First published: Tue Mar 08 2022(Updated: )
Microsoft Defender for Endpoint Spoofing Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Defender for Endpoint for iOS | ||
Microsoft Defender for Endpoint | ||
Microsoft Defender for Endpoint | ||
Microsoft Defender for Endpoint | ||
Microsoft Defender for Endpoint | ||
Microsoft Defender for Endpoint | ||
Microsoft Defender for Endpoint | ||
Microsoft Defender for Endpoint | ||
Microsoft Defender for Endpoint | ||
Microsoft Defender for Endpoint | ||
Microsoft Defender for Endpoint | <10.8047.22439.1056 | |
Microsoft Windows Server 2012 x64 | =r2 | |
Microsoft Windows Server 2016 | ||
Microsoft Defender for Endpoint | ||
Microsoft Windows 10 | =20h2 | |
Microsoft Windows 10 | =21h1 | |
Microsoft Windows 10 | =21h2 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =1909 | |
Microsoft Windows 11 | ||
Microsoft Windows 11 | ||
Microsoft Windows Server | =20h2 | |
Microsoft Windows Server | =2022 | |
Microsoft Windows Server 2019 | ||
Linux Kernel | ||
Apple macOS | ||
Google Android |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23278 is classified as a spoofing vulnerability.
To remediate CVE-2022-23278, ensure that your Microsoft Defender for Endpoint is updated with the latest security patches.
CVE-2022-23278 affects multiple products including Microsoft Defender for Endpoint for iOS, Linux, Windows, macOS, and Android.
CVE-2022-23278 is specifically a spoofing vulnerability related to Microsoft Defender for Endpoint.
Yes, CVE-2022-23278 can potentially be exploited remotely by attackers.