Report Name: Microsoft Patch Tuesday, August 2022
Generated: 2022-08-19 01:03:52

Vulristics Vulnerability Scores
Basic Vulnerability Scores
Products

Product NamePrevalenceUCHMLComment
Kerberos11Kerberos
Active Directory0.91Active Directory is a directory service developed by Microsoft for Windows domain networks
Windows Kernel0.95Windows Kernel
Windows Win32k0.92Windows kernel-mode driver
Microsoft Edge0.83202Web browser
Microsoft Exchange0.86Exchange
Microsoft Windows Support Diagnostic Tool (MSDT)0.811Windows component
Open Management Infrastructure0.81An open source project to further the development of a production quality implementation of the DMTF CIM/WBEM standards
Windows Bluetooth Driver0.81Windows component
Windows Bluetooth Service0.81Windows component
Windows Cloud Files Mini Filter Driver0.81Windows component
Windows Defender Credential Guard0.815Windows component
Windows Digital Media Receiver0.82Windows component
Windows Error Reporting Service0.81Windows component
Windows Fax Service0.81Windows component
Windows Hello0.81Windows component
Windows Kernel Memory0.81Windows component
Windows Local Security Authority (LSA)0.82Windows component
Windows Network File System0.81Windows component
Windows Partition Management Driver0.82Windows component
Windows Point-to-Point Protocol (PPP)0.831Windows component
Windows Print Spooler0.82Windows component
Windows Secure Socket Tunneling Protocol (SSTP)0.881Windows component
Windows WebBrowser Control0.81Windows component
.NET0.71.NET
Storage Spaces Direct0.75Storage Spaces Direct is a feature of Azure Stack HCI and Windows Server that enables you to cluster servers with internal storage into a software-defined storage solution
Microsoft Excel0.611MS Office product
Microsoft Office0.61Microsoft Office
Microsoft Outlook0.61MS Office product
Windows Hyper-V0.611Hardware virtualization component of the client editions of Windows NT
Azure Arc Jumpstart0.51Azure Arc Jumpstart
Azure Batch Node Agent0.51Azure Batch Node Agent
Azure Site Recovery0.5133Azure Site Recovery
HTTP.sys0.51HTTP.sys
Microsoft ATA Port Driver0.51Microsoft ATA Port Driver
SMB Client and Server0.51SMB Client and Server
Unified Write Filter0.51Unified Write Filter
Azure Sphere0.41Microsoft Azure Sphere is a solution for creating highly-secured, connected, MCU-powered devices
Azure RTOS0.362Azure RTOS is a small, fast, reliable, and easy-to-use real-time operating system (RTOS) for connecting deeply embedded IoT devices
Crypto Pro0.31Crypto Pro
Eurosoft0.31Eurosoft
New Horizon Data Systems Inc0.31New Horizon Data Systems Inc
Visual Studio0.34Integrated development environment


Vulnerability Types

Vulnerability TypeCriticalityUCHMLComment
Remote Code Execution1.01292Remote Code Execution
Security Feature Bypass0.9310Security Feature Bypass
Denial of Service0.725Denial of Service
Memory Corruption0.6112Memory Corruption
Elevation of Privilege0.5164Elevation of Privilege
Information Disclosure0.414Information Disclosure
Spoofing0.41Spoofing
Unknown Vulnerability Type02Unknown Vulnerability Type


Vulnerabilities

Urgent (1)

1. Remote Code Execution - Microsoft Windows Support Diagnostic Tool (MSDT) (CVE-2022-34713) - Urgent [843]

Description: Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-35743.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (cisa_kev object), AttackerKB, Microsoft websites
Public Exploit Exists0.617The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Functional Exploit)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.8. Based on Microsoft data

qualys: Microsoft Patch Tuesday Summary Microsoft has fixed 121 vulnerabilities (aka flaws) in the August 2022 update, including 17 vulnerabilities classified as Critical as they allow Elevation of Privilege (EoP) and Remote Code Execution (RCE). This month’s Patch Tuesday fixes two (2) zero-day vulnerabilities, with one (1) actively exploited* in attacks (CVE-2022-34713*, CVE-2022-30134). Earlier this month, August 5, 2022, Microsoft also released 20 Microsoft Edge (Chromium-Based) updates addressing Elevation of Privilege (EoP), Remote Code Execution (RCE), and Security Feature Bypass with severities of Low, Moderate, and Important respectively. Microsoft has fixed several flaws in its software, including Denial of Service (DoS), Elevation of Privilege (EoP), Information Disclosure, Microsoft Edge (Chromium-based), Remote Code Execution (RCE), Security Feature Bypass, and Spoofing.

qualys: CVE-2022-34713 | Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution (RCE) Vulnerability This vulnerability has a CVSSv3.1 score of 7.8/10. In May, Microsoft released a blog giving guidance for a vulnerability in MSDT and released updates to address it shortly thereafter. Public discussion of a vulnerability can encourage further scrutiny on the component, both by Microsoft security personnel as well as their research partners. This CVE is a variant of the vulnerability publicly known as Dogwalk. Exploitability Assessment: Exploitation Detected

tenable: CVE-2022-34713 and CVE-2022-35743 are RCE vulnerabilities in the Microsoft Windows Support Diagnostic Tool (MSDT) for troubleshooting. Both CVEs received a CVSS score of 7.8 and are rated important.

tenable: CVE-2022-34713 is credited to security researcher Imre Rad, who first disclosed the flaw in January 2020. At the time, Microsoft chose not to patch the flaw. However, following renewed interest in MSDT spurred by the discovery and exploitation of CVE-2022-30190 (aka Follina), Microsoft patched the flaw this month.

tenable: Security researcher j00sean resurfaced Rad’s “related” flaw in MSDT that was dubbed DogWalk, though Microsoft says CVE-2022-34713 is a “variant of” DogWalk that has been exploited in the wild.

rapid7: There is one 0-day being patched this month. CVE-2022-34713 is a remote code execution (RCE) vulnerability affecting the Microsoft Windows Support Diagnostic Tool (MSDT) – it carries a CVSSv3 base score of 7.8, as it requires convincing a potential victim to open a malicious file. The advisory indicates that this CVE is a variant of the “Dogwalk” vulnerability, which made news alongside Follina (CVE-2022-30190) back in May.

zdi: CVE-2022-34713 – Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability. This is not the first time an MSDT bug has been exploited in the wild this year. This bug also allows code execution when MSDT is called using the URL protocol from a calling application, typically Microsoft Word. There is an element of social engineering to this as a threat actor would need to convince a user to click a link or open a document. It’s not clear if this vulnerability is the result of a failed patch or something new. Either way, test and deploy this fix quickly.

kaspersky: DogWalk (aka CVE-2022-34713) — RCE vulnerability in MSDT

kaspersky: The most dangerous of the newly closed vulnerabilities is CVE-2022-34713. Potentially, it allows remote execution of malicious code (belongs to the RCE type). CVE-2022-34713, dubbed DogWalk, is a vulnerability in the Microsoft Windows Support Diagnostic Tool (MSDT), like Follina, which made some hype in May of this year.

Critical (0)

High (36)

2. Remote Code Execution - Microsoft Windows Support Diagnostic Tool (MSDT) (CVE-2022-35743) - High [554]

Description: Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.8. Based on Microsoft data

tenable: CVE-2022-34713 and CVE-2022-35743 are RCE vulnerabilities in the Microsoft Windows Support Diagnostic Tool (MSDT) for troubleshooting. Both CVEs received a CVSS score of 7.8 and are rated important.

3. Memory Corruption - Microsoft Edge (CVE-2022-2623) - High [502]

Description: Chromium: CVE-2022-2623 Use after free in Offline. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017The existence of a public exploit is mentioned on Vulners website (Barco Control Room Management Suite Directory Traversal, Barco Control Room Management Suite Directory Traversal Vulnerability)
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Web browser
CVSS Base Score0.010Vulnerability Severity Rating based on CVSS Base Score is NA. No data.

MS PT Extended: CVE-2022-2623 was published before August 2022 Patch Tuesday from 2022-07-13 to 2022-08-08

4. Remote Code Execution - Windows Network File System (CVE-2022-34715) - High [489]

Description: Windows Network File System Remote Code Execution Vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Windows component
CVSS Base Score1.010Vulnerability Severity Rating based on CVSS Base Score is 9.8. Based on Microsoft data

qualys: CVE-2022-34715: Windows Network File System Remote Code Execution (RCE) Vulnerability  This vulnerability has a CVSSv3.1 score of 9.8/10. Policy Compliance Control IDs (CIDs): 24139: Status of the Windows Network File System (NFSV4) service Exploitability Assessment: Exploitation Less Likely

rapid7: Vulnerabilities affecting Windows Network File System (NFS) have been trending in recent months, and today sees Microsoft patching CVE-2022-34715 (RCE, CVSS 9.8) affecting NFSv4.1 on Windows Server 2022.

zdi: CVE-2022-34715 – Windows Network File System Remote Code Execution Vulnerability. This is now the fourth month in a row with an NFS code execution patch, and this CVSS 9.8 bug could be the most severe of the lot. To exploit this, a remote, unauthenticated attacker would need to make a specially crafted call to an affected NFS server. This would provide the threat actor with code execution at elevated privileges. Microsoft lists this as Important severity, but if you’re using NFS, I would treat it as Critical. Definitely test and deploy this fix quickly.

