Lucene search

K
kasperskyKaspersky LabKLA20001
HistoryOct 11, 2022 - 12:00 a.m.

KLA20001 Multiple vulnerabilities in Microsoft Products (ESU)

2022-10-1100:00:00
Kaspersky Lab
threats.kaspersky.com
69

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

9 High

AI Score

Confidence

Low

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.023 Low

EPSS

Percentile

89.6%

Detect date:

10/11/2022

Severity:

Critical

Description:

Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to gain privileges, spoof user interface, obtain sensitive information, cause denial of service, execute arbitrary code, bypass security restrictions.

Exploitation:

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Affected products:

Windows 7 for 32-bit Systems Service Pack 1
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2

Solution:

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Original advisories:

CVE-2022-41033
CVE-2022-38029
CVE-2022-37994
CVE-2022-34689
CVE-2022-37985
CVE-2022-37975
CVE-2022-37999
CVE-2022-38032
CVE-2022-38051
CVE-2022-37976
CVE-2022-38042
CVE-2022-38047
CVE-2022-38044
CVE-2022-37981
CVE-2022-24504
CVE-2022-38040
CVE-2022-33634
CVE-2022-37990
CVE-2022-37982
CVE-2022-37997
CVE-2022-33635
CVE-2022-22035
CVE-2022-38038
CVE-2022-38043
CVE-2022-37988
CVE-2022-37991
CVE-2022-37993
CVE-2022-38026
CVE-2022-38041
CVE-2022-30198
CVE-2022-33645
CVE-2022-38034
CVE-2022-37977
CVE-2022-38033
CVE-2022-38022
CVE-2022-37986
CVE-2022-38037
CVE-2022-41081
CVE-2022-37987
CVE-2022-38031
CVE-2022-38000
CVE-2022-35770
CVE-2022-37989
CVE-2022-37978
CVE-2022-38027
CVE-2022-37996
CVE-2022-37965
CVE-2022-38028
CVE-2022-37984
CVE-2022-38045

Impacts:

ACE

Related products:

Microsoft Windows

CVE-IDS:

CVE-2022-380297.0High
CVE-2022-346897.5Critical
CVE-2022-379855.5High
CVE-2022-379758.8Critical
CVE-2022-379965.5High
CVE-2022-379655.9High
CVE-2022-380427.1High
CVE-2022-379847.8Critical
CVE-2022-379814.3Warning
CVE-2022-245048.1Critical
CVE-2022-336348.1Critical
CVE-2022-379907.8Critical
CVE-2022-380387.8Critical
CVE-2022-379917.8Critical
CVE-2022-379937.8Critical
CVE-2022-380417.5Critical
CVE-2022-380277.0High
CVE-2022-336457.5Critical
CVE-2022-380348.8Critical
CVE-2022-379776.5High
CVE-2022-380336.5High
CVE-2022-380377.8Critical
CVE-2022-380287.8Critical
CVE-2022-380008.1Critical
CVE-2022-379897.8Critical
CVE-2022-379787.5Critical
CVE-2022-410337.8Critical
CVE-2022-379947.8Critical
CVE-2022-379997.8Critical
CVE-2022-380326.6High
CVE-2022-380458.8Critical
CVE-2022-380517.8Critical
CVE-2022-379768.8Critical
CVE-2022-380478.1Critical
CVE-2022-380447.8Critical
CVE-2022-380408.8Critical
CVE-2022-379828.8Critical
CVE-2022-379977.8Critical
CVE-2022-336357.8Critical
CVE-2022-220358.1Critical
CVE-2022-380435.5High
CVE-2022-379887.8Critical
CVE-2022-380265.5High
CVE-2022-301988.1Critical
CVE-2022-380223.3Warning
CVE-2022-379867.8Critical
CVE-2022-410818.1Critical
CVE-2022-379877.8Critical
CVE-2022-380318.8Critical
CVE-2022-357706.5High

KB list:

5016672
5016622
5016683
5016684
5016681
5016686
5016669
5016679
5016676
5018474
5018478
5018476
5018457
5018446
5018479
5018450
5018454

Microsoft official advisories:

References

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

9 High

AI Score

Confidence

Low

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.023 Low

EPSS

Percentile

89.6%