CVE-2022-40732

Published: Dic 18, 2024 Last Modified: Ago 26, 2025 EU-VD ID: EUVD-2022-44001 Aliases: GSD-2022-40732
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 5,0
Attack Vector: local
Attack Complexity: low
Privileges Required: low
User Interaction: required
Scope: unchanged
Confidentiality: none
Integrity: none
Availability: high

Description

AI Translation Available

An access violation vulnerability exists in the DirectComposition functionality win32kbase.sys driver version 10.0.22000.593 as part of Windows 11 version 22000.593 and version 10.0.20348.643 as part of Windows Server 2022 version 20348.643. A specially-crafted set of syscalls can lead to a reboot. An unprivileged user can run specially-crafted code to trigger Denial Of Service.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0034
Percentile
0,6th
Updated

EPSS Score Trend (Last 90 Days)

476

NULL Pointer Dereference

Stable
Common Consequences
Security Scopes Affected:
Availability Integrity Confidentiality
Potential Impacts:
Dos: Crash, Exit, Or Restart Execute Unauthorized Code Or Commands Read Memory Modify Memory
Applicable Platforms
Languages: C, C#, C++, Go, Java
View CWE Details
Operating System

Windows 11 21H2 by Microsoft

cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.593:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Windows Server 2022 by Microsoft

cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.643:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1514