Lucene search

K
kasperskyKaspersky LabKLA12569
HistoryJun 14, 2022 - 12:00 a.m.

KLA12569 Multiple vulnerabilities in Microsoft Windows

2022-06-1400:00:00
Kaspersky Lab
threats.kaspersky.com
169

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.8 High

AI Score

Confidence

High

0.849 High

EPSS

Percentile

98.5%

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to cause denial of service, obtain sensitive information, gain privileges, execute arbitrary code, bypass security restrictions, spoof user interface.

Below is a complete list of vulnerabilities:

  1. A denial of service vulnerability in Windows Network Address Translation (NAT) can be exploited remotely to cause denial of service.
  2. Information disclosure vulnerability in microarchitectural fill buffers on some Intel Processors can be exploited to obtain sensitive information.
  3. An elevation of privilege vulnerability in Windows Advanced Local Procedure Call can be exploited remotely to gain privileges.
  4. Information disclosure vulnerability in multi-core shared buffers for some Intel Processors can be exploited to obtain sensitive information.
  5. Information disclosure vulnerability in specific special register write operations for some Intel Processors can be exploited to obtain sensitive information.
  6. A remote code execution vulnerability in Windows Lightweight Directory Access Protocol (LDAP) can be exploited remotely to execute arbitrary code.
  7. An elevation of privilege vulnerability in Windows Ancillary Function Driver for WinSock can be exploited remotely to gain privileges.
  8. A remote code execution vulnerability in Windows File History can be exploited remotely to execute arbitrary code.
  9. Information disclosure vulnerability in specific special register read operations for some Intel Processors can be exploited to obtain sensitive information.
  10. An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
  11. An elevation of privilege vulnerability in Local Security Authority Subsystem Service can be exploited remotely to gain privileges.
  12. A remote code execution vulnerability in Windows Hyper-V can be exploited remotely to execute arbitrary code.
  13. A denial of service vulnerability in Windows Kernel can be exploited remotely to cause denial of service.
  14. An elevation of privilege vulnerability in Windows Media Center can be exploited remotely to gain privileges.
  15. A remote code execution vulnerability in Windows iSCSI Discovery Service can be exploited remotely to execute arbitrary code.
  16. A remote code execution vulnerability in HEVC Video Extensions can be exploited remotely to execute arbitrary code.
  17. An elevation of privilege vulnerability in Windows Container Isolation FS Filter Driver can be exploited remotely to gain privileges.
  18. An information disclosure vulnerability in Windows Kernel can be exploited remotely to obtain sensitive information.
  19. An elevation of privilege vulnerability in Windows Defender Remote Credential Guard can be exploited remotely to gain privileges.
  20. A remote code execution vulnerability in Windows Network File System can be exploited remotely to execute arbitrary code.
  21. A denial of service vulnerability in Windows SMB can be exploited remotely to cause denial of service.
  22. An elevation of privilege vulnerability in Windows Kerberos can be exploited remotely to gain privileges.
  23. An elevation of privilege vulnerability in Microsoft File Server Shadow Copy Agent Service (RVSS) can be exploited remotely to gain privileges.
  24. A security feature bypass vulnerability in Kerberos AppContainer can be exploited remotely to bypass security restrictions.
  25. An information disclosure vulnerability in Windows Desired State Configuration (DSC) can be exploited remotely to obtain sensitive information.
  26. A remote code execution vulnerability in AV1 Video Extension can be exploited remotely to execute arbitrary code.
  27. An elevation of privilege vulnerability in Windows Container Manager Service can be exploited remotely to gain privileges.
  28. A spoofing vulnerability in Windows Autopilot Device Management and Enrollment Client can be exploited remotely to spoof user interface.
  29. A remote code execution vulnerability in Windows Encrypting File System (EFS) can be exploited remotely to execute arbitrary code.

