Rapid7 Vulnerability & Exploit Database

Microsoft Windows: CVE-2022-26917: Windows Fax Compose Form Remote Code Execution Vulnerability

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Microsoft Windows: CVE-2022-26917: Windows Fax Compose Form Remote Code Execution Vulnerability

Severity
5
CVSS
(AV:N/AC:H/Au:N/C:P/I:P/A:P)
Published
04/12/2022
Created
04/13/2022
Added
04/12/2022
Modified
07/22/2024

Description

Windows Fax Compose Form Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-26916, CVE-2022-26918.

Solution(s)

  • microsoft-windows-windows_10-1507-kb5012653
  • microsoft-windows-windows_10-1607-kb5012596
  • microsoft-windows-windows_10-1809-kb5012647
  • microsoft-windows-windows_10-1909-kb5012591
  • microsoft-windows-windows_10-20h2-kb5012599
  • microsoft-windows-windows_10-21h1-kb5012599
  • microsoft-windows-windows_10-21h2-kb5012599
  • microsoft-windows-windows_11-21h2-kb5012592
  • microsoft-windows-windows_server_2022-21h2-kb5012604
  • microsoft-windows-windows_server_2022-22h2-kb5012604
  • msft-kb5012596-ba19a6be-55eb-4b25-9881-521c17e75f44
  • msft-kb5012599-e72e2869-8466-4d6c-b6b1-9cb91b203311
  • msft-kb5012632-37c512b4-6b14-4d1c-be62-269aa278d1a4
  • msft-kb5012632-7942e13a-56d9-4239-9a4b-8bdd10251810
  • msft-kb5012639-5eb3595c-51d7-4e9c-9d3c-62575664d9c1
  • msft-kb5012639-8f64f575-7ae8-42d3-80a8-0f94a635a3e5
  • msft-kb5012639-9f8ea70a-5ec2-43c7-b527-47e2960a96b6
  • msft-kb5012647-3ed0afbb-9043-47fa-8891-fd9d378907c4
  • msft-kb5012649-6d7c0ed0-67a2-48a3-b4c6-1f9d567d80a1
  • msft-kb5012649-75035f09-f1c5-42db-9e99-ace6cbb8a313
  • msft-kb5012649-a1663399-38bf-420b-88d9-6e69b9fb4707
  • msft-kb5012649-c006940f-2694-404c-9959-30ce7c239dd1
  • msft-kb5012649-e584a90c-aeb0-434f-8f6f-22dd7a87a299
  • msft-kb5012666-0df39355-eacd-4695-8d04-25d6531060d6
  • msft-kb5012666-9ac9edbb-45b6-4483-bf14-e33ebd47d841
  • msft-kb5012666-e0699b1d-9b0b-4ab4-acb3-af938476776a

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;