Vulnerabilites related to microsoft - defender_for_endpoint
cve-2022-23278
Vulnerability from cvelistv5
Published
2022-03-09 17:06
Modified
2025-01-02 18:35
Summary
Microsoft Defender for Endpoint Spoofing Vulnerability
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T03:36:20.346Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Microsoft Defender for Endpoint Spoofing Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23278",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Defender for Endpoint for Linux",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "101.60.93",
                     status: "affected",
                     version: "101.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Defender for Endpoint for Mac",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "101.60.91",
                     status: "affected",
                     version: "101.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Defender for Endpoint for Android",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "1.0.3011.0302",
                     status: "affected",
                     version: "1.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Defender for Endpoint for iOS",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "1.1.18090109",
                     status: "affected",
                     version: "1.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows 10 Version 20H2 for 32-bit Systems",
                  "Windows 10 Version 1909 for ARM64-based Systems",
                  "Windows Server, version 20H2 (Server Core Installation)",
                  "Windows 11 version 21H2 for x64-based Systems",
                  "Windows 10 Version 21H2 for 32-bit Systems",
                  "Windows 11 version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 1909 for x64-based Systems",
                  "Windows Server 2022",
                  "Windows Server 2022 Datacenter: Azure Edition",
                  "Windows 10 Version 1909 for 32-bit Systems",
                  "Windows 10 Version 21H1 for ARM64-based Systems",
                  "Windows 10 Version 20H2 for ARM64-based Systems",
                  "Windows Server 2019 (Server Core installation)",
                  "Windows 10 Version 21H1 for 32-bit Systems",
                  "Windows 10 Version 21H2 for x64-based Systems",
                  "Windows 10 Version 21H2 for ARM64-based Systems",
                  "Windows Server 2022 (Server Core installation)",
                  "Windows 10 Version 21H1 for x64-based Systems",
                  "Windows Server 2019",
                  "Windows 10 Version 1809 for x64-based Systems",
                  "Windows 10 Version 1809 for ARM64-based Systems",
                  "Windows 10 Version 1809 for 32-bit Systems",
               ],
               product: "Microsoft Defender for Endpoint for Windows",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "10.0.19042.1586",
                     status: "affected",
                     version: "1.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "Windows Server 2016",
                  "Windows Server 2016 (Server Core installation)",
                  "Windows Server 2012 R2",
                  "Windows Server 2012 R2 (Server Core installation)",
               ],
               product: "Microsoft Defender for Endpoint EDR sensor",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "10.8047.22439",
                     status: "affected",
                     version: "1.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "101.60.93",
                           versionStartIncluding: "101.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:macos:*:*",
                           versionEndExcluding: "101.60.91",
                           versionStartIncluding: "101.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "1.0.3011.0302",
                           versionStartIncluding: "1.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "1.1.18090109",
                           versionStartIncluding: "1.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "10.0.19042.1586",
                           versionStartIncluding: "1.0.0.0",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:a:microsoft:defender_for_endpoint_edr_sensor:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "10.8047.22439",
                           versionStartIncluding: "1.0.0.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2022-03-08T08:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: "Microsoft Defender for Endpoint Spoofing Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 5.9,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Spoofing",
                     lang: "en-US",
                     type: "Impact",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-02T18:35:25.563Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Microsoft Defender for Endpoint Spoofing Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23278",
            },
         ],
         title: "Microsoft Defender for Endpoint Spoofing Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2022-23278",
      datePublished: "2022-03-09T17:06:57",
      dateReserved: "2022-01-15T00:00:00",
      dateUpdated: "2025-01-02T18:35:25.563Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-49071
Vulnerability from cvelistv5
Published
2024-12-12 19:07
Modified
2025-03-11 16:44
Summary
Improper authorization of an index that contains sensitive information from a Global Files search in Windows Defender allows an authorized attacker to disclose information over a network.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-49071",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-12-12T21:11:18.320547Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-12-12T21:11:39.964Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Defender for Endpoint for Windows",
               vendor: "Microsoft",
               versions: [
                  {
                     status: "affected",
                     version: "N/A",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:*:*:*",
                           versionStartIncluding: "N/A",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-12-12T08:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: "Improper authorization of an index that contains sensitive information from a Global Files search in Windows Defender allows an authorized attacker to disclose information over a network.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-612",