5. Remote Code Execution - Windows Point-to-Point Protocol (PPP) (CVE-2022-30133) - High [489]

Description: Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-35744.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Windows component
CVSS Base Score1.010Vulnerability Severity Rating based on CVSS Base Score is 9.8. Based on Microsoft data

qualys: CVE-2022-30133, CVE-2022-35744 | Windows Point-to-Point Protocol (PPP) Remote Code Execution (RCE) Vulnerability This vulnerability has a CVSSv3.1 score of 9.8/10. This vulnerability can only be exploited by communicating via Port 1723. As a temporary workaround prior to installing the updates that address this vulnerability, you can block traffic through that port thus rendering the vulnerability unexploitable. Warning: Disabling Port 1723 could affect communications over your network. Exploitability Assessment: Exploitation Less Likely

qualys: CVE-2022-30133, CVE-2022-35744 | Windows Point-to-Point Protocol (PPP) Remote Code Execution (RCE) Vulnerability  This vulnerability has a CVSSv3.1 score of 9.8/10. Policy Compliance Control IDs (CIDs): 11220: List of ‘Inbound Rules’ configured in Windows Firewall with Advanced Security via GPO14028: List of ‘Outbound Rules’ configured in Windows Firewall with Advanced Security via GPO Exploitability Assessment: Exploitation Less Likely

rapid7: Microsoft also patched several flaws affecting Remote Access Server (RAS). The most severe of these (CVE-2022-30133 and CVE-2022-35744) are related to Windows Point-to-Point Tunneling Protocol and could allow RCE simply by sending a malicious connection request to a server. Seven CVEs affecting the Windows Secure Socket Tunneling Protocol (SSTP) on RAS were also fixed this month: six RCEs and one Denial of Service. If you have RAS in your environment but are unable to patch immediately, consider blocking traffic on port 1723 from your network.

kaspersky: As for the CVSS rating, two related vulnerabilities are conditional champions: CVE-2022-30133 and CVE-2022-35744. Both are found in the Point-to-Point Protocol (PPP). Both allow attackers to send requests to the remote access server, which can lead to the execution of malicious code on the machine. And both have the same CVSS score: 9.8.

6. Remote Code Execution - Windows Point-to-Point Protocol (PPP) (CVE-2022-35744) - High [489]

Description: Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Windows component
CVSS Base Score1.010Vulnerability Severity Rating based on CVSS Base Score is 9.8. Based on Microsoft data

qualys: CVE-2022-30133, CVE-2022-35744 | Windows Point-to-Point Protocol (PPP) Remote Code Execution (RCE) Vulnerability This vulnerability has a CVSSv3.1 score of 9.8/10. This vulnerability can only be exploited by communicating via Port 1723. As a temporary workaround prior to installing the updates that address this vulnerability, you can block traffic through that port thus rendering the vulnerability unexploitable. Warning: Disabling Port 1723 could affect communications over your network. Exploitability Assessment: Exploitation Less Likely

qualys: CVE-2022-30133, CVE-2022-35744 | Windows Point-to-Point Protocol (PPP) Remote Code Execution (RCE) Vulnerability  This vulnerability has a CVSSv3.1 score of 9.8/10. Policy Compliance Control IDs (CIDs): 11220: List of ‘Inbound Rules’ configured in Windows Firewall with Advanced Security via GPO14028: List of ‘Outbound Rules’ configured in Windows Firewall with Advanced Security via GPO Exploitability Assessment: Exploitation Less Likely

rapid7: Microsoft also patched several flaws affecting Remote Access Server (RAS). The most severe of these (CVE-2022-30133 and CVE-2022-35744) are related to Windows Point-to-Point Tunneling Protocol and could allow RCE simply by sending a malicious connection request to a server. Seven CVEs affecting the Windows Secure Socket Tunneling Protocol (SSTP) on RAS were also fixed this month: six RCEs and one Denial of Service. If you have RAS in your environment but are unable to patch immediately, consider blocking traffic on port 1723 from your network.

kaspersky: As for the CVSS rating, two related vulnerabilities are conditional champions: CVE-2022-30133 and CVE-2022-35744. Both are found in the Point-to-Point Protocol (PPP). Both allow attackers to send requests to the remote access server, which can lead to the execution of malicious code on the machine. And both have the same CVSS score: 9.8.

7. Remote Code Execution - Visual Studio (CVE-2022-35777) - High [472]

Description: Visual Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-35825, CVE-2022-35826, CVE-2022-35827.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.314Integrated development environment
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 8.8. Based on Microsoft data

8. Remote Code Execution - Visual Studio (CVE-2022-35825) - High [472]

Description: Visual Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-35777, CVE-2022-35826, CVE-2022-35827.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.314Integrated development environment
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 8.8. Based on Microsoft data

9. Remote Code Execution - Visual Studio (CVE-2022-35826) - High [472]

Description: Visual Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-35777, CVE-2022-35825, CVE-2022-35827.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.314Integrated development environment
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 8.8. Based on Microsoft data

10. Remote Code Execution - Visual Studio (CVE-2022-35827) - High [472]

Description: Visual Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-35777, CVE-2022-35825, CVE-2022-35826.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.314Integrated development environment
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 8.8. Based on Microsoft data

11. Security Feature Bypass - Microsoft Edge (CVE-2022-33649) - High [468]

Description: Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Web browser
CVSS Base Score1.010Vulnerability Severity Rating based on CVSS Base Score is 9.6. Based on Microsoft data

MS PT Extended: CVE-2022-33649 was published before August 2022 Patch Tuesday from 2022-07-13 to 2022-08-08

qualys: Microsoft Edge | Last But Not Least Earlier in August, Microsoft released Microsoft Edge (Chromium-based) vulnerabilities CVE-2022-33636, CVE-2022-33649, and CVE-2022-35796. The vulnerability assigned to each of these CVEs is in the Chromium Open Source Software (OSS) which is consumed by Microsoft Edge. It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. For more information, please see Security Update Guide Supports CVEs Assigned by Industry Partners.

qualys: CVE-2022-33649 | Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability This vulnerability has a CVSSv3.1 score of 9.6/10. An attacker could host a specially crafted website designed to exploit the vulnerability through Microsoft Edge and then convince a user to view the website. However, in all cases an attacker would have no way to force a user to view the attacker-controlled content. Instead, an attacker would have to convince a user to take action, typically by an enticement in an email or instant message, or by getting the user to open an attachment sent through email. The user would have to click on a specially crafted URL to be compromised by the attacker. Exploitability Assessment: Exploitation Less Likely

12. Remote Code Execution - Microsoft Edge (CVE-2022-33636) - High [462]

Description: Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Web browser
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 8.3. Based on Microsoft data

MS PT Extended: CVE-2022-33636 was published before August 2022 Patch Tuesday from 2022-07-13 to 2022-08-08

qualys: Microsoft Edge | Last But Not Least Earlier in August, Microsoft released Microsoft Edge (Chromium-based) vulnerabilities CVE-2022-33636, CVE-2022-33649, and CVE-2022-35796. The vulnerability assigned to each of these CVEs is in the Chromium Open Source Software (OSS) which is consumed by Microsoft Edge. It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. For more information, please see Security Update Guide Supports CVEs Assigned by Industry Partners.

qualys: CVE-2022-33636, CVE-2022-35796 | Microsoft Edge (Chromium-based) Remote Code Execution (RCE) Vulnerability This vulnerability has a CVSSv3.1 score of 8.3/10. Per Microsoft’s severity guidelines, the amount of user interaction or preconditions required to allow this sort of exploitation downgraded the severity. The CVSS scoring system doesn’t allow for this type of nuance. An attacker could host a specially crafted website designed to exploit the vulnerability through Microsoft Edge and then convince a user to view the website. However, in all cases, an attacker would have no way to force a user to view the attacker-controlled content. Instead, an attacker would have to convince a user to take action, typically by an enticement in an email or instant message, or by getting the user to open an attachment sent through email. Successful exploitation of this vulnerability requires an attacker to win a race condition. Exploitability Assessment: Exploitation Less Likely

13. Remote Code Execution - Windows Bluetooth Service (CVE-2022-30144) - High [462]

Description: Windows Bluetooth Service Remote Code Execution Vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Microsoft data

