msrc_cve-2022-41099
Vulnerability from csaf_microsoft
Published
2022-11-08 08:00
Modified
2023-03-16 07:00
Summary
BitLocker Security Feature Bypass Vulnerability

Notes

Additional Resources
To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle
Disclaimer
The information provided in the Microsoft Knowledge Base is provided \"as is\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
Customer Action
Required. The vulnerability documented by this CVE requires customer action to resolve.



{
   document: {
      acknowledgments: [
         {
            names: [
               "Anonymous",
            ],
         },
      ],
      aggregate_severity: {
         namespace: "https://www.microsoft.com/en-us/msrc/security-update-severity-rating-system",
         text: "Important",
      },
      category: "csaf_security_advisory",
      csaf_version: "2.0",
      distribution: {
         text: "Public",
         tlp: {
            label: "WHITE",
            url: "https://www.first.org/tlp/",
         },
      },
      lang: "en-US",
      notes: [
         {
            category: "general",
            text: "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
            title: "Additional Resources",
         },
         {
            category: "legal_disclaimer",
            text: "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
            title: "Disclaimer",
         },
         {
            category: "general",
            text: "Required. The vulnerability documented by this CVE requires customer action to resolve.",
            title: "Customer Action",
         },
      ],
      publisher: {
         category: "vendor",
         contact_details: "secure@microsoft.com",
         name: "Microsoft Security Response Center",
         namespace: "https://msrc.microsoft.com",
      },
      references: [
         {
            category: "self",
            summary: "CVE-2022-41099 BitLocker Security Feature Bypass Vulnerability - HTML",
            url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41099",
         },
         {
            category: "self",
            summary: "CVE-2022-41099 BitLocker Security Feature Bypass Vulnerability - CSAF",
            url: "https://msrc.microsoft.com/csaf/2022/msrc_cve-2022-41099.json",
         },
         {
            category: "external",
            summary: "Microsoft Exploitability Index",
            url: "https://www.microsoft.com/en-us/msrc/exploitability-index?rtc=1",
         },
         {
            category: "external",
            summary: "Microsoft Support Lifecycle",
            url: "https://support.microsoft.com/lifecycle",
         },
         {
            category: "external",
            summary: "Common Vulnerability Scoring System",
            url: "https://www.first.org/cvss",
         },
      ],
      title: "BitLocker Security Feature Bypass Vulnerability",
      tracking: {
         current_release_date: "2023-03-16T07:00:00.000Z",
         generator: {
            date: "2025-01-02T21:31:19.585Z",
            engine: {
               name: "MSRC Generator",
               version: "1.0",
            },
         },
         id: "msrc_CVE-2022-41099",
         initial_release_date: "2022-11-08T08:00:00.000Z",
         revision_history: [
            {
               date: "2022-11-08T08:00:00.000Z",
               legacy_version: "1",
               number: "1",
               summary: "Information published.",
            },
            {
               date: "2023-01-10T08:00:00.000Z",
               legacy_version: "1.1",
               number: "2",
               summary: "The following updates have been made: 1) Added an FAQ with further steps customers need to take to protect the Windows Recovery Environment (WinRE) from this vulnerability. 2) Added an FAQ to further clarify that offline images are not affected by this vulnerability. These are informational changes only.",
            },
            {
               date: "2023-01-19T08:00:00.000Z",
               legacy_version: "1.2",
               number: "3",
               summary: "Updated the FAQs to further clarify the update guidance for this CVE. This is an informational change only.",
            },
            {
               date: "2023-02-07T08:00:00.000Z",
               legacy_version: "1.3",
               number: "4",
               summary: "The following updates have been made: 1) Added an FAQ to explain that a BitLocker encrypted drive cannot be accessed via an artibrary WinRE WIM hosted on an external drive. 2) Revised FAQ to clarify that the exploit is only possible with the winre.wim on the recovery partition of the device.",
            },
            {
               date: "2023-02-24T08:00:00.000Z",
               legacy_version: "1.4",
               number: "5",
               summary: "Added an FAQ to explain that the vulnerability cannot be exploited if the user is protected by BitLocker TPM+PIN. This is an informational change only.",
            },
            {
               date: "2023-03-16T07:00:00.000Z",
               legacy_version: "1.5",
               number: "6",
               summary: "Added an FAQ to inform customers that a sample script is now available to help automate updating WinRE from the running Windows OS. See [KB5025175: Updating the WinRE partition on deployed devices to address security vulnerabilities in CVE-2022-41099](https://support.microsoft.com/help/5025175) for more information.",
