Language:
https://support.microsoft.com/en-us/help/5015874
https://support.microsoft.com/en-us/help/5015877
Severity: High
ID: 163042
File Name: smb_nt_ms22_jul_5015877.nasl
Version: 1.13
Type: local
Agent: windows
Family: Windows : Microsoft Bulletins
Published: 7/12/2022
Updated: 6/17/2024
Supported Sensors: Nessus
Risk Factor: Critical
Score: 9.0
Risk Factor: High
Base Score: 8.5
Temporal Score: 7.4
Vector: CVSS2#AV:N/AC:M/Au:S/C:C/I:C/A:C
CVSS Score Source: CVE-2022-22041
Risk Factor: High
Base Score: 8.8
Temporal Score: 8.4
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CVSS Score Source: CVE-2022-30221
CPE: cpe:/o:microsoft:windows_8, cpe:/o:microsoft:windows_server_2012:r2
Required KB Items: SMB/MS_Bulletin_Checks/Possible
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 7/12/2022
Vulnerability Publication Date: 7/12/2022
CISA Known Exploited Vulnerability Due Dates: 8/2/2022
Core Impact
CVE: CVE-2022-21845, CVE-2022-22022, CVE-2022-22023, CVE-2022-22024, CVE-2022-22025, CVE-2022-22026, CVE-2022-22027, CVE-2022-22028, CVE-2022-22029, CVE-2022-22034, CVE-2022-22036, CVE-2022-22037, CVE-2022-22038, CVE-2022-22039, CVE-2022-22040, CVE-2022-22041, CVE-2022-22042, CVE-2022-22043, CVE-2022-22047, CVE-2022-22048, CVE-2022-22049, CVE-2022-22050, CVE-2022-30202, CVE-2022-30203, CVE-2022-30205, CVE-2022-30206, CVE-2022-30208, CVE-2022-30209, CVE-2022-30211, CVE-2022-30213, CVE-2022-30220, CVE-2022-30221, CVE-2022-30223, CVE-2022-30224, CVE-2022-30225, CVE-2022-30226