14. Remote Code Execution - Windows Secure Socket Tunneling Protocol (SSTP) (CVE-2022-34702) - High [462]

Description: Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34714, CVE-2022-35745, CVE-2022-35752, CVE-2022-35753, CVE-2022-35766, CVE-2022-35767, CVE-2022-35794.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 8.1. Based on Microsoft data

15. Remote Code Execution - Windows Secure Socket Tunneling Protocol (SSTP) (CVE-2022-34714) - High [462]

Description: Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34702, CVE-2022-35745, CVE-2022-35752, CVE-2022-35753, CVE-2022-35766, CVE-2022-35767, CVE-2022-35794.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 8.1. Based on Microsoft data

16. Remote Code Execution - Windows Secure Socket Tunneling Protocol (SSTP) (CVE-2022-35745) - High [462]

Description: Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 8.1. Based on Microsoft data

17. Remote Code Execution - Windows Secure Socket Tunneling Protocol (SSTP) (CVE-2022-35752) - High [462]

Description: Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 8.1. Based on Microsoft data

18. Remote Code Execution - Windows Secure Socket Tunneling Protocol (SSTP) (CVE-2022-35753) - High [462]

Description: Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 8.1. Based on Microsoft data

19. Remote Code Execution - Windows Secure Socket Tunneling Protocol (SSTP) (CVE-2022-35766) - High [462]

Description: Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34702, CVE-2022-34714, CVE-2022-35745, CVE-2022-35752, CVE-2022-35753, CVE-2022-35767, CVE-2022-35794.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 8.1. Based on Microsoft data

qualys: CVE-2022-35766, CVE-2022-35794 | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution (RCE) Vulnerability This vulnerability has a CVSSv3.1 score of 8.1/10. Successful exploitation of this vulnerability requires an attacker to win a race condition. An unauthenticated attacker could send a specially crafted connection request to a RAS server, which could lead to remote code execution (RCE) on the RAS server machine. Exploitability Assessment: Exploitation Less Likely

20. Remote Code Execution - Windows Secure Socket Tunneling Protocol (SSTP) (CVE-2022-35767) - High [462]

Description: Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34702, CVE-2022-34714, CVE-2022-35745, CVE-2022-35752, CVE-2022-35753, CVE-2022-35766, CVE-2022-35794.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 8.1. Based on Microsoft data

21. Remote Code Execution - Windows Secure Socket Tunneling Protocol (SSTP) (CVE-2022-35794) - High [462]

Description: Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34702, CVE-2022-34714, CVE-2022-35745, CVE-2022-35752, CVE-2022-35753, CVE-2022-35766, CVE-2022-35767.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 8.1. Based on Microsoft data

qualys: CVE-2022-35766, CVE-2022-35794 | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution (RCE) Vulnerability This vulnerability has a CVSSv3.1 score of 8.1/10. Successful exploitation of this vulnerability requires an attacker to win a race condition. An unauthenticated attacker could send a specially crafted connection request to a RAS server, which could lead to remote code execution (RCE) on the RAS server machine. Exploitability Assessment: Exploitation Less Likely

22. Remote Code Execution - Windows WebBrowser Control (CVE-2022-30194) - High [462]

Description: Windows WebBrowser Control Remote Code Execution Vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Microsoft data

23. Remote Code Execution - Azure RTOS (CVE-2022-30175) - High [459]

Description: Azure RTOS GUIX Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30176, CVE-2022-34687, CVE-2022-35773, CVE-2022-35779, CVE-2022-35806.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.314Azure RTOS is a small, fast, reliable, and easy-to-use real-time operating system (RTOS) for connecting deeply embedded IoT devices
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.8. Based on Microsoft data

24. Remote Code Execution - Azure RTOS (CVE-2022-30176) - High [459]

Description: Azure RTOS GUIX Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30175, CVE-2022-34687, CVE-2022-35773, CVE-2022-35779, CVE-2022-35806.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.314Azure RTOS is a small, fast, reliable, and easy-to-use real-time operating system (RTOS) for connecting deeply embedded IoT devices
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.8. Based on Microsoft data

25. Remote Code Execution - Azure RTOS (CVE-2022-34687) - High [459]

Description: Azure RTOS GUIX Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30175, CVE-2022-30176, CVE-2022-35773, CVE-2022-35779, CVE-2022-35806.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.314Azure RTOS is a small, fast, reliable, and easy-to-use real-time operating system (RTOS) for connecting deeply embedded IoT devices
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.8. Based on Microsoft data

26. Remote Code Execution - Azure RTOS (CVE-2022-35773) - High [459]

Description: Azure RTOS GUIX Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30175, CVE-2022-30176, CVE-2022-34687, CVE-2022-35779, CVE-2022-35806.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.314Azure RTOS is a small, fast, reliable, and easy-to-use real-time operating system (RTOS) for connecting deeply embedded IoT devices
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.8. Based on Microsoft data

27. Remote Code Execution - Azure RTOS (CVE-2022-35779) - High [459]

Description: Azure RTOS GUIX Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30175, CVE-2022-30176, CVE-2022-34687, CVE-2022-35773, CVE-2022-35806.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.314Azure RTOS is a small, fast, reliable, and easy-to-use real-time operating system (RTOS) for connecting deeply embedded IoT devices
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.8. Based on Microsoft data

28. Remote Code Execution - Azure RTOS (CVE-2022-35806) - High [459]

Description: Azure RTOS GUIX Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30175, CVE-2022-30176, CVE-2022-34687, CVE-2022-35773, CVE-2022-35779.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.314Azure RTOS is a small, fast, reliable, and easy-to-use real-time operating system (RTOS) for connecting deeply embedded IoT devices
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.8. Based on Microsoft data

29. Elevation of Privilege - Open Management Infrastructure (CVE-2022-33640) - High [452]

Description: System Center Operations Manager: Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.814An open source project to further the development of a production quality implementation of the DMTF CIM/WBEM standards
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.8. Based on Microsoft data

30. Remote Code Execution - Microsoft Office (CVE-2022-34717) - High [437]

Description: Microsoft Office Remote Code Execution Vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Microsoft Office
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 8.8. Based on Microsoft data

31. Remote Code Execution - Microsoft Excel (CVE-2022-33648) - High [424]

Description: Microsoft Excel Remote Code Execution Vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614MS Office product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.8. Based on Microsoft data

32. Remote Code Execution - Windows Hyper-V (CVE-2022-34696) - High [424]

Description: Windows Hyper-V Remote Code Execution Vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Hardware virtualization component of the client editions of Windows NT
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.8. Based on Microsoft data

33. Remote Code Execution - SMB Client and Server (CVE-2022-35804) - High [418]

Description: SMB Client and Server Remote Code Execution Vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514SMB Client and Server
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 8.8. Based on Microsoft data

qualys: CVE-2022-35804 | SMB Client and Server Remote Code Execution (RCE) Vulnerability This vulnerability has a CVSSv3.1 score of 8.8/10. Policy Compliance Control IDs (CIDs): 24476: Status of the SMBv3 Client compressions setting20233: Status of the SMBv3 Server compressions setting  Exploitability Assessment: Exploitation More Likely

tenable: CVE-2022-35804 is a RCE vulnerability affecting both the Server Message Block (SMB) client and server on Windows 11 systems using Microsoft SMB 3.1.1 (SMBv3). Microsoft rated this as “Exploitation More Likely” and assigned an 8.8 CVSSV3 score. This vulnerability is reminiscent of past SMB vulnerabilities such as the EternalBlue SMBv1 flaw patched in MS17-010 in March of 2017 that was exploited as part of the WannaCry incident in addition to the more recent CVE-2020-0796 “EternalDarkness” RCE flaw in SMB 3.1.1.

zdi: CVE-2022-35804 – SMB Client and Server Remote Code Execution Vulnerability. The server side of this bug would allow a remote, unauthenticated attacker to execute code with elevated privileges on affected SMB servers. Interestingly, this bug only affects Windows 11, which implies some new functionality introduced this vulnerability. Either way, this could potentially be wormable between affected Windows 11 systems with SMB server enabled. Disabling SMBv3 compression is a workaround for this bug, but applying the update is the best method to remediate the vulnerability.

34. Security Feature Bypass - Windows Defender Credential Guard (CVE-2022-34709) - High [414]

Description: Windows Defender Credential Guard Security Feature Bypass Vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.610Vulnerability Severity Rating based on CVSS Base Score is 6.0. Based on Microsoft data

35. Security Feature Bypass - Windows Hello (CVE-2022-35797) - High [414]

Description: Windows Hello Security Feature Bypass Vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.610Vulnerability Severity Rating based on CVSS Base Score is 6.1. Based on Microsoft data

rapid7: This is the worst of it. One last vulnerability to highlight: CVE-2022-35797 is a Security Feature Bypass in Windows Hello – Microsoft’s biometric authentication mechanism for Windows 10. Successful exploitation requires physical access to a system, but would allow an attacker to bypass a facial recognition check.

