Lucene search

K
kasperskyKaspersky LabKLA19245
HistorySep 13, 2022 - 12:00 a.m.

KLA19245 Multiple vulnerabilities in Microsoft Windows

2022-09-1300:00:00
Kaspersky Lab
threats.kaspersky.com
150

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.2 High

AI Score

Confidence

High

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.28 Low

EPSS

Percentile

96.8%

Detect date:

09/13/2022

Severity:

Critical

Description:

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, cause denial of service, obtain sensitive information, bypass security restrictions.

Exploitation:

Public exploits exist for this vulnerability.

Affected products:

Windows Server 2016 (Server Core installation)
Windows 10 for 32-bit Systems
Windows Server 2012 (Server Core installation)
Windows 11 for x64-based Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 for x64-based Systems
Windows 10 Version 21H1 for ARM64-based Systems
Windows Server 2012 R2
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 21H1 for x64-based Systems
Windows 10 Version 21H1 for 32-bit Systems
Windows Server 2012
Windows Server 2019 (Server Core installation)
Raw Image Extension
Windows 10 Version 1607 for x64-based Systems
Windows Server 2022 Azure Edition Core Hotpatch
Windows 11 for ARM64-based Systems
Windows Server 2022
AV1 Video Extension
Windows Server 2012 R2 (Server Core installation)
Windows RT 8.1
Windows 10 Version 20H2 for 32-bit Systems
Windows 10 Version 20H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 8.1 for 32-bit systems
Windows Server 2019
Windows Server 2022 (Server Core installation)
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 20H2 for x64-based Systems
Windows 8.1 for x64-based systems
Windows Server 2016
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 21H2 for 32-bit Systems

Solution:

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Original advisories:

CVE-2022-35840
CVE-2022-38004
CVE-2022-34727
CVE-2022-37969
CVE-2022-30170
CVE-2022-34724
CVE-2022-33647
CVE-2022-34732
CVE-2022-35830
CVE-2022-34726
CVE-2022-34718
CVE-2022-34721
CVE-2022-37957
CVE-2022-37955
CVE-2022-34731
CVE-2022-35803
CVE-2022-30200
CVE-2022-34730
CVE-2022-34729
CVE-2022-38006
CVE-2022-38005
CVE-2022-35831
CVE-2022-34723
CVE-2022-37959
CVE-2022-34725
CVE-2022-38011
CVE-2022-37956
CVE-2022-34733
CVE-2022-35836
CVE-2022-35833
CVE-2022-35832
CVE-2022-37958
CVE-2022-35835
CVE-2022-33679
CVE-2022-26928
CVE-2022-37954
CVE-2022-34734
CVE-2022-34728
CVE-2022-23960
CVE-2022-35841
CVE-2022-34720
CVE-2022-34719
CVE-2022-34722
CVE-2022-35837
CVE-2022-38019
CVE-2022-30196
CVE-2022-35838
CVE-2022-35834

Impacts:

ACE

Related products:

Microsoft Windows

CVE-IDS:

CVE-2022-358408.8Critical
CVE-2022-380047.8Critical
CVE-2022-347278.8Critical
CVE-2022-379697.8Critical
CVE-2022-301707.3High
CVE-2022-347247.5Critical
CVE-2022-336478.1Critical
CVE-2022-347328.8Critical
CVE-2022-358308.1Critical
CVE-2022-347268.8Critical
CVE-2022-347189.8Critical
CVE-2022-347219.8Critical
CVE-2022-379577.8Critical
CVE-2022-379557.8Critical
CVE-2022-347318.8Critical
CVE-2022-358037.8Critical
CVE-2022-302007.8Critical
CVE-2022-347308.8Critical
CVE-2022-347297.8Critical
CVE-2022-380066.5High
CVE-2022-380057.8Critical
CVE-2022-358315.5High
CVE-2022-347235.5High
CVE-2022-379596.5High
CVE-2022-347257.0High
CVE-2022-380117.3High
CVE-2022-379567.8Critical
CVE-2022-347338.8Critical
CVE-2022-358368.8Critical
CVE-2022-358337.5Critical
CVE-2022-358325.5High
CVE-2022-379588.1Critical
CVE-2022-358358.8Critical
CVE-2022-336798.1Critical
CVE-2022-269287.0High
CVE-2022-379547.8Critical
CVE-2022-347348.8Critical
CVE-2022-347285.5High
CVE-2022-239605.6High
CVE-2022-358418.8Critical
CVE-2022-347207.5Critical
CVE-2022-347197.8Critical
CVE-2022-347229.8Critical
CVE-2022-358376.5High
CVE-2022-380197.8Critical
CVE-2022-301968.2Critical
CVE-2022-358387.5Critical
CVE-2022-358348.8Critical

KB list:

5017392
5017377
5017316
5017327
5017365
5017367
5017315
5017305
5017328
5017308
5017370
5023713
5023702
5023697
5026456
5026370
5026368
5026361

Microsoft official advisories:

References

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.2 High

AI Score

Confidence

High

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.28 Low

EPSS

Percentile

96.8%