NA

CVE-2022-30226

Published: 12/07/2022 Updated: 20/07/2022
CVSS v2 Base Score: 3.6 | Impact Score: 4.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.1 | Impact Score: 5.2 | Exploitability Score: 1.8
Vector: AV:L/AC:L/Au:N/C:N/I:P/A:P

Vulnerability Summary

Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-22022, CVE-2022-22041, CVE-2022-30206.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows 10 -

microsoft windows 10 1607

microsoft windows server 2008 r2

microsoft windows 7 -

microsoft windows server 2012 r2

microsoft windows server 2016 -

microsoft windows rt 8.1 -

microsoft windows 10 20h2

microsoft windows 10 21h1

microsoft windows 10 1809

microsoft windows 11 -

microsoft windows 8.1 -

microsoft windows server 2008 -

microsoft windows server 2012 -

microsoft windows server 2016 20h2

microsoft windows server 2019 -

microsoft windows server 2022 -

microsoft windows 10 21h2

Github Repositories

CVE-2022-22041 Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2022-22022, CVE-2022-30206, CVE-2022-30226 authentication complexity vector SINGLE MEDIUM NETWORK confidentiality integrity availability COMPLETE COMPLETE COMPLETE CVSS Score: 85 References portalmsrcmicrosoftcom/en-US/security-guidance/adv

PoC in GitHub 2022 CVE-2022-0185 (2022-02-11) A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a f

PoC in GitHub 2022 CVE-2022-0185 (2022-02-11) A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a f

Recent Articles

IT threat evolution in Q3 2022. Non-mobile statistics
Securelist • AMR • 18 Nov 2022

IT threat evolution in Q3 2022
IT threat evolution in Q3 2022. Non-mobile statistics
IT threat evolution in Q3 2022. Mobile statistics

These statistics are based on detection verdicts of Kaspersky products and services received from users who consented to providing statistical data.
Quarterly figures
According to Kaspersky Security Network, in Q3 2022:

Kaspersky solutions blocked 956,074,958 attacks from online resources acros...