Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-30189 (GCVE-0-2022-30189)
Vulnerability from cvelistv5 – Published: 2022-06-15 21:52 – Updated: 2025-01-02 19:03- Spoofing
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Microsoft | Windows 10 Version 21H1 |
Affected:
10.0.0 , < 10.0.19043.1766
(custom)
|
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T06:40:47.834Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30189"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"platforms": [
"x64-based Systems",
"ARM64-based Systems",
"32-bit Systems"
],
"product": "Windows 10 Version 21H1",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.19043.1766",
"status": "affected",
"version": "10.0.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"32-bit Systems",
"ARM64-based Systems"
],
"product": "Windows 10 Version 20H2",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.19042.1766",
"status": "affected",
"version": "10.0.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"32-bit Systems",
"ARM64-based Systems",
"x64-based Systems"
],
"product": "Windows 10 Version 21H2",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.19043.1766",
"status": "affected",
"version": "10.0.19043.0",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.19043.1766",
"versionStartIncluding": "10.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.19042.1766",
"versionStartIncluding": "10.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.19043.1766",
"versionStartIncluding": "10.0.19043.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"datePublic": "2022-06-14T07:00:00+00:00",
"descriptions": [
{
"lang": "en-US",
"value": "Windows Autopilot Device Management and Enrollment Client Spoofing Vulnerability"
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en-US",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Spoofing",
"lang": "en-US",
"type": "Impact"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-01-02T19:03:12.155Z",
"orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"shortName": "microsoft"
},
"references": [
{
"name": "Windows Autopilot Device Management and Enrollment Client Spoofing Vulnerability",
"tags": [
"vendor-advisory"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30189"
}
],
"title": "Windows Autopilot Device Management and Enrollment Client Spoofing Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"assignerShortName": "microsoft",
"cveId": "CVE-2022-30189",
"datePublished": "2022-06-15T21:52:23",
"dateReserved": "2022-05-03T00:00:00",
"dateUpdated": "2025-01-02T19:03:12.155Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E2C378B-1507-4C81-82F6-9F599616845A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FAE4278F-71A7-43E9-8F79-1CBFAE71D730\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71E65CB9-6DC2-4A90-8C6A-103BEDC99823\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Windows Autopilot Device Management and Enrollment Client Spoofing Vulnerability\"}, {\"lang\": \"es\", \"value\": \"Una Vulnerabilidad de Suplantaci\\u00f3n en Windows Autopilot Device Management and Enrollment Client\"}]",
"id": "CVE-2022-30189",
"lastModified": "2025-01-02T19:16:22.197",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"secure@microsoft.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:N/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2022-06-15T22:15:15.467",
"references": "[{\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30189\", \"source\": \"secure@microsoft.com\"}, {\"url\": \"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30189\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}]",
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-30189\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2022-06-15T22:15:15.467\",\"lastModified\":\"2025-01-02T19:16:22.197\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Windows Autopilot Device Management and Enrollment Client Spoofing Vulnerability\"},{\"lang\":\"es\",\"value\":\"Una Vulnerabilidad de Suplantaci\u00f3n en Windows Autopilot Device Management and Enrollment Client\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E2C378B-1507-4C81-82F6-9F599616845A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAE4278F-71A7-43E9-8F79-1CBFAE71D730\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71E65CB9-6DC2-4A90-8C6A-103BEDC99823\"}]}]}],\"references\":[{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30189\",\"source\":\"secure@microsoft.com\"},{\"url\":\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30189\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}"
}
}
CERTFR-2022-AVI-557
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Microsoft Windows. Elles permettent à un attaquant de provoquer une usurpation d'identité, une élévation de privilèges, un contournement de la fonctionnalité de sécurité, une exécution de code à distance, une atteinte à la confidentialité des données et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows Server 2022 | ||
| Microsoft | Windows | Windows Server 2012 | ||
| Microsoft | Windows | Windows 10 pour systèmes x64 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2019 (Server Core installation) | ||
| Microsoft | Windows | Windows Server 2019 | ||
| Microsoft | Windows | Windows 11 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows Server 2012 R2 | ||
| Microsoft | Windows | Windows 10 Version 21H1 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows Server 2022 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 10 Version 20H2 pour systèmes x64 | ||
| Microsoft | Windows | Windows 10 Version 21H1 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows Server 2016 (Server Core installation) | ||
| Microsoft | Windows | Windows RT 8.1 | ||
| Microsoft | Windows | Windows 10 Version 21H1 pour systèmes x64 | ||
| Microsoft | Windows | Windows 7 pour systèmes x64 Service Pack 1 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 20H2 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2022 Azure Edition Core Hotpatch | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 | ||
| Microsoft | Windows | Windows 11 pour systèmes x64 | ||
| Microsoft | Windows | Windows 8.1 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2016 | ||
