SB2022111414 - Multiple vulnerabilities in Dell Unisphere for PowerMax, Dell Solutions Enabler, Dell Unisphere 360 and Dell VASA Provider



SB2022111414 - Multiple vulnerabilities in Dell Unisphere for PowerMax, Dell Solutions Enabler, Dell Unisphere 360 and Dell VASA Provider

Published: November 14, 2022 Updated: October 25, 2024

Security Bulletin ID SB2022111414
Severity
Critical
Patch available
YES
Number of vulnerabilities 141
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Critical 1% High 10% Medium 32% Low 57%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 141 secuirty vulnerabilities.


1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-21873)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Tile Data Repository, which leads to security restrictions bypass and privilege escalation.


2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-21867)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows Push Notifications Apps, which leads to security restrictions bypass and privilege escalation.


3) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-21868)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows Devices Human Interface, which leads to security restrictions bypass and privilege escalation.


4) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-21869)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Clipboard User Service, which leads to security restrictions bypass and privilege escalation.


5) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-21870)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Tablet Windows User Interface Application Core, which leads to security restrictions bypass and privilege escalation.


6) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-21871)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Microsoft Diagnostics Hub Standard Collector Runtime, which leads to security restrictions bypass and privilege escalation.


7) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-21872)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows Event Tracing, which leads to security restrictions bypass and privilege escalation.


8) Code Injection (CVE-ID: CVE-2022-21874)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation in Windows Security Center API. A remote attacker can send a specially crafted request and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


9) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-21865)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Connected Devices Platform Service, which leads to security restrictions bypass and privilege escalation.


10) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-21875)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows Storage, which leads to security restrictions bypass and privilege escalation.


11) Information disclosure (CVE-ID: CVE-2022-21876)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application in Win32k. A local user can gain unauthorized access to sensitive information on the system.


12) Out-of-bounds read (CVE-ID: CVE-2022-21877)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the Storage Spaces Controller (spaceport.sys drive). A local user can run a specially crafted program to trigger an out-of-bounds read error and read contents of memory with SYSTEM privileges..


13) Code Injection (CVE-ID: CVE-2022-21878)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation in Windows Geolocation Service. A remote attacker can send a specially crafted request and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


14) Input validation error (CVE-ID: CVE-2022-21879)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to insufficient validation of user-supplied input in Windows kernel. A local user can run a specially crafted program to read contents of memory on the system.


15) Information disclosure (CVE-ID: CVE-2022-21880)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application in Windows GDI+. A remote attacker can gain unauthorized access to sensitive information on the system.


16) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-21866)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows System Launcher, which leads to security restrictions bypass and privilege escalation.


17) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-21864)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows UI Immersive Server API, which leads to security restrictions bypass and privilege escalation.


18) Buffer overflow (CVE-ID: CVE-2022-21882)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the Win32k.sys driver. A local user can run a specially crafted program to trigger a buffer overflow and execute arbitrary code on the system with elevated privileges.

Note, the vulnerability is being actively exploited in the wild.


19) Buffer overflow (CVE-ID: CVE-2022-21851)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDU (Server RDP Preconnection) requests in client's drive redirection virtual channel in Remote Desktop Client. A remote attacker can trick the victim to connect to a malicious RDP server, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


20) Link following (CVE-ID: CVE-2022-21838)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a link following issue within the SilentCleanup scheduled task. A local user can create a specially symbolic crafted link to critical folders on the system and force the task to delete the folder.


21) Input validation error (CVE-ID: CVE-2022-21839)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in Windows Event Tracing Discretionary Access Control List. A local user can pass specially crafted input to the application and perform a denial of service (DoS) attack.


22) Input validation error (CVE-ID: CVE-2022-21843)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in Windows IKE Extension. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.


23) Input validation error (CVE-ID: CVE-2022-21848)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in Windows IKE Extension. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.


24) Code Injection (CVE-ID: CVE-2022-21849)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation in Windows IKE Extension. A remote attacker can send a specially crafted request and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


25) Buffer overflow (CVE-ID: CVE-2022-21850)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the Remote Desktop Client. A remote attacker can trick the victim to connect to a malicious RDP server, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


26) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-21852)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows DWM Core Library, which leads to security restrictions bypass and privilege escalation.


27) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-21863)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows StateRepository API Server file, which leads to security restrictions bypass and privilege escalation.


28) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-21857)

The vulnerability allows a remote authenticated attacker to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Active Directory Domain Services, which leads to security restrictions bypass and privilege escalation.


29) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-21858)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows Bind Filter Driver, which leads to security restrictions bypass and privilege escalation.


30) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-21859)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows Accounts Control, which leads to security restrictions bypass and privilege escalation.


31) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-21860)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows AppContracts API Server, which leads to security restrictions bypass and privilege escalation.


32) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-21861)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Task Flow Data Engine, which leads to security restrictions bypass and privilege escalation.


33) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-21862)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows Application Model Core API, which leads to security restrictions bypass and privilege escalation.


34) Buffer overflow (CVE-ID: CVE-2022-21881)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in Windows kernel. A local user can run a specially crafted program to trigger buffer overflow and execute arbitrary code with elevated privileges.


35) Input validation error (CVE-ID: CVE-2022-21883)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in Windows IKE Extension. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.


36) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-21835)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Microsoft Cryptographic Services, which leads to security restrictions bypass and privilege escalation.


37) Security features bypass (CVE-ID: CVE-2022-21924)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to an error in the Workstation Service. A remote attacker can trick the victim to initiate connection to the malicious host and gain access to sensitive information.


38) Information disclosure (CVE-ID: CVE-2022-21915)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application in Windows GDI+. A remote authenticated attacker can gain unauthorized access to sensitive information on the system.


39) Buffer overflow (CVE-ID: CVE-2022-21916)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in Windows Common Log File System Driver. A local user can run a specially crafted program to trigger memory corruption and execute arbitrary code with elevated privileges.

40) Input validation error (CVE-ID: CVE-2022-21918)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in DirectX Graphics Kernel File. A local user can pass specially crafted input to the application and perform a denial of service (DoS) attack.


41) Buffer overflow (CVE-ID: CVE-2022-21919)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in Windows User Profile Service. A local user can execute arbitrary code with elevated privileges.

42) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-21920)

The vulnerability allows a remote authenticated attacker to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows Kerberos, which leads to security restrictions bypass and privilege escalation.


43) Buffer overflow (CVE-ID: CVE-2022-21922)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in Microsoft Windows RPC service. A remote authenticated  user can send specially crafted data through the RPC runtime, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


44) Code Injection (CVE-ID: CVE-2022-21928)

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation in Windows Resilient File System (ReFS). An authenticated attacker with physical access can send a specially crafted request and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


45) Security features bypass (CVE-ID: CVE-2022-21913)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to unspecified error in Local Security Authority (Domain Policy). A remote attacker can trick the victim to initiate connection with a malicious system and gain access to sensitive information.


46) Code Injection (CVE-ID: CVE-2022-21958)

The vulnerability allows a local attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation in Windows Resilient File System (ReFS). An attacker with physical access can send a specially crafted request and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


47) Code Injection (CVE-ID: CVE-2022-21959)

The vulnerability allows a local attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation in Windows Resilient File System (ReFS). An attacker with physical access can send a specially crafted request and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


48) Code Injection (CVE-ID: CVE-2022-21960)

The vulnerability allows a local attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation in Windows Resilient File System (ReFS). An attacker with physical access can send a specially crafted request and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


49) Code Injection (CVE-ID: CVE-2022-21961)

The vulnerability allows a local attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation in Windows Resilient File System (ReFS). An attacker with physical access can send a specially crafted request and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


50) Code Injection (CVE-ID: CVE-2022-21962)

The vulnerability allows a local attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation in Windows Resilient File System (ReFS). An attacker with physical access can send a specially crafted request and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


51) Code Injection (CVE-ID: CVE-2022-21963)

The vulnerability allows a local attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation in Windows Resilient File System (ReFS). An attacker with physical access can send a specially crafted request and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


52) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-21914)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows Remote Access Connection Manager, which leads to security restrictions bypass and privilege escalation.


53) Code Injection (CVE-ID: CVE-2022-21912)

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation in DirectX Graphics Kernel. A local user can send a specially crafted request and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


54) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-21885)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows Remote Access Connection Manager, which leads to security restrictions bypass and privilege escalation.


55) Buffer overflow (CVE-ID: CVE-2022-21895)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in Windows User Profile Service. A local user can execute arbitrary code with elevated privileges.


