Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability
History

Fri, 03 Jan 2025 08:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 02 Jan 2025 21:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19567:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19567:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5501:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5501:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3650:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3650:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3650:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.2251:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.2251:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.2251:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.2251:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.2251:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.2251:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.2251:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.2251:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.2251:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.2251:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.2251:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.1219:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.1219:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_22H2:10.0.22621.819:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_22H2:10.0.22621.819:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20670:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20670:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20671:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20671:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20670:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20670:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20671:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5501:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3650:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.1249:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.1251:*:*:*:*:*:*:*
Vendors & Products Microsoft windows 10 1507
Microsoft windows 10 1607
Microsoft windows 10 1809
Microsoft windows 10 20h2
Microsoft windows 10 21h1
Microsoft windows 10 21h2
Microsoft windows 10 22h2
Microsoft windows 11 21h2
Microsoft windows 11 22h2
Microsoft windows Rt 8.1
Microsoft windows Server 2012 R2

cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2025-01-02T21:31:22.976Z

Reserved: 2022-09-19T00:00:00

Link: CVE-2022-41100

cve-icon Vulnrichment

Updated: 2024-08-03T12:35:49.071Z

cve-icon NVD

Status : Modified

Published: 2022-11-09T22:15:23.117

Modified: 2024-11-21T07:22:36.957

Link: CVE-2022-41100

cve-icon Redhat

No data.