| Microsoft | Windows | Windows 10 Version 20H2 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows 8.1 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows Server, version 20H2 (Server Core Installation) | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 7 pour systèmes 32 bits Service Pack 1 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Server 2022",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H1 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 20H2 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H1 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows RT 8.1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H1 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 7 pour syst\u00e8mes x64 Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 20H2 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 Azure Edition Core Hotpatch",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 8.1 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 20H2 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 8.1 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server, version 20H2 (Server Core Installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 7 pour syst\u00e8mes 32 bits Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-32230",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32230"
},
{
"name": "CVE-2022-30165",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30165"
},
{
"name": "CVE-2022-30189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30189"
},
{
"name": "CVE-2022-30151",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30151"
},
{
"name": "CVE-2022-30150",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30150"
},
{
"name": "CVE-2022-21127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21127"
},
{
"name": "CVE-2022-30135",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30135"
},
{
"name": "CVE-2022-30154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30154"
},
{
"name": "CVE-2022-30164",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30164"
},
{
"name": "CVE-2022-30153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30153"
},
{
"name": "CVE-2022-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
},
{
"name": "CVE-2022-30136",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30136"
},
{
"name": "CVE-2022-30146",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30146"
},
{
"name": "CVE-2022-30155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30155"
},
{
"name": "CVE-2022-30140",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30140"
},
{
"name": "CVE-2022-30139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30139"
},
{
"name": "CVE-2022-30161",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30161"
},
{
"name": "CVE-2022-30142",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30142"
},
{
"name": "CVE-2022-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
},
{
"name": "CVE-2022-30147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30147"
},
{
"name": "CVE-2022-30163",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30163"
},
{
"name": "CVE-2022-30131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30131"
},
{
"name": "CVE-2022-30162",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30162"
},
{
"name": "CVE-2022-21123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
},
{
"name": "CVE-2022-30152",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30152"
},
{
"name": "CVE-2022-30132",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30132"
},
{
"name": "CVE-2022-30166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30166"
},
{
"name": "CVE-2022-30145",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30145"
},
{
"name": "CVE-2022-30160",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30160"
},
{
"name": "CVE-2022-30149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30149"
},
{
"name": "CVE-2022-30143",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30143"
},
{
"name": "CVE-2022-30148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30148"
},
{
"name": "CVE-2022-30141",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30141"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30149 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30149"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30151 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30151"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30148 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30148"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30146 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30146"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30163 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30163"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30189 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30189"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-21125 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21125"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30161 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30161"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30145 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30145"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30135 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30135"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30143 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30143"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30154 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30154"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30155 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30155"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-32230 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-32230"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30139 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30139"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30136 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30136"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-21127 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21127"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30141 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30141"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30164 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30164"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30131 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30131"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30162 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30162"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-21123 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21123"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30166 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30166"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-21166 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21166"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30150 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30150"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30153 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30153"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30140 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30140"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30160 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30160"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30147 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30147"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30152 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30152"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30142 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30142"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30165 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30165"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30132 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30132"
