CVE-2022-30190 PUBLISHED
Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability
Assigner: microsoft
Reserved: 03.05.2022
Published: 01.06.2022
Updated: 04.02.2025
Metrics
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
CVSS Score: 7.8
Attack Vector |
Local |
Scope |
Unchanged |
Attack Complexity |
Low |
Confidentiality Impact |
High |
Privileges Required |
None |
Integrity Impact |
High |
User Interaction |
Required |
Availability Impact |
High |
CVSS 3.1
Product Status
Vendor |
Microsoft |
Product |
Windows 10 Version 1809 |
Versions |
- affected from 10.0.17763.0 to 10.0.17763.3046 (excl.)
|
Vendor |
Microsoft |
Product |
Windows 10 Version 1809 |
Versions |
- affected from 10.0.0 to 10.0.17763.3046 (excl.)
|
Vendor |
Microsoft |
Product |
Windows Server 2019 |
Versions |
- affected from 10.0.17763.0 to 10.0.17763.3046 (excl.)
|
Vendor |
Microsoft |
Product |
Windows Server 2019 (Server Core installation) |
Versions |
- affected from 10.0.17763.0 to 10.0.17763.3046 (excl.)
|
Vendor |
Microsoft |
Product |
Windows 10 Version 21H1 |
Versions |
- affected from 10.0.0 to 10.0.19043.1766 (excl.)
|
Vendor |
Microsoft |
Product |
Windows Server 2022 |
Versions |
- affected from 10.0.20348.0 to 10.0.20348.770 (excl.)
|
Vendor |
Microsoft |
Product |
Windows 10 Version 20H2 |
Versions |
- affected from 10.0.0 to 10.0.19042.1766 (excl.)
|
Vendor |
Microsoft |
Product |
Windows Server version 20H2 |
Versions |
- affected from 10.0.0 to 10.0.19042.1766 (excl.)
|
Vendor |
Microsoft |
Product |
Windows 11 version 21H2 |
Versions |
- affected from 10.0.0 to 10.0.22000.739 (excl.)
|
Vendor |
Microsoft |
Product |
Windows 10 Version 21H2 |
Versions |
- affected from 10.0.19043.0 to 10.0.19044.1766 (excl.)
|
Vendor |
Microsoft |
Product |
Windows 10 Version 1507 |
Versions |
- affected from 10.0.10240.0 to 10.0.10240.19325 (excl.)
|
Vendor |
Microsoft |
Product |
Windows 10 Version 1607 |
Versions |
- affected from 10.0.14393.0 to 10.0.14393.5192 (excl.)
|
Vendor |
Microsoft |
Product |
Windows Server 2016 |
Versions |
- affected from 10.0.14393.0 to 10.0.14393.5192 (excl.)
|
Vendor |
Microsoft |
Product |
Windows Server 2016 (Server Core installation) |
Versions |
- affected from 10.0.14393.0 to 10.0.14393.5192 (excl.)
|
Vendor |
Microsoft |
Product |
Windows 7 |
Versions |
- affected from 6.1.0 to 6.1.7601.25984 (excl.)
|
Vendor |
Microsoft |
Product |
Windows 7 Service Pack 1 |
Versions |
- affected from 6.1.0 to 6.1.7601.25984 (excl.)
|
Vendor |
Microsoft |
Product |
Windows 8.1 |
Versions |
- affected from 6.3.0 to 6.3.9600.20402 (excl.)
|
Vendor |
Microsoft |
Product |
Windows Server 2008 R2 Service Pack 1 |
Versions |
- affected from 6.1.7601.0 to 6.1.7601.25984 (excl.)
|
Vendor |
Microsoft |
Product |
Windows Server 2008 R2 Service Pack 1 (Server Core installation) |
Versions |
- affected from 6.1.7601.0 to 6.1.7601.25984 (excl.)
|
Vendor |
Microsoft |
Product |
Windows Server 2012 |
Versions |
- affected from 6.2.9200.0 to 6.2.9200.23736 (excl.)
|
Vendor |
Microsoft |
Product |
Windows Server 2012 (Server Core installation) |
Versions |
- affected from 6.2.9200.0 to 6.2.9200.23736 (excl.)
|
Vendor |
Microsoft |
Product |
Windows Server 2012 R2 |
Versions |
- affected from 6.3.9600.0 to 6.3.9600.20402 (excl.)
|
Vendor |
Microsoft |
Product |
Windows Server 2012 R2 (Server Core installation) |
Versions |
- affected from 6.3.9600.0 to 6.3.9600.20402 (excl.)
|
References
Problem Types