A Firewall Rule which allows all incoming TCP connections to all programs from any source and to all ports is created in Windows Firewall after Zabbix agent installation (MSI)
Max CVSS
9.8
EPSS Score
0.21%
Published
2022-12-05
Updated
2022-12-07

CVE-2022-41080

Known exploited
Used for ransomware
Microsoft Exchange Server Elevation of Privilege Vulnerability
Max CVSS
9.8
EPSS Score
1.85%
Published
2022-11-09
Updated
2023-06-13
CISA KEV Added
2023-01-10
Azure RTOS USBX is a USB host, device, and on-the-go (OTG) embedded stack, that is fully integrated with Azure RTOS ThreadX. Prior to version 6.1.12, the USB DFU UPLOAD functionality may be utilized to introduce a buffer overflow resulting in overwrite of memory contents. In particular cases this may allow an attacker to bypass security features or execute arbitrary code. The implementation of `ux_device_class_dfu_control_request` function prevents buffer overflow during handling of DFU UPLOAD command when current state is `UX_SYSTEM_DFU_STATE_DFU_IDLE`. This issue has been patched, please upgrade to version 6.1.12. As a workaround, add the `UPLOAD_LENGTH` check in all possible states.
Max CVSS
9.8
EPSS Score
0.44%
Published
2022-11-04
Updated
2022-11-07
Azure CLI is the command-line interface for Microsoft Azure. In versions previous to 2.40.0, Azure CLI contains a vulnerability for potential code injection. Critical scenarios are where a hosting machine runs an Azure CLI command where parameter values have been provided by an external source. The vulnerability is only applicable when the Azure CLI command is run on a Windows machine and with any version of PowerShell and when the parameter value contains the `&` or `|` symbols. If any of these prerequisites are not met, this vulnerability is not applicable. Users should upgrade to version 2.40.0 or greater to receive a a mitigation for the vulnerability.
Max CVSS
9.8
EPSS Score
0.34%
Published
2022-10-25
Updated
2023-06-27
Azure RTOS USBX is a high-performance USB host, device, and on-the-go (OTG) embedded stack, that is fully integrated with Azure RTOS ThreadX. The case is, in [_ux_host_class_pima_read](https://github.com/azure-rtos/usbx/blob/master/common/usbx_host_classes/src/ux_host_class_pima_read.c), there is data length from device response, returned in the very first packet, and read by [L165 code](https://github.com/azure-rtos/usbx/blob/082fd9db09a3669eca3358f10b8837a5c1635c0b/common/usbx_host_classes/src/ux_host_class_pima_read.c#L165), as header_length. Then in [L178 code](https://github.com/azure-rtos/usbx/blob/082fd9db09a3669eca3358f10b8837a5c1635c0b/common/usbx_host_classes/src/ux_host_class_pima_read.c#L178), there is a “if” branch, which check the expression of “(header_length - UX_HOST_CLASS_PIMA_DATA_HEADER_SIZE) > data_length” where if header_length is smaller than UX_HOST_CLASS_PIMA_DATA_HEADER_SIZE, calculation could overflow and then [L182 code](https://github.com/azure-rtos/usbx/blob/082fd9db09a3669eca3358f10b8837a5c1635c0b/common/usbx_host_classes/src/ux_host_class_pima_read.c#L182) the calculation of data_length is also overflow, this way the later [while loop start from L192](https://github.com/azure-rtos/usbx/blob/082fd9db09a3669eca3358f10b8837a5c1635c0b/common/usbx_host_classes/src/ux_host_class_pima_read.c#L192) can move data_pointer to unexpected address and cause write buffer overflow. The fix has been included in USBX release [6.1.12](https://github.com/azure-rtos/usbx/releases/tag/v6.1.12_rel). The following can be used as a workaround: Add check of `header_length`: 1. It must be greater than `UX_HOST_CLASS_PIMA_DATA_HEADER_SIZE`. 1. It should be greater or equal to the current returned data length (`transfer_request -> ux_transfer_request_actual_length`).
Max CVSS
9.8
EPSS Score
0.23%
Published
2022-10-13
Updated
2022-10-18
<p>Microsoft has identified a vulnerability affecting the cluster connect feature of Azure Arc-enabled Kubernetes clusters. This vulnerability could allow an unauthenticated user to elevate their privileges and potentially gain administrative control over the Kubernetes cluster. Additionally, because Azure Stack Edge allows customers to deploy Kubernetes workloads on their devices via Azure Arc, Azure Stack Edge devices are also vulnerable to this vulnerability.</p>
Max CVSS
10.0
EPSS Score
0.19%
Published
2022-10-11
Updated
2023-12-20
Azure RTOS USBx is a USB host, device, and on-the-go (OTG) embedded stack, fully integrated with Azure RTOS ThreadX and available for all Azure RTOS ThreadX–supported processors. Azure RTOS USBX implementation of host support for USB CDC ECM includes an integer underflow and a buffer overflow in the `_ux_host_class_cdc_ecm_mac_address_get` function which may be potentially exploited to achieve remote code execution or denial of service. Setting mac address string descriptor length to a `0` or `1` allows an attacker to introduce an integer underflow followed (string_length) by a buffer overflow of the `cdc_ecm -> ux_host_class_cdc_ecm_node_id` array. This may allow one to redirect the code execution flow or introduce a denial of service. The fix has been included in USBX release [6.1.12](https://github.com/azure-rtos/usbx/releases/tag/v6.1.12_rel). Improved mac address string descriptor length validation to check for unexpectedly small values may be used as a workaround.
Max CVSS
9.8
EPSS Score
2.71%
Published
2022-10-10
Updated
2023-06-29
Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability
Max CVSS
9.8
EPSS Score
1.09%
Published
2022-09-13
Updated
2023-04-11
Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability
Max CVSS
9.8
EPSS Score
1.09%
Published
2022-09-13
Updated
2023-04-11
Windows TCP/IP Remote Code Execution Vulnerability
Max CVSS
9.8
EPSS Score
23.99%
Published
2022-09-13
Updated
2023-04-11
Windows Network File System Remote Code Execution Vulnerability
Max CVSS
9.8
EPSS Score
1.47%
Published
2022-08-09
Updated
2023-05-31
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
Max CVSS
9.6
EPSS Score
0.18%
Published
2022-08-09
Updated
2023-05-31

