First published: Tue Aug 09 2022(Updated: )
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server 2008 R2 | ||
Microsoft Windows 7 | ||
Microsoft Windows 7 | ||
Microsoft Windows Server | =20H2 | |
Microsoft Windows Server 2012 R2 | ||
Microsoft Windows Server 2012 R2 | ||
Microsoft Windows Server 2008 R2 | ||
Microsoft Windows RT | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows 8.1 | ||
Microsoft Windows 8.1 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2019 | ||
Windows 11 | =21H2 | |
Windows 11 | =21H2 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | ||
Windows 10 | =20H2 | |
Windows 10 | =20H2 | |
Windows 10 | =1809 | |
Windows 10 | =1809 | |
Windows 10 | =1809 | |
Windows 10 | =1607 | |
Windows 10 | =1607 | |
Windows 10 | =21H1 | |
Windows 10 | =21H1 | |
Windows 10 | =21H1 | |
Windows 10 | =21H2 | |
Windows 10 | =21H2 | |
Windows 10 | =21H2 | |
Windows 10 | ||
Windows 10 | ||
Windows 10 | ||
Windows 10 | ||
Windows 10 | =20h2 | |
Windows 10 | =20h2 | |
Windows 10 | =20h2 | |
Windows 10 | =21h1 | |
Windows 10 | =21h1 | |
Windows 10 | =21h1 | |
Windows 10 | =21h2 | |
Windows 10 | =21h2 | |
Windows 10 | =21h2 | |
Windows 10 | =1607 | |
Windows 10 | =1607 | |
Windows 10 | =1809 | |
Windows 10 | =1809 | |
Windows 10 | =1809 | |
Windows 11 | ||
Windows 11 | ||
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows | ||
Microsoft Windows | ||
Microsoft Windows RT | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | =20h2 | |
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2022 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34714 has a high severity rating due to its potential for remote code execution.
To fix CVE-2022-34714, apply the latest security patches provided by Microsoft for the affected versions of Windows.
CVE-2022-34714 affects various versions of Windows, including Windows Server 2008 R2, Windows 7, Windows 10, and Windows 11.
Yes, CVE-2022-34714 can be exploited remotely, allowing attackers to potentially execute arbitrary code on the affected systems.
Currently, it is recommended to apply updates as the best method for mitigating the risk of CVE-2022-34714, and no specific workaround is provided by Microsoft.