We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-38000

Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability



Assignermicrosoft
Reserved2022-08-08
Published2022-10-11
Updated2024-08-03

Description

Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability



HIGH: 8.1CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C

Problem types

Remote Code Execution

Product status

10.0.0 before 10.0.17763.3532
affected

10.0.0 before 10.0.17763.3532
affected

10.0.0 before 10.0.17763.3532
affected

10.0.0 before 10.0.19043.2130
affected

10.0.0 before 10.0.20348.1129
affected

10.0.0 before 10.0.19042.2130
affected

10.0.0 before 10.0.22000.1098
affected

10.0.0 before 10.0.19044.2130
affected

10.0.0 before 10.0.22621.674
affected

10.0.0 before 10.0.10240.19507
affected

10.0.0 before 10.0.14393.5427
affected

10.0.0 before 10.0.14393.5427
affected

10.0.0 before 10.0.14393.5427
affected

6.1.0 before 6.1.7601.26174
affected

6.1.0 before 6.1.7601.26174
affected

6.3.0 before 6.3.9600.20625
affected

6.1.0 before 6.1.7601.26174
affected

6.0.0 before 6.1.7601.26174
affected

6.2.0 before 6.2.9200.23920
affected

6.2.0 before 6.2.9200.23920
affected

6.3.0 before 6.3.9600.20625
affected

6.3.0 before 6.3.9600.20625
affected

References

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38000

cve.org CVE-2022-38000

nvd.nist.gov CVE-2022-38000

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.