Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-26783 (GCVE-0-2022-26783)
Vulnerability from cvelistv5 – Published: 2022-04-15 19:04 – Updated: 2025-01-02 18:51
VLAI?
EPSS
Title
Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability
Summary
Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability
Severity ?
CWE
- Information Disclosure
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Microsoft | Windows Server 2019 |
Affected:
10.0.17763.0 , < 10.0.17763.2803
(custom)
|
|||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T05:11:44.542Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26783"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2019",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.17763.2803",
"status": "affected",
"version": "10.0.17763.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2019 (Server Core installation)",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.17763.2803",
"status": "affected",
"version": "10.0.17763.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2022",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.20348.643",
"status": "affected",
"version": "10.0.20348.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems"
],
"product": "Windows Server version 20H2",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.19042.1645",
"status": "affected",
"version": "10.0.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2016",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.14393.5066",
"status": "affected",
"version": "10.0.14393.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2016 (Server Core installation)",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.14393.5066",
"status": "affected",
"version": "10.0.14393.0",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.2803",
"versionStartIncluding": "10.0.17763.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.2803",
"versionStartIncluding": "10.0.17763.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.643",
"versionStartIncluding": "10.0.20348.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19042.1645",
"versionStartIncluding": "10.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.5066",
"versionStartIncluding": "10.0.14393.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.5066",
"versionStartIncluding": "10.0.14393.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"datePublic": "2022-04-12T07:00:00.000Z",
"descriptions": [
{
"lang": "en-US",
"value": "Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability"
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en-US",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Information Disclosure",
"lang": "en-US",
"type": "Impact"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-01-02T18:51:26.038Z",
"orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"shortName": "microsoft"
},
"references": [
{
"name": "Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability",
"tags": [
"vendor-advisory"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26783"
}
],
"title": "Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"assignerShortName": "microsoft",
"cveId": "CVE-2022-26783",
"datePublished": "2022-04-15T19:04:17.000Z",
"dateReserved": "2022-03-09T00:00:00.000Z",
"dateUpdated": "2025-01-02T18:51:26.038Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
FKIE_CVE-2022-26783
Vulnerability from fkie_nvd - Published: 2022-04-15 19:15 - Updated: 2024-11-21 06:54
Severity ?
Summary
Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| microsoft | windows_server_2016 | - | |
| microsoft | windows_server_2016 | 20h2 | |
| microsoft | windows_server_2019 | - | |
| microsoft | windows_server_2022 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"matchCriteriaId": "4A190388-AA82-4504-9D5A-624F23268C9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability"
},
{
"lang": "es",
"value": "Una vulnerabilidad de Divulgaci\u00f3n de Informaci\u00f3n en Windows Hyper-V Shared Virtual Hard Disks. Este ID de CVE es diferente de CVE-2022-24490, CVE-2022-24539, CVE-2022-26785"
}
],
"id": "CVE-2022-26783",
"lastModified": "2024-11-21T06:54:29.900",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "secure@microsoft.com",
"type": "Secondary"
}
]
},
"published": "2022-04-15T19:15:12.503",
"references": [
{
"source": "secure@microsoft.com",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26783"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26783"
}
],
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2022-26783
Vulnerability from gsd - Updated: 2023-12-13 01:19Details
Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2022-26783",
"description": "Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-24490, CVE-2022-24539, CVE-2022-26785.",
"id": "GSD-2022-26783"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-26783"
],
"details": "Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability",
"id": "GSD-2022-26783",
"modified": "2023-12-13T01:19:39.221248Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2022-26783",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Windows Server 2019",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "10.0.0",
"version_value": "10.0.17763.2803"
}
]
}
},
{
"product_name": "Windows Server 2019 (Server Core installation)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "10.0.0",
"version_value": "10.0.17763.2803"
}
]
}
},
{
"product_name": "Windows Server 2022",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "10.0.0",
"version_value": "10.0.20348.643"
}
]
}
},
{
"product_name": "Windows Server version 20H2",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "10.0.0",
"version_value": "10.0.19042.1645"
}
]
}
},
{
"product_name": "Windows Server 2016",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "10.0.0",
"version_value": "10.0.14393.5066"
}
]
}
},
{
"product_name": "Windows Server 2016 (Server Core installation)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "10.0.0",
"version_value": "10.0.14393.5066"
}
]
}
}
]
},
"vendor_name": "Microsoft"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability"
}
]
},
"impact": {
"cvss": [
{
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26783",
"refsource": "MISC",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26783"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2022-26783"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26783",
"refsource": "MISC",
"tags": [],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26783"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2023-06-29T01:15Z",
"publishedDate": "2022-04-15T19:15Z"
}
}
}
CERTFR-2022-AVI-335
Vulnerability from certfr_avis - Published: 2022-04-13 - Updated: 2022-04-13
De multiples vulnérabilités ont été corrigées dans Microsoft Windows. Elles permettent à un attaquant de provoquer une exécution de code à distance, une atteinte à la confidentialité des données, une élévation de privilèges et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows Server 2022 | ||
| Microsoft | Windows | Windows Server 2012 | ||
| Microsoft | Windows | Windows 10 pour systèmes x64 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes x64 | ||
| Microsoft | Windows | Windows 10 Version 1909 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2019 (Server Core installation) | ||
| Microsoft | Windows | Windows Server 2019 | ||
| Microsoft | Windows | Windows 11 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows Server 2012 R2 | ||
| Microsoft | Windows | Windows 10 Version 21H1 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows Server 2022 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 10 Version 20H2 pour systèmes x64 | ||
| Microsoft | Windows | Windows 10 Version 21H1 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows Server 2016 (Server Core installation) | ||
| Microsoft | Windows | Windows Upgrade Assistant | ||
| Microsoft | Windows | Windows RT 8.1 | ||
| Microsoft | Windows | Windows 10 Version 1909 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows 10 Version 21H1 pour systèmes x64 | ||
| Microsoft | Windows | Windows 7 pour systèmes x64 Service Pack 1 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1909 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 10 Version 20H2 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 | ||
| Microsoft | Windows | Windows 11 pour systèmes x64 | ||
