Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
References
Configurations
Configuration 1 (hide)
|
History
31 May 2023, 19:15
Type | Values Removed | Values Added |
---|---|---|
Summary | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability | |
References |
|
|
12 Aug 2022, 17:23
Type | Values Removed | Values Added |
---|---|---|
References | (N/A) https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34714 - Patch, Vendor Advisory | |
First Time |
Microsoft windows 7
Microsoft windows Server 2022 Microsoft windows Server 2019 Microsoft windows Rt 8.1 Microsoft windows Server 2012 Microsoft windows 10 Microsoft windows 8.1 Microsoft windows Server 2008 Microsoft Microsoft windows 11 Microsoft windows Server 2016 |
|
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:* |
09 Aug 2022, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-08-09 20:15
Updated : 2023-12-10 14:35
NVD link : CVE-2022-34714
Mitre link : CVE-2022-34714
CVE.ORG link : CVE-2022-34714
JSON object : View
Products Affected
microsoft
- windows_server_2019
- windows_10
- windows_server_2012
- windows_rt_8.1
- windows_7
- windows_8.1
- windows_server_2022
- windows_server_2008
- windows_server_2016
- windows_11
CWE