KLA20000
Multiple vulnerabilities in Microsoft Windows

Обновлено: 13/05/2023
Дата обнаружения
11/10/2022
Уровень угрозы
Critical
Описание

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, spoof user interface, obtain sensitive information, cause denial of service, execute arbitrary code, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability in Windows ALPC can be exploited remotely to gain privileges.
  2. A spoofing vulnerability in Windows CryptoAPI can be exploited remotely to spoof user interface.
  3. An information disclosure vulnerability in Windows Graphics Component can be exploited remotely to obtain sensitive information.
  4. An elevation of privilege vulnerability in Windows Group Policy can be exploited remotely to gain privileges.
  5. An information disclosure vulnerability in Windows Kernel Memory can be exploited remotely to obtain sensitive information.
  6. An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
  7. A denial of service vulnerability in Windows Point-to-Point Tunneling Protocol can be exploited remotely to cause denial of service.
  8. An elevation of privilege vulnerability in Microsoft DWM Core Library can be exploited remotely to gain privileges.
  9. An elevation of privilege vulnerability in Active Directory Domain Services can be exploited remotely to gain privileges.
  10. An elevation of privilege vulnerability in Windows WLAN Service can be exploited remotely to gain privileges.
  11. A denial of service vulnerability in Windows Event Logging Service can be exploited remotely to cause denial of service.
  12. A remote code execution vulnerability in Windows Point-to-Point Tunneling Protocol can be exploited remotely to execute arbitrary code.
  13. An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
  14. An information disclosure vulnerability in Web Account Manager can be exploited remotely to obtain sensitive information.
  15. An elevation of privilege vulnerability in Windows Resilient File System can be exploited remotely to gain privileges.
  16. An elevation of privilege vulnerability in Windows Hyper-V can be exploited remotely to gain privileges.
  17. A denial of service vulnerability in Windows Local Session Manager (LSM) can be exploited remotely to cause denial of service.
  18. An elevation of privilege vulnerability in Windows Group Policy Preference Client can be exploited remotely to gain privileges.
  19. A denial of service vulnerability in Windows Secure Channel can be exploited remotely to cause denial of service.
  20. An information disclosure vulnerability in Windows USB Serial Driver can be exploited remotely to obtain sensitive information.
  21. An elevation of privilege vulnerability in Windows Storage can be exploited remotely to gain privileges.
  22. A denial of service vulnerability in Windows TCP/IP Driver can be exploited remotely to cause denial of service.
  23. An elevation of privilege vulnerability in Windows Workstation Service can be exploited remotely to gain privileges.
  24. A denial of service vulnerability in Local Security Authority Subsystem Service (LSASS) can be exploited remotely to cause denial of service.
  25. An information disclosure vulnerability in Windows Server Remotely Accessible Registry Keys can be exploited remotely to obtain sensitive information.
  26. An elevation of privilege vulnerability in Windows Print Spooler can be exploited remotely to gain privileges.
  27. An elevation of privilege vulnerability in Windows Client Server Run-time Subsystem (CSRSS) can be exploited remotely to gain privileges.
  28. A security feature bypass vulnerability in Windows Active Directory Certificate Services can be exploited remotely to bypass security restrictions.
  29. An elevation of privilege vulnerability in Windows COM+ Event System Service can be exploited remotely to gain privileges.
  30. An information disclosure vulnerability in Windows Mixed Reality Developer Tools can be exploited remotely to obtain sensitive information.
  31. An elevation of privilege vulnerability in Connected User Experiences and Telemetry can be exploited remotely to gain privileges.
  32. A security feature bypass vulnerability in Windows Portable Device Enumerator Service can be exploited remotely to bypass security restrictions.
  33. An elevation of privilege vulnerability in Server Service Remote Protocol can be exploited remotely to gain privileges.
  34. An elevation of privilege vulnerability in Windows Graphics Component can be exploited remotely to gain privileges.
  35. An elevation of privilege vulnerability in Active Directory Certificate Services can be exploited remotely to gain privileges.
  36. A remote code execution vulnerability in Windows CD-ROM File System Driver can be exploited remotely to execute arbitrary code.
  37. A remote code execution vulnerability in Microsoft ODBC Driver can be exploited remotely to execute arbitrary code.
  38. An elevation of privilege vulnerability in Windows DWM Core Library can be exploited remotely to gain privileges.
  39. A remote code execution vulnerability in Microsoft WDAC OLE DB provider for SQL Server can be exploited remotely to execute arbitrary code.
  40. An information disclosure vulnerability in Windows Distributed File System (DFS) can be exploited remotely to obtain sensitive information.
  41. An elevation of privilege vulnerability in Windows Local Security Authority (LSA) can be exploited remotely to gain privileges.
  42. A remote code execution vulnerability in Windows GDI+ can be exploited remotely to execute arbitrary code.
  43. An elevation of privilege vulnerability in Windows DHCP Client can be exploited remotely to gain privileges.
  44. An information disclosure vulnerability in Windows Security Support Provider Interface can be exploited remotely to obtain sensitive information.
  45. An information disclosure vulnerability in Windows DHCP Client can be exploited remotely to obtain sensitive information.
  46. An elevation of privilege vulnerability in Windows Win32k can be exploited remotely to gain privileges.
  47. A denial of service vulnerability in Internet Key Exchange (IKE) Protocol can be exploited remotely to cause denial of service.
  48. A spoofing vulnerability in Windows NTLM can be exploited remotely to spoof user interface.
Эксплуатация

