Lucene search

K
cve[email protected]CVE-2022-26929
HistorySep 13, 2022 - 7:15 p.m.

CVE-2022-26929

2022-09-1319:15:09
web.nvd.nist.gov
80
4
cve-2022-26929
.net
framework
remote code execution
vulnerability
nvd

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.7 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

62.1%

.NET Framework Remote Code Execution Vulnerability

Affected configurations

Vulners
NVD
Node
microsoft.net_frameworkMatch4.8.1
OR
microsoft.net_frameworkMatch4.8.1
OR
microsoft.net_frameworkRange4.8.0.0–4.8.1
OR
microsoft.net_frameworkRange4.8.0.0–4.8.1
OR
microsoft.net_frameworkRange10.0.0–4.6.2
VendorProductVersionCPE
microsoft.net_framework4.8.1cpe:2.3:a:microsoft:.net_framework:4.8.1:*:*:*:*:*:*:*
microsoft.net_framework4.8.1cpe:2.3:a:microsoft:.net_framework:4.8.1:*:*:*:*:*:*:*
microsoft.net_framework*cpe:2.3:a:microsoft:.net_framework:*:*:*:*:*:*:*:*
microsoft.net_framework*cpe:2.3:a:microsoft:.net_framework:*:*:*:*:*:*:*:*
microsoft.net_framework*cpe:2.3:a:microsoft:.net_framework:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Microsoft",
    "product": "Microsoft .NET Framework 3.5 AND 4.8.1",
    "cpes": [
      "cpe:2.3:a:microsoft:.net:4.8.1:*:*:*:*:*:*:*"
    ],
    "platforms": [
      "Windows Server 2022 (Server Core installation)",
      "Windows 11 version 21H2 for x64-based Systems",
      "Windows Server 2022",
      "Windows 11 version 21H2 for ARM64-based Systems"
    ],
    "versions": [
      {
        "version": "4.8.1",
        "lessThan": "3.5.09082.05",
        "versionType": "custom",
        "status": "affected"
      },
      {
        "version": "4.8.1",
        "lessThan": "4.8.1.09082.07",
        "versionType": "custom",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Microsoft",
    "product": "Microsoft .NET Framework 4.8.1",
    "cpes": [
      "cpe:2.3:a:microsoft:.net_framework:4.8.1:*:*:*:*:*:*:*"
    ],
    "platforms": [
      "Windows 10 Version 21H1 for 32-bit Systems",
      "Windows 10 Version 21H1 for x64-based Systems",
      "Windows 10 Version 21H2 for 32-bit Systems",
      "Windows 10 Version 21H2 for ARM64-based Systems",
      "Windows 10 Version 21H1 for ARM64-based Systems",
      "Windows 10 Version 21H2 for x64-based Systems"
    ],
    "versions": [
      {
        "version": "4.8.0.0",
        "lessThan": "4.8.04556.03",
        "versionType": "custom",
        "status": "affected"
      },
      {
        "version": "4.8.0.0",
        "lessThan": "4.8.1.09082.07",
        "versionType": "custom",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Microsoft",
    "product": "Microsoft .NET Framework 3.5 AND 4.6/4.6.2",
    "cpes": [
      "cpe:2.3:a:microsoft:.net:3.5:*:*:*:*:*:*:*"
    ],
    "platforms": [
      "Windows 10 for 32-bit Systems",
      "Windows 10 for x64-based Systems"
    ],
    "versions": [
      {
        "version": "10.0.0",
        "lessThan": "10.0.10240.19444",
        "versionType": "custom",
        "status": "affected"
      }
    ]
  }
]

Social References

More

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.7 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

62.1%