36. Denial of Service - Azure Site Recovery (CVE-2022-35776) - High [409]

Description: Azure Site Recovery Denial of Service Vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514Azure Site Recovery
CVSS Base Score0.610Vulnerability Severity Rating based on CVSS Base Score is 6.2. Based on Microsoft data

37. Denial of Service - Windows Point-to-Point Protocol (PPP) (CVE-2022-35769) - High [401]

Description: Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-35747.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Microsoft data

Medium (108)

38. Elevation of Privilege - Kerberos (CVE-2022-35756) - Medium [398]

Description: Windows Kerberos Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common114Kerberos
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.8. Based on Microsoft data

39. Elevation of Privilege - Active Directory (CVE-2022-34691) - Medium [393]

Description: Active Directory Domain Services Elevation of Privilege Vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.914Active Directory is a directory service developed by Microsoft for Windows domain networks
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 8.8. Based on Microsoft data

qualys: CVE-2022-34691 | Active Directory Domain Services Elevation of Privilege (EoP) Vulnerability This vulnerability has a CVSSv3.1 score of 8.8/10. This vulnerability can only be exploited by communicating via Port 1723. As a temporary workaround An authenticated user could manipulate attributes on computer accounts they own or manage, and acquire a certificate from Active Directory Certificate Services that would allow elevation of privilege to System. Please see Certificate-based authentication changes on Windows domain controllers for more information and ways to protect your domain. Exploitability Assessment: Exploitation Less Likely

qualys: CVE-2022-34691: Active Directory Domain Services Elevation of Privilege (EoP) Vulnerability  This vulnerability has a CVSSv3.1 score of 8.8/10. Policy Compliance Control IDs (CIDs): 4079: Status of the ‘Active Directory Certificate Service’ Exploitability Assessment: Exploitation Less Likely

tenable: CVE-2022-34691 is an EoP vulnerability affecting Active Directory Domain Services. With an 8.8 CVSSv3 score, this vulnerability could be exploited by an authenticated attacker to manipulate attributes of accounts and possibly acquire a certificate from Active Directory Certificate Services. This certificate would allow the attacker to elevate their privileges. The advisory notes that exploitation is only possible when Active Directory Certificate Services is running on the domain.

40. Remote Code Execution - Azure Site Recovery (CVE-2022-35772) - Medium [391]

Description: Azure Site Recovery Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-35824.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Azure Site Recovery
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 7.2. Based on Microsoft data

41. Remote Code Execution - Azure Site Recovery (CVE-2022-35824) - Medium [391]

Description: Azure Site Recovery Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-35772.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Azure Site Recovery
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 7.2. Based on Microsoft data

42. Security Feature Bypass - Microsoft Excel (CVE-2022-33631) - Medium [390]

Description: Microsoft Excel Security Feature Bypass Vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.614MS Office product
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 7.3. Based on Microsoft data

43. Denial of Service - Windows Local Security Authority (LSA) (CVE-2022-35759) - Medium [387]

Description: Windows Local Security Authority (LSA) Denial of Service Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Microsoft data

44. Elevation of Privilege - Azure Batch Node Agent (CVE-2022-33646) - Medium [382]

Description: Azure Batch Node Agent Elevation of Privilege Vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Azure Batch Node Agent
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 7.0. Based on Microsoft data

qualys: CVE-2022-33646 | Azure Batch Node Agent Elevation of Privilege (EoP) Vulnerability This vulnerability has a CVSSv3.1 score of 7.0/10. Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability. Exploitability Assessment: Exploitation More Likely

45. Elevation of Privilege - Azure Site Recovery (CVE-2022-35775) - Medium [382]

Description: Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Azure Site Recovery
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Microsoft data

46. Elevation of Privilege - Azure Site Recovery (CVE-2022-35780) - Medium [382]

Description: Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Azure Site Recovery
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Microsoft data

47. Elevation of Privilege - Azure Site Recovery (CVE-2022-35781) - Medium [382]

Description: Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Azure Site Recovery
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Microsoft data

48. Elevation of Privilege - Azure Site Recovery (CVE-2022-35782) - Medium [382]

Description: Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Azure Site Recovery
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Microsoft data

49. Elevation of Privilege - Azure Site Recovery (CVE-2022-35784) - Medium [382]

Description: Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Azure Site Recovery
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Microsoft data

50. Elevation of Privilege - Azure Site Recovery (CVE-2022-35785) - Medium [382]

Description: Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Azure Site Recovery
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Microsoft data

51. Elevation of Privilege - Azure Site Recovery (CVE-2022-35786) - Medium [382]

Description: Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Azure Site Recovery
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Microsoft data

52. Elevation of Privilege - Azure Site Recovery (CVE-2022-35788) - Medium [382]

Description: Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Azure Site Recovery
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Microsoft data

53. Elevation of Privilege - Azure Site Recovery (CVE-2022-35789) - Medium [382]

Description: Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Azure Site Recovery
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Microsoft data

54. Elevation of Privilege - Azure Site Recovery (CVE-2022-35790) - Medium [382]

Description: Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Azure Site Recovery
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Microsoft data

55. Elevation of Privilege - Azure Site Recovery (CVE-2022-35791) - Medium [382]

Description: Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Azure Site Recovery
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Microsoft data

56. Elevation of Privilege - Azure Site Recovery (CVE-2022-35799) - Medium [382]

Description: Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Azure Site Recovery
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Microsoft data

57. Elevation of Privilege - Azure Site Recovery (CVE-2022-35801) - Medium [382]

Description: Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Azure Site Recovery
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Microsoft data

58. Elevation of Privilege - Azure Site Recovery (CVE-2022-35807) - Medium [382]

Description: Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Azure Site Recovery
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Microsoft data

59. Elevation of Privilege - Azure Site Recovery (CVE-2022-35808) - Medium [382]

Description: Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Azure Site Recovery
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Microsoft data

60. Elevation of Privilege - Azure Site Recovery (CVE-2022-35809) - Medium [382]

Description: Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Azure Site Recovery
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Microsoft data

61. Elevation of Privilege - Azure Site Recovery (CVE-2022-35810) - Medium [382]

Description: Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Azure Site Recovery
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Microsoft data

62. Elevation of Privilege - Azure Site Recovery (CVE-2022-35811) - Medium [382]

Description: Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Azure Site Recovery
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Microsoft data

63. Elevation of Privilege - Azure Site Recovery (CVE-2022-35813) - Medium [382]

Description: Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Azure Site Recovery
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Microsoft data

64. Elevation of Privilege - Azure Site Recovery (CVE-2022-35814) - Medium [382]

Description: Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Azure Site Recovery
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Microsoft data

65. Elevation of Privilege - Azure Site Recovery (CVE-2022-35815) - Medium [382]

Description: Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Azure Site Recovery
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Microsoft data

66. Elevation of Privilege - Azure Site Recovery (CVE-2022-35816) - Medium [382]

Description: Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Azure Site Recovery
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Microsoft data

67. Elevation of Privilege - Azure Site Recovery (CVE-2022-35817) - Medium [382]

Description: Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35818, CVE-2022-35819.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Azure Site Recovery
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Microsoft data

68. Elevation of Privilege - Azure Site Recovery (CVE-2022-35818) - Medium [382]

Description: Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35819.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Azure Site Recovery
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Microsoft data

69. Elevation of Privilege - Azure Site Recovery (CVE-2022-35819) - Medium [382]

Description: Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Azure Site Recovery
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Microsoft data

70. Elevation of Privilege - Windows Kernel (CVE-2022-34707) - Medium [379]

Description: Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35761, CVE-2022-35768.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.914Windows Kernel
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.8. Based on Microsoft data

71. Elevation of Privilege - Windows Kernel (CVE-2022-35761) - Medium [379]

Description: Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-34707, CVE-2022-35768.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.914Windows Kernel
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 8.4. Based on Microsoft data

72. Elevation of Privilege - Windows Kernel (CVE-2022-35768) - Medium [379]

Description: Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-34707, CVE-2022-35761.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.914Windows Kernel
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.8. Based on Microsoft data

73. Elevation of Privilege - Windows Win32k (CVE-2022-34699) - Medium [379]

Description: Windows Win32k Elevation of Privilege Vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.914Windows kernel-mode driver
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.8. Based on Microsoft data

74. Elevation of Privilege - Windows Win32k (CVE-2022-35750) - Medium [379]

Description: Win32k Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.914Windows kernel-mode driver
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.8. Based on Microsoft data

75. Denial of Service - Windows Point-to-Point Protocol (PPP) (CVE-2022-35747) - Medium [374]

Description: Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.610Vulnerability Severity Rating based on CVSS Base Score is 5.9. Based on Microsoft data

76. Denial of Service - Microsoft Outlook (CVE-2022-35742) - Medium [363]

Description: Microsoft Outlook Denial of Service Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.614MS Office product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Microsoft data

zdi: CVE-2022-35742 - Microsoft Outlook Denial of Service Vulnerability. This was reported through the ZDI program and is a mighty interesting bug. Sending a crafted email to a victim causes their Outlook application to terminate immediately. Outlook cannot be restarted. Upon restart, it will terminate again once it retrieves and processes the invalid message. It is not necessary for the victim to open the message or to use the Reading pane. The only way to restore functionality is to access the mail account using a different client (i.e., webmail, or administrative tools) and remove the offending email(s) from the mailbox before restarting Outlook.

