First published: Tue May 10 2022(Updated: )
Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-29133.
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 10 | =20h2 | |
Microsoft Windows 10 | =21h1 | |
Microsoft Windows 10 | =21h2 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =1909 | |
Microsoft Windows Server | =20h2 | |
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2022 | ||
Microsoft Windows 10 | =1909 | |
Microsoft Windows Server | =20H2 | |
Microsoft Windows 10 | =20H2 | |
Microsoft Windows 10 | =20H2 | |
Microsoft Windows Server 2019 | ||
Microsoft Windows 10 | =1909 | |
Microsoft Windows 10 | =21H1 | |
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows 10 | =1909 | |
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 10 | =21H1 | |
Microsoft Windows 10 | =21H1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-29142 is rated as important by Microsoft.
To fix CVE-2022-29142, apply the recommended security updates and patches provided by Microsoft.
CVE-2022-29142 affects specific versions of Windows 10 and Windows Server, including 1809, 1909, 20H2, 21H1, and 21H2.
Yes, CVE-2022-29142 is classified as a Windows Kernel Elevation of Privilege Vulnerability.
CVE-2022-29142 requires local access for exploitation, meaning it cannot be exploited remotely.