SB2022101718 - Multiple vulnerabilities in Dell products
Published: October 17, 2022 Updated: January 20, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 117 secuirty vulnerabilities.
1) Information disclosure (CVE-ID: CVE-2022-26933)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in Windows NTFS. A local user can gain unauthorized access to sensitive information on the system.
2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-22050)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Fax Service, which leads to security restrictions bypass and privilege escalation.
3) Information disclosure (CVE-ID: CVE-2022-22711)
The vulnerability allows a local attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in Windows BitLocker. A local attacker can gain unauthorized access to sensitive information on the system.
4) Race condition (CVE-ID: CVE-2022-23270)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to a race condition in Point-to-Point Tunneling Protocol. A remote attacker can send a specially crafted connection request to a RAS server and execute arbitrary code on the target system.
5) Type Confusion (CVE-ID: CVE-2022-23816)
The vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to a branch type confusion. A local user can force the branch predictor to predict the wrong branch type and gain access to sensitive information.
6) Type Confusion (CVE-ID: CVE-2022-23825)
The vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to a branch type confusion. A local user can force the branch predictor to predict the wrong branch type and gain access to sensitive information.
7) Security features bypass (CVE-ID: CVE-2022-26913)
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to security feature bypass issue in Windows Authentication. A remote attacker can bypass the target application
8) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-26923)
The vulnerability allows a remote user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Active Directory Domain Services, which leads to security restrictions bypass and privilege escalation.
9) Man-in-the-Middle (MitM) attack (CVE-ID: CVE-2022-26925)
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists within the Windows LSA service. A remote attacker can call a method on the LSARPC interface and coerce the domain controller to authenticate to the attacker using NTLM. As a result, an attacker can obtain credentials and compromise the affected system via the NTLM Relay Attack.
Note, the vulnerability is being actively exploited in the wild.
10) Input validation error (CVE-ID: CVE-2022-26926)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows Address Book. A remote attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
11) Input validation error (CVE-ID: CVE-2022-26927)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows Graphics Component. A remote attacker can trick a victim to open a specially crafted file or visit a malicious website and execute arbitrary code on the target system.
12) Information disclosure (CVE-ID: CVE-2022-26930)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in Windows Remote Access Connection Manager. A local user can gain unauthorized access to sensitive information on the system.
13) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-26931)
The vulnerability allows a remote user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Kerberos, which leads to security restrictions bypass and privilege escalation.
14) Information disclosure (CVE-ID: CVE-2022-26934)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in Windows Graphics Component. A remote attacker can trick a victim to open a specially crafted file and gain unauthorized access to sensitive information on the system.
15) Security features bypass (CVE-ID: CVE-2022-22048)
The vulnerability allows a local attacker to bypass authentication process.
The vulnerability exists due to security feature bypass issue in BitLocker. An attacker with physical access can bypass the BitLocker Device Encryption feature on the system storage device and gain access to encrypted data.
16) Information disclosure (CVE-ID: CVE-2022-26935)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in Windows WLAN AutoConfig Service. A remote attacker on the local network can gain unauthorized access to sensitive information on the system.
17) Information disclosure (CVE-ID: CVE-2022-26936)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in Windows Server Service. A remote user can gain unauthorized access to sensitive information on the system.
18) Information disclosure (CVE-ID: CVE-2022-27776)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to curl can leak authentication or cookie header data during HTTP redirects to the same host but another port number. When asked to send custom headers or cookies in its HTTP requests, curl sends that set of headers only to the host which name is used in the initial URL, so that redirects to other hosts will make curl send the data to those. However, due to a flawed check, curl wrongly also sends that same set of headers to the hosts that are identical to the first one but use a different port number or URL scheme.
The vulnerability exists due to an incomplete fix for #VU10224 (CVE-2018-1000007).
19) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-29103)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Remote Access Connection Manager, which leads to security restrictions bypass and privilege escalation.
20) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-29104)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Print Spooler, which leads to security restrictions bypass and privilege escalation.
21) Input validation error (CVE-ID: CVE-2022-29105)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Microsoft Windows Media Foundation. A remote attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
22) Information disclosure (CVE-ID: CVE-2022-29112)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in Windows Graphics Component. A remote attacker can trick a victim to open a specially crafted file and gain unauthorized access to sensitive information on the system.
