Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-38626 | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 02 Jan 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19387:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5291:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5291:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3287:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3287:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3287:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1889:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1889:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1889:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1889:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1889:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1889:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1889:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1889:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.856:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.856:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_7:6.1.7601.26065:sp1:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_7:6.1.7601.26065:sp1:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20520:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20520:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20520:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.26065:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21616:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21616:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23817:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20520:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5291:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3287:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.887:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1889:*:*:*:*:*:*:* |
|
| Vendors & Products |
Microsoft windows 10 20h2
Microsoft windows 10 21h1 Microsoft windows 10 21h2 Microsoft windows 11 21h2 Microsoft windows Server 2008 R2 Microsoft windows Server 2008 Sp2 Microsoft windows Server 2012 R2 Microsoft windows Server 20h2 |
Wed, 02 Oct 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: microsoft
Published:
Updated: 2025-01-02T19:34:03.474Z
Reserved: 2022-07-13T18:19:42.615Z
Link: CVE-2022-35753
Updated: 2024-08-03T09:44:21.680Z
Status : Modified
Published: 2023-05-31T19:15:16.877
Modified: 2024-11-21T07:11:36.760
Link: CVE-2022-35753
No data.
OpenCVE Enrichment
No data.
EUVD