8.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:S/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
10 High
AI Score
Confidence
High
0.702 High
EPSS
Percentile
98.0%
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, bypass security restrictions, obtain sensitive information, cause denial of service, spoof user interface.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2022-30206 high
CVE-2022-30222 critical
CVE-2022-30203 high
CVE-2022-23825 unknown
CVE-2022-22023 high
CVE-2022-30221 high
CVE-2022-30211 high
CVE-2022-30214 high
CVE-2022-30212 warning
CVE-2022-30202 high
CVE-2022-22037 high
CVE-2022-27776 high
CVE-2022-22031 critical
CVE-2022-33644 high
CVE-2022-22048 high
CVE-2022-22036 high
CVE-2022-22028 high
CVE-2022-30205 high
CVE-2022-22047 high
CVE-2022-30225 high
CVE-2022-30216 critical
CVE-2022-21845 warning
CVE-2022-22042 high
CVE-2022-30220 high
CVE-2022-22039 high
CVE-2022-22038 high
CVE-2022-22049 high
CVE-2022-30223 high
CVE-2022-22026 high
CVE-2022-30209 high
CVE-2022-22711 high
CVE-2022-22040 high
CVE-2022-22050 high
CVE-2022-22025 high
CVE-2022-22043 high
CVE-2022-30224 high
CVE-2022-22024 high
CVE-2022-22034 high
CVE-2022-30226 high
CVE-2022-22041 high
CVE-2022-22022 high
CVE-2022-30208 high
CVE-2022-30215 critical
CVE-2022-22045 critical
CVE-2022-30213 high
CVE-2022-22027 high
CVE-2022-22029 high
CVE-2022-29900 unknown
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/5015807
support.microsoft.com/kb/5015808
support.microsoft.com/kb/5015811
support.microsoft.com/kb/5015814
support.microsoft.com/kb/5015827
support.microsoft.com/kb/5015832
support.microsoft.com/kb/5015874
support.microsoft.com/kb/5015877
support.microsoft.com/kb/5023696
support.microsoft.com/kb/5023697
support.microsoft.com/kb/5023698
support.microsoft.com/kb/5023702
support.microsoft.com/kb/5023713
support.microsoft.com/kb/5026361
support.microsoft.com/kb/5026368
support.microsoft.com/kb/5026370
support.microsoft.com/kb/5026456
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21845
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22022
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22023
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22024
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22025
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22026
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22027
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22028
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22029
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22031
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22034
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22036
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22037
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22038
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22039
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22040
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22041
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22042
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22043
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22045
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22047
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22048
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22049
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22050
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22711
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23825
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-27776
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29900
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30202
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30203
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30205
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30206
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30208
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30209
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30211
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30212
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30213
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30214
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30215
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30216
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30220
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30221
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30222
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30223
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30224
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30225
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30226
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33644
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Remote-Desktop/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-11/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2016/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2019/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
8.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:S/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
10 High
AI Score
Confidence
High
0.702 High
EPSS
Percentile
98.0%