23) Race condition (CVE-ID: CVE-2022-29113)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition in Windows Digital Media Receiver. A local user can exploit the race and gain unauthorized access to sensitive information and escalate privileges on the system.
24) Path traversal (CVE-ID: CVE-2022-29114)
The vulnerability allows a local user to gain access to potentially sensitive information.
The
vulnerability exists due to path traversal in
Windows Print Spooler. A local user can gain obtain contents of arbitrary files on the system and view them with SYSTEM privileges.
25) Input validation error (CVE-ID: CVE-2022-29115)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows Fax Service. A remote attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
26) Input validation error (CVE-ID: CVE-2022-29121)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in Windows WLAN AutoConfig Service. A remote attacker on the local network can pass specially crafted input to the application and perform a denial of service (DoS) attack.
27) Race condition (CVE-ID: CVE-2022-29125)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition in Windows Push Notifications Apps. A local user can exploit the race and gain unauthorized access to sensitive information and escalate privileges on the system.
28) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-22049)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows CSRSS, which leads to security restrictions bypass and privilege escalation.
29) Buffer overflow (CVE-ID: CVE-2022-22047)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the Microsoft Windows Client/Server Runtime Subsystem (CSRSS). A local user can run a specially crafted program to execute arbitrary code with SYSTEM privileges.
Note, the vulnerability is being actively exploited in the wild.
30) Security features bypass (CVE-ID: CVE-2022-29127)
The vulnerability allows a local attacker to gain access to sensitive information.
The vulnerability exists due to an error in BitLocker. An attacker with physical access can gain access to encrypted data.
31) Input validation error (CVE-ID: CVE-2022-22019)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Remote Procedure Call Runtime. A remote attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
32) Information disclosure (CVE-ID: CVE-2022-21123)
The vulnerability allows an attacker to gain access to potentially sensitive information.
The vulnerability exists in Intel processors due to excessive data output when DirectPath I/O (PCI-Passthrough) is utilized. An attacker (both local and remote) with administrative access to a virtual machine that has an attached DirectPath I/O (PCI-Passthrough) device can obtain information stored in physical memory about the hypervisor or other virtual machines that reside on the same host.
33) Information disclosure (CVE-ID: CVE-2022-21125)
The vulnerability allows an attacker to gain access to potentially sensitive information.
The vulnerability exists in Intel processors due to excessive data output when DirectPath I/O (PCI-Passthrough) is utilized. An attacker (both local and remote) with administrative access to a virtual machine that has an attached DirectPath I/O (PCI-Passthrough) device can obtain information stored in physical memory about the hypervisor or other virtual machines that reside on the same host.
34) Incomplete cleanup (CVE-ID: CVE-2022-21127)
The vulnerability allows a local user to gain access to sensitive information on the system.
The vulnerability exists due to incomplete cleanup in specific special register read operations. A local user can enable information disclosure.
35) Information disclosure (CVE-ID: CVE-2022-21166)
The vulnerability allows an attacker to gain access to potentially sensitive information.
The vulnerability exists in Intel processors due to excessive data output when DirectPath I/O (PCI-Passthrough) is utilized. An attacker (both local and remote) with administrative access to a virtual machine that has an attached DirectPath I/O (PCI-Passthrough) device can obtain information stored in physical memory about the hypervisor or other virtual machines that reside on the same host.
36) Information disclosure (CVE-ID: CVE-2022-21845)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in Windows Kernel. A local user can gain unauthorized access to sensitive information on the system.
37) Race condition (CVE-ID: CVE-2022-21972)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to a race condition in Point-to-Point Tunneling Protocol. A remote attacker can send a specially crafted connection request to a RAS server and execute arbitrary code on the target system.
38) Information disclosure (CVE-ID: CVE-2022-22011)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in Windows Graphics Component. A local user can gain unauthorized access to sensitive information on the system.
39) Input validation error (CVE-ID: CVE-2022-22012)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows LDAP if the MaxReceiveBuffer LDAP policy is set to a value higher than the default value. A remote attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
40) Input validation error (CVE-ID: CVE-2022-22013)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows LDAP. A remote user can pass specially crafted input to the application and execute arbitrary code on the target system.
41) Input validation error (CVE-ID: CVE-2022-22014)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows LDAP. A remote user can pass specially crafted input to the application and execute arbitrary code on the target system.
42) Information disclosure (CVE-ID: CVE-2022-22015)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in Windows Remote Desktop Protocol (RDP). A remote user can gain unauthorized access to sensitive information on the system.
