Kaspersky ID:
KLA12483
Дата обнаружения:
08/03/2022
Обновлено:
30/11/2024

Описание

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to obtain sensitive information, cause denial of service, execute arbitrary code, gain privileges, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. An information disclosure vulnerability in Windows Common Log File System Driver can be exploited remotely to obtain sensitive information.
  2. A denial of service vulnerability in Windows Media Center Update can be exploited remotely to cause denial of service.
  3. A remote code execution vulnerability in Remote Desktop Client can be exploited remotely to execute arbitrary code.
  4. An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
  5. An elevation of privilege vulnerability in Windows Security Support Provider Interface can be exploited remotely to gain privileges.
  6. An elevation of privilege vulnerability in Windows Fast FAT File System Driver can be exploited remotely to gain privileges.
  7. An information disclosure vulnerability in Remote Desktop Protocol Client can be exploited remotely to obtain sensitive information.
  8. A security feature bypass vulnerability in Windows HTML Platforms can be exploited remotely to bypass security restrictions.
  9. An information disclosure vulnerability in Windows NT Lan Manager Datagram Receiver Driver can be exploited remotely to obtain sensitive information.
  10. An elevation of privilege vulnerability in Windows NT OS Kernel can be exploited remotely to gain privileges.
  11. A denial of service vulnerability in Point-to-Point Tunneling Protocol can be exploited remotely to cause denial of service.
  12. An elevation of privilege vulnerability in Windows ALPC can be exploited remotely to gain privileges.
  13. An elevation of privilege vulnerability in Windows Fax and Scan Service can be exploited remotely to gain privileges.
  14. An elevation of privilege vulnerability in Windows PDEV can be exploited remotely to gain privileges.
  15. An elevation of privilege vulnerability in Windows Inking COM can be exploited remotely to gain privileges.
  16. An elevation of privilege vulnerability in Windows DWM Core Library can be exploited remotely to gain privileges.
  17. A remote code execution vulnerability in HEVC Video Extensions can be exploited remotely to execute arbitrary code.
  18. A remote code execution vulnerability in Windows Event Tracing can be exploited remotely to execute arbitrary code.
  19. An information disclosure vulnerability in Media Foundation can be exploited remotely to obtain sensitive information.
  20. A remote code execution vulnerability in HEIF Image Extensions can be exploited remotely to execute arbitrary code.
  21. An elevation of privilege vulnerability in Tablet Windows User Interface Application can be exploited remotely to gain privileges.
  22. A remote code execution vulnerability in Raw Image Extension can be exploited remotely to execute arbitrary code.
  23. A remote code execution vulnerability in Windows SMBv3 Client/Server can be exploited remotely to execute arbitrary code.
  24. An elevation of privilege vulnerability in Xbox Live Auth Manager for Windows can be exploited remotely to gain privileges.
  25. A remote code execution vulnerability in VP9 Video Extensions can be exploited remotely to execute arbitrary code.
  26. An elevation of privilege vulnerability in Windows CD-ROM Driver can be exploited remotely to gain privileges.
  27. An elevation of privilege vulnerability in Windows Cloud Files Mini Filter Driver can be exploited remotely to gain privileges.
  28. A denial of service vulnerability in Windows Hyper-V can be exploited remotely to cause denial of service.
  29. An elevation of privilege vulnerability in Windows Print Spooler can be exploited remotely to gain privileges.
  30. An elevation of privilege vulnerability in Windows Update Stack can be exploited remotely to gain privileges.
  31. An elevation of privilege vulnerability in Windows Ancillary Function Driver for WinSock can be exploited remotely to gain privileges.

Первичный источник обнаружения

Эксплуатация

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Связанные продукты

Список CVE

  • CVE-2022-23281
    high
  • CVE-2022-21973
    high
  • CVE-2022-23285
    critical
  • CVE-2022-23296
    critical
  • CVE-2022-24454
    critical
  • CVE-2022-23293
    critical
  • CVE-2022-24503
    high
  • CVE-2022-24502
    warning
  • CVE-2022-23297
    high
  • CVE-2022-23298
    high
  • CVE-2022-23253
    high
  • CVE-2022-23283
    high
  • CVE-2022-24459
    critical
  • CVE-2022-21990
    critical
  • CVE-2022-23299
    critical
  • CVE-2022-23290
    critical
  • CVE-2022-23291
    critical
  • CVE-2022-23301
    critical
  • CVE-2022-24505
    high
  • CVE-2022-22006
    critical
  • CVE-2022-23294
    critical
  • CVE-2022-22010
    warning
  • CVE-2022-24457
    critical
  • CVE-2022-24460
    high
  • CVE-2022-23300
    critical
  • CVE-2022-24456
    critical
  • CVE-2022-24508
    critical
  • CVE-2022-21967
    high
  • CVE-2022-21977
    warning
  • CVE-2022-23288
    high
  • CVE-2022-24451
    critical
  • CVE-2022-24455
    critical
  • CVE-2022-23286
    high
  • CVE-2022-24501
    critical
  • CVE-2022-21975
    warning
  • CVE-2022-24453
    critical
  • CVE-2022-23295
    critical
  • CVE-2022-23284
    high
  • CVE-2022-24525
    high
  • CVE-2022-23287
    high
  • CVE-2022-24507
    critical
  • CVE-2022-24452
    critical
  • CVE-2022-22007
    critical

Список KB

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Confirm changes?
Your message has been sent successfully.