| Microsoft | Windows | Windows 8.1 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2016 | ||
| Microsoft | Windows | Windows 10 Version 20H2 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows 8.1 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows Server, version 20H2 (Server Core Installation) | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 7 pour systèmes 32 bits Service Pack 1 |
References
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Server 2022",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1909 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H1 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 20H2 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H1 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Upgrade Assistant",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows RT 8.1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1909 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H1 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 7 pour syst\u00e8mes x64 Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1909 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 20H2 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 8.1 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 20H2 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 8.1 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server, version 20H2 (Server Core Installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 7 pour syst\u00e8mes 32 bits Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-23257",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23257"
},
{
"name": "CVE-2022-26794",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26794"
},
{
"name": "CVE-2022-24486",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24486"
},
{
"name": "CVE-2022-26796",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26796"
},
{
"name": "CVE-2022-24495",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24495"
},
{
"name": "CVE-2022-24500",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24500"
},
{
"name": "CVE-2022-26821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26821"
},
{
"name": "CVE-2022-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24534"
},
{
"name": "CVE-2022-24487",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24487"
},
{
"name": "CVE-2022-26786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26786"
},
{
"name": "CVE-2022-21983",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21983"
},
{
"name": "CVE-2022-26918",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26918"
},
{
"name": "CVE-2022-24494",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24494"
},
{
"name": "CVE-2022-24546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24546"
},
{
"name": "CVE-2022-24549",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24549"
},
{
"name": "CVE-2022-26807",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26807"
},
{
"name": "CVE-2022-26919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26919"
},
{
"name": "CVE-2022-24489",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24489"
},
{
"name": "CVE-2022-26826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26826"
},
{
"name": "CVE-2022-26830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26830"
},
{
"name": "CVE-2022-26812",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26812"
},
{
"name": "CVE-2022-26914",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26914"
},
{
"name": "CVE-2022-26792",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26792"
},
{
"name": "CVE-2022-26904",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26904"
},
{
"name": "CVE-2022-26825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26825"
},
{
"name": "CVE-2022-24527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24527"
},
{
"name": "CVE-2022-24496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24496"
},
{
"name": "CVE-2022-26791",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26791"
},
{
"name": "CVE-2022-26783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26783"
},
{
"name": "CVE-2022-26790",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26790"
},
{
"name": "CVE-2022-26802",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26802"
},
{
"name": "CVE-2022-26818",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26818"
},
{
"name": "CVE-2022-24542",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24542"
},
{
"name": "CVE-2022-24484",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24484"
},
{
"name": "CVE-2022-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24539"
},
{
"name": "CVE-2022-24493",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24493"
},
{
"name": "CVE-2022-24545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24545"
},
{
"name": "CVE-2022-26797",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26797"
},
{
"name": "CVE-2022-26917",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26917"
},
{
"name": "CVE-2022-24498",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24498"
},
{
"name": "CVE-2022-26785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26785"
},
{
"name": "CVE-2022-26829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26829"
},
{
"name": "CVE-2022-24521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24521"
},
{
"name": "CVE-2022-26789",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26789"
},
{
"name": "CVE-2022-26808",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26808"
},
{
"name": "CVE-2022-26788",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26788"
},
{
"name": "CVE-2022-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24536"
},
{
"name": "CVE-2022-26831",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26831"
},
{
"name": "CVE-2022-24492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24492"
},
{
"name": "CVE-2022-26823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26823"
},
{
"name": "CVE-2022-26920",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26920"
},
{
"name": "CVE-2022-26915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26915"
},
{
"name": "CVE-2022-26793",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26793"
},
{
"name": "CVE-2022-26795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26795"
},
{
"name": "CVE-2022-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24538"
},
{
"name": "CVE-2022-24483",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24483"
},
{
"name": "CVE-2022-24488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24488"
},
{
"name": "CVE-2022-26801",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26801"
},
{
"name": "CVE-2022-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24537"
},
{
"name": "CVE-2022-26903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26903"
},
{
"name": "CVE-2022-26814",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26814"
},
{
"name": "CVE-2022-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24540"
},
{
"name": "CVE-2022-24541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24541"
},
{
"name": "CVE-2022-23268",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23268"
},
{
"name": "CVE-2022-24474",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24474"
},
{
"name": "CVE-2022-26809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26809"
},
{
"name": "CVE-2022-24544",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24544"
},
{
"name": "CVE-2022-26784",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26784"
},
{
"name": "CVE-2022-26916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26916"
},
{
"name": "CVE-2022-26816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26816"
},
{
"name": "CVE-2022-24533",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24533"
},
{
"name": "CVE-2022-26811",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26811"
},
{
"name": "CVE-2022-24490",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24490"
},
{
"name": "CVE-2022-24479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24479"
},
{
"name": "CVE-2022-26819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26819"
},
{
"name": "CVE-2022-26803",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26803"
},
{
"name": "CVE-2022-26815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26815"
},
{
