Security Updates for Windows Defender (April 2022)

medium Nessus Plugin ID 159916


An antimalware application installed on the remote host is affected by a denial of service vulnerability.


The Malware Protection Engine version of Microsoft Windows Defender installed on the remote Windows host is equal or prior to 1.1.19100.5. It is, therefore, affected by a denial of service vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands.


Microsoft has released KB4052623 to address this issue.

See Also

Plugin Details

Severity: Medium

ID: 159916

File Name: smb_nt_ms22_apr_win_defender.nasl

Version: 1.2

Type: local

Agent: windows

Published: 4/20/2022

Updated: 4/26/2022

Risk Information


Risk Factor: Low

Score: 3.6


Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Temporal Vector: E:U/RL:OF/RC:C

CVSS Score Source: CVE-2022-24548


Risk Factor: Medium

Base Score: 5.5

Temporal Score: 4.8

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows, cpe:/a:microsoft:windows_defender

Required KB Items: installed_sw/Windows Defender

Exploit Ease: No known exploits are available

Patch Publication Date: 4/12/2022

Vulnerability Publication Date: 4/12/2022

Reference Information

CVE: CVE-2022-24548

MSKB: 4052623

MSFT: MS22-4052623