                     description: "CWE-612: Improper Authorization of Index Containing Sensitive Information",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-03-11T16:44:43.319Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Windows Defender Information Disclosure Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49071",
            },
         ],
         tags: [
            "exclusively-hosted-service",
         ],
         title: "Windows Defender Information Disclosure Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-49071",
      datePublished: "2024-12-12T19:07:50.753Z",
      dateReserved: "2024-10-11T20:57:49.195Z",
      dateUpdated: "2025-03-11T16:44:43.319Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-49057
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Summary
Microsoft Defender for Endpoint on Android Spoofing Vulnerability
Impacted products
Vendor Product Version
Microsoft Microsoft Defender for Endpoint for Android Version: 1.0.0.0   < 1.0.7128.0101
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-49057",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-07T00:00:00+00:00",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-08T04:56:02.707Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Defender for Endpoint for Android",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "1.0.7128.0101",
                     status: "affected",
                     version: "1.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "1.0.7128.0101",
                           versionStartIncluding: "1.0.0.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-12-10T08:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: "Microsoft Defender for Endpoint on Android Spoofing Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 8.1,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-20",
                     description: "CWE-20: Improper Input Validation",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-03-11T16:44:02.115Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Microsoft Defender for Endpoint on Android Spoofing Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49057",
            },
         ],
         title: "Microsoft Defender for Endpoint on Android Spoofing Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-49057",
      datePublished: "2024-12-10T17:49:04.575Z",
      dateReserved: "2024-10-11T20:57:49.188Z",
      dateUpdated: "2025-03-11T16:44:02.115Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-35828
Vulnerability from cvelistv5
Published
2022-09-13 18:41
Modified
2025-03-11 16:10
Summary
Microsoft Defender for Endpoint for Mac Elevation of Privilege Vulnerability
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T09:44:22.170Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35828",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Defender for Endpoint for Mac",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "101.78.13",
                     status: "affected",
                     version: "101.0.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:macos:*:*",
                           versionEndExcluding: "101.78.13",
                           versionStartIncluding: "101.0.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2022-09-13T07:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: "Microsoft Defender for Endpoint for Mac Elevation of Privilege Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en-US",
                     type: "Impact",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-03-11T16:10:21.448Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Microsoft Defender for Endpoint for Mac Elevation of Privilege Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35828",
            },
         ],
         title: "Microsoft Defender for Endpoint for Mac Elevation of Privilege Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2022-35828",
      datePublished: "2022-09-13T18:41:52",
      dateReserved: "2022-07-13T00:00:00",
      dateUpdated: "2025-03-11T16:10:21.448Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-43614
Vulnerability from cvelistv5
Published
2024-10-08 17:36
Modified
2025-01-29 23:51
Summary
Microsoft Defender for Endpoint for Linux Spoofing Vulnerability
Impacted products
Vendor Product Version
Microsoft Microsoft Defender for Endpoint for Linux Version: 101.0.0   < 101.24052.0002
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-43614",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-08T18:34:19.602647Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-08T19:23:32.600Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Defender for Endpoint for Linux",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "101.24052.0002",
                     status: "affected",
                     version: "101.0.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "101.24052.0002",
                           versionStartIncluding: "101.0.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-10-08T07:00:00.000Z",
         descriptions: [
            {
               lang: "en-US",
               value: "Microsoft Defender for Endpoint for Linux Spoofing Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-23",
                     description: "CWE-23: Relative Path Traversal",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-29T23:51:03.191Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Microsoft Defender for Endpoint for Linux Spoofing Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43614",
            },
         ],
         title: "Microsoft Defender for Endpoint for Linux Spoofing Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-43614",
      datePublished: "2024-10-08T17:36:18.291Z",
      dateReserved: "2024-08-14T01:08:33.553Z",
      dateUpdated: "2025-01-29T23:51:03.191Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-21315
Vulnerability from cvelistv5
Published
2024-02-13 18:02
Modified
2024-12-31 18:51
Summary
Microsoft Defender for Endpoint Protection Elevation of Privilege Vulnerability
Impacted products
Vendor Product Version
Microsoft Microsoft Defender for Endpoint for Windows Version: 1.0.0.0   < 10.0.17763.5122
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-21315",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-02-14T15:35:25.681720Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-12T19:09:24.865Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T22:20:40.204Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Microsoft Defender for Endpoint Protection Elevation of Privilege Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21315",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Windows 10 Version 1809 for 32-bit Systems",
                  "Windows 10 Version 1809 for x64-based Systems",
