Lucene search

K
nvd[email protected]NVD:CVE-2022-30190
HistoryJun 01, 2022 - 8:15 p.m.

CVE-2022-30190

2022-06-0120:15:07
CWE-610
web.nvd.nist.gov
12
msdt
url protocol
remote code execution

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.964

Percentile

99.6%

A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights.
Please see the MSRC Blog Entry for important information about steps you can take to protect your system from this vulnerability.

Affected configurations

Nvd
Node
microsoftwindows_10_1507Range<10.0.10240.19325
OR
microsoftwindows_10_1607Range<10.0.14393.5192
OR
microsoftwindows_10_1809Range<10.0.17763.3046
OR
microsoftwindows_10_20h2Range<10.0.19042.1766
OR
microsoftwindows_10_21h1Range<10.0.19043.1766
OR
microsoftwindows_10_21h2Range<10.0.19044.1766
OR
microsoftwindows_11_21h2Range<10.0.22000.739
OR
microsoftwindows_7Match-sp1
OR
microsoftwindows_8.1Match-
OR
microsoftwindows_rt_8.1Match-
OR
microsoftwindows_server_2008Match-sp2
OR
microsoftwindows_server_2008Matchr2sp1
OR
microsoftwindows_server_2012Match-
OR
microsoftwindows_server_2012Matchr2
OR
microsoftwindows_server_2016Range<10.0.14393.5192
OR
microsoftwindows_server_2019Range<10.0.17763.3046
OR
microsoftwindows_server_2022Range<10.0.20348.770
OR
microsoftwindows_server_20h2Range<10.0.19042.1766

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.964

Percentile

99.6%