Rapid7 Vulnerability & Exploit Database

Microsoft CVE-2022-23294: Windows Event Tracing Remote Code Execution Vulnerability

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Microsoft CVE-2022-23294: Windows Event Tracing Remote Code Execution Vulnerability

Severity
7
CVSS
(AV:N/AC:L/Au:S/C:P/I:P/A:P)
Published
03/08/2022
Created
03/09/2022
Added
03/08/2022
Modified
03/16/2022

Description

Microsoft CVE-2022-23294: Windows Event Tracing Remote Code Execution Vulnerability

Solution(s)

  • msft-kb5011485-58fba0da-91d7-4275-a54f-386c0756c33c
  • msft-kb5011485-bc885136-9c88-42cf-a014-d57c5b25fcc4
  • msft-kb5011487-2ca7e0c3-62cd-4437-ab26-17c1c80e871d
  • msft-kb5011487-6b5fa06e-2bec-411b-a3b0-bfb10bf50240
  • msft-kb5011487-9036648d-bcdd-4478-bc43-ccd812fdbbfa
  • msft-kb5011487-c606eb9e-eec6-4246-b330-4c0158d4d515
  • msft-kb5011487-d750e656-cafd-4b8b-8d37-133b850e734a
  • msft-kb5011487-e34980a8-3441-4dda-82a0-06019fec3d4d
  • msft-kb5011487-e41f95fd-25c1-4580-a3a0-7df02a74ded2
  • msft-kb5011491-24d52ffb-3efb-4132-915f-c468b35ed88a
  • msft-kb5011491-c9ace5ca-862c-4e59-83f9-3a543b3e894a
  • msft-kb5011493-f7a60bf7-e59b-4d2c-92ba-5fe0af0e8ff7
  • msft-kb5011495-59778b27-7056-4e95-9574-da34208d8a2e
  • msft-kb5011495-fa870787-7e83-4890-9511-d26b208c0919
  • msft-kb5011495-fcc9dc2f-9538-4142-b6a1-42d396906fd5
  • msft-kb5011497-2edd86da-7457-436a-baed-e45b15d36d69
  • msft-kb5011503-11858b38-8f79-4716-82ef-679370b75d42
  • msft-kb5011503-686dd9ab-6d46-4ef7-af3b-789a985d4420
  • msft-kb5011503-d2ea412e-09c7-4707-91d5-e53fe39fb416
  • msft-kb5011527-9cdd843a-1d5d-4f78-97e8-e99029f476f6
  • msft-kb5011527-b63c18bb-66cf-4553-a7e3-4c8efda23081
  • msft-kb5011527-cafc4114-6e80-4938-948e-81d4d756f031
  • msft-kb5011560-0cdcd625-dc44-48cc-92fa-40c452eaba68
  • msft-kb5011560-b7dd9bbf-be91-4f9c-989b-6647088ea33e
  • msft-kb5011560-e79e7c2e-86bb-4706-8c25-9b4135472f41

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;