                  "Windows 10 Version 1809 for ARM64-based Systems",
                  "Windows Server 2019",
                  "Windows Server 2019 (Server Core installation)",
                  "Windows Server 2022",
                  "Windows Server 2022 (Server Core installation)",
                  "Windows 11 version 21H2 for x64-based Systems",
                  "Windows 11 version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for 32-bit Systems",
                  "Windows 10 Version 21H2 for ARM64-based Systems",
                  "Windows 10 Version 21H2 for x64-based Systems",
                  "Windows 10 for 32-bit Systems",
                  "Windows 10 for x64-based Systems",
                  "Windows 10 Version 1607 for 32-bit Systems",
                  "Windows 10 Version 1607 for x64-based Systems",
                  "Windows Server 2016",
                  "Windows Server 2016 (Server Core installation)",
                  "Windows Server 2012 R2",
                  "Windows Server 2012 R2 (Server Core installation)",
                  "Windows 11 Version 23H2 for ARM64-based Systems",
                  "Windows 11 Version 22H2 for ARM64-based Systems",
                  "Windows 10 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for ARM64-based Systems",
                  "Windows Server 2022, 23H2 Edition (Server Core installation)",
                  "Windows 11 Version 23H2 for x64-based Systems",
                  "Windows 11 Version 22H2 for x64-based Systems",
                  "Windows 10 Version 22H2 for 32-bit Systems",
                  "Windows Server 2012",
                  "Windows Server 2012 (Server Core installation)",
               ],
               product: "Microsoft Defender for Endpoint for Windows",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "10.0.17763.5122",
                     status: "affected",
                     version: "1.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "10.0.17763.5122",
                           versionStartIncluding: "1.0.0.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2024-02-20T08:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: "Microsoft Defender for Endpoint Protection Elevation of Privilege Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-20",
                     description: "CWE-20: Improper Input Validation",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-12-31T18:51:53.902Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Microsoft Defender for Endpoint Protection Elevation of Privilege Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21315",
            },
         ],
         title: "Microsoft Defender for Endpoint Protection Elevation of Privilege Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2024-21315",
      datePublished: "2024-02-13T18:02:27.519Z",
      dateReserved: "2023-12-08T22:45:19.366Z",
      dateUpdated: "2024-12-31T18:51:53.902Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-33637
Vulnerability from cvelistv5
Published
2022-07-12 22:37
Modified
2025-01-02 19:24
Summary
Microsoft Defender for Endpoint Tampering Vulnerability
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T08:09:22.319Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "Microsoft Defender for Endpoint Tampering Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33637",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Unknown",
               ],
               product: "Microsoft Defender for Endpoint for Linux",
               vendor: "Microsoft",
               versions: [
                  {
                     lessThan: "101.68.80",
                     status: "affected",
                     version: "101.0.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "101.68.80",
                           versionStartIncluding: "101.0.0",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         datePublic: "2022-07-12T07:00:00+00:00",
         descriptions: [
            {
               lang: "en-US",
               value: "Microsoft Defender for Endpoint Tampering Vulnerability",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Tampering",
                     lang: "en-US",
                     type: "Impact",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-02T19:24:38.250Z",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "Microsoft Defender for Endpoint Tampering Vulnerability",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33637",
            },
         ],
         title: "Microsoft Defender for Endpoint Tampering Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2022-33637",
      datePublished: "2022-07-12T22:37:58",
      dateReserved: "2022-06-14T00:00:00",
      dateUpdated: "2025-01-02T19:24:38.250Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2022-07-12 23:15
Modified
2024-11-21 07:08
Summary
Microsoft Defender for Endpoint Tampering Vulnerability
Impacted products
Vendor Product Version
microsoft defender_for_endpoint -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:-:*:*:*:*:linux:*:*",
                     matchCriteriaId: "1EFDA019-FE81-4CBC-8B31-E8F9C42272A4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Microsoft Defender for Endpoint Tampering Vulnerability",
      },
      {
         lang: "es",
         value: "Una Vulnerabilidad de manipulación de Microsoft Defender for Endpoint",
      },
   ],
   id: "CVE-2022-33637",
   lastModified: "2024-11-21T07:08:13.563",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 4,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:S/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Secondary",
         },
      ],
   },
   published: "2022-07-12T23:15:12.277",
   references: [
      {
         source: "secure@microsoft.com",
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33637",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33637",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-03-09 17:15
Modified
2024-11-21 06:48
Summary
Microsoft Defender for Endpoint Spoofing Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:defender_for_endpoint_edr_sensor:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "94C76B85-1113-4CBE-B112-471E98E007B3",
                     versionEndExcluding: "10.8047.22439.1056",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C9118F2-2432-43F6-A08B-90A568D12777",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E2C378B-1507-4C81-82F6-9F599616845A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAE4278F-71A7-43E9-8F79-1CBFAE71D730",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*",