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Пораженные продукты

Windows Server 2012
Windows 8.1 for 32-bit systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows Server 2019 (Server Core installation)
Windows 10 Version 21H1 for ARM64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 10 Version 21H1 for x64-based Systems
Windows Server 2019
Windows 10 Version 21H2 for 32-bit Systems
Windows Server 2012 R2 (Server Core installation)
Windows Server 2016 (Server Core installation)
Windows Server 2022
Windows Server 2022 (Server Core installation)
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 for x64-based Systems
Windows Server 2012 R2
Windows 11 for ARM64-based Systems
Windows 10 Version 20H2 for ARM64-based Systems
Windows 10 Version 21H1 for 32-bit Systems
Windows RT 8.1
Windows 10 Version 20H2 for 32-bit Systems
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 20H2 for x64-based Systems
Windows Server 2012 (Server Core installation)
Windows 11 for x64-based Systems
Windows 10 for 32-bit Systems
Windows 8.1 for x64-based systems
Windows 11 Version 22H2 for x64-based Systems

Решение

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Первичный источник обнаружения
CVE-2022-38029
CVE-2022-34689
CVE-2022-37985
CVE-2022-37975
CVE-2022-37996
CVE-2022-38050
CVE-2022-37965
CVE-2022-37983
CVE-2022-38042
CVE-2022-37984
CVE-2022-37981
CVE-2022-24504
CVE-2022-33634
CVE-2022-37990
CVE-2022-38046
CVE-2022-38003
CVE-2022-38038
CVE-2022-37979
CVE-2022-37998
CVE-2022-37991
CVE-2022-37993
CVE-2022-38041
CVE-2022-38030
CVE-2022-38027
CVE-2022-33645
CVE-2022-38034
CVE-2022-37977
CVE-2022-38033
CVE-2022-38037
CVE-2022-38028
CVE-2022-38000
CVE-2022-37989
CVE-2022-37978
CVE-2022-41033
CVE-2022-37994
CVE-2022-37974
CVE-2022-38021
CVE-2022-37999
CVE-2022-37973
CVE-2022-38032
CVE-2022-38045
CVE-2022-38051
CVE-2022-37976
CVE-2022-38047
CVE-2022-38044
CVE-2022-38040
CVE-2022-37970
CVE-2022-37982
CVE-2022-38025
CVE-2022-37997
CVE-2022-38016
CVE-2022-33635
CVE-2022-22035
CVE-2022-37980
CVE-2022-38043
CVE-2022-37995
CVE-2022-37988
CVE-2022-38026
CVE-2022-30198
CVE-2022-38022
CVE-2022-37986
CVE-2022-38039
CVE-2022-38036
CVE-2022-41081
CVE-2022-37987
CVE-2022-38031
CVE-2022-35770
Оказываемое влияние
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

SB 
[?]

PE 
[?]

SUI 
[?]
Связанные продукты
Microsoft Windows
Microsoft Windows Server
Microsoft Windows Server 2012
Microsoft Windows 8
Windows RT
Microsoft Windows 10
Microsoft Windows Server 2016
Microsoft Windows Server 2019
Microsoft Windows 11
CVE-IDS
CVE-2022-380295.0Critical
CVE-2022-346895.0Critical
CVE-2022-379855.0Critical
CVE-2022-379755.0Critical
CVE-2022-379965.0Critical
CVE-2022-380505.0Critical
CVE-2022-379655.0Critical
CVE-2022-379835.0Critical
CVE-2022-380425.0Critical
CVE-2022-379845.0Critical
CVE-2022-379815.0Critical
CVE-2022-245045.0Critical
CVE-2022-336345.0Critical
CVE-2022-379905.0Critical
CVE-2022-380465.0Critical
CVE-2022-380035.0Critical
CVE-2022-380385.0Critical
CVE-2022-379795.0Critical
CVE-2022-379985.0Critical
CVE-2022-379915.0Critical
CVE-2022-379935.0Critical
CVE-2022-380415.0Critical
CVE-2022-380305.0Critical
CVE-2022-380275.0Critical
CVE-2022-336455.0Critical
CVE-2022-380345.0Critical
CVE-2022-379775.0Critical
CVE-2022-380335.0Critical
CVE-2022-380375.0Critical
CVE-2022-380285.0Critical
CVE-2022-380005.0Critical
CVE-2022-379895.0Critical
CVE-2022-379785.0Critical
CVE-2022-410335.0Critical
CVE-2022-379945.0Critical
CVE-2022-379745.0Critical
CVE-2022-380215.0Critical
CVE-2022-379995.0Critical
CVE-2022-379735.0Critical
CVE-2022-380325.0Critical
CVE-2022-380455.0Critical
CVE-2022-380515.0Critical
CVE-2022-379765.0Critical
CVE-2022-380475.0Critical
CVE-2022-380445.0Critical
CVE-2022-380405.0Critical
CVE-2022-379705.0Critical
CVE-2022-379825.0Critical
CVE-2022-380255.0Critical
CVE-2022-379975.0Critical
CVE-2022-380165.0Critical
CVE-2022-336355.0Critical
CVE-2022-220355.0Critical
CVE-2022-379805.0Critical
CVE-2022-380435.0Critical
CVE-2022-379955.0Critical
CVE-2022-379885.0Critical
CVE-2022-380265.0Critical
CVE-2022-301985.0Critical
CVE-2022-380225.0Critical
CVE-2022-379865.0Critical
CVE-2022-380395.0Critical
CVE-2022-380365.0Critical
CVE-2022-410815.0Critical
CVE-2022-379875.0Critical
CVE-2022-380315.0Critical
CVE-2022-357705.0Critical
KB list

5016627
5016672
5016622
5016683
5016639
5016616
5016623
5016684
5016681
5016629
5018474
5018478
5018418
5018476
5018427
5018457
5018410
5018425
5018421
5018411
5018419