First published: Tue Aug 09 2022(Updated: )
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server 2008 R2 | ||
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 10 | =21H1 | |
Microsoft Windows 7 | ||
Microsoft Windows 11 | =21H2 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | ||
Microsoft Windows 7 | ||
Microsoft Windows 10 | =20H2 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =1607 | |
Microsoft Windows Server 2019 | ||
Microsoft Windows 8.1 for 32-bit systems | ||
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 11 | =21H2 | |
Microsoft Windows Server | =20H2 | |
Microsoft Windows 10 | =21H2 | |
Microsoft Windows Server 2019 | ||
Microsoft Windows 10 | =21H1 | |
Microsoft Windows 10 | =20H2 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2012 R2 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | =21H1 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows 10 | =1607 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows 8.1 for x64-based systems | ||
Microsoft Windows Server 2012 R2 | ||
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2008 R2 | ||
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows RT | ||
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | =20h2 | |
Microsoft Windows 10 | =20h2 | |
Microsoft Windows 10 | =20h2 | |
Microsoft Windows 10 | =21h1 | |
Microsoft Windows 10 | =21h1 | |
Microsoft Windows 10 | =21h1 | |
Microsoft Windows 10 | =21h2 | |
Microsoft Windows 10 | =21h2 | |
Microsoft Windows 10 | =21h2 | |
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 11 | ||
Microsoft Windows 11 | ||
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.1 | ||
Microsoft Windows 8.1 | ||
Microsoft Windows RT | ||
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Server 2012 x64 | =r2 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | =20h2 | |
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows Server 2008 Itanium |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34714 has a high severity rating due to its potential for remote code execution.
To fix CVE-2022-34714, apply the latest security patches provided by Microsoft for the affected versions of Windows.
CVE-2022-34714 affects various versions of Windows, including Windows Server 2008 R2, Windows 7, Windows 10, and Windows 11.
Yes, CVE-2022-34714 can be exploited remotely, allowing attackers to potentially execute arbitrary code on the affected systems.
Currently, it is recommended to apply updates as the best method for mitigating the risk of CVE-2022-34714, and no specific workaround is provided by Microsoft.