43) Race condition (CVE-ID: CVE-2022-22016)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition in Windows PlayToManager. A local user can exploit the race and gain unauthorized access to sensitive information and escalate privileges on the system.
44) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-22022)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Print Spooler, which leads to security restrictions bypass and privilege escalation.
45) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-22045)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows.Devices.Picker.dll, which leads to security restrictions bypass and privilege escalation.
46) Security features bypass (CVE-ID: CVE-2022-22023)
The vulnerability allows a local user to bypass authentication process.
The vulnerability exists due to security feature bypass issue in Windows Portable Device Enumerator Service. An authenticated attacker with physical access can bypass the target application.
47) Input validation error (CVE-ID: CVE-2022-22024)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows Fax Service. A remote attacker can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
48) Input validation error (CVE-ID: CVE-2022-22025)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in Windows Internet Information Services Cachuri Module. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
49) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-22026)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows CSRSS, which leads to security restrictions bypass and privilege escalation.
50) Input validation error (CVE-ID: CVE-2022-22027)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows Fax Service. A remote attacker can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
51) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-22031)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Credential Guard Domain-joined Public Key, which leads to security restrictions bypass and privilege escalation.
52) Use-after-free (CVE-ID: CVE-2022-22034)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error in multiple methods within the win32kfull driver in Microsoft Windows. A local user can run a specially crafted program to trigger a use-after-free error and execute arbitrary code with SYSTEM privileges.
List of vulnerable methods:
- UMPDDrvStretchBltROP
- UMPDDrvAlphaBlend
- UMPDDrvCopyBits
- UMPDDrvStretchBlt
- UMPDDrvPlgBlt
- UMPDDrvTransparentBlt
- UMPDDrvBitBlt
- UMPDDrvStrokePath
- UMPDDrvGradientFill
- UMPDDrvTextOut
53) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-22036)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Performance Counters for Windows, which leads to security restrictions bypass and privilege escalation.
54) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-22037)
The vulnerability allows a remote user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Advanced Local Procedure Call, which leads to security restrictions bypass and privilege escalation.
55) Input validation error (CVE-ID: CVE-2022-22038)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Remote Procedure Call Runtime. A remote attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
56) Input validation error (CVE-ID: CVE-2022-22040)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in Internet Information Services Dynamic Compression Module. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
57) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-22041)
The vulnerability allows a remote administrator to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Print Spooler, which leads to security restrictions bypass and privilege escalation.
58) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-22043)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Fast FAT File System Driver, which leads to security restrictions bypass and privilege escalation.
59) Race condition (CVE-ID: CVE-2022-29126)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition in Tablet Windows User Interface Application Core. A local user can exploit the race and gain unauthorized access to sensitive information and escalate privileges on the system.
60) Input validation error (CVE-ID: CVE-2022-29128)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows LDAP. A remote user can pass specially crafted input to the application and execute arbitrary code on the target system.
61) Input validation error (CVE-ID: CVE-2022-30221)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows Graphics Component. A remote attacker can trick a victim to connect to a malicious RDP server and execute arbitrary code on the target system.
62) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-30166)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Local Security Authority Subsystem Service, which leads to security restrictions bypass and privilege escalation.
63) OS Command Injection (CVE-ID: CVE-2022-30190)
The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.
The vulnerability exists due to improper input validation when processing URL within the Microsoft Windows Support Diagnostic Tool (MSDT). A remote unauthenticated attacker can trick the victim to open a specially crafted file, which calls the ms-msdt tool and execute arbitrary OS commands on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Note, the vulnerability is being actively exploited in the wild.
UPDATED
The vulnerability resides within MSTD and not in Microsoft Word. Microsoft Word is an attack vector and not the source of vulnerability.
64) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-30202)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Advanced Local Procedure Call, which leads to security restrictions bypass and privilege escalation.
65) Security features bypass (CVE-ID: CVE-2022-30203)
The vulnerability allows a local user to bypass authentication process.
The vulnerability exists due to security feature bypass issue in Windows Boot Manager. An authenticated attacker with physical access can bypass Secure Boot
66) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-30205)
The vulnerability allows a remote administrator to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Group Policy, which leads to security restrictions bypass and privilege escalation.
67) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-30206)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Print Spooler, which leads to security restrictions bypass and privilege escalation.
