Windows-10
- Microsoft-Windows-Server-2016
- Microsoft-Windows-Server-2019
- Microsoft-Windows-11
CVE list
- CVE-2022-30152 critical
- CVE-2022-21125 high
- CVE-2022-30160 critical
- CVE-2022-21123 high
- CVE-2022-21166 high
- CVE-2022-30149 critical
- CVE-2022-30151 high
- CVE-2022-30142 critical
- CVE-2022-30161 critical
- CVE-2022-30146 critical
- CVE-2022-21127 high
- CVE-2022-30147 critical
- CVE-2022-30166 critical
- CVE-2022-30141 critical
- CVE-2022-30163 critical
- CVE-2022-30155 high
- CVE-2022-30135 critical
- CVE-2022-30153 critical
- CVE-2022-30143 critical
- CVE-2022-30140 critical
- CVE-2022-22018 critical
- CVE-2022-30131 critical
- CVE-2022-30162 high
- CVE-2022-30150 critical
- CVE-2022-30136 critical
- CVE-2022-32230 critical
- CVE-2022-30165 critical
- CVE-2022-30154 high
- CVE-2022-30164 critical
- CVE-2022-29119 critical
- CVE-2022-29111 critical
- CVE-2022-30148 high
- CVE-2022-30167 critical
- CVE-2022-30132 critical
- CVE-2022-30139 critical
- CVE-2022-30193 critical
- CVE-2022-30189 high
- CVE-2022-30145 critical
- CVE-2022-30188 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!