            },
         ],
         status: "final",
         version: "6",
      },
   },
   product_tree: {
      branches: [
         {
            branches: [
               {
                  category: "product_version_range",
                  name: "<10.0.17763.3650",
                  product: {
                     name: "Windows 10 Version 1809 for 32-bit Systems <10.0.17763.3650",
                     product_id: "18",
                  },
               },
               {
                  category: "product_version",
                  name: "10.0.17763.3650",
                  product: {
                     name: "Windows 10 Version 1809 for 32-bit Systems 10.0.17763.3650",
                     product_id: "11568",
                  },
               },
            ],
            category: "product_name",
            name: "Windows 10 Version 1809 for 32-bit Systems",
         },
         {
            branches: [
               {
                  category: "product_version_range",
                  name: "<10.0.17763.3650",
                  product: {
                     name: "Windows 10 Version 1809 for x64-based Systems <10.0.17763.3650",
                     product_id: "17",
                  },
               },
               {
                  category: "product_version",
                  name: "10.0.17763.3650",
                  product: {
                     name: "Windows 10 Version 1809 for x64-based Systems 10.0.17763.3650",
                     product_id: "11569",
                  },
               },
            ],
            category: "product_name",
            name: "Windows 10 Version 1809 for x64-based Systems",
         },
         {
            branches: [
               {
                  category: "product_version_range",
                  name: "<10.0.17763.3650",
                  product: {
                     name: "Windows 10 Version 1809 for ARM64-based Systems <10.0.17763.3650",
                     product_id: "16",
                  },
               },
               {
                  category: "product_version",
                  name: "10.0.17763.3650",
                  product: {
                     name: "Windows 10 Version 1809 for ARM64-based Systems 10.0.17763.3650",
                     product_id: "11570",
                  },
               },
            ],
            category: "product_name",
            name: "Windows 10 Version 1809 for ARM64-based Systems",
         },
         {
            branches: [
               {
                  category: "product_version_range",
                  name: "<10.0.19043.2251",
                  product: {
                     name: "Windows 10 Version 21H1 for x64-based Systems <10.0.19043.2251",
                     product_id: "13",
                  },
               },
               {
                  category: "product_version",
                  name: "10.0.19043.2251",
                  product: {
                     name: "Windows 10 Version 21H1 for x64-based Systems 10.0.19043.2251",
                     product_id: "11896",
                  },
               },
            ],
            category: "product_name",
            name: "Windows 10 Version 21H1 for x64-based Systems",
         },
         {
            branches: [
               {
                  category: "product_version_range",
                  name: "<10.0.19043.2251",
                  product: {
                     name: "Windows 10 Version 21H1 for ARM64-based Systems <10.0.19043.2251",
                     product_id: "12",
                  },
               },
               {
                  category: "product_version",
                  name: "10.0.19043.2251",
                  product: {
                     name: "Windows 10 Version 21H1 for ARM64-based Systems 10.0.19043.2251",
                     product_id: "11897",
                  },
               },
            ],
            category: "product_name",
            name: "Windows 10 Version 21H1 for ARM64-based Systems",
         },
         {
            branches: [
               {
                  category: "product_version_range",
                  name: "<10.0.19043.2251",
                  product: {
                     name: "Windows 10 Version 21H1 for 32-bit Systems <10.0.19043.2251",
                     product_id: "11",
                  },
               },
               {
                  category: "product_version",
                  name: "10.0.19043.2251",
                  product: {
                     name: "Windows 10 Version 21H1 for 32-bit Systems 10.0.19043.2251",
                     product_id: "11898",
                  },
               },
            ],
            category: "product_name",
            name: "Windows 10 Version 21H1 for 32-bit Systems",
         },
         {
            branches: [
               {
                  category: "product_version_range",
                  name: "<10.0.19042.2251",
                  product: {
                     name: "Windows 10 Version 20H2 for 32-bit Systems <10.0.19042.2251",
                     product_id: "15",
                  },
               },
               {
                  category: "product_version",