"name": "CVE-2022-26827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26827"
},
{
"name": "CVE-2022-26817",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26817"
},
{
"name": "CVE-2022-22009",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22009"
},
{
"name": "CVE-2022-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22008"
},
{
"name": "CVE-2022-26813",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26813"
},
{
"name": "CVE-2022-24530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24530"
},
{
"name": "CVE-2022-26810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26810"
},
{
"name": "CVE-2022-24481",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24481"
},
{
"name": "CVE-2022-26828",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26828"
},
{
"name": "CVE-2022-24547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24547"
},
{
"name": "CVE-2022-26798",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26798"
},
{
"name": "CVE-2022-24485",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24485"
},
{
"name": "CVE-2022-24499",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24499"
},
{
"name": "CVE-2022-26787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26787"
},
{
"name": "CVE-2022-24550",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24550"
},
{
"name": "CVE-2022-24491",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24491"
},
{
"name": "CVE-2022-24528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24528"
},
{
"name": "CVE-2022-26824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26824"
},
{
"name": "CVE-2022-24543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24543"
},
{
"name": "CVE-2022-26822",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26822"
},
{
"name": "CVE-2022-26820",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26820"
}
],
"initial_release_date": "2022-04-13T00:00:00",
"last_revision_date": "2022-04-13T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24489 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24489"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24496 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24496"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26915 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26915"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26795 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26795"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24544 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24544"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26918 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26918"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26831 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26831"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26822 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26822"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26797 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26797"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24534 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24534"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26904 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26904"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26788 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26788"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26796 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26796"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26783 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26783"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26919 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26919"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26820 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26820"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24488 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24488"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26807 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26807"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-22009 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22009"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24474 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24474"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24493 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24493"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24481 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24481"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26809 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26809"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26824 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26824"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24498 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24498"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24487 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24487"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26815 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26815"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24536 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24536"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26801 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26801"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24490 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24490"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24483 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24483"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24527 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24527"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26916 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26916"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-21983 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21983"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-22008 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22008"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26817 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26817"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-23257 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23257"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24537 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24537"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26829 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26829"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26786 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26786"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26798 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26798"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24545 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24545"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24550 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24550"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26903 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26903"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26823 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26823"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24539 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24539"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24538 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24538"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26792 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26792"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26920 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26920"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26789 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26789"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24491 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24491"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26794 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26794"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26802 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26802"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26811 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26811"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24485 