56) Code Injection (CVE-ID: CVE-2022-21888)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation in Windows Modern Execution Server. A remote attacker can send a specially crafted request and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


57) Input validation error (CVE-ID: CVE-2022-21889)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in Windows IKE Extension. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.


58) Input validation error (CVE-ID: CVE-2022-21890)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input Windows IKE Extension. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.


59) Code Injection (CVE-ID: CVE-2022-21892)

The vulnerability allows a local attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation in Windows Resilient File System (ReFS). An attacker with physical access can send a specially crafted request and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


60) Code Injection (CVE-ID: CVE-2022-21893)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation in Remote Desktop Protocol. A remote attacker can trick a target victim to connect to a malicious RDP server and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


61) Security features bypass (CVE-ID: CVE-2022-21894)

The vulnerability allows a local user to bypass implemented security restrictions.

the vulnerability exists due to an error in Secure Boot implementation. A local user can bypass implemented security restrictions.


62) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-21896)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows DWM Core Library, which leads to security restrictions bypass and privilege escalation.


63) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-21908)

The vulnerability allows a remote attacker to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows Installer, which leads to security restrictions bypass and privilege escalation.


64) Buffer overflow (CVE-ID: CVE-2022-21897)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in Windows Common Log File System Driver. A local user can run a specially crafted program to trigger memory corruption and execute arbitrary code with elevated privileges.


65) Code Injection (CVE-ID: CVE-2022-21898)

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation in DirectX Graphics Kernel. A local user can send a specially crafted request and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


66) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-21902)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows DWM Core Library, which leads to security restrictions bypass and privilege escalation.


67) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-21903)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows GDI, which leads to security restrictions bypass and privilege escalation.


68) Information disclosure (CVE-ID: CVE-2022-21904)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application Windows GDI. A remote attacker can gain unauthorized access to sensitive information on the system.


69) Security features bypass (CVE-ID: CVE-2022-21906)

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to improper input validation in Windows Defender Application Control. A remote attacker can pass a specially crafted file to the system and bypass implemented security restrictions.


70) Buffer overflow (CVE-ID: CVE-2022-21907)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the HTTP Trailer Support feature in HTTP Protocol Stack (http.sys). A remote attacker can send a specially crafted HTTP request to the web server, trigger a buffer overflow and execute arbitrary code on the system.


71) Spoofing attack (CVE-ID: CVE-2022-21836)

The vulnerability allows a local user to perform spoofing attack.

The vulnerability exists due to incorrect processing of user-supplied data in Windows Certificate. A local user can spoof page content.


72) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-21834)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows User-mode Driver Framework Reflector Driver, which leads to security restrictions bypass and privilege escalation.


73) Information disclosure (CVE-ID: CVE-2021-38631)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application in Windows Remote Desktop Protocol (RDP). A local administrator can gain unauthorized access to sensitive information on the system.


74) Improper input validation (CVE-ID: CVE-2022-21340)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The vulnerability exists due to improper input validation within the Libraries component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.


75) Improper input validation (CVE-ID: CVE-2022-21341)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The vulnerability exists due to improper input validation within the Serialization component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.


76) Improper input validation (CVE-ID: CVE-2022-21248)

The vulnerability allows a remote non-authenticated attacker to manipulate data.

The vulnerability exists due to improper input validation within the Serialization component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to manipulate data.


77) Insufficient verification of data authenticity (CVE-ID: CVE-2021-22947)

The vulnerability allows a remote attacker to perform MitM attack.

The vulnerability exists in the way libcurl handles the STARTTLS negotiation process. When curl connects to an IMAP, POP3, SMTP or FTP server to exchange data securely using STARTTLS to upgrade the connection to TLS level, the server can still respond and send back multiple responses before the TLS upgrade. Such multiple "pipelined" responses are cached by curl. curl would then upgrade to TLS but not flush the in-queue of cached responses and instead use and trust the responses it got before the TLS handshake as if they were authenticated.

Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker's injected data comes from the TLS-protected server.

Over POP3 and IMAP an attacker can inject fake response data.


78) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-36957)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows Desktop Bridge, which leads to security restrictions bypass and privilege escalation.


79) Use-after-free (CVE-ID: CVE-2021-36976)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error in copy_string. A remote attacker can cause a denial of service condition on the target system.


