8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
9.2 High
AI Score
Confidence
Low
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.005 Low
EPSS
Percentile
75.2%
10/11/2022
Critical
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, spoof user interface, obtain sensitive information, cause denial of service, execute arbitrary code, bypass security restrictions.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Windows Server 2012
Windows 8.1 for 32-bit systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows Server 2019 (Server Core installation)
Windows 10 Version 21H1 for ARM64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 10 Version 21H1 for x64-based Systems
Windows Server 2019
Windows 10 Version 21H2 for 32-bit Systems
Windows Server 2012 R2 (Server Core installation)
Windows Server 2016 (Server Core installation)
Windows Server 2022
Windows Server 2022 (Server Core installation)
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 for x64-based Systems
Windows Server 2012 R2
Windows 11 for ARM64-based Systems
Windows 10 Version 20H2 for ARM64-based Systems
Windows 10 Version 21H1 for 32-bit Systems
Windows RT 8.1
Windows 10 Version 20H2 for 32-bit Systems
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 20H2 for x64-based Systems
Windows Server 2012 (Server Core installation)
Windows 11 for x64-based Systems
Windows 10 for 32-bit Systems
Windows 8.1 for x64-based systems
Windows 11 Version 22H2 for x64-based Systems
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2022-38029
CVE-2022-34689
CVE-2022-37985
CVE-2022-37975
CVE-2022-37996
CVE-2022-38050
CVE-2022-37965
CVE-2022-37983
CVE-2022-38042
CVE-2022-37984
CVE-2022-37981
CVE-2022-24504
CVE-2022-33634
CVE-2022-37990
CVE-2022-38046
CVE-2022-38003
CVE-2022-38038
CVE-2022-37979
CVE-2022-37998
CVE-2022-37991
CVE-2022-37993
CVE-2022-38041
CVE-2022-38030
CVE-2022-38027
CVE-2022-33645
CVE-2022-38034
CVE-2022-37977
CVE-2022-38033
CVE-2022-38037
CVE-2022-38028
CVE-2022-38000
CVE-2022-37989
CVE-2022-37978
CVE-2022-41033
CVE-2022-37994
CVE-2022-37974
CVE-2022-38021
CVE-2022-37999
CVE-2022-37973
CVE-2022-38032
CVE-2022-38045
CVE-2022-38051
CVE-2022-37976
CVE-2022-38047
CVE-2022-38044
CVE-2022-38040
CVE-2022-37970
CVE-2022-37982
CVE-2022-38025
CVE-2022-37997
CVE-2022-38016
CVE-2022-33635
CVE-2022-22035
CVE-2022-37980
CVE-2022-38043
CVE-2022-37995
CVE-2022-37988
CVE-2022-38026
CVE-2022-30198
CVE-2022-38022
CVE-2022-37986
CVE-2022-38039
CVE-2022-38036
CVE-2022-41081
CVE-2022-37987
CVE-2022-38031
CVE-2022-35770
ACE
CVE-2022-380297.0High
CVE-2022-346897.5Critical
CVE-2022-379855.5High
CVE-2022-379758.8Critical
CVE-2022-379965.5High
CVE-2022-380507.8Critical
CVE-2022-379655.9High
CVE-2022-379837.8Critical
CVE-2022-380427.1High
CVE-2022-379847.8Critical
CVE-2022-379814.3Warning
CVE-2022-245048.1Critical
CVE-2022-336348.1Critical
CVE-2022-379907.8Critical
CVE-2022-380467.5Critical
CVE-2022-380037.8Critical
CVE-2022-380387.8Critical
CVE-2022-379797.8Critical
CVE-2022-379987.7Critical
CVE-2022-379917.8Critical
CVE-2022-379937.8Critical
CVE-2022-380417.5Critical
CVE-2022-380304.3Warning
CVE-2022-380277.0High
CVE-2022-336457.5Critical
CVE-2022-380348.8Critical
CVE-2022-379776.5High
CVE-2022-380336.5High
CVE-2022-380377.8Critical
CVE-2022-380287.8Critical
CVE-2022-380008.1Critical
CVE-2022-379897.8Critical
CVE-2022-379787.5Critical
CVE-2022-410337.8Critical
CVE-2022-379947.8Critical
CVE-2022-379746.5High
CVE-2022-380217.0High
CVE-2022-379997.8Critical
CVE-2022-379737.7Critical
CVE-2022-380326.6High
CVE-2022-380458.8Critical
CVE-2022-380517.8Critical
CVE-2022-379768.8Critical
CVE-2022-380478.1Critical
CVE-2022-380447.8Critical
CVE-2022-380408.8Critical
CVE-2022-379707.8Critical
CVE-2022-379828.8Critical
CVE-2022-380255.5High
CVE-2022-379977.8Critical
CVE-2022-380168.8Critical
CVE-2022-336357.8Critical
CVE-2022-220358.1Critical
CVE-2022-379807.8Critical
CVE-2022-380435.5High
CVE-2022-379957.8Critical
CVE-2022-379887.8Critical
CVE-2022-380265.5High
CVE-2022-301988.1Critical
CVE-2022-380223.3Warning
CVE-2022-379867.8Critical
CVE-2022-380397.8Critical
CVE-2022-380367.5Critical
CVE-2022-410818.1Critical
CVE-2022-379877.8Critical
CVE-2022-380318.8Critical
CVE-2022-357706.5High
5016627
5016622
5016683
5016639
5016616
5016623
5016681
5016629
5018474
5018418
5018476
5018427
5018410
5018425
5018421
5018411
5018419
support.microsoft.com/kb/5016616
support.microsoft.com/kb/5016622
support.microsoft.com/kb/5016623
support.microsoft.com/kb/5016627
support.microsoft.com/kb/5016629
support.microsoft.com/kb/5016639
support.microsoft.com/kb/5016681
support.microsoft.com/kb/5016683
support.microsoft.com/kb/5018410
support.microsoft.com/kb/5018411
support.microsoft.com/kb/5018418
support.microsoft.com/kb/5018419
support.microsoft.com/kb/5018421
support.microsoft.com/kb/5018425
support.microsoft.com/kb/5018427
support.microsoft.com/kb/5018474
support.microsoft.com/kb/5018476
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22035
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24504
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30198
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33634
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33635
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33645
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34689
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35770
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37965
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37970
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37973
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37974
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37975
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37976
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37977
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37978
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37979
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37980
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37981
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37982
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37983
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37984
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37985
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37986
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37987
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37988
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37989
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37990
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37991
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37993
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37994
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37995
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37996
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37997
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37998
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37999
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38000
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38003
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38016
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38021
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38022
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38025
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38026
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38027
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38028
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38029
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38030
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38031
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38032
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38033
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38034
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38036
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38037
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38038
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38039
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38040
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38041
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38042
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38043
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38044
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38045
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38046
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38047
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38050
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38051
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41033
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41081
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22035
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24504
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30198
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33634
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33635
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33645
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34689
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35770
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37965
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37970
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37973
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37974
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37975
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37976
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37977
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37978
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37979
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37980
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37981
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37982
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37983
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37984
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37985
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37986
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37987
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37988
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37989
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37990
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37991
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37993
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37994
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37995
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37996
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37997
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37998
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37999
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38000
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38003
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38016
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38021
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38022
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38025
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38026
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38027
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38028
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38029
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38030
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38031
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38032
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38033
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38034
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38036
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38037
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38038
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38039
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38040
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38041
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38042
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38043
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38044
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38045
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38046
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38047
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38050
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38051
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41033
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41081
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-11/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2016/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2019/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
9.2 High
AI Score
Confidence
Low
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.005 Low
EPSS
Percentile
75.2%