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24485"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26787 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26787"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26826 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26826"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24546 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24546"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24543 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24543"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24486 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24486"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24547 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24547"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26814 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26814"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26793 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26793"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26828 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26828"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26803 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26803"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24530 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24530"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26825 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26825"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24484 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24484"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24492 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24492"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24494 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24494"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26810 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26810"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26830 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26830"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24495 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24495"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26791 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26791"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26813 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26813"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24542 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24542"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24541 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24541"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26785 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26785"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26808 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26808"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24549 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24549"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24500 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24500"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26819 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26819"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-23268 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23268"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24521 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24521"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24499 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24499"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24533 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24533"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26827 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26827"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26784 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26784"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24528 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24528"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26821 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26821"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24540 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24540"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26790 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26790"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26818 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26818"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24479 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24479"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26812 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26812"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26917 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26917"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26914 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26914"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26816 du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26816"
}
],
"reference": "CERTFR-2022-AVI-335",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-04-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eMicrosoft Windows\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer une ex\u00e9cution de code \u00e0 distance, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de\nservice.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 12 avril 2022",
"url": "https://msrc.microsoft.com/update-guide/"
}
]
}
CNVD-2022-74594
Vulnerability from cnvd - Published: 2022-11-07
VLAI Severity ?
Title
Microsoft Windows Hyper-V Shared Virtual Hard Disks信息泄露漏洞
Description
Microsoft Windows Hyper-V是美国微软(Microsoft)公司的一款可提供硬件虚拟化的工具。
Microsoft Windows Hyper-V Shared Virtual Hard Disks存在信息泄露漏洞。该漏洞源于网络系统或产品在运行过程中存在配置等错误。攻击者可利用此漏洞获取敏感信息。
Severity
中
Patch Name
Microsoft Windows Hyper-V Shared Virtual Hard Disks信息泄露漏洞的补丁
Patch Description
Microsoft Windows Hyper-V是美国微软(Microsoft)公司的一款可提供硬件虚拟化的工具。
Microsoft Windows Hyper-V Shared Virtual Hard Disks存在信息泄露漏洞。该漏洞源于网络系统或产品在运行过程中存在配置等错误。攻击者可利用此漏洞获取敏感信息。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布了漏洞修复程序,请及时关注更新: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26783
Reference
https://nvd.nist.gov/vuln/detail/CVE-2022-26783
Impacted products
| Name | ['Microsoft Windows Server 2016', 'Microsoft Windows Server 2019', 'Microsoft Windows Server 20H2', 'Microsoft Windows Server 2022'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2022-26783",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2022-26783"
}
},
"description": "Microsoft Windows Hyper-V\u662f\u7f8e\u56fd\u5fae\u8f6f\uff08Microsoft\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u53ef\u63d0\u4f9b\u786c\u4ef6\u865a\u62df\u5316\u7684\u5de5\u5177\u3002\n\nMicrosoft Windows Hyper-V Shared Virtual Hard Disks\u5b58\u5728\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u5728\u8fd0\u884c\u8fc7\u7a0b\u4e2d\u5b58\u5728\u914d\u7f6e\u7b49\u9519\u8bef\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u6b64\u6f0f\u6d1e\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26783",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2022-74594",
"openTime": "2022-11-07",
"patchDescription": "Microsoft Windows Hyper-V\u662f\u7f8e\u56fd\u5fae\u8f6f\uff08Microsoft\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u53ef\u63d0\u4f9b\u786c\u4ef6\u865a\u62df\u5316\u7684\u5de5\u5177\u3002\r\n\r\nMicrosoft Windows Hyper-V Shared Virtual Hard Disks\u5b58\u5728\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u5728\u8fd0\u884c\u8fc7\u7a0b\u4e2d\u5b58\u5728\u914d\u7f6e\u7b49\u9519\u8bef\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u6b64\u6f0f\u6d1e\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Microsoft Windows Hyper-V Shared Virtual Hard Disks\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Microsoft Windows Server 2016",
"Microsoft Windows Server 2019",
"Microsoft Windows Server 20H2",
"Microsoft Windows Server 2022"
]
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2022-26783",
"serverity": "\u4e2d",
"submitTime": "2022-04-15",
"title": "Microsoft Windows Hyper-V Shared Virtual Hard Disks\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e"
}
GHSA-C6V3-42RV-HX7J
Vulnerability from github – Published: 2022-04-16 00:00 – Updated: 2022-04-16 00:00
VLAI?
