Описание
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to cause denial of service, obtain sensitive information, gain privileges, execute arbitrary code, bypass security restrictions, spoof user interface.
Below is a complete list of vulnerabilities:
- A denial of service vulnerability in Windows Network Address Translation (NAT) can be exploited remotely to cause denial of service.
- Information disclosure vulnerability in microarchitectural fill buffers on some Intel Processors can be exploited to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Advanced Local Procedure Call can be exploited remotely to gain privileges.
- Information disclosure vulnerability in multi-core shared buffers for some Intel Processors can be exploited to obtain sensitive information.
- Information disclosure vulnerability in specific special register write operations for some Intel Processors can be exploited to obtain sensitive information.
- A remote code execution vulnerability in Windows Lightweight Directory Access Protocol (LDAP) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Ancillary Function Driver for WinSock can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows File History can be exploited remotely to execute arbitrary code.
- Information disclosure vulnerability in specific special register read operations for some Intel Processors can be exploited to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Local Security Authority Subsystem Service can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Hyper-V can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows Kernel can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Media Center can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows iSCSI Discovery Service can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in HEVC Video Extensions can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Container Isolation FS Filter Driver can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Defender Remote Credential Guard can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Network File System can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows SMB can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Kerberos can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Microsoft File Server Shadow Copy Agent Service (RVSS) can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in Kerberos AppContainer can be exploited remotely to bypass security restrictions.
- An information disclosure vulnerability in Windows Desired State Configuration (DSC) can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in AV1 Video Extension can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Container Manager Service can be exploited remotely to gain privileges.
- A spoofing vulnerability in Windows Autopilot Device Management and Enrollment Client can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in Windows Encrypting File System (EFS) can be exploited remotely to execute arbitrary code.
Первичный источник обнаружения
- CVE-2022-30152
CVE-2022-22018
CVE-2022-21125
CVE-2022-21123
CVE-2022-30131
CVE-2022-30162
CVE-2022-30150
CVE-2022-30151
CVE-2022-30136
CVE-2022-32230
CVE-2022-30165
CVE-2022-30154
CVE-2022-30164
CVE-2022-30163
CVE-2022-30155
CVE-2022-29119
CVE-2022-30135
CVE-2022-29111
CVE-2022-30153
CVE-2022-30140
CVE-2022-30160
CVE-2022-30148
CVE-2022-30167
CVE-2022-30132
CVE-2022-21166
CVE-2022-30149
CVE-2022-30139
CVE-2022-30142
CVE-2022-30161
CVE-2022-30146
CVE-2022-21127
CVE-2022-30193
CVE-2022-30147
CVE-2022-30166
CVE-2022-30189
CVE-2022-30145
CVE-2022-30141
CVE-2022-30188
CVE-2022-30143
Эксплуатация
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-8
- Windows-RT
- Microsoft-Windows-10
- Microsoft-Windows-Server-2016
- Microsoft-Windows-Server-2019
- Microsoft-Windows-11
Список CVE
- CVE-2022-30152 critical
- CVE-2022-21125 high
- CVE-2022-30160 critical
- CVE-2022-21123 high
- CVE-2022-21166 high
- CVE-2022-30149 critical
- CVE-2022-30151 high
- CVE-2022-30142 critical
- CVE-2022-30161 critical
- CVE-2022-30146 critical
- CVE-2022-21127 high
- CVE-2022-30147 critical
- CVE-2022-30166 critical
- CVE-2022-30141 critical
- CVE-2022-30163 critical
- CVE-2022-30155 high
- CVE-2022-30135 critical
- CVE-2022-30153 critical
- CVE-2022-30143 critical
- CVE-2022-30140 critical
- CVE-2022-22018 critical
- CVE-2022-30131 critical
- CVE-2022-30162 high
- CVE-2022-30150 critical
- CVE-2022-30136 critical
- CVE-2022-32230 critical
- CVE-2022-30165 critical
- CVE-2022-30154 high
- CVE-2022-30164 critical
- CVE-2022-29119 critical
- CVE-2022-29111 critical
- CVE-2022-30148 high
- CVE-2022-30167 critical
- CVE-2022-30132 critical
- CVE-2022-30139 critical
- CVE-2022-30193 critical
- CVE-2022-30189 high
- CVE-2022-30145 critical
- CVE-2022-30188 critical
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!