68) Input validation error (CVE-ID: CVE-2022-30208)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in Windows Security Account Manager (SAM). A remote user can pass specially crafted input to the application and perform a denial of service (DoS) attack.
69) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-30209)
The vulnerability allows a remote attacker to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows IIS Server, which leads to security restrictions bypass and privilege escalation.
70) Input validation error (CVE-ID: CVE-2022-30211)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows Layer 2 Tunneling Protocol (L2TP). A remote user can pass specially crafted input to the application and execute arbitrary code on the target system.
71) Race condition (CVE-ID: CVE-2022-30212)
The vulnerability allows a local user to gain access to sensitive information on the system.
The vulnerability exists due to a race condition in Windows Connected Devices Platform Service. A local user can exploit the race and gain unauthorized access to sensitive information.
72) Information disclosure (CVE-ID: CVE-2022-30213)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in Windows GDI+. A local user can gain unauthorized access to sensitive information on the system.
73) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-30220)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Common Log File System Driver, which leads to security restrictions bypass and privilege escalation.
74) Input validation error (CVE-ID: CVE-2022-30222)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows Shell. A remote attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
75) Security features bypass (CVE-ID: CVE-2022-30164)
The vulnerability allows a local user to bypass authentication process.
The vulnerability exists due to security feature bypass issue in Kerberos AppContainer. A local user can bypass the target application.
76) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-30224)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Advanced Local Procedure Call, which leads to security restrictions bypass and privilege escalation.
77) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-30225)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Media Player Network Sharing Service, which leads to security restrictions bypass and privilege escalation.
78) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-30226)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Print Spooler, which leads to security restrictions bypass and privilege escalation.
79) Input validation error (CVE-ID: CVE-2022-32230)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in Windows SMB. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
80) Improper input validation (CVE-ID: CVE-2022-21540)
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Hotspot component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to gain access to sensitive information.
81) Improper input validation (CVE-ID: CVE-2022-21541)
The vulnerability allows a remote non-authenticated attacker to manipulate data.
The vulnerability exists due to improper input validation within the Hotspot component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to manipulate data.
82) Improper input validation (CVE-ID: CVE-2022-21549)
The vulnerability allows a remote non-authenticated attacker to manipulate data.
The vulnerability exists due to improper input validation within the Libraries component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to manipulate data.
83) Deserialization of Untrusted Data (CVE-ID: CVE-2022-25647)
The vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to insecure input validation when processing serialized data passed to writeReplace() method. A remote attacker can pass specially crafted data to the application and perform a denial of service attack.
84) Improper input validation (CVE-ID: CVE-2022-34169)
The vulnerability allows a remote non-authenticated attacker to compromise the affected system.
The vulnerability exists due to an integer truncation issue when processing malicious XSLT stylesheets. A remote non-authenticated attacker can pass specially crafted data to the application to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode.
85) OS Command Injection (CVE-ID: CVE-2022-1292)
The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.
The vulnerability exists due to improper input validation in the c_rehash script distributed by some operating systems. A remote attacker with ability to pass data to c_rehash script can and execute arbitrary OS commands with the privileges of the script.
86) OS Command Injection (CVE-ID: CVE-2022-2068)
The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.
The vulnerability exists due to improper input validation in the c_rehash script distributed by some operating systems. A remote attacker with ability to pass data to c_rehash script can and execute arbitrary OS commands with the privileges of the script.
The vulnerability exists due to incomplete fix for #VU62765 (CVE-2022-1292).
87) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-30165)
The vulnerability allows a remote user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Kerberos, which leads to security restrictions bypass and privilege escalation.
88) Information disclosure (CVE-ID: CVE-2022-30162)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in Windows Kernel. A local user can gain unauthorized access to sensitive information on the system.
89) Input validation error (CVE-ID: CVE-2022-29129)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows LDAP. A remote user can pass specially crafted input to the application and execute arbitrary code on the target system.
90) Input validation error (CVE-ID: CVE-2022-30140)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows iSCSI Discovery Service. A remote user can pass specially crafted input to the application and execute arbitrary code on the target system.
91) Input validation error (CVE-ID: CVE-2022-29130)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows LDAP if the MaxReceiveBuffer LDAP policy is set to a value higher than the default value. A remote attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
92) Input validation error (CVE-ID: CVE-2022-29131)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows LDAP. A remote user can pass specially crafted input to the application and execute arbitrary code on the target system.
93) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-29132)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Print Spooler, which leads to security restrictions bypass and privilege escalation.
94) Input validation error (CVE-ID: CVE-2022-29137)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows LDAP. A remote user can pass specially crafted input to the application and execute arbitrary code on the target system.
95) Input validation error (CVE-ID: CVE-2022-29139)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows LDAP. A remote attacker can trick a victim to connect a Lightweight Directory Access Protocol (LDAP) client to a malicious LDAP server and execute arbitrary code on the target system.
96) Path traversal (CVE-ID: CVE-2022-29140)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to path traversal in Windows Print Spooler. A local user can gain obtain contents of arbitrary files on the system and view them with SYSTEM privileges.97) Input validation error (CVE-ID: CVE-2022-29141)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows LDAP. A remote user can pass specially crafted input to the application and execute arbitrary code on the target system.
98) Race condition (CVE-ID: CVE-2022-29142)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition in Windows Kernel. A local user can exploit the race and gain unauthorized access to sensitive information and escalate privileges on the system.
99) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-30131)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Container Isolation FS Filter Driver, which leads to security restrictions bypass and privilege escalation.
100) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-30132)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Container Manager Service, which leads to security restrictions bypass and privilege escalation.
101) Buffer overflow (CVE-ID: CVE-2022-30138)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error in Microsoft Windows Print Spooler service within the issuance of certificates. A local user can trigger memory corruption and execute arbitrary code with elevated privileges.
102) Input validation error (CVE-ID: CVE-2022-30139)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows Lightweight Directory Access Protocol (LDAP). A remote user can pass specially crafted input to the application and execute arbitrary code on the target system.
103) Input validation error (CVE-ID: CVE-2022-30141)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows Lightweight Directory Access Protocol (LDAP). A remote attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
104) Input validation error (CVE-ID: CVE-2022-30161)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows Lightweight Directory Access Protocol (LDAP). A remote attacker can trick a victim to connect to a malicious LDAP server and execute arbitrary code on the target system.
105) Input validation error (CVE-ID: CVE-2022-30142)
The vulnerability allows a remote attacker to execute arbizrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows File History. A remote user can trick a victim to connect to a malicious remote share and execute arbitrary code on the target system.
106) Input validation error (CVE-ID: CVE-2022-30143)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows Lightweight Directory Access Protocol (LDAP). A remote user can trick a victim to connect to a malicious LDAP server and execute arbitrary code on the target system.
107) Input validation error (CVE-ID: CVE-2022-30145)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows Encrypting File System (EFS). A remote user can pass specially crafted input to the application and execute arbitrary code on the target system.
108) Input validation error (CVE-ID: CVE-2022-30146)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows Lightweight Directory Access Protocol (LDAP). A remote attacker can trick a victim to connect to a malicious LDAP server and execute arbitrary code on the target system.
109) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-30147)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Installer, which leads to security restrictions bypass and privilege escalation.
110) Information disclosure (CVE-ID: CVE-2022-30148)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in Windows Desired State Configuration (DSC). A local user can gain unauthorized access to sensitive information on the system.
111) Input validation error (CVE-ID: CVE-2022-30149)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows Lightweight Directory Access Protocol (LDAP). A remote user can trick a victim to connect to a malicious LDAP server and execute arbitrary code on the target system.
112) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-30150)
The vulnerability allows a remote user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Defender Remote Credential Guard, which leads to security restrictions bypass and privilege escalation.
113) Race condition (CVE-ID: CVE-2022-30151)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition in Windows Ancillary Function Driver for WinSock. A local user can exploit the race and gain unauthorized access to sensitive information and escalate privileges on the system.
114) Input validation error (CVE-ID: CVE-2022-30152)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in Windows Network Address Translation (NAT). A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
115) Input validation error (CVE-ID: CVE-2022-30153)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows Lightweight Directory Access Protocol (LDAP). A remote user can trick a victim to connect to a malicious LDAP server and execute arbitrary code on the target system.
116) Input validation error (CVE-ID: CVE-2022-30155)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in Windows Kernel. A remote attacker can trick a victim to open a specially crafted file and perform a denial of service (DoS) attack.
117) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-30160)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Advanced Local Procedure Call, which leads to security restrictions bypass and privilege escalation.
Remediation
Install update from vendor's website.