ID CVE-2022-23270
Summary Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
References
Vulnerable Configurations
  • cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*
    cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*
  • cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*
    cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*
  • cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
    cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
  • cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*
    cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*
  • cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*
    cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*
  • cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*
    cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*
  • cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*
    cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*
  • cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*
    cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*
  • cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*
    cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*
  • cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*
    cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*
  • cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*
    cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*
  • cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*
    cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*
  • cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x86:*
    cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x86:*
  • cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*
    cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*
  • cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*
    cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*
  • cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*
    cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*
  • cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*
    cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*
  • cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*
    cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*
  • cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*
    cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*
  • cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:*:x64:*
    cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:*:x64:*
  • cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:*:x86:*
    cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:*:x86:*
  • cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*
    cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*
  • cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*
    cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*
  • cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*
    cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*
  • cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*
    cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*
  • cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*
    cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*
  • cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*
    cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*
  • cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*
    cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*
  • cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*
    cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*
CVSS
Base: 9.3 (as of 21-12-2023 - 00:15)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:M/Au:N/C:C/I:C/A:C
Last major update 21-12-2023 - 00:15
Published 10-05-2022 - 21:15
Last modified 21-12-2023 - 00:15
Back to Top