Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
References
Link | Resource |
---|---|
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30149 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Dec 2023, 22:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability |
27 Jun 2022, 19:09
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:hololens:* cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:azure:*:*:* cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:* |
|
CWE | NVD-CWE-noinfo | |
References | (MISC) https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30149 - Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 5.1
v3 : 7.5 |
First Time |
Microsoft windows 7
Microsoft windows Server 2022 Microsoft windows Server 2019 Microsoft windows Rt 8.1 Microsoft windows Server 2012 Microsoft windows 10 Microsoft windows 8.1 Microsoft windows Server 2008 Microsoft Microsoft windows 11 Microsoft windows Server 2016 |
15 Jun 2022, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-06-15 22:15
Updated : 2023-12-20 22:15
NVD link : CVE-2022-30149
Mitre link : CVE-2022-30149
CVE.ORG link : CVE-2022-30149
JSON object : View
Products Affected
microsoft
- windows_7
- windows_rt_8.1
- windows_server_2016
- windows_11
- windows_server_2019
- windows_server_2022
- windows_server_2008
- windows_server_2012
- windows_10
- windows_8.1
CWE