CVE-2022-34707Use After Free in Microsoft Windows 10 Version 1507

CWE-416Use After Free8 documents5 sources
Severity
7.8HIGHNVD
EPSS
0.5%
top 36.27%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 9
Latest updateMay 1

Description

Windows Kernel Elevation of Privilege Vulnerability

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages20 packages

CVEListV5microsoft/windows_76.1.06.1.7601.26065
CVEListV5microsoft/windows_8.16.3.06.3.9600.20520
CVEListV5microsoft/windows_server_20126.2.9200.06.2.9200.23817
CVEListV5microsoft/windows_server_201610.0.14393.010.0.14393.5291
CVEListV5microsoft/windows_server_201910.0.17763.010.0.17763.3287

🔴Vulnerability Details

6
Project0
The Windows Registry Adventure #8: Practical exploitation of hive memory corruption - Project Zero2025-05-01
Project0
The Windows Registry Adventure #7: Attack surface analysis - Project Zero2025-05-01
Project0
The Windows Registry Adventure #5: The regf file format - Project Zero2024-12-01
Project0
The Windows Registry Adventure #1: Introduction and research results - Project Zero2024-04-01
GHSA
GHSA-rv6c-672j-cj29: Windows Kernel Elevation of Privilege Vulnerability2022-08-10

📋Vendor Advisories

1
Microsoft
Windows Kernel Elevation of Privilege Vulnerability2022-08-09
CVE-2022-34707 — Use After Free in Microsoft | cvebase