Kaspersky ID:
KLA12483
Дата обнаружения:
08/03/2022
Обновлено:
22/01/2024

Описание

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to obtain sensitive information, cause denial of service, execute arbitrary code, gain privileges, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. An information disclosure vulnerability in Windows Common Log File System Driver can be exploited remotely to obtain sensitive information.
  2. A denial of service vulnerability in Windows Media Center Update can be exploited remotely to cause denial of service.
  3. A remote code execution vulnerability in Remote Desktop Client can be exploited remotely to execute arbitrary code.
  4. An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
  5. An elevation of privilege vulnerability in Windows Security Support Provider Interface can be exploited remotely to gain privileges.
  6. An elevation of privilege vulnerability in Windows Fast FAT File System Driver can be exploited remotely to gain privileges.
  7. An information disclosure vulnerability in Remote Desktop Protocol Client can be exploited remotely to obtain sensitive information.
  8. A security feature bypass vulnerability in Windows HTML Platforms can be exploited remotely to bypass security restrictions.
  9. An information disclosure vulnerability in Windows NT Lan Manager Datagram Receiver Driver can be exploited remotely to obtain sensitive information.
  10. An elevation of privilege vulnerability in Windows NT OS Kernel can be exploited remotely to gain privileges.
  11. A denial of service vulnerability in Point-to-Point Tunneling Protocol can be exploited remotely to cause denial of service.
  12. An elevation of privilege vulnerability in Windows ALPC can be exploited remotely to gain privileges.
  13. An elevation of privilege vulnerability in Windows Fax and Scan Service can be exploited remotely to gain privileges.
  14. An elevation of privilege vulnerability in Windows PDEV can be exploited remotely to gain privileges.
  15. An elevation of privilege vulnerability in Windows Inking COM can be exploited remotely to gain privileges.
  16. An elevation of privilege vulnerability in Windows DWM Core Library can be exploited remotely to gain privileges.
  17. A remote code execution vulnerability in HEVC Video Extensions can be exploited remotely to execute arbitrary code.
  18. A remote code execution vulnerability in Windows Event Tracing can be exploited remotely to execute arbitrary code.
  19. An information disclosure vulnerability in Media Foundation can be exploited remotely to obtain sensitive information.
  20. A remote code execution vulnerability in HEIF Image Extensions can be exploited remotely to execute arbitrary code.
  21. An elevation of privilege vulnerability in Tablet Windows User Interface Application can be exploited remotely to gain privileges.
  22. A remote code execution vulnerability in Raw Image Extension can be exploited remotely to execute arbitrary code.
  23. A remote code execution vulnerability in Windows SMBv3 Client/Server can be exploited remotely to execute arbitrary code.
  24. An elevation of privilege vulnerability in Xbox Live Auth Manager for Windows can be exploited remotely to gain privileges.
  25. A remote code execution vulnerability in VP9 Video Extensions can be exploited remotely to execute arbitrary code.
  26. An elevation of privilege vulnerability in Windows CD-ROM Driver can be exploited remotely to gain privileges.
  27. An elevation of privilege vulnerability in Windows Cloud Files Mini Filter Driver can be exploited remotely to gain privileges.
  28. A denial of service vulnerability in Windows Hyper-V can be exploited remotely to cause denial of service.
  29. An elevation of privilege vulnerability in Windows Print Spooler can be exploited remotely to gain privileges.
  30. An elevation of privilege vulnerability in Windows Update Stack can be exploited remotely to gain privileges.
  31. An elevation of privilege vulnerability in Windows Ancillary Function Driver for WinSock can be exploited remotely to gain privileges.

Первичный источник обнаружения

Эксплуатация

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Связанные продукты

Список CVE

  • CVE-2022-23281
    warning
  • CVE-2022-21973
    warning
  • CVE-2022-23285
    high
  • CVE-2022-23296
    high
  • CVE-2022-24454
    high
  • CVE-2022-23293
    high
  • CVE-2022-24503
    warning
  • CVE-2022-24502
    warning
  • CVE-2022-23297
    warning
  • CVE-2022-23298
    high
  • CVE-2022-23253
    warning
  • CVE-2022-23283
    warning
  • CVE-2022-24459
    high
  • CVE-2022-21990
    high
  • CVE-2022-23299
    high
  • CVE-2022-23290
    high
  • CVE-2022-23291
    high
  • CVE-2022-23301
    high
  • CVE-2022-24505
    warning
  • CVE-2022-22006
    high
  • CVE-2022-23294
    high
  • CVE-2022-22010
    warning
  • CVE-2022-24457
    high
  • CVE-2022-24460
    critical
  • CVE-2022-23300
    high
  • CVE-2022-24456
    high
  • CVE-2022-24508
    high
  • CVE-2022-21967
    warning
  • CVE-2022-21977
    warning
  • CVE-2022-23288
    high
  • CVE-2022-24451
    high
  • CVE-2022-24455
    high
  • CVE-2022-23286
    high
  • CVE-2022-24501
    high
  • CVE-2022-21975
    warning
  • CVE-2022-24453
    high
  • CVE-2022-23295
    high
  • CVE-2022-23284
    critical
  • CVE-2022-24525
    warning
  • CVE-2022-23287
    high
  • CVE-2022-24507
    warning
  • CVE-2022-24452
    high
  • CVE-2022-22007
    high

Список KB

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Confirm changes?
Your message has been sent successfully.