Rapid7 Vulnerability & Exploit Database

Microsoft Windows: CVE-2022-29132: Windows Print Spooler Elevation of Privilege Vulnerability

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Microsoft Windows: CVE-2022-29132: Windows Print Spooler Elevation of Privilege Vulnerability

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
05/10/2022
Created
05/11/2022
Added
05/10/2022
Modified
07/22/2024

Description

Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-29104.

Solution(s)

  • microsoft-windows-windows_10-1507-kb5013963
  • microsoft-windows-windows_10-1607-kb5013952
  • microsoft-windows-windows_10-1809-kb5013941
  • microsoft-windows-windows_10-1909-kb5013945
  • microsoft-windows-windows_10-20h2-kb5013942
  • microsoft-windows-windows_10-21h1-kb5013942
  • microsoft-windows-windows_10-21h2-kb5013942
  • microsoft-windows-windows_11-21h2-kb5013943
  • microsoft-windows-windows_server_2022-21h2-kb5013944
  • microsoft-windows-windows_server_2022-22h2-kb5013944
  • msft-kb5013941-59152f2c-dbc8-4ae8-b878-8f600a953869
  • msft-kb5013942-4c8d68e3-6993-47d2-bbe0-f172a4c80a9c
  • msft-kb5013952-4c2e40d9-1607-4a6c-a9ef-e73eeb2f5074
  • msft-kb5013999-0b229988-8a0f-49bd-ac7e-9f8ba0f1101d
  • msft-kb5013999-15c4f0d4-2470-4bda-ae64-77033495975f
  • msft-kb5013999-1617125e-5d17-41ac-9c67-56c6a27bb3a7
  • msft-kb5013999-c3e5d102-3db4-49f1-be23-9c33987e0639
  • msft-kb5013999-cf5d3de1-fdb8-4025-9ee3-3007da47f368
  • msft-kb5014001-6876241a-0a4c-4a9a-a6f4-69d88470b71c
  • msft-kb5014001-6ec9c5f0-7dd4-4303-b5ad-e935ce5a41c2
  • msft-kb5014001-8b2141d1-4d92-4c17-9cf9-f5ccfb095cfe
  • msft-kb5014006-8b4476db-9336-4f84-8603-d7d805ceb0bf
  • msft-kb5014006-f9386712-ed29-4038-955c-4ca0883b07b7
  • msft-kb5014018-0325d075-63f1-40ab-b8c0-67e92a410f90
  • msft-kb5014018-12124b3d-b5f7-4aba-9df2-974626b0290f
  • msft-kb5014018-dbd1ac3a-97df-42fd-b5aa-153748ba9ebf

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;