8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
8 High
AI Score
Confidence
High
5.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
MULTIPLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:M/C:P/I:P/A:P
0.013 Low
EPSS
Percentile
85.3%
08/09/2022
Critical
Multiple vulnerabilities were found in Microsoft Azure. Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, execute arbitrary code, cause denial of service.
Open Management Infrastructure
Azure Site Recovery VMWare to Azure
Azure Sphere
Azure Real Time Operating System GUIX Studio
Azure Batch
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2022-35782
CVE-2022-35790
CVE-2022-33646
CVE-2022-35799
CVE-2022-35814
CVE-2022-35809
CVE-2022-35811
CVE-2022-35808
CVE-2022-34685
CVE-2022-35785
CVE-2022-35817
CVE-2022-35789
CVE-2022-35775
CVE-2022-35772
CVE-2022-35780
CVE-2022-35773
CVE-2022-35788
CVE-2022-35819
CVE-2022-35781
CVE-2022-35784
CVE-2022-35801
CVE-2022-35776
CVE-2022-35802
CVE-2022-33640
CVE-2022-35774
CVE-2022-30175
CVE-2022-35791
CVE-2022-35783
CVE-2022-35787
CVE-2022-34686
CVE-2022-35818
CVE-2022-35800
CVE-2022-35810
CVE-2022-35816
CVE-2022-35813
CVE-2022-35806
CVE-2022-35812
CVE-2022-35779
CVE-2022-30176
CVE-2022-34687
CVE-2022-35821
CVE-2022-35807
CVE-2022-35824
CVE-2022-35786
CVE-2022-35815
ACE
CVE-2022-357826.5High
CVE-2022-357906.5High
CVE-2022-336467.0High
CVE-2022-357996.5High
CVE-2022-358146.5High
CVE-2022-358096.5High
CVE-2022-358116.5High
CVE-2022-358086.5High
CVE-2022-346855.5High
CVE-2022-357856.5High
CVE-2022-358176.5High
CVE-2022-357896.5High
CVE-2022-357756.5High
CVE-2022-357727.2High
CVE-2022-357806.5High
CVE-2022-357737.8Critical
CVE-2022-357886.5High
CVE-2022-358196.5High
CVE-2022-357816.5High
CVE-2022-357846.5High
CVE-2022-358016.5High
CVE-2022-357766.2High
CVE-2022-358028.1Critical
CVE-2022-336407.8Critical
CVE-2022-357744.9Warning
CVE-2022-301757.8Critical
CVE-2022-357916.5High
CVE-2022-357834.4Warning
CVE-2022-357874.9Warning
CVE-2022-346865.5High
CVE-2022-358186.5High
CVE-2022-358004.9Warning
CVE-2022-358106.5High
CVE-2022-358166.5High
CVE-2022-358136.5High
CVE-2022-358067.8Critical
CVE-2022-358124.9Warning
CVE-2022-357797.8Critical
CVE-2022-301767.8Critical
CVE-2022-346877.8Critical
CVE-2022-358214.4Warning
CVE-2022-358076.5High
CVE-2022-358247.2High
CVE-2022-357866.5High
CVE-2022-358156.5High
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30175
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30176
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33640
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33646
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34685
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34686
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34687
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35772
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35773
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35774
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35775
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35776
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35779
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35780
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35781
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35782
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35783
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35784
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35785
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35786
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35787
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35788
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35789
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35790
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35791
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35799
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35800
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35801
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35802
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35806
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35807
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35808
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35809
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35810
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35811
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35812
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35813
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35814
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35815
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35816
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35817
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35818
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35819
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35821
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35824
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30175
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30176
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33640
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33646
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34685
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34686
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34687
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35772
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35773
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35774
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35775
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35776
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35779
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35780
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35781
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35782
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35783
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35784
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35785
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35786
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35787
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35788
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35789
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35790
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35791
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35799
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35800
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35801
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35802
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35806
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35807
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35808
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35809
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35810
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35811
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35812
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35813
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35814
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35815
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35816
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35817
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35818
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35819
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35821
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35824
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/product/Microsoft-Azure/
8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
8 High
AI Score
Confidence
High
5.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
MULTIPLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:M/C:P/I:P/A:P
0.013 Low
EPSS
Percentile
85.3%