Microsoft Diagnostics Hub Standard Collector Runtime Elevation of Privilege Vulnerability
References
Link | Resource |
---|---|
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21871 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Dec 2023, 01:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) Microsoft Diagnostics Hub Standard Collector Runtime Elevation of Privilege Vulnerability |
08 Aug 2023, 14:21
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo |
31 Mar 2023, 18:31
Type | Values Removed | Values Added |
---|---|---|
First Time |
Microsoft windows 10 20h2
Microsoft windows 10 21h1 Microsoft windows 10 21h2 Microsoft windows 10 1909 Microsoft windows 10 1607 Microsoft visual Studio 2017 Microsoft windows 10 1507 Microsoft windows 11 21h2 Microsoft windows 10 1809 Microsoft visual Studio 2019 |
|
CPE | cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:* |
cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:* cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:* cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:* |
18 Jan 2022, 13:52
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21871 - Patch, Vendor Advisory | |
First Time |
Microsoft
Microsoft windows Server Microsoft windows Server 2016 Microsoft windows 10 Microsoft windows 11 Microsoft windows Server 2019 |
|
CPE | cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:* |
|
CVSS |
v2 : v3 : |
v2 : 7.2
v3 : 7.8 |
CWE | CWE-269 |
11 Jan 2022, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-01-11 21:15
Updated : 2023-12-21 01:15
NVD link : CVE-2022-21871
Mitre link : CVE-2022-21871
CVE.ORG link : CVE-2022-21871
JSON object : View
Products Affected
microsoft
- windows_server
- windows_10_1507
- visual_studio_2019
- windows_11_21h2
- windows_10_20h2
- windows_10_1909
- windows_10_1607
- windows_10_21h1
- windows_10_1809
- windows_server_2019
- visual_studio_2017
- windows_server_2016
- windows_10_21h2
CWE