8.8
CVE-2022-41128
- EPSS 67.15%
- Published 09.11.2022 22:15:25
- Last modified 07.03.2025 17:12:53
- Source secure@microsoft.com
- Teams watchlist Login
- Open Login
Windows Scripting Languages Remote Code Execution Vulnerability
Data is provided by the National Vulnerability Database (NVD)
Microsoft ≫ Windows 10 1507 Version < 10.0.10240.19567
Microsoft ≫ Windows 10 1607 Version < 10.0.14393.5501
Microsoft ≫ Windows 10 1809 Version < 10.0.17763.3650
Microsoft ≫ Windows 10 20h2 Version < 10.0.19042.2251
Microsoft ≫ Windows 10 21h1 Version < 10.0.19043.2251
Microsoft ≫ Windows 10 21h2 Version < 10.0.19044.2251
Microsoft ≫ Windows 10 22h2 Version < 10.0.19045.2251
Microsoft ≫ Windows 11 21h2 Version < 10.0.22000.1219
Microsoft ≫ Windows 11 22h2 Version < 10.0.22621.819
Microsoft ≫ Windows 8.1 Version-
Microsoft ≫ Windows 8.1 Version- SwEditionrt
Microsoft ≫ Windows Server 2008 Versionr2 Updatesp1 HwPlatformx64
Microsoft ≫ Windows Server 2012 Version-
Microsoft ≫ Windows Server 2012 Versionr2
Microsoft ≫ Windows Server 2016 Version < 10.0.14393.5501
Microsoft ≫ Windows Server 2019 Version < 10.0.17763.3650
Microsoft ≫ Windows Server 2022 Version < 10.0.20348.1249
08.11.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog
Microsoft Windows Scripting Languages Remote Code Execution Vulnerability
VulnerabilityMicrosoft Windows contains an unspecified vulnerability in the JScript9 scripting language which allows for remote code execution.
DescriptionApply updates per vendor instructions.
Required actionsType | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 67.15% | 0.985 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
secure@microsoft.com | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
CWE-787 Out-of-bounds Write
The product writes data past the end, or before the beginning, of the intended buffer.