77. Denial of Service - Windows Secure Socket Tunneling Protocol (SSTP) (CVE-2022-34701) - Medium [360]

Description: Windows Secure Socket Tunneling Protocol (SSTP) Denial of Service Vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.510Vulnerability Severity Rating based on CVSS Base Score is 5.3. Based on Microsoft data

78. Elevation of Privilege - Microsoft Edge (CVE-2022-35796) - Medium [360]

Description: Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.814Web browser
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Microsoft data

MS PT Extended: CVE-2022-35796 was published before August 2022 Patch Tuesday from 2022-07-13 to 2022-08-08

qualys: Microsoft Edge | Last But Not Least Earlier in August, Microsoft released Microsoft Edge (Chromium-based) vulnerabilities CVE-2022-33636, CVE-2022-33649, and CVE-2022-35796. The vulnerability assigned to each of these CVEs is in the Chromium Open Source Software (OSS) which is consumed by Microsoft Edge. It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. For more information, please see Security Update Guide Supports CVEs Assigned by Industry Partners.

qualys: CVE-2022-33636, CVE-2022-35796 | Microsoft Edge (Chromium-based) Remote Code Execution (RCE) Vulnerability This vulnerability has a CVSSv3.1 score of 8.3/10. Per Microsoft’s severity guidelines, the amount of user interaction or preconditions required to allow this sort of exploitation downgraded the severity. The CVSS scoring system doesn’t allow for this type of nuance. An attacker could host a specially crafted website designed to exploit the vulnerability through Microsoft Edge and then convince a user to view the website. However, in all cases, an attacker would have no way to force a user to view the attacker-controlled content. Instead, an attacker would have to convince a user to take action, typically by an enticement in an email or instant message, or by getting the user to open an attachment sent through email. Successful exploitation of this vulnerability requires an attacker to win a race condition. Exploitability Assessment: Exploitation Less Likely

79. Elevation of Privilege - Microsoft Exchange (CVE-2022-21980) - Medium [360]

Description: Microsoft Exchange Server Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-24477, CVE-2022-24516.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.814Exchange
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 8.0. Based on Microsoft data

tenable: CVE-2022-21980, CVE-2022-24516 andCVE-2022-24477 are EoP vulnerabilities in Microsoft Exchange Server. Microsoft has published a companion blog post for this Exchange Server update. All three received a CVSSv3 score of 8.0 and were rated “Exploitation More Likely” according to Microsoft’s Exploitability Index. Tianze Ding with Tencent Xuanwu Lab is credited with discovering these vulnerabilities. Yuhao Weng with Sangfor Zhiniang Peng with Sangfor also share credit for CVE-2022-21980.

zdi: CVE-2022-21980/24516/24477 – Microsoft Exchange Server Elevation of Privilege Vulnerability. I couldn’t pick between these three Critical-rated Exchange bugs, so I’m listing them all. Rarely are elevation of privilege (EoP) bugs rated Critical, but these certainly qualify. These bugs could allow an authenticated attacker to take over the mailboxes of all Exchange users. They could then read and send emails or download attachments from any mailbox on the Exchange server. Administrators will also need to enable Extended Protection to fully address these vulnerabilities.

kaspersky: The second zero-day vulnerability closed last Tuesday is CVE-2022-30134. It’s contained in Microsoft Exchange. Information about it was published before Microsoft was able to create the patch, but so far this vulnerability has not been exploited in the wild. Theoretically, if an attacker manages to use CVE-2022-30134, he will be able to read the victim’s email correspondence. This is not the only flaw in Exchange that was fixed by the new patch. It also closes the CVE-2022-24516, CVE-2022-21980 and CVE-2022-24477 vulnerabilities that allow attackers to elevate their privileges.

80. Elevation of Privilege - Microsoft Exchange (CVE-2022-24477) - Medium [360]

Description: Microsoft Exchange Server Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21980, CVE-2022-24516.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.814Exchange
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 8.0. Based on Microsoft data

tenable: CVE-2022-21980, CVE-2022-24516 andCVE-2022-24477 are EoP vulnerabilities in Microsoft Exchange Server. Microsoft has published a companion blog post for this Exchange Server update. All three received a CVSSv3 score of 8.0 and were rated “Exploitation More Likely” according to Microsoft’s Exploitability Index. Tianze Ding with Tencent Xuanwu Lab is credited with discovering these vulnerabilities. Yuhao Weng with Sangfor Zhiniang Peng with Sangfor also share credit for CVE-2022-21980.

kaspersky: The second zero-day vulnerability closed last Tuesday is CVE-2022-30134. It’s contained in Microsoft Exchange. Information about it was published before Microsoft was able to create the patch, but so far this vulnerability has not been exploited in the wild. Theoretically, if an attacker manages to use CVE-2022-30134, he will be able to read the victim’s email correspondence. This is not the only flaw in Exchange that was fixed by the new patch. It also closes the CVE-2022-24516, CVE-2022-21980 and CVE-2022-24477 vulnerabilities that allow attackers to elevate their privileges.

81. Elevation of Privilege - Microsoft Exchange (CVE-2022-24516) - Medium [360]

Description: Microsoft Exchange Server Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21980, CVE-2022-24477.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.814Exchange
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 8.0. Based on Microsoft data

tenable: CVE-2022-21980, CVE-2022-24516 andCVE-2022-24477 are EoP vulnerabilities in Microsoft Exchange Server. Microsoft has published a companion blog post for this Exchange Server update. All three received a CVSSv3 score of 8.0 and were rated “Exploitation More Likely” according to Microsoft’s Exploitability Index. Tianze Ding with Tencent Xuanwu Lab is credited with discovering these vulnerabilities. Yuhao Weng with Sangfor Zhiniang Peng with Sangfor also share credit for CVE-2022-21980.

kaspersky: The second zero-day vulnerability closed last Tuesday is CVE-2022-30134. It’s contained in Microsoft Exchange. Information about it was published before Microsoft was able to create the patch, but so far this vulnerability has not been exploited in the wild. Theoretically, if an attacker manages to use CVE-2022-30134, he will be able to read the victim’s email correspondence. This is not the only flaw in Exchange that was fixed by the new patch. It also closes the CVE-2022-24516, CVE-2022-21980 and CVE-2022-24477 vulnerabilities that allow attackers to elevate their privileges.

82. Elevation of Privilege - Windows Bluetooth Driver (CVE-2022-35820) - Medium [360]

Description: Windows Bluetooth Driver Elevation of Privilege Vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.8. Based on Microsoft data

83. Elevation of Privilege - Windows Defender Credential Guard (CVE-2022-34705) - Medium [360]

Description: Windows Defender Credential Guard Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35771.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.8. Based on Microsoft data

84. Elevation of Privilege - Windows Defender Credential Guard (CVE-2022-35771) - Medium [360]

Description: Windows Defender Credential Guard Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-34705.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.8. Based on Microsoft data

85. Elevation of Privilege - Windows Digital Media Receiver (CVE-2022-35746) - Medium [360]

Description: Windows Digital Media Receiver Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.8. Based on Microsoft data

86. Elevation of Privilege - Windows Digital Media Receiver (CVE-2022-35749) - Medium [360]

Description: Windows Digital Media Receiver Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.8. Based on Microsoft data

87. Elevation of Privilege - Windows Error Reporting Service (CVE-2022-35795) - Medium [360]

Description: Windows Error Reporting Service Elevation of Privilege Vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.8. Based on Microsoft data

88. Elevation of Privilege - Windows Local Security Authority (LSA) (CVE-2022-34706) - Medium [360]

Description: Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.8. Based on Microsoft data

89. Elevation of Privilege - Windows Partition Management Driver (CVE-2022-33670) - Medium [360]

Description: Windows Partition Management Driver Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-34703.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.8. Based on Microsoft data

90. Elevation of Privilege - Windows Partition Management Driver (CVE-2022-34703) - Medium [360]

Description: Windows Partition Management Driver Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-33670.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.8. Based on Microsoft data

91. Elevation of Privilege - Azure Site Recovery (CVE-2022-35774) - Medium [355]

Description: Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Azure Site Recovery
CVSS Base Score0.510Vulnerability Severity Rating based on CVSS Base Score is 4.9. Based on Microsoft data

92. Elevation of Privilege - Azure Site Recovery (CVE-2022-35787) - Medium [355]

Description: Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Azure Site Recovery
CVSS Base Score0.510Vulnerability Severity Rating based on CVSS Base Score is 4.9. Based on Microsoft data

