First published: Tue Jan 11 2022(Updated: )
This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Windows kernel. The issue results from improper authorization logic when accessing files in the EFI partition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.1 | ||
Microsoft Windows RT 8.1 | ||
Microsoft Windows Server 2008 | =r2-sp1 | |
Microsoft Windows Server 2012 | ||
Microsoft Windows Server 2012 | =r2 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-21899 is a vulnerability in Microsoft Windows EFI Partition that allows local attackers to create a denial-of-service condition.
CVE-2022-21899 has a severity rating of 5.5 (high).
CVE-2022-21899 affects Microsoft Windows 10, Windows 7, Windows 8.1, Windows RT 8.1, Windows Server 2008, Windows Server 2012, and Windows Server 2012 R2.
To fix CVE-2022-21899, apply the relevant patches provided by Microsoft or follow the recommended remediation steps.
You can find more information about CVE-2022-21899 on the Microsoft Security Guidance advisory, Zero Day Initiative advisories, and the Microsoft Update Guide vulnerability page.