vulnerability
Microsoft Windows: CVE-2022-30221: Windows Graphics Component Remote Code Execution Vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:H/Au:N/C:P/I:P/A:P) | Jul 12, 2022 | Jul 12, 2022 | Nov 11, 2025 |
Severity
5
CVSS
(AV:N/AC:H/Au:N/C:P/I:P/A:P)
Published
Jul 12, 2022
Added
Jul 12, 2022
Modified
Nov 11, 2025
Description
Windows Graphics Component Remote Code Execution Vulnerability
Solutions
microsoft-windows-windows_10-1507-kb5015832microsoft-windows-windows_10-1607-kb5015808microsoft-windows-windows_10-1809-kb5015811microsoft-windows-windows_10-20h2-kb5015807microsoft-windows-windows_10-21h1-kb5015807microsoft-windows-windows_10-21h2-kb5015807microsoft-windows-windows_11-21h2-kb5015814microsoft-windows-windows_server_2012_r2-kb5015877microsoft-windows-windows_server_2016-1607-kb5015808microsoft-windows-windows_server_2019-1809-kb5015811microsoft-windows-windows_server_2022-21h2-kb5015827microsoft-windows-windows_server_2022-22h2-kb5015827msft-kb5015807-51c1eea0-5bd0-4188-9068-04cc6177eb33msft-kb5015862-1de70d10-94bb-4638-bd11-b957cf312fb7msft-kb5015862-4e81339a-a7e3-4a55-bd58-41bd52eb5379msft-kb5015862-4f403150-eb82-401c-9a71-deb3ee41682dmsft-kb5015862-a853bffc-9343-4ccb-988d-3b535ea8b17fmsft-kb5015862-e4b4376f-2042-439d-860c-b5b91d3a65a0msft-kb5015877-c8380410-41db-436e-b243-95058fa05127msft-kb5015877-e99e1999-6138-49c3-82e8-71a36a9e28ca
References
- CVE-2022-30221
- https://attackerkb.com/topics/CVE-2022-30221
- URL-https://support.microsoft.com/help/5015807
- URL-https://support.microsoft.com/help/5015808
- URL-https://support.microsoft.com/help/5015811
- URL-https://support.microsoft.com/help/5015814
- URL-https://support.microsoft.com/help/5015827
- URL-https://support.microsoft.com/help/5015832
- URL-https://support.microsoft.com/help/5015874
- URL-https://support.microsoft.com/help/5015877
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.