}
],
"reference": "CERTFR-2022-AVI-557",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-06-15T00:00:00.000000"
}
],
"risks": [
{
"description": "Usurpation d\u0027identit\u00e9"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eMicrosoft Windows\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer une usurpation d\u0027identit\u00e9, une \u00e9l\u00e9vation de privil\u00e8ges, un\ncontournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9, une ex\u00e9cution de code \u00e0\ndistance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un d\u00e9ni de\nservice.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/"
}
]
}
CERTFR-2022-AVI-557
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Microsoft Windows. Elles permettent à un attaquant de provoquer une usurpation d'identité, une élévation de privilèges, un contournement de la fonctionnalité de sécurité, une exécution de code à distance, une atteinte à la confidentialité des données et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows Server 2022 | ||
| Microsoft | Windows | Windows Server 2012 | ||
| Microsoft | Windows | Windows 10 pour systèmes x64 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2019 (Server Core installation) | ||
| Microsoft | Windows | Windows Server 2019 | ||
| Microsoft | Windows | Windows 11 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows Server 2012 R2 | ||
| Microsoft | Windows | Windows 10 Version 21H1 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows Server 2022 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 10 Version 20H2 pour systèmes x64 | ||
| Microsoft | Windows | Windows 10 Version 21H1 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows Server 2016 (Server Core installation) | ||
| Microsoft | Windows | Windows RT 8.1 | ||
| Microsoft | Windows | Windows 10 Version 21H1 pour systèmes x64 | ||
| Microsoft | Windows | Windows 7 pour systèmes x64 Service Pack 1 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 20H2 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2022 Azure Edition Core Hotpatch | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 | ||
| Microsoft | Windows | Windows 11 pour systèmes x64 | ||
| Microsoft | Windows | Windows 8.1 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2016 | ||
| Microsoft | Windows | Windows 10 Version 20H2 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows 8.1 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows Server, version 20H2 (Server Core Installation) | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 7 pour systèmes 32 bits Service Pack 1 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Server 2022",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H1 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 20H2 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H1 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows RT 8.1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H1 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 7 pour syst\u00e8mes x64 Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 20H2 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 Azure Edition Core Hotpatch",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 8.1 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 20H2 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 8.1 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server, version 20H2 (Server Core Installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 7 pour syst\u00e8mes 32 bits Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-32230",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32230"
},
{
"name": "CVE-2022-30165",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30165"
},
{
"name": "CVE-2022-30189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30189"
},
{
"name": "CVE-2022-30151",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30151"
},
{
"name": "CVE-2022-30150",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30150"
},
{
"name": "CVE-2022-21127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21127"
},
{
"name": "CVE-2022-30135",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30135"
},
{
"name": "CVE-2022-30154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30154"
},
{
"name": "CVE-2022-30164",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30164"
},
{
"name": "CVE-2022-30153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30153"
},
{
"name": "CVE-2022-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
},
{
"name": "CVE-2022-30136",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30136"
},
{
"name": "CVE-2022-30146",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30146"
},
{
"name": "CVE-2022-30155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30155"
},
{
"name": "CVE-2022-30140",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30140"
},
{
"name": "CVE-2022-30139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30139"
},
{
"name": "CVE-2022-30161",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30161"
},
{
"name": "CVE-2022-30142",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30142"
},
{
"name": "CVE-2022-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
},
{
"name": "CVE-2022-30147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30147"
},
{
"name": "CVE-2022-30163",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30163"
},
{
"name": "CVE-2022-30131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30131"
},
{
"name": "CVE-2022-30162",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30162"
},
{
"name": "CVE-2022-21123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
},
{
"name": "CVE-2022-30152",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30152"
},
{
