gsd-2022-21918
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
DirectX Graphics Kernel File Denial of Service Vulnerability.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2022-21918", "description": "DirectX Graphics Kernel File Denial of Service Vulnerability.", "id": "GSD-2022-21918" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-21918" ], "details": "DirectX Graphics Kernel File Denial of Service Vulnerability.", "id": "GSD-2022-21918", "modified": "2023-12-13T01:19:14.373603Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2022-21918", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Windows 10 Version 1809", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "10.0.0", "version_value": "10.0.17763.2452" } ] } }, { "product_name": "Windows Server 2019", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "10.0.0", "version_value": "10.0.17763.2452" } ] } }, { "product_name": "Windows Server 2019 (Server Core installation)", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "10.0.0", "version_value": "10.0.17763.2452" } ] } }, { "product_name": "Windows 10 Version 1909", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "10.0.0", "version_value": "10.0.18363.2037" } ] } }, { "product_name": "Windows 10 Version 21H1", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "10.0.0", "version_value": "10.0.19043.1466" } ] } }, { "product_name": "Windows Server 2022", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "10.0.0", "version_value": "10.0.20348.469" } ] } }, { "product_name": "Windows 10 Version 20H2", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "10.0.0", "version_value": "10.0.19042.1466" } ] } }, { "product_name": "Windows Server version 20H2", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "10.0.0", "version_value": "10.0.19042.1466" } ] } }, { "product_name": "Windows 11 version 21H2", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "10.0.0", "version_value": "10.0.22000.434" } ] } }, { "product_name": "Windows 10 Version 21H2", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "10.0.0", "version_value": "10.0.19044.1466" } ] } } ] }, "vendor_name": "Microsoft" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "DirectX Graphics Kernel File Denial of Service Vulnerability" } ] }, "impact": { "cvss": [ { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21918", "refsource": "MISC", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21918" } ] } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*", "matchCriteriaId": "610B33F9-0309-4CF7-B7E4-5152D9B2FFE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", "matchCriteriaId": "21074553-EDF2-468D-8E79-C39851B5BC79", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*", "matchCriteriaId": "4E62F9CB-D1B6-4B4D-BCCD-7F4D36A73B4D", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*", "matchCriteriaId": "49A4BBDA-0389-4171-AA49-6837F7DF4454", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*", "matchCriteriaId": "F8C238FA-B20F-40A5-B861-A8295858F4BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*", "matchCriteriaId": "56513BCA-A9F5-4112-BDE6-77E9B8D2677E", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*", "matchCriteriaId": "665EA912-D724-41EB-86A9-24EB4FE87B54", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*", "matchCriteriaId": "77E07B96-EAAA-4DD6-9172-0DE98A36726F", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*", "matchCriteriaId": "B846A736-E77C-4665-B28B-4E511880D575", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*", "matchCriteriaId": "925B8C67-C96F-4A4D-9BE7-CCCD78EF3C31", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", "matchCriteriaId": "6CF580BA-6938-40F6-9D86-F43044A6BACA", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*", "matchCriteriaId": "C5E038AA-514F-48AC-B45E-859EE32525B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*", "matchCriteriaId": "31622391-A67E-4E2A-A855-1316B6E38630", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*", "matchCriteriaId": "61F0792D-7587-4297-8EE7-D4DC3A30EE84", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*", "matchCriteriaId": "7649042B-4430-4BD9-B82F-984A2831A651", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "matchCriteriaId": "B9F64296-66BF-4F1D-A11C-0C44C347E2AC", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "matchCriteriaId": "5D7F7DDB-440E-42CD-82F4-B2C13F3CC462", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*", "matchCriteriaId": "1EAF6DBA-6E3A-4854-BFBF-B5DC36CE5929", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*", "matchCriteriaId": "BE257836-4F4D-4352-8293-B9CAD34F8794", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "DirectX Graphics Kernel File Denial of Service Vulnerability" }, { "lang": "es", "value": "Una vulnerabilidad de Denegaci\u00f3n de Servicio en DirectX Graphics Kernel File" } ], "id": "CVE-2022-21918", "lastModified": "2023-12-21T01:15:25.640", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 4.0, "source": "secure@microsoft.com", "type": "Primary" } ] }, "published": "2022-01-11T21:15:13.410", "references": [ { "source": "secure@microsoft.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21918" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] } } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.