                  name: "10.0.19042.2251",
                  product: {
                     name: "Windows 10 Version 20H2 for 32-bit Systems 10.0.19042.2251",
                     product_id: "11801",
                  },
               },
            ],
            category: "product_name",
            name: "Windows 10 Version 20H2 for 32-bit Systems",
         },
         {
            branches: [
               {
                  category: "product_version_range",
                  name: "<10.0.19042.2251",
                  product: {
                     name: "Windows 10 Version 20H2 for ARM64-based Systems <10.0.19042.2251",
                     product_id: "14",
                  },
               },
               {
                  category: "product_version",
                  name: "10.0.19042.2251",
                  product: {
                     name: "Windows 10 Version 20H2 for ARM64-based Systems 10.0.19042.2251",
                     product_id: "11802",
                  },
               },
            ],
            category: "product_name",
            name: "Windows 10 Version 20H2 for ARM64-based Systems",
         },
         {
            branches: [
               {
                  category: "product_version_range",
                  name: "<10.0.22000.1219",
                  product: {
                     name: "Windows 11 version 21H2 for x64-based Systems <10.0.22000.1219",
                     product_id: "10",
                  },
               },
               {
                  category: "product_version",
                  name: "10.0.22000.1219",
                  product: {
                     name: "Windows 11 version 21H2 for x64-based Systems 10.0.22000.1219",
                     product_id: "11926",
                  },
               },
            ],
            category: "product_name",
            name: "Windows 11 version 21H2 for x64-based Systems",
         },
         {
            branches: [
               {
                  category: "product_version_range",
                  name: "<10.0.22000.1219",
                  product: {
                     name: "Windows 11 version 21H2 for ARM64-based Systems <10.0.22000.1219",
                     product_id: "9",
                  },
               },
               {
                  category: "product_version",
                  name: "10.0.22000.1219",
                  product: {
                     name: "Windows 11 version 21H2 for ARM64-based Systems 10.0.22000.1219",
                     product_id: "11927",
                  },
               },
            ],
            category: "product_name",
            name: "Windows 11 version 21H2 for ARM64-based Systems",
         },
         {
            branches: [
               {
                  category: "product_version_range",
                  name: "<10.0.19044.2251",
                  product: {
                     name: "Windows 10 Version 21H2 for 32-bit Systems <10.0.19044.2251",
                     product_id: "8",
                  },
               },
               {
                  category: "product_version",
                  name: "10.0.19044.2251",
                  product: {
                     name: "Windows 10 Version 21H2 for 32-bit Systems 10.0.19044.2251",
                     product_id: "11929",
                  },
               },
            ],
            category: "product_name",
            name: "Windows 10 Version 21H2 for 32-bit Systems",
         },
         {
            branches: [
               {
                  category: "product_version_range",
                  name: "<10.0.19044.2251",
                  product: {
                     name: "Windows 10 Version 21H2 for ARM64-based Systems <10.0.19044.2251",
                     product_id: "7",
                  },
               },
               {
                  category: "product_version",
                  name: "10.0.19044.2251",
                  product: {
                     name: "Windows 10 Version 21H2 for ARM64-based Systems 10.0.19044.2251",
                     product_id: "11930",
                  },
               },
            ],
            category: "product_name",
            name: "Windows 10 Version 21H2 for ARM64-based Systems",
         },
         {
            branches: [
               {
                  category: "product_version_range",
                  name: "<10.0.19044.2251",
                  product: {
                     name: "Windows 10 Version 21H2 for x64-based Systems <10.0.19044.2251",
                     product_id: "6",
                  },
               },
               {
                  category: "product_version",
                  name: "10.0.19044.2251",
                  product: {
                     name: "Windows 10 Version 21H2 for x64-based Systems 10.0.19044.2251",
                     product_id: "11931",
                  },
               },
            ],
            category: "product_name",
            name: "Windows 10 Version 21H2 for x64-based Systems",
         },
         {
            branches: [
               {
                  category: "product_version_range",
                  name: "<10.0.22621.819",
                  product: {
                     name: "Windows 11 Version 22H2 for ARM64-based Systems <10.0.22621.819",
