Kaspersky ID:
KLA20047
Detect Date:
11/08/2022
Updated:
01/22/2024

Description

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, cause denial of service, execute arbitrary code, bypass security restrictions, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability in Windows Extensible File Allocation Table can be exploited remotely to gain privileges.
  2. A denial of service vulnerability in Windows Network Address Translation (NAT) can be exploited remotely to cause denial of service.
  3. An elevation of privilege vulnerability in Windows Kerberos RC4-HMAC can be exploited remotely to gain privileges.
  4. An elevation of privilege vulnerability in Windows Advanced Local Procedure Call (ALPC) can be exploited remotely to gain privileges.
  5. A remote code execution vulnerability in Microsoft ODBC Driver can be exploited remotely to execute arbitrary code.
  6. A security feature bypass vulnerability in BitLocker can be exploited remotely to bypass security restrictions.
  7. An elevation of privilege vulnerability in Microsoft DWM Core Library can be exploited remotely to gain privileges.
  8. An elevation of privilege vulnerability in Windows CNG Key Isolation Service can be exploited remotely to gain privileges.
  9. A remote code execution vulnerability in Windows Point-to-Point Tunneling Protocol can be exploited remotely to execute arbitrary code.
  10. An elevation of privilege vulnerability in Windows Overlay Filter can be exploited remotely to gain privileges.
  11. An elevation of privilege vulnerability in Windows Win32k can be exploited remotely to gain privileges.
  12. An information disclosure vulnerability in Windows Human Interface Device can be exploited remotely to obtain sensitive information.
  13. A denial of service vulnerability in Windows Hyper-V can be exploited remotely to cause denial of service.
  14. An elevation of privilege vulnerability in Windows Digital Media Receiver can be exploited remotely to gain privileges.
  15. A denial of service vulnerability in Windows Point-to-Point Tunneling Protocol can be exploited remotely to cause denial of service.
  16. An information disclosure vulnerability in Windows GDI+ can be exploited remotely to obtain sensitive information.
  17. A denial of service vulnerability in Windows Kerberos can be exploited remotely to cause denial of service.
  18. An information disclosure vulnerability can be exploited remotely to obtain sensitive information.
  19. An elevation of privilege vulnerability in Windows Bind Filter Driver can be exploited remotely to gain privileges.
  20. An elevation of privilege vulnerability in Windows Win32 Kernel Subsystem can be exploited remotely to gain privileges.
  21. An information disclosure vulnerability in Network Policy Server (NPS) RADIUS Protocol can be exploited remotely to obtain sensitive information.
  22. An elevation of privilege vulnerability in Windows Print Spooler can be exploited remotely to gain privileges.
  23. A security feature bypass vulnerability in Windows Mark of the Web can be exploited remotely to bypass security restrictions.
  24. An elevation of privilege vulnerability in Windows Resilient File System (ReFS) can be exploited remotely to gain privileges.
  25. An elevation of privilege vulnerability in Windows Group Policy can be exploited remotely to gain privileges.
  26. An elevation of privilege vulnerability in Windows Kerberos can be exploited remotely to gain privileges.
  27. A remote code execution vulnerability in Windows Scripting Languages can be exploited remotely to execute arbitrary code.
  28. A remote code execution vulnerability in Windows Graphics Component can be exploited remotely to execute arbitrary code.
  29. A denial of service vulnerability in Network Policy Server (NPS) RADIUS Protocol can be exploited remotely to cause denial of service.
  30. An elevation of privilege vulnerability in Netlogon RPC can be exploited remotely to gain privileges.
  31. An elevation of privilege vulnerability in Windows HTTP.sys can be exploited remotely to gain privileges.

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2022-41058
    warning
  • CVE-2022-37966
    warning
  • CVE-2022-41090
    warning
  • CVE-2022-41045
    warning
  • CVE-2022-41118
    warning
  • CVE-2022-41048
    warning
  • CVE-2022-41098
    warning
  • CVE-2022-41053
    warning
  • CVE-2022-41097
    warning
  • CVE-2022-23824
    warning
  • CVE-2022-41073
    warning
  • CVE-2022-41047
    warning
  • CVE-2022-41086
    warning
  • CVE-2022-37967
    warning
  • CVE-2022-41128
    warning
  • CVE-2022-37992
    warning
  • CVE-2022-41109
    warning
  • CVE-2022-41056
    warning
  • CVE-2022-38023
    warning
  • CVE-2022-41039
    warning
  • CVE-2022-41057
    warning
  • CVE-2022-41095
    warning
  • CVE-2022-41050
    warning
  • CVE-2022-41093
    warning
  • CVE-2022-41099
    warning
  • CVE-2022-41096
    warning
  • CVE-2022-41125
    warning
  • CVE-2022-41088
    warning
  • CVE-2022-41102
    warning
  • CVE-2022-41092
    warning
  • CVE-2022-41055
    warning
  • CVE-2022-38015
    warning
  • CVE-2022-41100
    warning
  • CVE-2022-41114
    warning
  • CVE-2022-41113
    warning
  • CVE-2022-41091
    warning
  • CVE-2022-41054
    warning
  • CVE-2022-41052
    warning
  • CVE-2022-41049
    warning
  • CVE-2022-41101
    warning

KB list

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.