CNNVD-ID编号 | CNNVD-202210-554 |
CVE编号 | CVE-2022-37965 |
发布时间 | 2022-10-11 |
更新时间 | 2022-10-12 |
漏洞类型 | 其他 |
漏洞来源 | N/A |
危险等级 | 中危 |
威胁类型 | 远程 |
厂 商 | N/A |
Proto是开源的一个用于创建对象的可扩展程序代码模板。 Microsoft Remote Access Service Point-to-Point Tunneling Protocol存在安全漏洞。以下产品和版本受到影响:Windows 10 Version 20H2 for ARM64-based Systems,Windows 11 for x64-based Systems,Windows 11 for ARM64-based Systems,Windows 10 Version 21H2 for 32-bit Systems,Windows 10 Version 21H2 for ARM64-based Systems,Windows 10 Version 21H2 for x64-based Systems,Windows 11 Version 22H2 for ARM64-based Systems,Windows 11 Version 22H2 for x64-based Systems,Windows 10 for 32-bit Systems,Windows 10 for x64-based Systems,Windows 10 Version 1607 for 32-bit Systems,Windows 10 Version 1607 for x64-based Systems,Windows Server 2016,Windows Server 2016 (Server Core installation),Windows 8.1 for 32-bit systems,Windows 8.1 for x64-based systems,Windows RT 8.1,Windows Server 2012,Windows Server 2012 (Server Core installation),Windows Server 2012 R2,Windows Server 2012 R2 (Server Core installation),Windows 10 Version 1809 for ARM64-based Systems,Windows Server 2019,Windows Server 2019 (Server Core installation),Windows 10 Version 21H1 for x64-based Systems,Windows 10 Version 21H1 for ARM64-based Systems,Windows 10 Version 21H1 for 32-bit Systems,Windows Server 2022,Windows Server 2022 (Server Core installation),Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 20H2 for x64-based Systems,Windows 10 Version 20H2 for 32-bit Systems。
来源:MISC
链接:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37965
来源:msrc.microsoft.com
链接:https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37965
来源:cxsecurity.com
暂无