93. Elevation of Privilege - Azure Site Recovery (CVE-2022-35800) - Medium [355]

Description: Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Azure Site Recovery
CVSS Base Score0.510Vulnerability Severity Rating based on CVSS Base Score is 4.9. Based on Microsoft data

94. Elevation of Privilege - Windows Cloud Files Mini Filter Driver (CVE-2022-35757) - Medium [347]

Description: Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 7.3. Based on Microsoft data

95. Elevation of Privilege - Windows Fax Service (CVE-2022-34690) - Medium [347]

Description: Windows Fax Service Elevation of Privilege Vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 7.1. Based on Microsoft data

96. Elevation of Privilege - Windows Print Spooler (CVE-2022-35755) - Medium [347]

Description: Windows Print Spooler Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 7.3. Based on Microsoft data

qualys: CVE-2022-35755 | Windows Print Spooler Elevation of Privilege (EoP) Vulnerability This vulnerability has a CVSSv3.1 score of 7.3/10. Policy Compliance Control IDs (CIDs): 1368: Status of the ‘Print Spooler’ service Exploitability Assessment: Exploitation More Likely

tenable: CVE-2022-35755 andCVE-2022-35793are EoP vulnerabilities in Windows Print Spooler Components that both received a CVSSv3 score of 7.3 and were rated “Exploitation More Likely.” These vulnerabilities were discovered by Xuefeng Li with Sangfor who has a long history of disclosing Print Spooler flaws, tracing back to the original PrintNightmare (CVE-2021-34527). CVE-2022-35755 can be exploited using a specially crafted “input file,” while exploitation of CVE-2022-35793 requires a user click on a specially crafted URL. Both would give the attacker SYSTEM privileges.

97. Elevation of Privilege - Windows Print Spooler (CVE-2022-35793) - Medium [347]

Description: Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35755.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 7.3. Based on Microsoft data

qualys: CVE-2022-35793 | Windows Print Spooler Elevation of Privilege (EoP) Vulnerability This vulnerability has a CVSSv3.1 score of 7.3/10. Policy Compliance Control IDs (CIDs): 1368: Status of the ‘Print Spooler’ service21711: Status of the ‘Allow Print Spooler to accept client connections’ group policy setting  Exploitability Assessment: Exploitation More Likely

tenable: CVE-2022-35755 andCVE-2022-35793are EoP vulnerabilities in Windows Print Spooler Components that both received a CVSSv3 score of 7.3 and were rated “Exploitation More Likely.” These vulnerabilities were discovered by Xuefeng Li with Sangfor who has a long history of disclosing Print Spooler flaws, tracing back to the original PrintNightmare (CVE-2021-34527). CVE-2022-35755 can be exploited using a specially crafted “input file,” while exploitation of CVE-2022-35793 requires a user click on a specially crafted URL. Both would give the attacker SYSTEM privileges.

tenable: Both vulnerabilities can be mitigated by disabling the Print Spooler service, but CVE-2022-35793 can also be mitigated by disabling inbound remote printing via Group Policy.

98. Denial of Service - HTTP.sys (CVE-2022-35748) - Medium [344]

Description: HTTP.sys Denial of Service Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.514HTTP.sys
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Microsoft data

99. Elevation of Privilege - Azure Site Recovery (CVE-2022-35783) - Medium [341]

Description: Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Azure Site Recovery
CVSS Base Score0.410Vulnerability Severity Rating based on CVSS Base Score is 4.4. Based on Microsoft data

100. Elevation of Privilege - Azure Site Recovery (CVE-2022-35812) - Medium [341]

Description: Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Azure Site Recovery
CVSS Base Score0.410Vulnerability Severity Rating based on CVSS Base Score is 4.4. Based on Microsoft data

101. Elevation of Privilege - Storage Spaces Direct (CVE-2022-35762) - Medium [341]

Description: Storage Spaces Direct Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35763, CVE-2022-35764, CVE-2022-35765, CVE-2022-35792.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.714Storage Spaces Direct is a feature of Azure Stack HCI and Windows Server that enables you to cluster servers with internal storage into a software-defined storage solution
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.8. Based on Microsoft data

102. Elevation of Privilege - Storage Spaces Direct (CVE-2022-35763) - Medium [341]

Description: Storage Spaces Direct Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35762, CVE-2022-35764, CVE-2022-35765, CVE-2022-35792.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.714Storage Spaces Direct is a feature of Azure Stack HCI and Windows Server that enables you to cluster servers with internal storage into a software-defined storage solution
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.8. Based on Microsoft data

103. Elevation of Privilege - Storage Spaces Direct (CVE-2022-35764) - Medium [341]

Description: Storage Spaces Direct Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35762, CVE-2022-35763, CVE-2022-35765, CVE-2022-35792.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.714Storage Spaces Direct is a feature of Azure Stack HCI and Windows Server that enables you to cluster servers with internal storage into a software-defined storage solution
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.8. Based on Microsoft data

104. Elevation of Privilege - Storage Spaces Direct (CVE-2022-35765) - Medium [341]

Description: Storage Spaces Direct Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35762, CVE-2022-35763, CVE-2022-35764, CVE-2022-35792.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.714Storage Spaces Direct is a feature of Azure Stack HCI and Windows Server that enables you to cluster servers with internal storage into a software-defined storage solution
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.8. Based on Microsoft data

105. Elevation of Privilege - Storage Spaces Direct (CVE-2022-35792) - Medium [341]

Description: Storage Spaces Direct Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35762, CVE-2022-35763, CVE-2022-35764, CVE-2022-35765.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.714Storage Spaces Direct is a feature of Azure Stack HCI and Windows Server that enables you to cluster servers with internal storage into a software-defined storage solution
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.8. Based on Microsoft data

106. Information Disclosure - Microsoft Exchange (CVE-2022-30134) - Medium [340]

Description: Microsoft Exchange Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-21979, CVE-2022-34692.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.415Information Disclosure
Vulnerable Product is Common0.814Exchange
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.6. Based on Microsoft data

qualys: Microsoft Patch Tuesday Summary Microsoft has fixed 121 vulnerabilities (aka flaws) in the August 2022 update, including 17 vulnerabilities classified as Critical as they allow Elevation of Privilege (EoP) and Remote Code Execution (RCE). This month’s Patch Tuesday fixes two (2) zero-day vulnerabilities, with one (1) actively exploited* in attacks (CVE-2022-34713*, CVE-2022-30134). Earlier this month, August 5, 2022, Microsoft also released 20 Microsoft Edge (Chromium-Based) updates addressing Elevation of Privilege (EoP), Remote Code Execution (RCE), and Security Feature Bypass with severities of Low, Moderate, and Important respectively. Microsoft has fixed several flaws in its software, including Denial of Service (DoS), Elevation of Privilege (EoP), Information Disclosure, Microsoft Edge (Chromium-based), Remote Code Execution (RCE), Security Feature Bypass, and Spoofing.

qualys: CVE-2022-30134 | Microsoft Exchange Information Disclosure Vulnerability This vulnerability has a CVSSv3.1 score of 7.6/10. This vulnerability requires that a user with an affected version of Exchange Server access a malicious server. An attacker would have to host a specially crafted server share or website. An attacker would have no way to force users to visit this specially crafted server share or website, but would have to convince them to visit the server share or website, typically by way of an enticement in an email or chat message. For more information, see Exchange Server Support for Windows Extended Protection and/or The Exchange Blog. Exploitability Assessment: Exploitation Unlikely

rapid7: Publicly disclosed, but not (yet) exploited is CVE-2022-30134, an Information Disclosure vulnerability affecting Exchange Server. In this case, simply patching is not sufficient to protect against attackers being able to read targeted email messages. Administrators should enable Extended Protection in order to fully remediate this vulnerability, as well as the five other vulnerabilities affecting Exchange this month. Details about how to accomplish this are available via the Exchange Blog.

kaspersky: The second zero-day vulnerability closed last Tuesday is CVE-2022-30134. It’s contained in Microsoft Exchange. Information about it was published before Microsoft was able to create the patch, but so far this vulnerability has not been exploited in the wild. Theoretically, if an attacker manages to use CVE-2022-30134, he will be able to read the victim’s email correspondence. This is not the only flaw in Exchange that was fixed by the new patch. It also closes the CVE-2022-24516, CVE-2022-21980 and CVE-2022-24477 vulnerabilities that allow attackers to elevate their privileges.

107. Security Feature Bypass - Microsoft Edge (CVE-2022-2479) - Medium [333]

Description: Chromium: CVE-2022-2479 Insufficient validation of untrusted input in File. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Web browser
CVSS Base Score0.010Vulnerability Severity Rating based on CVSS Base Score is NA. No data.