"name": "CVE-2022-30132",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30132"
},
{
"name": "CVE-2022-30166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30166"
},
{
"name": "CVE-2022-30145",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30145"
},
{
"name": "CVE-2022-30160",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30160"
},
{
"name": "CVE-2022-30149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30149"
},
{
"name": "CVE-2022-30143",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30143"
},
{
"name": "CVE-2022-30148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30148"
},
{
"name": "CVE-2022-30141",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30141"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30149 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30149"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30151 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30151"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30148 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30148"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30146 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30146"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30163 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30163"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30189 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30189"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-21125 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21125"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30161 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30161"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30145 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30145"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30135 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30135"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30143 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30143"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30154 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30154"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30155 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30155"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-32230 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-32230"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30139 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30139"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30136 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30136"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-21127 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21127"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30141 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30141"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30164 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30164"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30131 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30131"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30162 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30162"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-21123 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21123"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30166 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30166"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-21166 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21166"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30150 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30150"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30153 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30153"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30140 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30140"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30160 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30160"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30147 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30147"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30152 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30152"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30142 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30142"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30165 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30165"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30132 du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30132"
}
],
"reference": "CERTFR-2022-AVI-557",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-06-15T00:00:00.000000"
}
],
"risks": [
{
"description": "Usurpation d\u0027identit\u00e9"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eMicrosoft Windows\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer une usurpation d\u0027identit\u00e9, une \u00e9l\u00e9vation de privil\u00e8ges, un\ncontournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9, une ex\u00e9cution de code \u00e0\ndistance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un d\u00e9ni de\nservice.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 14 juin 2022",
"url": "https://msrc.microsoft.com/update-guide/"
}
]
}
GSD-2022-30189
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2022-30189",
"description": "Windows Autopilot Device Management and Enrollment Client Spoofing Vulnerability.",
"id": "GSD-2022-30189"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-30189"
],
"details": "Windows Autopilot Device Management and Enrollment Client Spoofing Vulnerability.",
"id": "GSD-2022-30189",
"modified": "2023-12-13T01:19:36.583943Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2022-30189",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Windows 10 Version 21H1",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "10.0.0",
"version_value": "10.0.19043.1766"
}
]
}
},
{
"product_name": "Windows 10 Version 20H2",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "10.0.0",
"version_value": "10.0.19042.1766"
}
]
}
},
{
"product_name": "Windows 10 Version 21H2",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "10.0.0",
"version_value": "10.0.19043.1766"
}
]
}
}
]
},
"vendor_name": "Microsoft"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Autopilot Device Management and Enrollment Client Spoofing Vulnerability"
}
]
},
"impact": {
"cvss": [
{
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Spoofing"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30189",
"refsource": "MISC",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30189"
}
]
}
},
"nvd.nist.gov": {
"cve": {
