Language:
https://support.microsoft.com/en-us/help/5018457
https://support.microsoft.com/en-us/help/5018478
Severity: High
ID: 166029
File Name: smb_nt_ms22_oct_5018478.nasl
Version: 1.13
Type: local
Agent: windows
Family: Windows : Microsoft Bulletins
Published: 10/11/2022
Updated: 6/17/2024
Supported Sensors: Nessus Agent, Nessus
Risk Factor: High
Score: 8.9
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.7
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2022-38040
Risk Factor: High
Base Score: 8.8
Temporal Score: 8.4
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CVSS Score Source: CVE-2022-38045
CPE: cpe:/o:microsoft:windows_server_2012
Required KB Items: SMB/MS_Bulletin_Checks/Possible
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 10/11/2022
Vulnerability Publication Date: 10/11/2022
CISA Known Exploited Vulnerability Due Dates: 11/1/2022, 5/14/2024
CVE: CVE-2022-22035, CVE-2022-24504, CVE-2022-30198, CVE-2022-33634, CVE-2022-33635, CVE-2022-33645, CVE-2022-35770, CVE-2022-37965, CVE-2022-37975, CVE-2022-37976, CVE-2022-37977, CVE-2022-37978, CVE-2022-37981, CVE-2022-37982, CVE-2022-37984, CVE-2022-37985, CVE-2022-37986, CVE-2022-37987, CVE-2022-37988, CVE-2022-37989, CVE-2022-37990, CVE-2022-37991, CVE-2022-37993, CVE-2022-37994, CVE-2022-37997, CVE-2022-37999, CVE-2022-38000, CVE-2022-38022, CVE-2022-38026, CVE-2022-38027, CVE-2022-38028, CVE-2022-38029, CVE-2022-38031, CVE-2022-38032, CVE-2022-38033, CVE-2022-38034, CVE-2022-38037, CVE-2022-38038, CVE-2022-38040, CVE-2022-38041, CVE-2022-38042, CVE-2022-38043, CVE-2022-38044, CVE-2022-38045, CVE-2022-38047, CVE-2022-38051, CVE-2022-41033, CVE-2022-41081