                     product_id: "5",
                  },
               },
               {
                  category: "product_version",
                  name: "10.0.22621.819",
                  product: {
                     name: "Windows 11 Version 22H2 for ARM64-based Systems 10.0.22621.819",
                     product_id: "12085",
                  },
               },
            ],
            category: "product_name",
            name: "Windows 11 Version 22H2 for ARM64-based Systems",
         },
         {
            branches: [
               {
                  category: "product_version_range",
                  name: "<10.0.22621.819",
                  product: {
                     name: "Windows 11 Version 22H2 for x64-based Systems <10.0.22621.819",
                     product_id: "4",
                  },
               },
               {
                  category: "product_version",
                  name: "10.0.22621.819",
                  product: {
                     name: "Windows 11 Version 22H2 for x64-based Systems 10.0.22621.819",
                     product_id: "12086",
                  },
               },
            ],
            category: "product_name",
            name: "Windows 11 Version 22H2 for x64-based Systems",
         },
         {
            branches: [
               {
                  category: "product_version_range",
                  name: "<10.0.19045.2251",
                  product: {
                     name: "Windows 10 Version 22H2 for x64-based Systems <10.0.19045.2251",
                     product_id: "3",
                  },
               },
               {
                  category: "product_version",
                  name: "10.0.19045.2251",
                  product: {
                     name: "Windows 10 Version 22H2 for x64-based Systems 10.0.19045.2251",
                     product_id: "12097",
                  },
               },
            ],
            category: "product_name",
            name: "Windows 10 Version 22H2 for x64-based Systems",
         },
         {
            branches: [
               {
                  category: "product_version_range",
                  name: "<10.0.19045.2251",
                  product: {
                     name: "Windows 10 Version 22H2 for ARM64-based Systems <10.0.19045.2251",
                     product_id: "2",
                  },
               },
               {
                  category: "product_version",
                  name: "10.0.19045.2251",
                  product: {
                     name: "Windows 10 Version 22H2 for ARM64-based Systems 10.0.19045.2251",
                     product_id: "12098",
                  },
               },
            ],
            category: "product_name",
            name: "Windows 10 Version 22H2 for ARM64-based Systems",
         },
         {
            branches: [
               {
                  category: "product_version_range",
                  name: "<10.0.19045.2251",
                  product: {
                     name: "Windows 10 Version 22H2 for 32-bit Systems <10.0.19045.2251",
                     product_id: "1",
                  },
               },
               {
                  category: "product_version",
                  name: "10.0.19045.2251",
                  product: {
                     name: "Windows 10 Version 22H2 for 32-bit Systems 10.0.19045.2251",
                     product_id: "12099",
                  },
               },
            ],
            category: "product_name",
            name: "Windows 10 Version 22H2 for 32-bit Systems",
         },
         {
            branches: [
               {
                  category: "product_version_range",
                  name: "<10.0.10240.19567",
                  product: {
                     name: "Windows 10 for 32-bit Systems <10.0.10240.19567",
                     product_id: "22",
                  },
               },
               {
                  category: "product_version",
                  name: "10.0.10240.19567",
                  product: {
                     name: "Windows 10 for 32-bit Systems 10.0.10240.19567",
                     product_id: "10729",
                  },
               },
            ],
            category: "product_name",
            name: "Windows 10 for 32-bit Systems",
         },
         {
            branches: [
               {
                  category: "product_version_range",
                  name: "<10.0.10240.19567",
                  product: {
                     name: "Windows 10 for x64-based Systems <10.0.10240.19567",
                     product_id: "21",
                  },
               },
               {
                  category: "product_version",
                  name: "10.0.10240.19567",
                  product: {
                     name: "Windows 10 for x64-based Systems 10.0.10240.19567",
                     product_id: "10735",
                  },
               },
            ],
            category: "product_name",
            name: "Windows 10 for x64-based Systems",
         },
         {
            branches: [
               {
                  category: "product_version_range",
                  name: "<10.0.14393.5501",
                  product: {
                     name: "Windows 10 Version 1607 for 32-bit Systems <10.0.14393.5501",
