First published: Tue Nov 08 2022(Updated: )
Microsoft Windows contains an unspecified vulnerability in the JScript9 scripting language which allows for remote code execution.
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 10 | =20H2 | |
Microsoft Windows 11 | =22H2 | |
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =22H2 | |
Microsoft Windows Server 2008 R2 | ||
Microsoft Windows Server 2012 R2 | ||
Microsoft Windows 8.1 for x64-based systems | ||
Microsoft Windows 10 | =22H2 | |
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 10 | =1607 | |
Microsoft Windows 8.1 for 32-bit systems | ||
Microsoft Windows 11 | =21H2 | |
Microsoft Windows Server 2019 | ||
Microsoft Windows 11 | =21H2 | |
Microsoft Windows 10 | =21H1 | |
Microsoft Windows 11 | =22H2 | |
Microsoft Windows 7 | ||
Microsoft Windows 10 | =21H1 | |
Microsoft Windows 10 | =21H1 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows 10 | =20H2 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 7 | ||
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | =20H2 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 10 | =22H2 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows | ||
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows RT | ||
Microsoft Windows 10 1507 | <10.0.10240.19567 | |
Microsoft Windows 10 Version 1607 x86 | <10.0.14393.5501 | |
Microsoft Windows 10 1809 | <10.0.17763.3650 | |
Microsoft Windows 10 20H2 | <10.0.19042.2251 | |
Microsoft Windows 10 21h1 | <10.0.19043.2251 | |
Microsoft Windows 10 21h2 | <10.0.19044.2251 | |
Microsoft Windows 10 22h2 | <10.0.19045.2251 | |
Microsoft Windows 11 21h2 | <10.0.22000.1219 | |
Microsoft Windows 11 22h2 | <10.0.22621.819 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.1 | ||
Microsoft Windows 8.1 | ||
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Server 2012 x64 | =r2 | |
Microsoft Windows Server 2016 | <10.0.14393.5501 | |
Microsoft Windows Server 2019 | <10.0.17763.3650 | |
Microsoft Windows Server 2022 | <10.0.20348.1249 | |
Microsoft Windows 10 | ||
Microsoft Windows 10 | =20h2 | |
Microsoft Windows 10 | =21h1 | |
Microsoft Windows 10 | =21h2 | |
Microsoft Windows 10 | =22h2 | |
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 11 | ||
Microsoft Windows 11 | =22h2 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2022 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41128 is a vulnerability in Microsoft Windows that allows for remote code execution.
CVE-2022-41128 affects multiple versions of Microsoft Windows, including Windows 10, Windows 11, Windows Server 2008 R2, Windows Server 2012 R2, Windows Server 2016, Windows 7, Windows 8.1, and Windows Server 2012.
The severity of CVE-2022-41128 is critical, with a CVSS score of 8.8.
To fix CVE-2022-41128, Microsoft has released patches that can be downloaded from the Microsoft Update Catalog or through Windows Update. Please refer to the provided support links for the specific patches for your version of Windows.
You can find more information about CVE-2022-41128 on the Microsoft Security Response Center website.