MS PT Extended: CVE-2022-2479 was published before August 2022 Patch Tuesday from 2022-07-13 to 2022-08-08

108. Security Feature Bypass - Microsoft Edge (CVE-2022-2610) - Medium [333]

Description: Chromium: CVE-2022-2610 Insufficient policy enforcement in Background Fetch. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Web browser
CVSS Base Score0.010Vulnerability Severity Rating based on CVSS Base Score is NA. No data.

MS PT Extended: CVE-2022-2610 was published before August 2022 Patch Tuesday from 2022-07-13 to 2022-08-08

109. Security Feature Bypass - Microsoft Edge (CVE-2022-2615) - Medium [333]

Description: Chromium: CVE-2022-2615 Insufficient policy enforcement in Cookies. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Web browser
CVSS Base Score0.010Vulnerability Severity Rating based on CVSS Base Score is NA. No data.

MS PT Extended: CVE-2022-2615 was published before August 2022 Patch Tuesday from 2022-07-13 to 2022-08-08

110. Security Feature Bypass - Microsoft Edge (CVE-2022-2618) - Medium [333]

Description: Chromium: CVE-2022-2618 Insufficient validation of untrusted input in Internals. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Web browser
CVSS Base Score0.010Vulnerability Severity Rating based on CVSS Base Score is NA. No data.

MS PT Extended: CVE-2022-2618 was published before August 2022 Patch Tuesday from 2022-07-13 to 2022-08-08

111. Security Feature Bypass - Microsoft Edge (CVE-2022-2619) - Medium [333]

Description: Chromium: CVE-2022-2619 Insufficient validation of untrusted input in Settings. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Web browser
CVSS Base Score0.010Vulnerability Severity Rating based on CVSS Base Score is NA. No data.

MS PT Extended: CVE-2022-2619 was published before August 2022 Patch Tuesday from 2022-07-13 to 2022-08-08

112. Security Feature Bypass - Microsoft Edge (CVE-2022-2622) - Medium [333]

Description: Chromium: CVE-2022-2622 Insufficient validation of untrusted input in Safe Browsing. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Web browser
CVSS Base Score0.010Vulnerability Severity Rating based on CVSS Base Score is NA. No data.

MS PT Extended: CVE-2022-2622 was published before August 2022 Patch Tuesday from 2022-07-13 to 2022-08-08

113. Information Disclosure - Windows Kernel (CVE-2022-30197) - Medium [332]

Description: Windows Kernel Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-34708.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.415Information Disclosure
Vulnerable Product is Common0.914Windows Kernel
CVSS Base Score0.610Vulnerability Severity Rating based on CVSS Base Score is 5.5. Based on Microsoft data

114. Information Disclosure - Windows Kernel (CVE-2022-34708) - Medium [332]

Description: Windows Kernel Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-30197.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.415Information Disclosure
Vulnerable Product is Common0.914Windows Kernel
CVSS Base Score0.610Vulnerability Severity Rating based on CVSS Base Score is 5.5. Based on Microsoft data

115. Elevation of Privilege - Windows Hyper-V (CVE-2022-35751) - Medium [322]

Description: Windows Hyper-V Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.614Hardware virtualization component of the client editions of Windows NT
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.8. Based on Microsoft data

116. Information Disclosure - Windows Defender Credential Guard (CVE-2022-34704) - Medium [313]

Description: Windows Defender Credential Guard Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-34710, CVE-2022-34712.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.415Information Disclosure
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.610Vulnerability Severity Rating based on CVSS Base Score is 5.5. Based on Microsoft data

117. Information Disclosure - Windows Defender Credential Guard (CVE-2022-34710) - Medium [313]

Description: Windows Defender Credential Guard Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-34704, CVE-2022-34712.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.415Information Disclosure
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.610Vulnerability Severity Rating based on CVSS Base Score is 5.5. Based on Microsoft data

118. Information Disclosure - Windows Defender Credential Guard (CVE-2022-34712) - Medium [313]

Description: Windows Defender Credential Guard Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-34704, CVE-2022-34710.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.415Information Disclosure
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.610Vulnerability Severity Rating based on CVSS Base Score is 5.5. Based on Microsoft data

119. Information Disclosure - Windows Kernel Memory (CVE-2022-35758) - Medium [313]

Description: Windows Kernel Memory Information Disclosure Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.415Information Disclosure
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.610Vulnerability Severity Rating based on CVSS Base Score is 5.5. Based on Microsoft data

120. Information Disclosure - Azure RTOS (CVE-2022-34685) - Medium [310]

Description: Azure RTOS GUIX Studio Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-34686.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.415Information Disclosure
Vulnerable Product is Common0.314Azure RTOS is a small, fast, reliable, and easy-to-use real-time operating system (RTOS) for connecting deeply embedded IoT devices
CVSS Base Score0.610Vulnerability Severity Rating based on CVSS Base Score is 5.5. Based on Microsoft data

121. Information Disclosure - Azure RTOS (CVE-2022-34686) - Medium [310]

Description: Azure RTOS GUIX Studio Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-34685.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.415Information Disclosure
Vulnerable Product is Common0.314Azure RTOS is a small, fast, reliable, and easy-to-use real-time operating system (RTOS) for connecting deeply embedded IoT devices
CVSS Base Score0.610Vulnerability Severity Rating based on CVSS Base Score is 5.5. Based on Microsoft data

122. Information Disclosure - Azure Arc Jumpstart (CVE-2022-35798) - Medium [308]

Description: Azure Arc Jumpstart Information Disclosure Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.415Information Disclosure
Vulnerable Product is Common0.514Azure Arc Jumpstart
CVSS Base Score0.310Vulnerability Severity Rating based on CVSS Base Score is 3.3. Based on Microsoft data

MS PT Extended: CVE-2022-35798 was published before August 2022 Patch Tuesday from 2022-07-13 to 2022-08-08

123. Elevation of Privilege - Azure Site Recovery (CVE-2022-35802) - Medium [304]

Description: Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Azure Site Recovery
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 8.1. Based on Microsoft data

124. Elevation of Privilege - Microsoft ATA Port Driver (CVE-2022-35760) - Medium [304]

Description: Microsoft ATA Port Driver Elevation of Privilege Vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Microsoft ATA Port Driver
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.8. Based on Microsoft data

125. Information Disclosure - Azure Sphere (CVE-2022-35821) - Medium [302]

Description: Azure Sphere Information Disclosure Vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists0.417The existence of a public exploit is mentioned in Microsoft CVSS Temporal Score (Proof-of-Concept Exploit)
Criticality of Vulnerability Type0.415Information Disclosure
Vulnerable Product is Common0.414Microsoft Azure Sphere is a solution for creating highly-secured, connected, MCU-powered devices
CVSS Base Score0.410Vulnerability Severity Rating based on CVSS Base Score is 4.4. Based on Microsoft data

126. Information Disclosure - Microsoft Exchange (CVE-2022-21979) - Medium [300]

Description: Microsoft Exchange Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-30134, CVE-2022-34692.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.415Information Disclosure
Vulnerable Product is Common0.814Exchange
CVSS Base Score0.510Vulnerability Severity Rating based on CVSS Base Score is 4.8. Based on Microsoft data

127. Information Disclosure - Microsoft Exchange (CVE-2022-34692) - Medium [300]

Description: Microsoft Exchange Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-21979, CVE-2022-30134.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.415Information Disclosure
Vulnerable Product is Common0.814Exchange
CVSS Base Score0.510Vulnerability Severity Rating based on CVSS Base Score is 5.3. Based on Microsoft data

128. Spoofing - .NET (CVE-2022-34716) - Medium [294]

Description: .NET Spoofing Vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.415Spoofing
Vulnerable Product is Common0.714.NET
CVSS Base Score0.610Vulnerability Severity Rating based on CVSS Base Score is 5.9. Based on Microsoft data

129. Elevation of Privilege - Unified Write Filter (CVE-2022-35754) - Medium [290]

Description: Unified Write Filter Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.514Unified Write Filter
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.7. Based on Microsoft data

130. Memory Corruption - Microsoft Edge (CVE-2022-2477) - Medium [272]

Description: Chromium: CVE-2022-2477 Use after free in Guest View. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Web browser
CVSS Base Score0.010Vulnerability Severity Rating based on CVSS Base Score is NA. No data.

MS PT Extended: CVE-2022-2477 was published before August 2022 Patch Tuesday from 2022-07-13 to 2022-08-08

131. Memory Corruption - Microsoft Edge (CVE-2022-2478) - Medium [272]

Description: Chromium: CVE-2022-2478 Use after free in PDF. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Web browser
CVSS Base Score0.010Vulnerability Severity Rating based on CVSS Base Score is NA. No data.

MS PT Extended: CVE-2022-2478 was published before August 2022 Patch Tuesday from 2022-07-13 to 2022-08-08

132. Memory Corruption - Microsoft Edge (CVE-2022-2480) - Medium [272]

Description: Chromium: CVE-2022-2480 Use after free in Service Worker API. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Web browser
CVSS Base Score0.010Vulnerability Severity Rating based on CVSS Base Score is NA. No data.