Original advisories

CVE-2022-30152

CVE-2022-22018

CVE-2022-21125

CVE-2022-21123

CVE-2022-30131

CVE-2022-30162

CVE-2022-30150

CVE-2022-30151

CVE-2022-30136

CVE-2022-32230

CVE-2022-30165

CVE-2022-30154

CVE-2022-30164

CVE-2022-30163

CVE-2022-30155

CVE-2022-29119

CVE-2022-30135

CVE-2022-29111

CVE-2022-30153

CVE-2022-30140

CVE-2022-30160

CVE-2022-30148

CVE-2022-30167

CVE-2022-30132

CVE-2022-21166

CVE-2022-30149

CVE-2022-30139

CVE-2022-30142

CVE-2022-30161

CVE-2022-30146

CVE-2022-21127

CVE-2022-30193

CVE-2022-30147

CVE-2022-30166

CVE-2022-30189

CVE-2022-30145

CVE-2022-30141

CVE-2022-30188

CVE-2022-30143

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

Microsoft-Windows

Microsoft-Windows-Server

Microsoft-Windows-Server-2012

Microsoft-Windows-8

Windows-RT

Microsoft-Windows-10

Microsoft-Windows-Server-2016

Microsoft-Windows-Server-2019

Microsoft-Windows-11

CVE list

CVE-2022-30152 critical

CVE-2022-21125 high

CVE-2022-30160 critical

CVE-2022-21123 high

CVE-2022-21166 high

CVE-2022-30149 critical

CVE-2022-30151 high

CVE-2022-30142 critical

CVE-2022-30161 critical

CVE-2022-30146 critical

CVE-2022-21127 high

CVE-2022-30147 critical

CVE-2022-30166 critical

CVE-2022-30141 critical

CVE-2022-30163 critical

CVE-2022-30155 high

CVE-2022-30135 critical

CVE-2022-30153 critical

CVE-2022-30143 critical

CVE-2022-30140 critical

CVE-2022-22018 critical

CVE-2022-30131 critical

CVE-2022-30162 high

CVE-2022-30150 critical

CVE-2022-30136 critical

CVE-2022-32230 critical

CVE-2022-30165 critical

CVE-2022-30154 high

CVE-2022-30164 critical

CVE-2022-29119 critical

CVE-2022-29111 critical

CVE-2022-30148 high

CVE-2022-30167 critical

CVE-2022-30132 critical

CVE-2022-30139 critical

CVE-2022-30193 critical

CVE-2022-30189 high

CVE-2022-30145 critical

CVE-2022-30188 critical

KB list

5013942

5013941

5013943

5013945

5014702

5014699

5014692

5014710

5014747

5014678

5014738

5014741

5014697

5014746

5014677

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

Affected Products

  • Windows Server 2016 (Server Core installation)Windows 10 Version 21H1 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 8.1 for 32-bit systemsWindows Server 2022 Azure Edition Core HotpatchWindows 10 Version 21H1 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows Server, version 20H2 (Server Core Installation)AV1 Video ExtensionWindows 11 for ARM64-based SystemsWindows RT 8.1Windows Server 2019Windows Server 2012HEVC Video ExtensionWindows 10 Version 21H1 for ARM64-based SystemsWindows 11 for x64-based SystemsWindows Server 2022HEVC Video ExtensionsWindows 8.1 for x64-based systemsWindows Server 2012 R2 (Server Core installation)Windows 10 Version 1607 for 32-bit SystemsWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 20H2 for 32-bit SystemsWindows Server 2019 (Server Core installation)Windows 10 Version 21H2 for 32-bit SystemsWindows 10 Version 1809 for 32-bit SystemsWindows 10 Version 21H2 for ARM64-based SystemsWindows 10 Version 20H2 for x64-based SystemsWindows Server 2012 (Server Core installation)Windows Server 2012 R2Windows 10 Version 20H2 for ARM64-based SystemsWindows Server 2022 (Server Core installation)Windows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 1809 for x64-based Systems

References

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.8 High

AI Score

Confidence

High

0.849 High

EPSS

Percentile

98.5%