Lucene search

K
vulnrichmentMicrosoftVULNRICHMENT:CVE-2022-41044
HistoryNov 09, 2022 - 12:00 a.m.

CVE-2022-41044 Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability

2022-11-0900:00:00
microsoft
github.com
6
cve-2022-41044
windows
point-to-point tunneling protocol
remote code execution

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

AI Score

6.8

Confidence

Low

EPSS

0.005

Percentile

77.6%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

CNA Affected

[
  {
    "cpes": [
      "cpe:2.3:o:microsoft:windows_7:6.1.7601.26221:sp1:*:*:*:*:x86:*"
    ],
    "vendor": "Microsoft",
    "product": "Windows 7",
    "versions": [
      {
        "status": "affected",
        "version": "6.1.0",
        "lessThan": "6.1.7601.26221",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "32-bit Systems"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:o:microsoft:windows_7:6.1.7601.26221:sp1:*:*:*:*:x64:*"
    ],
    "vendor": "Microsoft",
    "product": "Windows 7 Service Pack 1",
    "versions": [
      {
        "status": "affected",
        "version": "6.1.0",
        "lessThan": "6.1.7601.26221",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "x64-based Systems"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21768:*:*:*:*:*:x64:*"
    ],
    "vendor": "Microsoft",
    "product": "Windows Server 2008 Service Pack 2",
    "versions": [
      {
        "status": "affected",
        "version": "6.0.0",
        "lessThan": "6.0.6003.21768",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "32-bit Systems"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21768:*:*:*:*:*:x64:*",
      "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21768:*:*:*:*:*:x86:*"
    ],
    "vendor": "Microsoft",
    "product": "Windows Server 2008 Service Pack 2 (Server Core installation)",
    "versions": [
      {
        "status": "affected",
        "version": "6.0.0",
        "lessThan": "6.0.6003.21768",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "32-bit Systems",
      "x64-based Systems"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21768:*:*:*:*:*:x86:*"
    ],
    "vendor": "Microsoft",
    "product": "Windows Server 2008  Service Pack 2",
    "versions": [
      {
        "status": "affected",
        "version": "6.0.0",
        "lessThan": "6.0.6003.21768",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "x64-based Systems"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.26221:*:*:*:*:*:x64:*"
    ],
    "vendor": "Microsoft",
    "product": "Windows Server 2008 R2 Service Pack 1",
    "versions": [
      {
        "status": "affected",
        "version": "6.1.0",
        "lessThan": "6.1.7601.26221",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "x64-based Systems"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.26221:*:*:*:*:*:x64:*"
    ],
    "vendor": "Microsoft",
    "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)",
    "versions": [
      {
        "status": "affected",
        "version": "6.0.0",
        "lessThan": "6.1.7601.26221",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "x64-based Systems"
    ]
  }
]

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

AI Score

6.8

Confidence

Low

EPSS

0.005

Percentile

77.6%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total