MS PT Extended: CVE-2022-2480 was published before August 2022 Patch Tuesday from 2022-07-13 to 2022-08-08

133. Memory Corruption - Microsoft Edge (CVE-2022-2481) - Medium [272]

Description: Chromium: CVE-2022-2481 Use after free in Views. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Web browser
CVSS Base Score0.010Vulnerability Severity Rating based on CVSS Base Score is NA. No data.

MS PT Extended: CVE-2022-2481 was published before August 2022 Patch Tuesday from 2022-07-13 to 2022-08-08

134. Memory Corruption - Microsoft Edge (CVE-2022-2603) - Medium [272]

Description: Chromium: CVE-2022-2603 Use after free in Omnibox. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Web browser
CVSS Base Score0.010Vulnerability Severity Rating based on CVSS Base Score is NA. No data.

MS PT Extended: CVE-2022-2603 was published before August 2022 Patch Tuesday from 2022-07-13 to 2022-08-08

135. Memory Corruption - Microsoft Edge (CVE-2022-2604) - Medium [272]

Description: Chromium: CVE-2022-2604 Use after free in Safe Browsing. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Web browser
CVSS Base Score0.010Vulnerability Severity Rating based on CVSS Base Score is NA. No data.

MS PT Extended: CVE-2022-2604 was published before August 2022 Patch Tuesday from 2022-07-13 to 2022-08-08

136. Memory Corruption - Microsoft Edge (CVE-2022-2605) - Medium [272]

Description: Chromium: CVE-2022-2605 Out of bounds read in Dawn. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Web browser
CVSS Base Score0.010Vulnerability Severity Rating based on CVSS Base Score is NA. No data.

MS PT Extended: CVE-2022-2605 was published before August 2022 Patch Tuesday from 2022-07-13 to 2022-08-08

137. Memory Corruption - Microsoft Edge (CVE-2022-2606) - Medium [272]

Description: Chromium: CVE-2022-2606 Use after free in Managed devices API. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Web browser
CVSS Base Score0.010Vulnerability Severity Rating based on CVSS Base Score is NA. No data.

MS PT Extended: CVE-2022-2606 was published before August 2022 Patch Tuesday from 2022-07-13 to 2022-08-08

138. Memory Corruption - Microsoft Edge (CVE-2022-2614) - Medium [272]

Description: Chromium: CVE-2022-2614 Use after free in Sign-In Flow. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Web browser
CVSS Base Score0.010Vulnerability Severity Rating based on CVSS Base Score is NA. No data.

MS PT Extended: CVE-2022-2614 was published before August 2022 Patch Tuesday from 2022-07-13 to 2022-08-08

139. Memory Corruption - Microsoft Edge (CVE-2022-2617) - Medium [272]

Description: Chromium: CVE-2022-2617 Use after free in Extensions API. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Web browser
CVSS Base Score0.010Vulnerability Severity Rating based on CVSS Base Score is NA. No data.

MS PT Extended: CVE-2022-2617 was published before August 2022 Patch Tuesday from 2022-07-13 to 2022-08-08

140. Memory Corruption - Microsoft Edge (CVE-2022-2621) - Medium [272]

Description: Chromium: CVE-2022-2621 Use after free in Extensions. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Web browser
CVSS Base Score0.010Vulnerability Severity Rating based on CVSS Base Score is NA. No data.

MS PT Extended: CVE-2022-2621 was published before August 2022 Patch Tuesday from 2022-07-13 to 2022-08-08

141. Memory Corruption - Microsoft Edge (CVE-2022-2624) - Medium [272]

Description: Chromium: CVE-2022-2624 Heap buffer overflow in PDF. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.615Memory Corruption
Vulnerable Product is Common0.814Web browser
CVSS Base Score0.010Vulnerability Severity Rating based on CVSS Base Score is NA. No data.

MS PT Extended: CVE-2022-2624 was published before August 2022 Patch Tuesday from 2022-07-13 to 2022-08-08

142. Security Feature Bypass - Crypto Pro (CVE-2022-34303) - Medium [239]

Description: CERT/CC: CVE-20220-34303 Crypto Pro Boot Loader Bypass

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.314Crypto Pro
CVSS Base Score0.010Vulnerability Severity Rating based on CVSS Base Score is NA. No data.

qualys: CERT/CC: CVE-2022-34303 Crypto Pro Boot Loader Bypass At the time of publication, a CVSSv3.1 score has not been assigned. Exploitability Assessment: Exploitation More Likely

tenable: As part of this month’s Patch Tuesday release, Microsoft addressed three security bypass vulnerabilities in a third-party driver affecting Windows Secure Boot: CVE-2022-34301, CVE-2022-34302 and CVE-2022-34303. These flaws were reported through the CERT Coordination Center (CERT/CC). We have not included these flaws as part of our metrics for this month’s Patch Tuesday release because they are standalone security updates for third-party drivers.

143. Security Feature Bypass - Eurosoft (CVE-2022-34301) - Medium [239]

Description: CERT/CC: CVE-2022-34301 Eurosoft Boot Loader Bypass

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.314Eurosoft
CVSS Base Score0.010Vulnerability Severity Rating based on CVSS Base Score is NA. No data.

qualys: CERT/CC: CVE-2022-34301 Eurosoft Boot Loader Bypass

tenable: As part of this month’s Patch Tuesday release, Microsoft addressed three security bypass vulnerabilities in a third-party driver affecting Windows Secure Boot: CVE-2022-34301, CVE-2022-34302 and CVE-2022-34303. These flaws were reported through the CERT Coordination Center (CERT/CC). We have not included these flaws as part of our metrics for this month’s Patch Tuesday release because they are standalone security updates for third-party drivers.

144. Security Feature Bypass - New Horizon Data Systems Inc (CVE-2022-34302) - Medium [239]

Description: CERT/CC: CVE-2022-34302 New Horizon Data Systems Inc Boot Loader Bypass

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.314New Horizon Data Systems Inc
CVSS Base Score0.010Vulnerability Severity Rating based on CVSS Base Score is NA. No data.

qualys: CERT/CC: CVE-2022-34302 New Horizon Data Systems Inc Boot Loader Bypass

tenable: As part of this month’s Patch Tuesday release, Microsoft addressed three security bypass vulnerabilities in a third-party driver affecting Windows Secure Boot: CVE-2022-34301, CVE-2022-34302 and CVE-2022-34303. These flaws were reported through the CERT Coordination Center (CERT/CC). We have not included these flaws as part of our metrics for this month’s Patch Tuesday release because they are standalone security updates for third-party drivers.

145. Information Disclosure - Microsoft Edge (CVE-2022-2612) - Medium [232]

Description: Chromium: CVE-2022-2612 Side-channel information leakage in Keyboard input. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type0.415Information Disclosure
Vulnerable Product is Common0.814Web browser
CVSS Base Score0.010Vulnerability Severity Rating based on CVSS Base Score is NA. No data.

MS PT Extended: CVE-2022-2612 was published before August 2022 Patch Tuesday from 2022-07-13 to 2022-08-08

Low (2)

146. Unknown Vulnerability Type - Microsoft Edge (CVE-2022-2611) - Low [151]

Description: {'ms_cve_data_all': 'Chromium: CVE-2022-2611 Inappropriate implementation in Fullscreen API. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.\n', 'nvd_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Inappropriate implementation in Fullscreen API in Google Chrome on Android prior to 104.0.5112.79 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common0.814Web browser
CVSS Base Score0.010Vulnerability Severity Rating based on CVSS Base Score is NA. No data.

MS PT Extended: CVE-2022-2611 was published before August 2022 Patch Tuesday from 2022-07-13 to 2022-08-08

147. Unknown Vulnerability Type - Microsoft Edge (CVE-2022-2616) - Low [151]

Description: {'ms_cve_data_all': 'Chromium: CVE-2022-2616 Inappropriate implementation in Extensions API. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.\n', 'nvd_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Inappropriate implementation in Extensions API in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to spoof the contents of the Omnibox (URL bar) via a crafted Chrome Extension.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned on Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017The existence of a public exploit is NOT mentioned on Vulners and Microsoft websites
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common0.814Web browser
CVSS Base Score0.010Vulnerability Severity Rating based on CVSS Base Score is NA. No data.

MS PT Extended: CVE-2022-2616 was published before August 2022 Patch Tuesday from 2022-07-13 to 2022-08-08

Exploitation in the wild detected (1)

Remote Code Execution (1)

Public exploit exists, but exploitation in the wild is NOT detected (1)

Memory Corruption (1)

Other Vulnerabilities (145)

Remote Code Execution (31)

Security Feature Bypass (13)

Elevation of Privilege (65)

Denial of Service (7)

Information Disclosure (14)

Spoofing (1)

Memory Corruption (12)

Unknown Vulnerability Type (2)