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"matchCriteriaId": "9E2C378B-1507-4C81-82F6-9F599616845A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"matchCriteriaId": "FAE4278F-71A7-43E9-8F79-1CBFAE71D730",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*",
"matchCriteriaId": "71E65CB9-6DC2-4A90-8C6A-103BEDC99823",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Windows Autopilot Device Management and Enrollment Client Spoofing Vulnerability"
},
{
"lang": "es",
"value": "Una Vulnerabilidad de Suplantaci\u00f3n en Windows Autopilot Device Management and Enrollment Client"
}
],
"id": "CVE-2022-30189",
"lastModified": "2023-12-20T22:15:26.993",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "secure@microsoft.com",
"type": "Primary"
}
]
},
"published": "2022-06-15T22:15:15.467",
"references": [
{
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30189"
}
],
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
}
}
}
MSRC_CVE-2022-30189
Vulnerability from csaf_microsoft - Published: 2022-06-14 07:00 - Updated: 2022-06-14 07:00Notes
{
"document": {
"acknowledgments": [
{
"names": [
"\u003ca href=\"https://twitter.com/_dirkjan\"\u003eDirk-jan Mollema\u003c/a\u003e"
]
}
],
"aggregate_severity": {
"namespace": "https://www.microsoft.com/en-us/msrc/security-update-severity-rating-system",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
},
{
"category": "general",
"text": "Required. The vulnerability documented by this CVE requires customer action to resolve.",
"title": "Customer Action"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2022-30189 Windows Autopilot Device Management and Enrollment Client Spoofing Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30189"
},
{
"category": "self",
"summary": "CVE-2022-30189 Windows Autopilot Device Management and Enrollment Client Spoofing Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/csaf/2022/msrc_cve-2022-30189.json"
},
{
"category": "external",
"summary": "Microsoft Exploitability Index",
"url": "https://www.microsoft.com/en-us/msrc/exploitability-index?rtc=1"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Windows Autopilot Device Management and Enrollment Client Spoofing Vulnerability",
"tracking": {
"current_release_date": "2022-06-14T07:00:00.000Z",
"generator": {
"date": "2025-01-02T19:02:47.103Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2022-30189",
"initial_release_date": "2022-06-14T07:00:00.000Z",
"revision_history": [
{
"date": "2022-06-14T07:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.19043.1766",
"product": {
"name": "Windows 10 Version 21H1 for x64-based Systems \u003c10.0.19043.1766",
"product_id": "6"
}
},
{
"category": "product_version",
"name": "10.0.19043.1766",
"product": {
"name": "Windows 10 Version 21H1 for x64-based Systems 10.0.19043.1766",
"product_id": "11896"
}
}
],
"category": "product_name",
"name": "Windows 10 Version 21H1 for x64-based Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.19043.1766",
"product": {
"name": "Windows 10 Version 21H1 for ARM64-based Systems \u003c10.0.19043.1766",
"product_id": "5"
}
},
{
"category": "product_version",
"name": "10.0.19043.1766",
"product": {
"name": "Windows 10 Version 21H1 for ARM64-based Systems 10.0.19043.1766",
"product_id": "11897"
}
}
],
"category": "product_name",
"name": "Windows 10 Version 21H1 for ARM64-based Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.19043.1766",
"product": {
"name": "Windows 10 Version 21H1 for 32-bit Systems \u003c10.0.19043.1766",
"product_id": "4"
}
},
{
"category": "product_version",
"name": "10.0.19043.1766",
"product": {
"name": "Windows 10 Version 21H1 for 32-bit Systems 10.0.19043.1766",
"product_id": "11898"
}
}
],
"category": "product_name",
"name": "Windows 10 Version 21H1 for 32-bit Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.19042.1766",
"product": {
"name": "Windows 10 Version 20H2 for 32-bit Systems \u003c10.0.19042.1766",
"product_id": "8"
}
},
{
"category": "product_version",
"name": "10.0.19042.1766",
"product": {
"name": "Windows 10 Version 20H2 for 32-bit Systems 10.0.19042.1766",
"product_id": "11801"
}
}
],
"category": "product_name",
"name": "Windows 10 Version 20H2 for 32-bit Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.19042.1766",
"product": {
"name": "Windows 10 Version 20H2 for ARM64-based Systems \u003c10.0.19042.1766",
"product_id": "7"
}
},
{
"category": "product_version",
"name": "10.0.19042.1766",
"product": {
"name": "Windows 10 Version 20H2 for ARM64-based Systems 10.0.19042.1766",
"product_id": "11802"
}
}
],
"category": "product_name",
"name": "Windows 10 Version 20H2 for ARM64-based Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.19043.1766",
"product": {
"name": "Windows 10 Version 21H2 for 32-bit Systems \u003c10.0.19043.1766",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "10.0.19043.1766",
"product": {
"name": "Windows 10 Version 21H2 for 32-bit Systems 10.0.19043.1766",
"product_id": "11929"
}
}
],
"category": "product_name",
"name": "Windows 10 Version 21H2 for 32-bit Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.19044.1766",
"product": {
"name": "Windows 10 Version 21H2 for ARM64-based Systems \u003c10.0.19044.1766",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "10.0.19044.1766",
"product": {
"name": "Windows 10 Version 21H2 for ARM64-based Systems 10.0.19044.1766",
"product_id": "11930"
}
}
],
"category": "product_name",
"name": "Windows 10 Version 21H2 for ARM64-based Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.19044.1766",
"product": {
"name": "Windows 10 Version 21H2 for x64-based Systems \u003c10.0.19044.1766",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "10.0.19044.1766",
"product": {
"name": "Windows 10 Version 21H2 for x64-based Systems 10.0.19044.1766",
"product_id": "11931"
}
}
],
"category": "product_name",
"name": "Windows 10 Version 21H2 for x64-based Systems"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-30189",
"notes": [
{
"category": "general",
"text": "Microsoft",
"title": "Assigning CNA"
},
{
"category": "faq",
"text": "An attacker would have to send the victim a malicious file that the victim would have to execute.",
"title": "According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?"
},
{
"category": "faq",
"text": "Exploiting this vulnerability will allow an attacker to access resources that are protected by conditional access policies based solely on device compliance state. For more information, please refer to Scenarios for using Conditional Access with Microsoft Intune - Microsoft Intune | Microsoft Docs.",
"title": "According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H)? What does that mean for this vulnerability?"
