Language:
Severity: Critical
ID: 159676
File Name: smb_nt_ms22_apr_5012666.nasl
Version: 1.10
Type: local
Agent: windows
Family: Windows : Microsoft Bulletins
Published: 4/12/2022
Updated: 6/17/2024
Supported Sensors: Nessus
Risk Factor: Critical
Score: 9.4
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.7
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2022-26809
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.4
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CPE: cpe:/o:microsoft:windows_server_2012
Required KB Items: SMB/MS_Bulletin_Checks/Possible
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 4/12/2022
Vulnerability Publication Date: 4/12/2022
CISA Known Exploited Vulnerability Due Dates: 5/4/2022, 5/16/2022
Core Impact
Metasploit (User Profile Arbitrary Junction Creation Local Privilege Elevation)
CVE: CVE-2022-21983, CVE-2022-24474, CVE-2022-24481, CVE-2022-24483, CVE-2022-24484, CVE-2022-24485, CVE-2022-24492, CVE-2022-24493, CVE-2022-24494, CVE-2022-24498, CVE-2022-24499, CVE-2022-24500, CVE-2022-24521, CVE-2022-24527, CVE-2022-24528, CVE-2022-24530, CVE-2022-24533, CVE-2022-24534, CVE-2022-24536, CVE-2022-24538, CVE-2022-24540, CVE-2022-24541, CVE-2022-24542, CVE-2022-24544, CVE-2022-26784, CVE-2022-26787, CVE-2022-26790, CVE-2022-26792, CVE-2022-26794, CVE-2022-26796, CVE-2022-26797, CVE-2022-26798, CVE-2022-26801, CVE-2022-26802, CVE-2022-26803, CVE-2022-26807, CVE-2022-26809, CVE-2022-26810, CVE-2022-26812, CVE-2022-26813, CVE-2022-26815, CVE-2022-26819, CVE-2022-26820, CVE-2022-26821, CVE-2022-26822, CVE-2022-26827, CVE-2022-26829, CVE-2022-26831, CVE-2022-26903, CVE-2022-26904, CVE-2022-26915, CVE-2022-26916, CVE-2022-26917, CVE-2022-26918, CVE-2022-26919