CVE-2022-30190

Known exploited
Public exploit
<p>A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights.</p> <p>Please see the <a href="https://aka.ms/CVE-2022-30190-Guidance">MSRC Blog Entry</a> for important information about steps you can take to protect your system from this vulnerability.</p>
Max CVSS
9.3
EPSS Score
97.14%
Published
2022-06-01
Updated
2023-12-20
CISA KEV Added
2022-06-14
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
Max CVSS
9.3
EPSS Score
0.93%
Published
2022-06-15
Updated
2023-12-20
Windows Network File System Remote Code Execution Vulnerability
Max CVSS
10.0
EPSS Score
88.91%
Published
2022-06-15
Updated
2023-12-20
Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability
Max CVSS
9.8
EPSS Score
1.09%
Published
2022-08-09
Updated
2023-05-31
Azure RTOS USBX is a USB host, device, and on-the-go (OTG) embedded stack. Prior to version 6.1.11, he USBX DFU UPLOAD functionality may be utilized to introduce a buffer overflow resulting in overwrite of memory contents. In particular cases this may allow an attacker to bypass security features or execute arbitrary code. The implementation of `ux_device_class_dfu_control_request` function does not assure that a buffer overflow will not occur during handling of the DFU UPLOAD command. When an attacker issues the `UX_SLAVE_CLASS_DFU_COMMAND_UPLOAD` control transfer request with `wLenght` larger than the buffer size (`UX_SLAVE_REQUEST_CONTROL_MAX_LENGTH`, 256 bytes), depending on the actual implementation of `dfu -> ux_slave_class_dfu_read`, a buffer overflow may occur. In example `ux_slave_class_dfu_read` may read 4096 bytes (or more up to 65k) to a 256 byte buffer ultimately resulting in an overflow. Furthermore in case an attacker has some control over the read flash memory, this may result in execution of arbitrary code and platform compromise. A fix for this issue has been included in USBX release 6.1.11. As a workaround, align request and buffer size to assure that buffer boundaries are respected.
Max CVSS
9.8
EPSS Score
1.24%
Published
2022-05-24
Updated
2022-06-07
Azure RTOS USBX is a USB host, device, and on-the-go (OTG) embedded stack. In versions prior to 6.1.10, an attacker can cause a buffer overflow by providing the Azure RTOS USBX host stack a HUB descriptor with `bNbPorts` set to a value greater than `UX_MAX_TT` which defaults to 8. For a `bNbPorts` value of 255, the implementation of `ux_host_class_hub_descriptor_get` function will modify the contents of `hub` -> `ux_host_class_hub_device` -> `ux_device_hub_tt` array violating the end boundary by 255 - `UX_MAX_TT` items. The USB host stack needs to validate the number of ports reported by the hub, and if the value is larger than UX_MAX_TT, USB stack needs to reject the request. This fix has been included in USBX release 6.1.10.
Max CVSS
9.8
EPSS Score
0.26%
Published
2022-05-24
Updated
2022-06-07
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
Max CVSS
9.0
EPSS Score
1.08%
Published
2022-05-10
Updated
2023-12-21
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
Max CVSS
9.8
EPSS Score
1.20%
Published
2022-05-10
Updated
2023-12-21
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
Max CVSS
9.0
EPSS Score
1.08%
Published
2022-05-10
Updated
2023-12-21
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
Max CVSS
9.0
EPSS Score
1.08%
Published
2022-05-10
Updated
2023-12-21
Microsoft Excel Remote Code Execution Vulnerability
Max CVSS
9.3
EPSS Score
0.27%
Published
2022-05-10
Updated
2023-12-21
Windows Network File System Remote Code Execution Vulnerability
Max CVSS
9.8
EPSS Score
78.32%
Published
2022-05-10
Updated
2023-12-21

CVE-2022-26923

Known exploited
Public exploit
Active Directory Domain Services Elevation of Privilege Vulnerability
Max CVSS
9.0
EPSS Score
7.08%
Published
2022-05-10
Updated
2023-12-21
CISA KEV Added
2022-08-18
75 vulnerabilities found
1 2 3
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!