Rapid7 Vulnerability & Exploit Database

Microsoft Windows: CVE-2022-30211: Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Microsoft Windows: CVE-2022-30211: Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability

Severity
6
CVSS
(AV:N/AC:M/Au:S/C:P/I:P/A:P)
Published
07/12/2022
Created
07/16/2022
Added
07/12/2022
Modified
07/22/2024

Description

Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability.

Solution(s)

  • microsoft-windows-windows_10-1507-kb5015832
  • microsoft-windows-windows_10-1607-kb5015808
  • microsoft-windows-windows_10-1809-kb5015811
  • microsoft-windows-windows_10-20h2-kb5015807
  • microsoft-windows-windows_10-21h1-kb5015807
  • microsoft-windows-windows_10-21h2-kb5015807
  • microsoft-windows-windows_11-21h2-kb5015814
  • microsoft-windows-windows_server_2022-21h2-kb5015827
  • microsoft-windows-windows_server_2022-22h2-kb5015827
  • msft-kb5015807-51c1eea0-5bd0-4188-9068-04cc6177eb33
  • msft-kb5015808-a8b47751-6566-4980-93e4-5d7b78597e03
  • msft-kb5015811-0cb1acde-c120-423c-ac3b-cbfb2900b581
  • msft-kb5015862-1de70d10-94bb-4638-bd11-b957cf312fb7
  • msft-kb5015862-4e81339a-a7e3-4a55-bd58-41bd52eb5379
  • msft-kb5015862-4f403150-eb82-401c-9a71-deb3ee41682d
  • msft-kb5015862-a853bffc-9343-4ccb-988d-3b535ea8b17f
  • msft-kb5015862-e4b4376f-2042-439d-860c-b5b91d3a65a0
  • msft-kb5015870-5e9201ad-bf3c-4f67-a1c6-85c5a745f210
  • msft-kb5015870-cf0605c2-d196-4e59-a86f-c05fd408bcca
  • msft-kb5015875-2815a86c-fcc6-4b94-8861-6c17c560c6af
  • msft-kb5015875-a1374d1d-18d9-42b5-8890-977b2061722c
  • msft-kb5015875-d639f6d9-5119-4f89-8680-bdbdc7fa0290
  • msft-kb5015877-653e2815-a840-4ad6-8757-84a894929c64
  • msft-kb5015877-c8380410-41db-436e-b243-95058fa05127
  • msft-kb5015877-e99e1999-6138-49c3-82e8-71a36a9e28ca

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;