vulnerability
Microsoft CVE-2022-41089: .NET Framework Remote Code Execution Vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:M/Au:N/C:C/I:C/A:C) | Dec 13, 2022 | Dec 13, 2022 | Feb 17, 2026 |
Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
Dec 13, 2022
Added
Dec 13, 2022
Modified
Feb 17, 2026
Description
Microsoft CVE-2022-41089: .NET Framework Remote Code Execution Vulnerability
Solutions
msft-kb5020859-01da78d5-7413-41fe-b65a-edb60c30d5ebmsft-kb5020859-6ba039d7-81c2-4d78-b810-e26f24263d5dmsft-kb5020859-81b6afa1-7c73-4ab5-ac61-073ed1699c36msft-kb5020860-4e38cfc9-1cb9-44ad-a6e9-c768ef150741msft-kb5020860-c243e39e-d10d-4c86-9f9c-ed0ec96fbe4amsft-kb5020861-0576a673-d348-4dd0-a971-75df7420f347msft-kb5020861-2b9f939a-1777-40ae-b567-91e0757a0eacmsft-kb5020861-7db87b84-4962-4fc2-bc77-d9b8ad0310efmsft-kb5020861-caf37148-075e-4604-b55f-499a188bc320msft-kb5020861-f4afc49e-0c2e-4752-9477-55d07bc2ccf2msft-kb5020862-0bd04fee-ece7-4c4b-b9f0-50ad900de0f9msft-kb5020862-739a1613-da84-4124-a4cd-740185713b0emsft-kb5020862-df10a781-6ef2-4999-bf2a-af660c35c39dmsft-kb5020867-0f2ab6f9-aa9d-424a-8527-4a654c939859msft-kb5020867-60a8e746-e478-4f21-aa7b-be3f0c0d1c02msft-kb5020867-f94301af-ab5b-4c22-8c22-a4245b7a3578msft-kb5020868-5908095a-61a6-48f9-88de-ae596398e69emsft-kb5020868-603d1eee-b702-4dc1-ad75-7ef2a7b1feb2msft-kb5020868-d5a147de-77d3-457f-9105-7b7899a5c5femsft-kb5020869-09e81ca4-40f1-4526-9d28-082bbb2d8070msft-kb5020869-2b525e21-e7a4-415e-89a1-b85caf63c07cmsft-kb5020869-2c83948a-30ef-4ae6-8900-4999605d8cd7msft-kb5020869-6ec2d362-bbcd-4b1b-a88e-1fe763f4adf4msft-kb5020869-a26e36a3-de37-4f3e-8c5e-80a0f4bf8544msft-kb5020869-d16e529d-26a0-4a3d-b0a7-f6d8881f90aamsft-kb5020869-e93a3c43-e15a-419d-812d-d8e94f547e8amsft-kb5020876-768fac73-edff-4914-87f7-4b4fd5753802msft-kb5020876-84c987b5-208c-476d-aebd-a30cf72da7camsft-kb5020876-fdb7e55a-3eca-4433-9a44-1d59f93d9ed1msft-kb5020878-2fba0b3e-e279-4155-b18a-4953fb344a90msft-kb5020878-38b63e46-7618-4eb9-a709-ba05b91e60d2msft-kb5020878-70930def-506c-48e5-b3cb-475bb98d7aa8msft-kb5020879-349ab49f-1527-44fe-86fb-9e82583a32f9msft-kb5020879-3b3fc5c0-352b-4114-9253-bad4f49ebd97msft-kb5020879-4ac46aff-8fd3-40d5-8b2c-075766b38c0bmsft-kb5020879-4f1aa411-1bc8-454a-ab4a-14c50f01cc4amsft-kb5020879-f6e3a9ce-b0f8-4608-be80-b451ae728286msft-kb5020894-04622dda-4638-4dbd-9ffa-61586e9333e4msft-kb5020894-2451863f-d3dc-4d25-805b-128045ac3780msft-kb5020894-deb4dd7c-4a37-447d-b986-0aa1654753fbmsft-kb5020895-96a6a679-7219-4644-b385-c52218862c8emsft-kb5020895-c6b8ad87-e4f8-47b9-85bc-6b9880f19933msft-kb5020896-217741a2-8aea-4943-a46a-461c7e3deb04msft-kb5020896-614431a5-8573-4f19-bad2-fadb28a767ebmsft-kb5020896-831e0fed-fc82-4183-a46c-e3a20c7b5fc5msft-kb5020896-9b1c99de-7f7c-423d-a40b-acfbb98a4772msft-kb5020896-d3138266-333a-491b-a921-6f1aabcff4c8msft-kb5020897-3bdcdb30-1e76-4d51-87b3-e584ae7fa7f5msft-kb5020897-49721afd-21c1-42cd-8523-8580a5268c7fmsft-kb5020897-62881f34-a00e-4001-8a8b-763c37131ae8msft-kb5020900-1465eaee-2320-435f-bea4-620e19bc62d2msft-kb5020900-70b3bc48-5188-47d5-9271-a8a5e3b2d6camsft-kb5020900-879449ce-64aa-4356-956a-90e35d6f1523msft-kb5020900-9426f059-aea3-4c4b-a0a4-325cfd7705f7msft-kb5020900-9a18d461-2d3f-4c06-a7b9-093cc217f61dmsft-kb5020900-a789e97e-9c1b-4c7b-90f5-dde336ee0b61msft-kb5020900-fe578bdd-9b83-4aa2-80c3-3ae7cdfb5442msft-kb5020903-0a379a1a-c80d-42fa-abdb-5ebf933aa40cmsft-kb5020903-0d4d273c-da26-4157-a6b0-c2c3cf02701dmsft-kb5020903-425ad67c-f9e5-4b7d-98dc-d1c5c90c3cc4msft-kb5020903-68dbe4f8-1183-422a-b362-ed29ec3db8fcmsft-kb5020903-fbcb5170-de10-4b71-842b-9d707844086emicrosoft-dot_net_framework-windows_10-1809-kb5020874microsoft-dot_net_framework-windows_server_2019-1809-kb5020874microsoft-dot_net_framework-windows_10-1809-kb5020866microsoft-dot_net_framework-windows_server_2016-1607-kb5020873microsoft-dot_net_framework-windows_10-1607-kb5020873microsoft-dot_net_framework-windows_10-21h1-kb5020872microsoft-dot_net_framework-windows_10-21h1-kb5020881microsoft-dot_net_framework-windows_server_2022-21h2-kb5020877microsoft-dot_net_framework-windows_server_2022-22h2-kb5020877microsoft-dot_net_framework-windows_10-20h2-kb5020872microsoft-dot_net_framework-windows_11-21h2-kb5020875microsoft-dot_net_framework-windows_10-21h2-kb5020872microsoft-dot_net_framework-windows_server_2019-1809-kb5020866microsoft-dot_net_framework-windows_server_2022-21h2-kb5020883microsoft-dot_net_framework-windows_server_2022-22h2-kb5020883microsoft-dot_net_framework-windows_11-21h2-kb5020882microsoft-dot_net_framework-windows_10-22h2-kb5020872microsoft-dot_net_framework-windows_10-21h2-kb5020881microsoft-dot_net_framework-windows_10-22h2-kb5020881microsoft-dot_net_framework-windows_11-22h2-kb5020880microsoft-dot_net_framework-windows_10-20h2-kb5020881microsoft-dot_net_framework-windows_10-1507-kb5021243
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.