Windows Kernel Elevation of Privilege Vulnerability
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/168097/Race-Against-The-Sandbox.html | Third Party Advisory VDB Entry |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21881 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Dec 2023, 01:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) Windows Kernel Elevation of Privilege Vulnerability |
08 Aug 2023, 14:21
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-362 |
19 Aug 2022, 10:56
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://packetstormsecurity.com/files/168097/Race-Against-The-Sandbox.html - Third Party Advisory, VDB Entry |
16 Aug 2022, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
CVSS |
v2 : v3 : |
v2 : 7.2
v3 : 7.0 |
18 Jan 2022, 20:02
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:rt:*:*:* |
|
CWE | CWE-269 | |
CVSS |
v2 : v3 : |
v2 : 7.2
v3 : 7.8 |
First Time |
Microsoft
Microsoft windows Server Microsoft windows 8.1 Microsoft windows Server 2016 Microsoft windows Server 2012 Microsoft windows 10 Microsoft windows Server 2019 |
|
References | (MISC) https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21881 - Patch, Vendor Advisory |
11 Jan 2022, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-01-11 21:15
Updated : 2023-12-21 01:15
NVD link : CVE-2022-21881
Mitre link : CVE-2022-21881
CVE.ORG link : CVE-2022-21881
JSON object : View
Products Affected
microsoft
- windows_server_2019
- windows_10
- windows_server
- windows_server_2012
- windows_8.1
- windows_server_2016
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')