KLA12502
Multiple vulnerabilities in Microsoft Windows

Обновлено: 16/05/2023
Дата обнаружения
12/04/2022
Уровень угрозы
Critical
Описание

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, cause denial of service, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability in Connected User Experiences and Telemetry can be exploited remotely to gain privileges.
  2. A remote code execution vulnerability in Windows Hyper-V can be exploited remotely to execute arbitrary code.
  3. A denial of service vulnerability in Windows Cluster Shared Volume (CSV) can be exploited remotely to cause denial of service.
  4. A remote code execution vulnerability in Windows Fax Compose Form can be exploited remotely to execute arbitrary code.
  5. An information disclosure vulnerability in Windows Hyper-V Shared Virtual Hard Disks can be exploited remotely to obtain sensitive information.
  6. An elevation of privilege vulnerability in Windows Print Spooler can be exploited remotely to gain privileges.
  7. An elevation of privilege vulnerability in PowerShell can be exploited remotely to gain privileges.
  8. A remote code execution vulnerability in Win32 File Enumeration can be exploited remotely to execute arbitrary code.
  9. A remote code execution vulnerability in Windows DNS Server can be exploited remotely to execute arbitrary code.
  10. An elevation of privilege vulnerability in Cluster Client Failover (CCF) can be exploited remotely to gain privileges.
  11. Information disclosure vulnerability in Windows iSCSI Target Service can be exploited to obtain sensitive information.
  12. An information disclosure vulnerability in Windows Graphics Component can be exploited remotely to obtain sensitive information.
  13. A remote code execution vulnerability in Remote Desktop Protocol can be exploited remotely to execute arbitrary code.
  14. A remote code execution vulnerability in Windows Graphics Component can be exploited remotely to execute arbitrary code.
  15. A denial of service vulnerability in Windows Cluster Shared Volume (CSV) can be exploited remotely to cause denial of service.
  16. An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
  17. A remote code execution vulnerability in Windows SMB can be exploited remotely to execute arbitrary code.
  18. A remote code execution vulnerability in Windows Server Service can be exploited remotely to execute arbitrary code.
  19. A remote code execution vulnerability in Windows Kerberos can be exploited remotely to execute arbitrary code.
  20. A remote code execution vulnerability in Windows Network File System can be exploited remotely to execute arbitrary code.
  21. A denial of service vulnerability in Windows Hyper-V can be exploited remotely to cause denial of service.
  22. An elevation of privilege vulnerability in Windows AppX Package Manager can be exploited remotely to gain privileges.
  23. A remote code execution vulnerability in Windows Upgrade Assistant can be exploited remotely to execute arbitrary code.
  24. A remote code execution vulnerability in Windows Stream Enumeration can be exploited remotely to execute arbitrary code.
  25. A denial of service vulnerability in Windows Secure Channel can be exploited remotely to cause denial of service.
  26. A remote code execution vulnerability in Win32 Stream Enumeration can be exploited remotely to execute arbitrary code.
  27. An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
  28. A denial of service vulnerability in Windows LDAP can be exploited remotely to cause denial of service.
  29. An elevation of privilege vulnerability in Windows Win32k can be exploited remotely to gain privileges.
  30. A remote code execution vulnerability in Remote Procedure Call Runtime can be exploited remotely to execute arbitrary code.
  31. An elevation of privilege vulnerability in Windows Bluetooth Driver can be exploited remotely to gain privileges.
  32. An elevation of privilege vulnerability in Windows File Server Resource Management Service can be exploited remotely to gain privileges.
  33. A remote code execution vulnerability in Windows Local Security Authority (LSA) can be exploited remotely to execute arbitrary code.
  34. A remote code execution vulnerability in DiskUsage.exe can be exploited remotely to execute arbitrary code.
  35. An elevation of privilege vulnerability in Windows Desktop Bridge can be exploited remotely to gain privileges.
  36. An elevation of privilege vulnerability in Windows Ancillary Function Driver for WinSock can be exploited remotely to gain privileges.
  37. An information disclosure vulnerability in Windows Kernel can be exploited remotely to obtain sensitive information.
  38. A remote code execution vulnerability in HEVC Video Extensions can be exploited remotely to execute arbitrary code.
  39. An elevation of privilege vulnerability in Windows User Profile Service can be exploited remotely to gain privileges.
  40. A remote code execution vulnerability in Windows LDAP can be exploited remotely to execute arbitrary code.
  41. An elevation of privilege vulnerability in Windows File Explorer can be exploited remotely to gain privileges.
  42. An information disclosure vulnerability in Microsoft Local Security Authority (LSA) Server can be exploited remotely to obtain sensitive information.
  43. An elevation of privilege vulnerability in Local Security Authority (LSA) can be exploited remotely to gain privileges.
  44. An elevation of privilege vulnerability in Windows Work Folder Service can be exploited remotely to gain privileges.
  45. An elevation of privilege vulnerability in Windows DWM Core Library can be exploited remotely to gain privileges.
  46. An elevation of privilege vulnerability in Windows Kerberos can be exploited remotely to gain privileges.
  47. An elevation of privilege vulnerability in Windows Digital Media Receiver can be exploited remotely to gain privileges.
  48. An elevation of privilege vulnerability in Windows ALPC can be exploited remotely to gain privileges.
  49. A remote code execution vulnerability in Windows Direct Show can be exploited remotely to execute arbitrary code.
  50. An information disclosure vulnerability in Windows DNS Server can be exploited remotely to obtain sensitive information.
  51. An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
  52. An elevation of privilege vulnerability in Windows Telephony Server can be exploited remotely to gain privileges.
Эксплуатация

