Kaspersky ID:
KLA12458
Дата обнаружения:
08/02/2022
Обновлено:
22/01/2024

Описание

Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, cause denial of service.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability in Windows Print Spooler can be exploited remotely to gain privileges.
  2. An information disclosure vulnerability in Windows Common Log File System Driver can be exploited remotely to obtain sensitive information.
  3. An information disclosure vulnerability in Windows Remote Access Connection Manager can be exploited remotely to obtain sensitive information.
  4. An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
  5. A denial of service vulnerability in Windows Common Log File System Driver can be exploited remotely to cause denial of service.
  6. An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.

Первичный источник обнаружения

Эксплуатация

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Связанные продукты

Список CVE

  • CVE-2022-22717
    high
  • CVE-2022-21998
    warning
  • CVE-2022-22718
    high
  • CVE-2022-21981
    warning
  • CVE-2022-22710
    warning
  • CVE-2022-21997
    warning
  • CVE-2022-21985
    warning
  • CVE-2022-21999
    warning
  • CVE-2022-21989
    high
  • CVE-2022-22000
    high

Список KB

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Узнай больше об угрозах и векторах атаки на Энциклопедии Kaspersky
Бесплатно
Читать
Kaspersky Premium
Комплексное решение для защиты вашей цифровой жизни
Премиум
Скачать
Confirm changes?
Your message has been sent successfully.