80) Information disclosure (CVE-ID: CVE-2021-38665)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application in Remote Desktop Protocol Client. A remote attacker can gain unauthorized access to sensitive information on the system.


81) Improper input validation (CVE-ID: CVE-2022-21293)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The vulnerability exists due to improper input validation within the Libraries component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.


82) Code Injection (CVE-ID: CVE-2021-38666)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation in Remote Desktop Client. A remote attacker can send a specially crafted request and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


83) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-41333)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows Print Spooler, which leads to security restrictions bypass and privilege escalation.


84) Input validation error (CVE-ID: CVE-2021-41356)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in Windows. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.


85) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-41366)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Credential Security Support Provider Protocol (CredSSP), which leads to security restrictions bypass and privilege escalation.


86) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-41367)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in NTFS, which leads to security restrictions bypass and privilege escalation.


87) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-41370)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in NTFS, which leads to security restrictions bypass and privilege escalation.


88) Improper input validation (CVE-ID: CVE-2022-21294)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The vulnerability exists due to improper input validation within the Libraries component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.


89) Improper input validation (CVE-ID: CVE-2022-21283)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The vulnerability exists due to improper input validation within the Libraries component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.


90) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-41377)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows Fast FAT File System Driver, which leads to security restrictions bypass and privilege escalation.


91) Improper input validation (CVE-ID: CVE-2022-21305)

The vulnerability allows a remote non-authenticated attacker to manipulate data.

The vulnerability exists due to improper input validation within the Hotspot component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to manipulate data.


92) Execution with unnecessary privileges (CVE-ID: CVE-2021-36339)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application binary has a setuid bit. A local low-privileged user can run the affected binary to get privileged access to the virtual appliance.


93) Input validation error (CVE-ID: CVE-2021-4034)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improper handling of the calling parameters count in the pkexec setuid binary, which causes the binary to execute environment variables as commands. A local user can craft environment variables in a way that they will be processed and executed by pkexec and execute arbitrary commands on the system as root.


94) Inconsistent interpretation of HTTP requests (CVE-ID: CVE-2021-22959)

The vulnerability allows a remote attacker to preform HTTP request smuggling attacks.

The vulnerability exists due to improper validation of HTTP requests, where the application accepts requests with a space right after the header name before the colon. A remote attacker can send a specially crafted HTTP request to the server and smuggle arbitrary HTTP headers.

Successful exploitation of vulnerability may allow an attacker to poison HTTP cache and perform phishing attacks.


95) Improper input validation (CVE-ID: CVE-2022-21349)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The vulnerability exists due to improper input validation within the 2D component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.


96) Improper input validation (CVE-ID: CVE-2022-21291)

The vulnerability allows a remote non-authenticated attacker to manipulate data.

The vulnerability exists due to improper input validation within the Hotspot component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to manipulate data.


97) Improper input validation (CVE-ID: CVE-2022-21277)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The vulnerability exists due to improper input validation within the ImageIO component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.


98) Improper input validation (CVE-ID: CVE-2022-21271)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The vulnerability exists due to improper input validation within the Libraries component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.


99) Improper input validation (CVE-ID: CVE-2022-21360)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The vulnerability exists due to improper input validation within the ImageIO component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.


100) Improper input validation (CVE-ID: CVE-2022-21365)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The vulnerability exists due to improper input validation within the ImageIO component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.


101) Improper input validation (CVE-ID: CVE-2022-21366)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The vulnerability exists due to improper input validation within the ImageIO component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.


102) Improper input validation (CVE-ID: CVE-2022-21282)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The vulnerability exists due to improper input validation within the JAXP component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to gain access to sensitive information.


103) Improper input validation (CVE-ID: CVE-2022-21296)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The vulnerability exists due to improper input validation within the JAXP component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to gain access to sensitive information.


104) Improper input validation (CVE-ID: CVE-2022-21299)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The vulnerability exists due to improper input validation within the JAXP component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.


105) Information disclosure (CVE-ID: CVE-2021-41371)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application in Windows Remote Desktop Protocol (RDP). A local administrator can gain unauthorized access to sensitive information on the system.


106) Code Injection (CVE-ID: CVE-2021-41378)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation in Windows NTFS. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


107) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-21833)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Virtual Machine IDE Drive, which leads to security restrictions bypass and privilege escalation.


108) Information disclosure (CVE-ID: CVE-2021-43235)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application in Storage Spaces Controller. A local user can gain unauthorized access to sensitive information on the system.


109) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-43229)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows NTFS, which leads to security restrictions bypass and privilege escalation.


110) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-43230)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows NTFS, which leads to security restrictions bypass and privilege escalation.


111) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-43231)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows NTFS, which leads to security restrictions bypass and privilege escalation.


112) Code Injection (CVE-ID: CVE-2021-43232)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation in Windows Event Tracing. A remote attacker can send a specially crafted request and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


113) Code Injection (CVE-ID: CVE-2021-43233)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation in Remote Desktop Client. A remote attacker can send a specially crafted request and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


114) Code Injection (CVE-ID: CVE-2021-43234)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation in Windows Fax Service. A remote attacker can send a specially crafted request and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


115) Information disclosure (CVE-ID: CVE-2021-43236)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application in Microsoft Message Queuing. A remote attacker can gain unauthorized access to sensitive information on the system.


116) Information disclosure (CVE-ID: CVE-2021-43227)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application in Storage Spaces Controller. A local user can gain unauthorized access to sensitive information on the system.


117) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-43238)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows Remote Access, which leads to security restrictions bypass and privilege escalation.


118) Information disclosure (CVE-ID: CVE-2021-43244)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application in Windows Kernel. A local user can gain unauthorized access to sensitive information on the system.


119) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-43247)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows TCP/IP Driver, which leads to security restrictions bypass and privilege escalation.


120) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-43248)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows Digital Media Receiver, which leads to security restrictions bypass and privilege escalation.


121) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-43883)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows Installer, which leads to security restrictions bypass and privilege escalation.


122) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-43893)

The vulnerability allows a remote authenticated attacker to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows Encrypting File System (EFS), which leads to security restrictions bypass and privilege escalation.


123) Input validation error (CVE-ID: CVE-2021-43228)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in SymCrypt. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.


124) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-43226)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows Common Log File System Driver, which leads to security restrictions bypass and privilege escalation.


125) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-41379)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows Installer, which leads to security restrictions bypass and delete targeted files on a system.


126) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-42285)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows Kernel, which leads to security restrictions bypass and privilege escalation.


127) Code Injection (CVE-ID: CVE-2021-42275)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation in Microsoft COM for Windows. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


128) Code Injection (CVE-ID: CVE-2021-42276)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation in Microsoft Windows Media Foundation. A remote attacker can send a specially crafted request and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


129) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-42277)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Diagnostics Hub Standard Collector. A local user can delete targeted files on a system.


130) Buffer overflow (CVE-ID: CVE-2021-42279)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in Chakra Scripting Engine. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


131) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-42280)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows Feedback Hub, which leads to security restrictions bypass and privilege escalation.


132) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-42283)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in NTFS, which leads to security restrictions bypass and privilege escalation.


133) Security features bypass (CVE-ID: CVE-2021-42288)

The vulnerability allows a local attacker to bypass authentication process.

The vulnerability exists due to security feature bypass issue in Windows Hello. An attacker with physical access can bypass the target application


134) Information disclosure (CVE-ID: CVE-2021-43224)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application in Windows Common Log File System Driver. A local user can gain unauthorized access to sensitive information on the system.


135) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-43207)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows Common Log File System Driver, which leads to security restrictions bypass and privilege escalation.


136) Buffer overflow (CVE-ID: CVE-2021-43215)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in iSNS Server. A remote attacker can send a specially crafted request, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


137) Information disclosure (CVE-ID: CVE-2021-43216)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application in Microsoft Local Security Authority Server (lsasrv). A remote authenticated attacker can gain unauthorized access to sensitive information on the system.


138) Out-of-bounds write (CVE-ID: CVE-2021-43217)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input in Windows Encrypting File System (EFS). A remote attacker can trigger out-of-bounds write and execute arbitrary code on the target system.


139) Input validation error (CVE-ID: CVE-2021-43219)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in DirectX Graphics Kernel File. A remote attacker on the local network can pass specially crafted input to the application and perform a denial of service (DoS) attack.


140) Information disclosure (CVE-ID: CVE-2021-43222)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application in Microsoft Message Queuing. A remote attacker can gain unauthorized access to sensitive information on the system.


141) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-43223)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Windows Remote Access Connection Manager, which leads to security restrictions bypass and privilege escalation.


Remediation

Install update from vendor's website.