                     product_id: "20",
                  },
               },
               {
                  category: "product_version",
                  name: "10.0.14393.5501",
                  product: {
                     name: "Windows 10 Version 1607 for 32-bit Systems 10.0.14393.5501",
                     product_id: "10852",
                  },
               },
            ],
            category: "product_name",
            name: "Windows 10 Version 1607 for 32-bit Systems",
         },
         {
            branches: [
               {
                  category: "product_version_range",
                  name: "<10.0.14393.5501",
                  product: {
                     name: "Windows 10 Version 1607 for x64-based Systems <10.0.14393.5501",
                     product_id: "19",
                  },
               },
               {
                  category: "product_version",
                  name: "10.0.14393.5501",
                  product: {
                     name: "Windows 10 Version 1607 for x64-based Systems 10.0.14393.5501",
                     product_id: "10853",
                  },
               },
            ],
            category: "product_name",
            name: "Windows 10 Version 1607 for x64-based Systems",
         },
      ],
   },
   vulnerabilities: [
      {
         cve: "CVE-2022-41099",
         notes: [
            {
               category: "general",
               text: "Microsoft",
               title: "Assigning CNA",
            },
            {
               category: "faq",
               text: "A successful attacker could bypass the BitLocker Device Encryption feature on the system storage device. An attacker with physical access to the target could exploit this vulnerability to gain access to encrypted data.",
               title: "What kind of security feature could be bypassed by successfully exploiting this vulnerability?",
            },
            {
               category: "faq",
               text: "Yes. You must apply the applicable Windows security update to your Windows Recovery Environment (WinRE). For more information about how to apply the WinRE update, see Add an update package to Windows RE.\nIMPORTANT: End users and enterprises who are updating Windows devices which are already deployed in their environment can instead use the latest Windows Safe OS Dynamic Updates to update WinRE when the partition is too small to install the full Windows update. You can download the latest Windows Safe OS Dynamic Update from the Microsoft Update Catalog.",
               title: "Are there additional steps that I need to take to be protected from this vulnerability?",
            },
            {
               category: "faq",
               text: "No. The exploit is only possible with the winre.wim on the recovery partition of the device.",
               title: "Can a bootable Windows ISO or USB flash drive that boot to Windows RE be used to exploit this vulnerability?",
            },
            {
               category: "faq",
               text: "No. A BitLocker encrypted drive cannot be accessed via an arbitrary WinRE WIM file hosted on an external drive. Please complete all steps in [Microsoft Learn | Add an Update to Windows RE | Apply the update to a running PC  to ensure that the updated Windows RE image is turned on and correctly configured for your Windows installation.",
               title: "Can a vulnerable version of WinRE WIM file be used to exploit this vulnerability?",
            },
            {
               category: "faq",
               text: "No. To exploit the vulnerability the attacker needs to know the TPM PIN if the user is protected by the BitLocker TPM+PIN.",
               title: "If TPM+PIN BitLocker protectors are being used, can the vulnerability be exploited if the attacker does not know the TPM PIN?",
            },
            {
               category: "faq",
               text: "Yes. Microsoft has developed a sample script that can help you automate updating WinRE from the running Windows OS. Please see KB5025175: Updating the WinRE partition on deployed devices to address security vulnerabilities in CVE-2022-41099 for more information.",
               title: "Is there a way I can automate the process of updating WinRE on my Windows devices which have already been deployed?",
            },
         ],
         product_status: {
            fixed: [
               "10729",
               "10735",
               "10852",
               "10853",
               "11568",
               "11569",
               "11570",
               "11801",
               "11802",
               "11896",
               "11897",
               "11898",
               "11926",
               "11927",
               "11929",
               "11930",
               "11931",
               "12085",
               "12086",
               "12097",
               "12098",
               "12099",
            ],
            known_affected: [
               "1",
               "2",
               "3",
               "4",
               "5",
               "6",
               "7",
               "8",
               "9",
               "10",
               "11",
               "12",
               "13",
               "14",
               "15",