The following public exploits exists for this vulnerability:

https://github.com/Evelinjohn32/Cve-2022-26809

https://github.com/kevinsmith96/Cve-2022-26809

https://github.com/michealadams30/Cve-2022-26809

https://github.com/dianaross20/Cve-2022-26809

https://github.com/Mileyadams26/Cve-2022-26809

https://github.com/robotMD5/CVE-2022-24481-POC

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Пораженные продукты

Windows 10 Version 20H2 for x64-based Systems
Windows 10 for 32-bit Systems
Windows Server 2012 R2
Windows Server 2012 (Server Core installation)
Windows 10 Version 21H1 for 32-bit Systems
Windows 10 Version 1909 for x64-based Systems
Windows Server 2016
Windows RT 8.1
Windows 10 Version 1809 for ARM64-based Systems
Windows Server 2022 (Server Core installation)
Windows 10 Version 1809 for x64-based Systems
Windows Server 2016 (Server Core installation)
Windows Server 2019
Windows 10 Version 21H2 for ARM64-based Systems
Windows Server 2019 (Server Core installation)
Windows 11 for x64-based Systems
Windows 10 Version 21H1 for x64-based Systems
Windows 10 Version 1607 for x64-based Systems
Windows 8.1 for 32-bit systems
Windows 8.1 for x64-based systems
Windows Server 2022
Windows 11 for ARM64-based Systems
Windows 10 for x64-based Systems
Windows 10 Version 21H1 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 10 Version 1909 for 32-bit Systems
Windows 10 Version 21H2 for x64-based Systems
Windows Server 2012
Windows 10 Version 20H2 for ARM64-based Systems
Windows Server, version 20H2 (Server Core Installation)
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 20H2 for 32-bit Systems
Windows 10 Version 1607 for 32-bit Systems
Windows Server 2012 R2 (Server Core installation)
Windows 10 Version 1909 for ARM64-based Systems
Windows Upgrade Assistant
HEVC Video Extension
HEVC Video Extensions

Решение

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Первичный источник обнаружения
CVE-2022-26917
CVE-2022-26803
CVE-2022-26788
CVE-2022-26791
CVE-2022-26789
CVE-2022-26825
CVE-2022-26822
CVE-2022-26802
CVE-2022-26795
CVE-2022-26920
CVE-2022-26813
CVE-2022-26801
CVE-2022-26796
CVE-2022-26916
CVE-2022-26812
CVE-2022-26793
CVE-2022-26821
CVE-2022-24549
CVE-2022-26915
CVE-2022-26831
CVE-2022-26828
CVE-2022-26810
CVE-2022-26792
CVE-2022-26786
CVE-2022-26918
CVE-2022-26904
CVE-2022-26819
CVE-2022-26826
CVE-2022-26809
CVE-2022-26919
CVE-2022-26808
CVE-2022-26798
CVE-2022-26807
CVE-2022-26824
CVE-2022-26787
CVE-2022-26797
CVE-2022-26827
CVE-2022-26823
CVE-2022-26790
CVE-2022-26794
CVE-2022-26811
CVE-2022-26820
CVE-2022-24479
CVE-2022-23257
CVE-2022-26784
CVE-2022-24539
CVE-2022-24485
CVE-2022-24489
CVE-2022-24498
CVE-2022-24536
CVE-2022-24533
CVE-2022-26903
CVE-2022-24538
CVE-2022-24521
CVE-2022-24500
CVE-2022-24541
CVE-2022-24545
CVE-2022-24491
CVE-2022-23268
CVE-2022-26818
CVE-2022-24543
CVE-2022-21983
CVE-2022-24537
CVE-2022-26829
CVE-2022-22008
CVE-2022-24534
CVE-2022-24499
CVE-2022-24542
CVE-2022-24528
CVE-2022-24487
CVE-2022-26830
CVE-2022-24490
CVE-2022-24488
CVE-2022-26815
CVE-2022-24494
CVE-2022-24483
CVE-2022-24484
CVE-2022-26814
CVE-2022-24532
CVE-2022-24492
CVE-2022-22009
CVE-2022-24493
CVE-2022-24496
CVE-2022-26785
CVE-2022-26783
CVE-2022-24530
CVE-2022-26817
CVE-2022-24481
CVE-2022-24474
CVE-2022-24546
CVE-2022-24486
CVE-2022-24547
CVE-2022-24544
CVE-2022-24540
CVE-2022-24495
CVE-2022-26816
CVE-2022-26914
CVE-2022-24550
Оказываемое влияние
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

