Rapid7 Vulnerability & Exploit Database

Microsoft CVE-2022-35820: Windows Bluetooth Driver Elevation of Privilege Vulnerability

Back to Search

Microsoft CVE-2022-35820: Windows Bluetooth Driver Elevation of Privilege Vulnerability

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
08/09/2022
Created
08/29/2022
Added
08/09/2022
Modified
11/04/2022

Description

Microsoft CVE-2022-35820: Windows Bluetooth Driver Elevation of Privilege Vulnerability

Solution(s)

  • msft-kb5012170-01f7dc80-5870-4a79-bb59-fe9071e01405
  • msft-kb5012170-181c957c-eeae-4b37-ac53-b906da62d0d0
  • msft-kb5012170-18a9e21e-966a-4dbf-9ee5-761e18a25960
  • msft-kb5012170-2105042a-74b5-4d09-bfa5-f5024edf8cdf
  • msft-kb5012170-33263bb7-a99d-45ec-93c2-2bbef2e97449
  • msft-kb5012170-36cf5ff2-8923-4fd5-b0c7-1a8360c859c8
  • msft-kb5012170-3bd0451d-20f1-4d2d-961e-d75cc029a28c
  • msft-kb5012170-4701a8af-8542-4142-b842-7d155d5e7cad
  • msft-kb5012170-4b12e535-48cc-4f25-b1bb-72bb93a36a1a
  • msft-kb5012170-57743484-d253-4a5c-97bb-d2c10daa7d65
  • msft-kb5012170-64c16479-6287-4eb1-bb3c-78f1ccdb2922
  • msft-kb5012170-68ee4170-9caa-469c-934a-db6c3c031ff4
  • msft-kb5012170-8d7048ad-8a40-4cc0-b22e-f36d1082c6fb
  • msft-kb5012170-96cdbf5b-ad59-49b2-9a04-8eac985d4c45
  • msft-kb5012170-a74a41b8-42a3-41b4-bc05-0ceb5fc64caa
  • msft-kb5012170-b7ffa144-7b80-4e93-a83f-77adf0fada2d
  • msft-kb5012170-bbfaf36d-4823-4715-a178-18dd1a8b6d8b
  • msft-kb5012170-e224a275-f1b6-4aec-9a22-7c5376e91029
  • msft-kb5012170-f8a2eb85-3457-4081-b44d-6701f1456e69
  • msft-kb5016616-19312fba-febf-468e-99eb-4b92bee47422
  • msft-kb5016616-20475448-8a02-4d47-94b4-466c50bf506c
  • msft-kb5016616-2a56d861-e033-41ce-92a9-10ae7e83ec1e
  • msft-kb5016616-48792918-1264-4953-9b4c-d27bf6bc27a3
  • msft-kb5016616-a92e25e6-f534-406a-afe0-619711c4f699
  • msft-kb5016616-d4c1774e-c52b-442a-9a98-bb02c0931fef
  • msft-kb5016616-f6c6e642-b604-4ab9-ab8b-4cbf1307b3c7
  • msft-kb5016627-07cd50a0-c704-4cec-bddb-1d82ad30c9cc
  • msft-kb5016629-39e3742a-49ed-4eea-addf-68d93b37f504
  • msft-kb5016679-2ebaf040-c03d-40fd-9edc-4a76308669f8
  • msft-kb5016679-57461ffc-a63a-425c-99d4-f1a023b537d1
  • msft-kb5016679-6535387a-b0d4-4430-90ac-63b289542907
  • msft-kb5016679-65f2bf43-7c07-464d-9cc5-4edb940467d8
  • msft-kb5016679-9b078d1d-a657-4c4c-bad8-29a49bacea24
  • msft-kb5016683-5f63176b-842e-4fa2-8aa2-287714ee7ef6
  • msft-kb5016683-afc2544a-aa8d-46d5-a3d0-8bd6c32f6312
  • msft-kb5016683-ea2ca0ef-c9b3-43d8-ab10-8fe2a4d09aea
  • msft-kb5016684-0c0671d0-c2ed-4e83-96f1-9b25023f2793
  • msft-kb5016684-7603268f-a892-48c9-95ff-b834889289b5
  • msft-kb5016684-ce91e9cb-4c8f-48d5-965f-ed83b295d2bc

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;