               "16",
               "17",
               "18",
               "19",
               "20",
               "21",
               "22",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2022-41099 BitLocker Security Feature Bypass Vulnerability - HTML",
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41099",
            },
            {
               category: "self",
               summary: "CVE-2022-41099 BitLocker Security Feature Bypass Vulnerability - CSAF",
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41099",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               date: "2022-11-08T08:00:00.000Z",
               details: "10.0.17763.3650:Security Update:https://support.microsoft.com/help/5019966",
               product_ids: [
                  "18",
                  "17",
                  "16",
               ],
               url: "https://support.microsoft.com/help/5019966",
            },
            {
               category: "vendor_fix",
               date: "2022-11-08T08:00:00.000Z",
               details: "10.0.19043.2251:Security Update:https://support.microsoft.com/help/5019959",
               product_ids: [
                  "13",
                  "12",
                  "11",
               ],
               url: "https://support.microsoft.com/help/5019959",
            },
            {
               category: "vendor_fix",
               date: "2022-11-08T08:00:00.000Z",
               details: "10.0.19042.2251:Security Update:https://support.microsoft.com/help/5019959",
               product_ids: [
                  "15",
                  "14",
               ],
               url: "https://support.microsoft.com/help/5019959",
            },
            {
               category: "vendor_fix",
               date: "2022-11-08T08:00:00.000Z",
               details: "10.0.22000.1219:Security Update:https://support.microsoft.com/help/5019961",
               product_ids: [
                  "10",
                  "9",
               ],
               url: "https://support.microsoft.com/help/5019961",
            },
            {
               category: "vendor_fix",
               date: "2022-11-08T08:00:00.000Z",
               details: "10.0.19044.2251:Security Update:https://support.microsoft.com/help/5019959",
               product_ids: [
                  "8",
                  "7",
                  "6",
               ],
               url: "https://support.microsoft.com/help/5019959",
            },
            {
               category: "vendor_fix",
               date: "2022-11-08T08:00:00.000Z",
               details: "10.0.22621.819:Security Update:https://support.microsoft.com/help/5019980",
               product_ids: [
                  "5",
                  "4",
               ],
               url: "https://support.microsoft.com/help/5019980",
            },
            {
               category: "vendor_fix",
               date: "2022-11-08T08:00:00.000Z",
               details: "10.0.19045.2251:Security Update:https://support.microsoft.com/help/5019959",
               product_ids: [
                  "3",
                  "2",
                  "1",
               ],
               url: "https://support.microsoft.com/help/5019959",
            },
            {
               category: "vendor_fix",
               date: "2022-11-08T08:00:00.000Z",
               details: "10.0.10240.19567:Security Update:https://support.microsoft.com/help/5019970",
               product_ids: [
                  "22",
                  "21",
               ],
               url: "https://support.microsoft.com/help/5019970",
            },
            {
               category: "vendor_fix",
               date: "2022-11-08T08:00:00.000Z",
               details: "10.0.14393.5501:Security Update:https://support.microsoft.com/help/5019964",
               product_ids: [
                  "20",
                  "19",
               ],
               url: "https://support.microsoft.com/help/5019964",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  attackComplexity: "LOW",
                  attackVector: "PHYSICAL",
                  availabilityImpact: "NONE",
                  baseScore: 4.6,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  environmentalsScore: 0,
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 4,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               products: [
                  "1",
                  "2",
                  "3",
                  "4",
                  "5",
                  "6",
                  "7",
                  "8",
                  "9",
                  "10",
                  "11",
                  "12",
                  "13",
                  "14",
                  "15",
                  "16",
                  "17",
                  "18",
                  "19",
                  "20",
                  "21",
                  "22",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               details: "Security Feature Bypass",
            },
            {
               category: "exploit_status",
               details: "Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely",
            },
         ],
         title: "BitLocker Security Feature Bypass Vulnerability",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.