PE 
[?]
Связанные продукты
Microsoft Windows
Microsoft Windows Server
Microsoft Windows Server 2012
Microsoft Windows 8
Windows RT
Microsoft Windows 10
Microsoft Windows Server 2016
Microsoft Windows Server 2019
CVE-IDS
CVE-2022-244794.6Warning
CVE-2022-232574.6Warning
CVE-2022-267844.0Warning
CVE-2022-269175.1High
CVE-2022-245396.8High
CVE-2022-268037.2High
CVE-2022-267884.6Warning
CVE-2022-267914.6Warning
CVE-2022-244855.1High
CVE-2022-267894.6Warning
CVE-2022-268259.0Critical
CVE-2022-268228.5Critical
CVE-2022-268024.6Warning
CVE-2022-244894.6Warning
CVE-2022-244984.0Warning
CVE-2022-267954.6Warning
CVE-2022-269204.9Warning
CVE-2022-245369.0Critical
CVE-2022-268139.0Critical
CVE-2022-245338.5Critical
CVE-2022-269039.3Critical
CVE-2022-245384.0Warning
CVE-2022-268014.6Warning
CVE-2022-245214.6Warning
CVE-2022-245006.8High
CVE-2022-245419.3Critical
CVE-2022-267964.6Warning
CVE-2022-245455.1High
CVE-2022-269165.1High
CVE-2022-268129.0Critical
CVE-2022-267934.6Warning
CVE-2022-244917.5Critical
CVE-2022-232682.1Warning
CVE-2022-268218.5Critical
CVE-2022-245494.6Warning
CVE-2022-268188.5Critical
CVE-2022-245436.8High
CVE-2022-219835.1High
CVE-2022-245376.9High
CVE-2022-269155.0Critical
CVE-2022-268298.5Critical
CVE-2022-220086.9High
CVE-2022-245345.1High
CVE-2022-244994.6Warning
CVE-2022-268315.0Critical
CVE-2022-245424.6Warning
CVE-2022-245286.8High
CVE-2022-268284.4Warning
CVE-2022-268104.6Warning
CVE-2022-244877.5Critical
CVE-2022-267924.6Warning
CVE-2022-268305.1High
CVE-2022-267864.6Warning
CVE-2022-244906.8High
CVE-2022-269185.1High
CVE-2022-244884.6Warning
CVE-2022-268159.0Critical
CVE-2022-244944.6Warning
CVE-2022-244834.9Warning
CVE-2022-244842.1Warning
CVE-2022-268148.5Critical
CVE-2022-245329.3Critical
CVE-2022-269044.4Warning
CVE-2022-268198.5Critical
CVE-2022-268269.0Critical
CVE-2022-244929.3Critical
CVE-2022-220094.4Warning
CVE-2022-269199.3Critical
CVE-2022-268084.4Warning
CVE-2022-244934.9Warning
CVE-2022-244964.6Warning
CVE-2022-267854.0Warning
CVE-2022-267987.2High
CVE-2022-268074.4Warning
CVE-2022-267836.8High
CVE-2022-268249.0Critical
CVE-2022-245304.6Warning
CVE-2022-267874.6Warning
CVE-2022-268178.5Critical
CVE-2022-267974.6Warning
CVE-2022-244814.6Warning
CVE-2022-244744.6Warning
CVE-2022-245464.6Warning
CVE-2022-244864.6Warning
CVE-2022-268276.9High
CVE-2022-245474.6Warning
CVE-2022-245444.6Warning
CVE-2022-268239.0Critical
CVE-2022-245404.4Warning
CVE-2022-244956.0High
CVE-2022-268164.0Warning
CVE-2022-267904.6Warning
CVE-2022-269144.6Warning
CVE-2022-245507.2High
CVE-2022-267944.6Warning
CVE-2022-268119.0Critical
CVE-2022-268208.5Critical
KB list

5012653
5012647
5012599
5012596
5012666
5012639
5012592
5012604
5012591
5012650
5012670
5023706