Lucene search

K
kasperskyKaspersky LabKLA20117
HistoryDec 13, 2022 - 12:00 a.m.

KLA20117 Multiple vulnerabilities in Microsoft Windows

2022-12-1300:00:00
Kaspersky Lab
threats.kaspersky.com
157
microsoft windows
vulnerabilities
privilege gain
security bypass
arbitrary code
sensitive information
denial of service

8.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

0.023 Low

EPSS

Percentile

89.7%

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, bypass security restrictions, execute arbitrary code, obtain sensitive information, cause denial of service.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability in Windows Error Reporting can be exploited remotely to gain privileges.
  2. A security feature bypass vulnerability in Windows SmartScreen can be exploited remotely to bypass security restrictions.
  3. A remote code execution vulnerability in Windows Media can be exploited remotely to execute arbitrary code.
  4. An elevation of privilege vulnerability in Windows Subsystem for Linux (WSL2) Kernel can be exploited remotely to gain privileges.
  5. An elevation of privilege vulnerability in Windows Projected File System can be exploited remotely to gain privileges.
  6. An information disclosure vulnerability in Windows Bluetooth Driver can be exploited remotely to obtain sensitive information.
  7. An elevation of privilege vulnerability in Windows Graphics Component can be exploited remotely to gain privileges.
  8. An elevation of privilege vulnerability in Windows Hyper-V can be exploited remotely to gain privileges.
  9. An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
  10. A remote code execution vulnerability in PowerShell can be exploited remotely to execute arbitrary code.
  11. A remote code execution vulnerability in Windows Secure Socket Tunneling Protocol (SSTP) can be exploited remotely to execute arbitrary code.
  12. An elevation of privilege vulnerability in DirectX Graphics Kernel can be exploited remotely to gain privileges.
  13. An elevation of privilege vulnerability in Windows Print Spooler can be exploited remotely to gain privileges.
  14. A denial of service vulnerability in Windows Hyper-V can be exploited remotely to cause denial of service.
  15. An elevation of privilege vulnerability in Windows Graphics Component can be exploited remotely to cause denial of service.
  16. A remote code execution vulnerability in Raw Image Extension can be exploited remotely to execute arbitrary code.
  17. A remote code execution vulnerability in Windows Contacts can be exploited remotely to execute arbitrary code.
  18. A denial of service vulnerability in Windows Kernel can be exploited remotely to cause denial of service.
  19. An elevation of privilege vulnerability in Windows Fax Compose Form can be exploited remotely to gain privileges.
  20. An elevation of privilege vulnerability in Windows Client Server Run-Time Subsystem (CSRSS) can be exploited remotely to gain privileges.
  21. An elevation of privilege vulnerability in Windows Bluetooth Driver can be exploited remotely to gain privileges.
  22. An information disclosure vulnerability in Windows Graphics Component can be exploited remotely to obtain sensitive information.
  23. A denial of service vulnerability in Windows Local Session Manager (LSM) can be exploited remotely to cause denial of service.

Original advisories

CVE-2022-44669

CVE-2022-44698

CVE-2022-44668

CVE-2022-44689

CVE-2022-44677

CVE-2022-44674

CVE-2022-41121

CVE-2022-41094

CVE-2022-44683

CVE-2022-41076

CVE-2022-44676

CVE-2022-44667

CVE-2022-44710

CVE-2022-44678

CVE-2022-44682

CVE-2022-44681

CVE-2022-44697

CVE-2022-44671

CVE-2022-44687

CVE-2022-44670

CVE-2022-44666

CVE-2022-44707

CVE-2022-41077

CVE-2022-44673

CVE-2022-44675

CVE-2022-44679

CVE-2022-41074

CVE-2022-44680

ADV220005

CVE-2022-44684

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

Microsoft-Windows

Microsoft-Windows-Server

Microsoft-Windows-Server-2012

Microsoft-Windows-8

Windows-RT

Microsoft-Windows-10

Microsoft-Azure

Microsoft-Windows-Server-2016

Microsoft-Windows-Server-2019

Microsoft-Windows-11

CVE list

CVE-2022-44669 high

CVE-2022-44698 high

CVE-2022-44668 critical

CVE-2022-44689 critical

CVE-2022-44677 critical

CVE-2022-44674 high

CVE-2022-41121 critical

CVE-2022-41094 critical

CVE-2022-44683 critical

CVE-2022-41076 critical

CVE-2022-44676 critical

CVE-2022-44667 critical

CVE-2022-44710 critical

CVE-2022-44678 critical

CVE-2022-44682 high

CVE-2022-44681 critical

CVE-2022-44697 critical

CVE-2022-44671 critical

CVE-2022-44687 critical

CVE-2022-44670 critical

CVE-2022-44666 critical

CVE-2022-44707 high

CVE-2022-41077 critical

CVE-2022-44673 high

CVE-2022-44675 critical

CVE-2022-44679 high

CVE-2022-41074 high

CVE-2022-44680 critical ADV220005 unknown

CVE-2022-44684 high

KB list

5021243

5021234

5021233

5021235

5021294

5021237

5021296

5021249

5021255

5022287

5022291

5022286

5022297

5022352

5022303

5022346

5022289

5022282

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

Affected Products

  • Windows 10 Version 1607 for x64-based SystemsWindows Server 2022Windows 10 for 32-bit SystemsWindows Server 2019 (Server Core installation)Windows 10 for x64-based SystemsWindows 10 Version 22H2 for x64-based SystemsWindows 11 for ARM64-based SystemsWindows 8.1 for 32-bit systemsWindows 10 Version 1809 for x64-based SystemsWindows Server 2019Windows 11 for x64-based SystemsWindows 10 Version 21H2 for 32-bit SystemsWindows Server 2022 Datacenter: Azure EditionWindows Server 2012 (Server Core installation)Windows 10 Version 21H1 for ARM64-based SystemsWindows 11 Version 22H2 for x64-based SystemsWindows 10 Version 20H2 for x64-based SystemsWindows 10 Version 21H1 for x64-based SystemsWindows Server 2022 (Server Core installation)Windows 11 Version 22H2 for ARM64-based SystemsWindows 10 Version 20H2 for ARM64-based SystemsWindows 10 Version 22H2 for 32-bit SystemsWindows Server 2012Windows Server 2016Windows 10 Version 21H2 for ARM64-based SystemsWindows Server 2012 R2Remote Desktop client for Windows DesktopWindows 10 Version 1607 for 32-bit SystemsWindows Server 2016 (Server Core installation)Windows 10 Version 1809 for 32-bit SystemsWindows 10 Version 21H1 for 32-bit SystemsWindows RT 8.1Windows 8.1 for x64-based systemsWindows 10 Version 1809 for ARM64-based SystemsRaw Image ExtensionWindows 10 Version 21H2 for x64-based SystemsWindows 10 Version 22H2 for ARM64-based SystemsWindows Server 2012 R2 (Server Core installation)Windows 10 Version 20H2 for 32-bit Systems

References

8.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

0.023 Low

EPSS

Percentile

89.7%