Windows User Profile Service Elevation of Privilege Vulnerability
References
Link | Resource |
---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21919 | Patch Vendor Advisory |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21919 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
24 Feb 2025, 15:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21919 - Vendor Advisory |
21 Nov 2024, 06:45
Type | Values Removed | Values Added |
---|---|---|
References |
|
15 Nov 2024, 14:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21919 - Patch, Vendor Advisory | |
CPE | cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:* |
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:* |
14 Nov 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
02 Jul 2024, 17:03
Type | Values Removed | Values Added |
---|---|---|
First Time |
Microsoft windows 10 21h1
Microsoft windows 10 1607 Microsoft windows Server 20h2 Microsoft windows 10 1507 Microsoft windows 10 1809 Microsoft windows 10 1909 Microsoft windows 10 20h2 Microsoft windows Server 2022 Microsoft windows Rt 8.1 Microsoft windows 11 21h2 Microsoft windows 10 21h2 |
|
CPE | cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:-:*:x86:* cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:-:*:x64:* |
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:* |
21 Dec 2023, 01:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) Windows User Profile Service Elevation of Privilege Vulnerability |
Information
Published : 2022-01-11 21:15
Updated : 2025-02-24 15:45
NVD link : CVE-2022-21919
Mitre link : CVE-2022-21919
CVE.ORG link : CVE-2022-21919
JSON object : View
Products Affected
microsoft
- windows_server_20h2
- windows_10_1909
- windows_10_1507
- windows_server_2012
- windows_10_20h2
- windows_server_2019
- windows_10_21h2
- windows_server_2022
- windows_rt_8.1
- windows_7
- windows_server_2008
- windows_10_1809
- windows_10_21h1
- windows_11_21h2
- windows_10_1607
- windows_server_2016
- windows_8.1
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')