First published: Tue Aug 09 2022(Updated: )
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 10 | =20H2 | |
Microsoft Windows 10 | =20h2 | |
Microsoft Windows 10 | =20h2 | |
Microsoft Windows 10 | =20h2 | |
Microsoft Windows 10 | =21h1 | |
Microsoft Windows 10 | =21h1 | |
Microsoft Windows 10 | =21h1 | |
Microsoft Windows 10 | =21h2 | |
Microsoft Windows 10 | =21h2 | |
Microsoft Windows 10 | =21h2 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 11 | ||
Microsoft Windows 11 | ||
Microsoft Windows Server 2016 | =20h2 | |
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2022 | ||
=21H2 | ||
=21H2 | ||
=21H2 | ||
=21H2 | ||
=20H2 | ||
=20H2 | ||
=21H1 | ||
=20H2 | ||
=21H1 | ||
=21H1 | ||
=1809 | ||
=21H2 | ||
=1809 | ||
=1809 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-35766 is a vulnerability in Windows Secure Socket Tunneling Protocol (SSTP) that allows remote code execution.
CVE-2022-35766 has a severity rating of 8.1, which is classified as critical.
Microsoft Windows 10 versions 20H2, 21H1, and 21H2, as well as Windows 11, Windows Server 2016, Windows Server 2019, and Windows Server 2022 are affected by CVE-2022-35766.
To fix CVE-2022-35766, apply the relevant security patches provided by Microsoft, which can be found in the referenced links.
You can find more information about CVE-2022-35766 on the Microsoft Security Response Center website using the reference link.