Msrc Windows 11 Version 21H2 vulnerabilities
1,324 known vulnerabilities affecting msrc/windows_11_version_21h2.
Total CVEs
1,324
CISA KEV
61
actively exploited
Public exploits
20
Exploited in wild
70
Severity breakdown
CRITICAL38HIGH978MEDIUM305LOW3
Vulnerabilities
Page 49 of 67
CVE-2022-35752HIGHCVSS 8.12022-08-09
CVE-2022-35752 [HIGH] Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: How could an attacker exploit this vulnerability?
The vulnerable system can be exploited witho
msrc
CVE-2022-34302HIGHCVSS 6.72022-08-09
CVE-2022-34302 [MEDIUM] CERT/CC: CVE-2022-34302 New Horizon Data Systems Inc Boot Loader Bypass
CERT/CC: CVE-2022-34302 New Horizon Data Systems Inc Boot Loader Bypass
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
An attacker who successfully exploited this vulnerability could bypass Secure Boot.
FAQ: Why are there different security update packages for this CVE?
These are standalone security updates. These packages must be installed in add
msrc
CVE-2022-34699HIGHCVSS 7.82022-08-09
CVE-2022-34699 [HIGH] Windows Win32k Elevation of Privilege Vulnerability
Windows Win32k Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Win32K: Windows Win32K
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software R
msrc
CVE-2022-34706HIGHCVSS 7.82022-08-09
CVE-2022-34706 [HIGH] Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability
Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Local Security Authority (LSA): Windows Local Security Authority (LSA)
Microsoft: Microsoft
Customer Action Required: Yes
Impa
msrc
CVE-2022-34713HIGHCVSS 7.8KEV2022-08-09
CVE-2022-34713 [HIGH] Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability
Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?
The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself
msrc
CVE-2022-34691HIGHCVSS 8.82022-08-09
CVE-2022-34691 [HIGH] Active Directory Domain Services Elevation of Privilege Vulnerability
Active Directory Domain Services Elevation of Privilege Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An authenticated user could manipulate attributes on computer accounts they own or manage, and acquire a certificate from Active Directory Certificate Services that would allow elevation of privilege to System.
FAQ: Where can I find out more information about this vulnerability?
P
msrc
CVE-2022-35820HIGHCVSS 7.82022-08-09
CVE-2022-35820 [HIGH] Windows Bluetooth Driver Elevation of Privilege Vulnerability
Windows Bluetooth Driver Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An authorized local attacker could exploit this Windows Bluetooth driver vulnerability by programmatically running certain functions to arbitrarily gain registry key creation and deletion in the bthport.sys driver.
Microsoft Bluetooth Driver: Microsoft B
msrc
CVE-2022-34714HIGHCVSS 8.12022-08-09
CVE-2022-34714 [HIGH] Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could send a spe
msrc
CVE-2022-35753HIGHCVSS 8.12022-08-09
CVE-2022-35753 [HIGH] Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: How could an attacker exploit this vulnerability?
The vulnerable system can be exploited witho
msrc
CVE-2022-35758MEDIUMCVSS 5.52022-08-09
CVE-2022-35758 [MEDIUM] Windows Kernel Memory Information Disclosure Vulnerability
Windows Kernel Memory Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process.
Windows Kernel: Windows Kernel
Microsoft: Microsoft
Customer Act
msrc
CVE-2022-35754MEDIUMCVSS 6.72022-08-09
CVE-2022-35754 [MEDIUM] Unified Write Filter Elevation of Privilege Vulnerability
Unified Write Filter Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Unified Write Filter: Windows Unified Write Filter
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly D
msrc
CVE-2022-34709MEDIUMCVSS 6.02022-08-09
CVE-2022-34709 [MEDIUM] Windows Defender Credential Guard Security Feature Bypass Vulnerability
Windows Defender Credential Guard Security Feature Bypass Vulnerability
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
An attacker who successfully exploited this vulnerability could bypass Kerberos protection used by Defender Credential Guard.
Windows Defender Credential Guard: Windows Defender Credential Guard
Microsoft: Microsoft
Customer Act
msrc
CVE-2022-35747MEDIUMCVSS 5.92022-08-09
CVE-2022-35747 [MEDIUM] Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability
Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could send a specially crafted connection request to a RAS server, which could lead to denial of service (DOS) on the RAS server machine.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerabili
msrc
CVE-2022-34710MEDIUMCVSS 5.52022-08-09
CVE-2022-34710 [MEDIUM] Windows Defender Credential Guard Information Disclosure Vulnerability
Windows Defender Credential Guard Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successfully exploited this vulnerability could access Kerberos protected data.
Windows Defender Credential Guard: Windows Defender Credential Guard
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Information Disclosure
Exploit S
msrc
CVE-2022-35759MEDIUMCVSS 6.52022-08-09
CVE-2022-35759 [MEDIUM] Windows Local Security Authority (LSA) Denial of Service Vulnerability
Windows Local Security Authority (LSA) Denial of Service Vulnerability
Windows Local Security Authority (LSA): Windows Local Security Authority (LSA)
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https
msrc
CVE-2020-35538MEDIUMCVSS 5.52022-08-09
CVE-2020-35538 [MEDIUM] CWE-476 A crafted input file could cause a null pointer dereference in jcopy_sample_rows() when processed by libjpeg-turbo.
A crafted input file could cause a null pointer dereference in jcopy_sample_rows() when processed by libjpeg-turbo.
FAQ: Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?
One of the main benefits to our customers who choose to use the Azure Linux distro is th
msrc
CVE-2022-34704MEDIUMCVSS 4.72022-08-09
CVE-2022-34704 [MEDIUM] Windows Defender Credential Guard Information Disclosure Vulnerability
Windows Defender Credential Guard Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successfully exploited this vulnerability could recover plaintext from TLS-protected data.
Windows Defender Credential Guard: Windows Defender Credential Guard
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Information Disclosure
msrc
CVE-2022-34708MEDIUMCVSS 5.52022-08-09
CVE-2022-34708 [MEDIUM] Windows Kernel Information Disclosure Vulnerability
Windows Kernel Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process.
Windows Kernel: Windows Kernel
Microsoft: Microsoft
Customer Action Required:
msrc
CVE-2022-22024HIGHCVSS 7.82022-07-12
CVE-2022-22024 [HIGH] Windows Fax Service Remote Code Execution Vulnerability
Windows Fax Service Remote Code Execution Vulnerability
FAQ: In what scenarios is my computer vulnerable?
For Windows 11 and Windows 10 the FAX service is not installed by default. For the vulnerability to be exploitable, the Windows Fax and Scan feature needs to be enabled, and the Fax service needs to be running. Systems that do not have the Fax service running are not vulnerable.
How can I verify whether the Fax se
msrc
CVE-2022-22026HIGHCVSS 8.82022-07-12
CVE-2022-22026 [HIGH] Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability
Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?
A locally authenticated attacker could send specially crafted data to the local CSRSS service to elevate their privileges from AppContainer to SYSTEM. Because the A
msrc