Msrc Windows 11 Version 22H2 vulnerabilities
1,469 known vulnerabilities affecting msrc/windows_11_version_22h2.
Total CVEs
1,469
CISA KEV
65
actively exploited
Public exploits
26
Exploited in wild
47
Severity breakdown
CRITICAL32HIGH1032MEDIUM398LOW7
Vulnerabilities
Page 31 of 74
CVE-2024-43551HIGHCVSS 7.82024-10-08
CVE-2024-43551 [HIGH] CWE-59 Windows Storage Elevation of Privilege Vulnerability
Windows Storage Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Storage: Windows Storage
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest
msrc
CVE-2024-43615HIGHCVSS 7.12024-10-08
CVE-2024-43615 [HIGH] CWE-73 Microsoft OpenSSH for Windows Remote Code Execution Vulnerability
Microsoft OpenSSH for Windows Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component.
FAQ: According to the CVSS metric, privileges required is low (PR:L). What d
msrc
CVE-2024-43519HIGHCVSS 8.82024-10-08
CVE-2024-43519 [HIGH] CWE-197 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using th
msrc
CVE-2024-43528HIGHCVSS 7.82024-10-08
CVE-2024-43528 [HIGH] CWE-122 Windows Secure Kernel Mode Elevation of Privilege Vulnerability
Windows Secure Kernel Mode Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: Are there additional actions I need to take after installing November 12, 2024 update?
This update affects a component of Virtualization-based Secur
msrc
CVE-2024-43515HIGHCVSS 7.52024-10-08
CVE-2024-43515 [HIGH] CWE-400 Internet Small Computer Systems Interface (iSCSI) Denial of Service Vulnerability
Internet Small Computer Systems Interface (iSCSI) Denial of Service Vulnerability
Internet Small Computer Systems Interface (iSCSI): Internet Small Computer Systems Interface (iSCSI)
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely
Reference: https://cat
msrc
CVE-2024-43534MEDIUMCVSS 6.52024-10-08
CVE-2024-43534 [MEDIUM] CWE-125 Windows Graphics Component Information Disclosure Vulnerability
Windows Graphics Component Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
An attacker must send the user a malic
msrc
CVE-2024-37982MEDIUMCVSS 6.72024-10-08
CVE-2024-37982 [MEDIUM] CWE-822 Windows Resume Extensible Firmware Interface Security Feature Bypass Vulnerability
Windows Resume Extensible Firmware Interface Security Feature Bypass Vulnerability
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
An attacker who successfully exploited this vulnerability could bypass Secure Boot.
Windows EFI Partition: Windows EFI Partition
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Security
msrc
CVE-2024-43573MEDIUMCVSS 6.5KEV2024-10-08
CVE-2024-43573 [MEDIUM] CWE-79 Windows MSHTML Platform Spoofing Vulnerability
Windows MSHTML Platform Spoofing Vulnerability
FAQ: The Security Updates table indicates that this vulnerability affects all supported versions of Microsoft Windows except Windows Server 2008, Windows Server 2008 R2, and Windows Server 2012. Why are IE Cumulative updates listed for Windows Server 2012 R2?
While Microsoft has announced retirement of the Internet Explorer 11 application on certain platforms and the Micr
msrc
CVE-2024-43513MEDIUMCVSS 6.42024-10-08
CVE-2024-43513 [MEDIUM] CWE-693 BitLocker Security Feature Bypass Vulnerability
BitLocker Security Feature Bypass Vulnerability
FAQ: Is there a prerequisite for installing the security update?
Yes. For Windows Server 2012 R2 only, to apply this update, you must have KB2919355 installed.
FAQ: Are there additional steps that I need to take to be protected from this vulnerability?
Depending on the version of Windows you are running, you might need to take additional steps to update Windows Recove
msrc
CVE-2024-43585MEDIUMCVSS 5.52024-10-08
CVE-2024-43585 [MEDIUM] CWE-693 Code Integrity Guard Security Feature Bypass Vulnerability
Code Integrity Guard Security Feature Bypass Vulnerability
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
An attacker who successfully exploited this vulnerability could trick Windows Code Integrity Guard (CIG) into trusting the file the attacker altered to contain arbitrary content bypassing CIG integrity checks.
FAQ: According to the CVSS metrics, su
msrc
CVE-2024-43547MEDIUMCVSS 6.52024-10-08
CVE-2024-43547 [MEDIUM] CWE-325 Windows Kerberos Information Disclosure Vulnerability
Windows Kerberos Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is Kernel memory read - unintentional read access to memory contents in kernel space from a user mode process.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H
msrc
CVE-2024-37976MEDIUMCVSS 6.72024-10-08
CVE-2024-37976 [MEDIUM] CWE-190 Windows Resume Extensible Firmware Interface Security Feature Bypass Vulnerability
Windows Resume Extensible Firmware Interface Security Feature Bypass Vulnerability
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
An attacker who successfully exploited this vulnerability could bypass Secure Boot.
Windows EFI Partition: Windows EFI Partition
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Security
msrc
CVE-2024-43554MEDIUMCVSS 5.52024-10-08
CVE-2024-43554 [MEDIUM] CWE-212 Windows Kernel-Mode Driver Information Disclosure Vulnerability
Windows Kernel-Mode Driver Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory.
Windows Kernel-Mode Drivers:
msrc
CVE-2024-43570MEDIUMCVSS 6.42024-10-08
CVE-2024-43570 [MEDIUM] CWE-416 Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerabil
msrc
CVE-2024-43520MEDIUMCVSS 5.02024-10-08
CVE-2024-43520 [MEDIUM] CWE-476 Windows Kernel Denial of Service Vulnerability
Windows Kernel Denial of Service Vulnerability
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
An attacker must send the user a malicious input file and convince the user to open said input file.
FAQ: According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?
A
msrc
CVE-2024-37983MEDIUMCVSS 6.72024-10-08
CVE-2024-37983 [MEDIUM] CWE-822 Windows Resume Extensible Firmware Interface Security Feature Bypass Vulnerability
Windows Resume Extensible Firmware Interface Security Feature Bypass Vulnerability
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
An attacker who successfully exploited this vulnerability could bypass Secure Boot.
Windows EFI Partition: Windows EFI Partition
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Security
msrc
CVE-2024-38240HIGHCVSS 8.12024-09-10
CVE-2024-38240 [HIGH] CWE-125 Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
FAQ: Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?
The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerab
msrc
CVE-2024-38238HIGHCVSS 7.82024-09-10
CVE-2024-38238 [HIGH] CWE-122 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
Kernel Streaming Service Driver Elevation of Privilege Vulnerability
FAQ: Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?
The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affec
msrc
CVE-2024-30073HIGHCVSS 7.82024-09-10
CVE-2024-30073 [HIGH] CWE-41 Windows Security Zone Mapping Security Feature Bypass Vulnerability
Windows Security Zone Mapping Security Feature Bypass Vulnerability
FAQ: Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?
The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect t
msrc
CVE-2024-38247HIGHCVSS 7.82024-09-10
CVE-2024-38247 [HIGH] CWE-415 Windows Graphics Component Elevation of Privilege Vulnerability
Windows Graphics Component Elevation of Privilege Vulnerability
FAQ: Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?
The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their ma
msrc