Details
Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-24490, CVE-2022-24539, CVE-2022-26785.
Severity ?
6.5 (Medium)
{
"affected": [],
"aliases": [
"CVE-2022-26783"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-04-15T19:15:00Z",
"severity": "MODERATE"
},
"details": "Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-24490, CVE-2022-24539, CVE-2022-26785.",
"id": "GHSA-c6v3-42rv-hx7j",
"modified": "2022-04-16T00:00:35Z",
"published": "2022-04-16T00:00:35Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26783"
},
{
"type": "WEB",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26783"
},
{
"type": "WEB",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26783"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
]
}
CVE-2022-26783
Vulnerability from fstec - Published: 12.04.2022
VLAI Severity ?
Title
Уязвимость системы аппаратной виртуализации Windows Hyper-V операционных систем Windows, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Description
Уязвимость системы аппаратной виртуализации Windows Hyper-V операционных систем Windows связана с ошибками при обработке информации. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, получить несанкционированный доступ к защищаемой информации
Severity ?
Vendor
Microsoft Corp
Software Name
Windows Server 2016, Windows Server 2016 (Server Core installation), Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 20H2 (Server Core Installation), Windows Server 2022, Windows Server 2022 (Server Core installation)
Software Version
- (Windows Server 2016), - (Windows Server 2016 (Server Core installation)), - (Windows Server 2019), - (Windows Server 2019 (Server Core installation)), - (Windows Server 20H2 (Server Core Installation)), - (Windows Server 2022), - (Windows Server 2022 (Server Core installation))
Possible Mitigations
Использование рекомендаций производителя:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26783
Reference
https://nvd.nist.gov/vuln/detail/CVE-2022-26783
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26783
CWE
CWE-200
{
"CVSS 2.0": "AV:N/AC:L/Au:S/C:C/I:N/A:N",
"CVSS 3.0": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Microsoft Corp",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "- (Windows Server 2016), - (Windows Server 2016 (Server Core installation)), - (Windows Server 2019), - (Windows Server 2019 (Server Core installation)), - (Windows Server 20H2 (Server Core Installation)), - (Windows Server 2022), - (Windows Server 2022 (Server Core installation))",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26783",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "12.04.2022",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "26.05.2022",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "26.05.2022",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2022-03156",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2022-26783",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Windows Server 2016, Windows Server 2016 (Server Core installation), Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 20H2 (Server Core Installation), Windows Server 2022, Windows Server 2022 (Server Core installation)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Microsoft Corp Windows Server 2016 - , Microsoft Corp Windows Server 2016 (Server Core installation) - , Microsoft Corp Windows Server 2019 - , Microsoft Corp Windows Server 2019 (Server Core installation) - , Microsoft Corp Windows Server 20H2 (Server Core Installation) - , Microsoft Corp Windows Server 2022 - , Microsoft Corp Windows Server 2022 (Server Core installation) - ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 Windows Hyper-V \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c Windows, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0420\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 (CWE-200)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 Windows Hyper-V \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c Windows \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438 \u043f\u0440\u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0435 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0441\u0431\u043e\u0440 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://nvd.nist.gov/vuln/detail/CVE-2022-26783\nhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26783",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-200",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,8)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,5)"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…