},
{
"category": "faq",
"text": "This vulnerability only affects Azure AD-joined autopilot devices that are also used for conditional access for compliance, and only impacts Autopilot pre-registered devices that are enabled for either self-deploying mode or pre-provisioning mode, either of which utilize TPM-based device authentication instead of user-based credentials/MFA.",
"title": "To what scenario is this vulnerability applicable?"
},
{
"category": "faq",
"text": "Microsoft Account (MSA) device ticket playback from one device to another allows a second non-authorized device to perform AAD join and to replace the original device.",
"title": "What is the nature of the spoofing?"
}
],
"product_status": {
"fixed": [
"11801",
"11802",
"11896",
"11897",
"11898",
"11929",
"11930",
"11931"
],
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-30189 Windows Autopilot Device Management and Enrollment Client Spoofing Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30189"
},
{
"category": "self",
"summary": "CVE-2022-30189 Windows Autopilot Device Management and Enrollment Client Spoofing Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30189"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-14T07:00:00.000Z",
"details": "10.0.19043.1766:Security Update:https://support.microsoft.com/help/5014699",
"product_ids": [
"6",
"5",
"4",
"3"
],
"url": "https://support.microsoft.com/help/5014699"
},
{
"category": "vendor_fix",
"date": "2022-06-14T07:00:00.000Z",
"details": "10.0.19042.1766:Security Update:https://support.microsoft.com/help/5014699",
"product_ids": [
"8",
"7"
],
"url": "https://support.microsoft.com/help/5014699"
},
{
"category": "vendor_fix",
"date": "2022-06-14T07:00:00.000Z",
"details": "10.0.19044.1766:Security Update:https://support.microsoft.com/help/5014699",
"product_ids": [
"2",
"1"
],
"url": "https://support.microsoft.com/help/5014699"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"exploitCodeMaturity": "PROOF_OF_CONCEPT",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"remediationLevel": "OFFICIAL_FIX",
"reportConfidence": "CONFIRMED",
"scope": "UNCHANGED",
"temporalScore": 5.9,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Spoofing"
},
{
"category": "exploit_status",
"details": "Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely"
}
],
"title": "Windows Autopilot Device Management and Enrollment Client Spoofing Vulnerability"
}
]
}
FKIE_CVE-2022-30189
Vulnerability from fkie_nvd - Published: 2022-06-15 22:15 - Updated: 2025-01-02 19:16| Vendor | Product | Version | |
|---|---|---|---|
| microsoft | windows_10 | 20h2 | |
| microsoft | windows_10 | 21h1 | |
| microsoft | windows_10 | 21h2 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"matchCriteriaId": "9E2C378B-1507-4C81-82F6-9F599616845A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"matchCriteriaId": "FAE4278F-71A7-43E9-8F79-1CBFAE71D730",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*",
"matchCriteriaId": "71E65CB9-6DC2-4A90-8C6A-103BEDC99823",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Autopilot Device Management and Enrollment Client Spoofing Vulnerability"
},
{
"lang": "es",
"value": "Una Vulnerabilidad de Suplantaci\u00f3n en Windows Autopilot Device Management and Enrollment Client"
}
],
"id": "CVE-2022-30189",
"lastModified": "2025-01-02T19:16:22.197",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "secure@microsoft.com",
"type": "Secondary"
}
]
},
"published": "2022-06-15T22:15:15.467",
"references": [
{
"source": "secure@microsoft.com",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30189"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30189"
}
],
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-RFWM-W9JQ-QR63
Vulnerability from github – Published: 2022-06-16 00:00 – Updated: 2025-01-02 21:31Windows Autopilot Device Management and Enrollment Client Spoofing Vulnerability.
{
"affected": [],
"aliases": [
"CVE-2022-30189"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-06-15T22:15:00Z",
"severity": "MODERATE"
},
"details": "Windows Autopilot Device Management and Enrollment Client Spoofing Vulnerability.",
"id": "GHSA-rfwm-w9jq-qr63",
"modified": "2025-01-02T21:31:39Z",
"published": "2022-06-16T00:00:16Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30189"
},
{
"type": "WEB",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30189"
},
{
"type": "WEB",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30189"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.