                     matchCriteriaId: "71E65CB9-6DC2-4A90-8C6A-103BEDC99823",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9273B95-20ED-4547-B0A8-95AD15B30372",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "B9F64296-66BF-4F1D-A11C-0C44C347E2AC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "5D7F7DDB-440E-42CD-82F4-B2C13F3CC462",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EAF6DBA-6E3A-4854-BFBF-B5DC36CE5929",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE257836-4F4D-4352-8293-B9CAD34F8794",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB79EE26-FC32-417D-A49C-A1A63165A968",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C9118F2-2432-43F6-A08B-90A568D12777",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:linux:linux_kernel:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BA79AC0-A0CC-4EE6-AEF5-9B8C8EA2C9F1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Microsoft Defender for Endpoint Spoofing Vulnerability",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de Suplantación de Identidad de Microsoft Defender for Endpoint",
      },
   ],
   id: "CVE-2022-23278",
   lastModified: "2024-11-21T06:48:18.743",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.9,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.2,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.9,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.2,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Secondary",
         },
      ],
   },
   published: "2022-03-09T17:15:11.210",
   references: [
      {
         source: "secure@microsoft.com",
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23278",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23278",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-10-08 18:15
Modified
2024-10-21 20:50
Summary
Microsoft Defender for Endpoint for Linux Spoofing Vulnerability
Impacted products
Vendor Product Version
microsoft defender_for_endpoint *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:linux:*:*",
                     matchCriteriaId: "B1C19969-2E8D-4FDB-8345-61E3128B7819",
                     versionEndExcluding: "101.24052.0002",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Microsoft Defender for Endpoint for Linux Spoofing Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de suplantación de Microsoft Defender for Endpoint for Linux",
      },
   ],
   id: "CVE-2024-43614",
   lastModified: "2024-10-21T20:50:38.370",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-10-08T18:15:29.623",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43614",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-23",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-09-13 19:15
Modified
2025-01-02 20:15
Summary
Microsoft Defender for Endpoint for Mac Elevation of Privilege Vulnerability
Impacted products
Vendor Product Version
microsoft defender_for_endpoint -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:-:*:*:*:*:macos:*:*",
                     matchCriteriaId: "E913B5DC-7E6F-47FD-9979-C5AE396EDEF2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Microsoft Defender for Endpoint for Mac Elevation of Privilege Vulnerability",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de Elevación de Privilegios de Microsoft Defender for Endpoint for Mac",
      },
   ],
   id: "CVE-2022-35828",
   lastModified: "2025-01-02T20:15:49.700",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2022-09-13T19:15:11.137",
   references: [
      {
         source: "secure@microsoft.com",
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35828",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35828",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-12-12 19:15
Modified
2025-01-10 18:24
Summary
Improper authorization of an index that contains sensitive information from a Global Files search in Windows Defender allows an authorized attacker to disclose information over a network.
Impacted products
Vendor Product Version
microsoft defender_for_endpoint -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:-:*:*:*:*:windows:*:*",
                     matchCriteriaId: "B601F85E-E9AA-47B5-A2D7-AD6DC8C04C0D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [
      {
         sourceIdentifier: "secure@microsoft.com",
         tags: [
            "exclusively-hosted-service",
         ],
      },
   ],
   descriptions: [
      {
         lang: "en",
         value: "Improper authorization of an index that contains sensitive information from a Global Files search in Windows Defender allows an authorized attacker to disclose information over a network.",
      },
      {
         lang: "es",
         value: "La autorización incorrecta de un índice que contiene información confidencial de una búsqueda de archivos globales en Windows Defender permite a un atacante autorizado divulgar información a través de una red.",
      },
   ],
   id: "CVE-2024-49071",
   lastModified: "2025-01-10T18:24:41.833",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-12-12T19:15:09.387",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49071",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-612",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-02-13 18:15
Modified
2024-11-21 08:54
Summary
Microsoft Defender for Endpoint Protection Elevation of Privilege Vulnerability



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:windows:*:*",
                     matchCriteriaId: "6110E9B7-9AF4-4BB8-8E38-F2419A1E0B12",
                     versionEndExcluding: "10.0.25398.531",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022_23h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75CCACE6-A0EE-4A6F-BD5A-7AA504B02717",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:windows:*:*",
                     matchCriteriaId: "34FE251F-9F96-4C7A-9AE1-8040A2A98B42",
                     versionEndExcluding: "10.0.19045.3693",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "A9D54EE6-30AF-411C-A285-A4DCB6C6EC06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "C230D3BF-7FCE-405C-B62E-B9190C995C3C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:windows:*:*",
                     matchCriteriaId: "C43F35FF-BCFC-434A-A6D4-6EDEEEC91E94",
                     versionEndExcluding: "10.0.22621.2715",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "B2D24C54-F04F-4717-B614-FE67B3ED9DC0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "B0301BA0-81DB-4FC1-9BC3-EB48A56BC608",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:windows:*:*",
                     matchCriteriaId: "89BDD39C-EED5-418E-8734-23FD425F43E4",
                     versionEndExcluding: "6.3.9600.21813",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:windows:*:*",
                     matchCriteriaId: "31793C00-933B-4CBB-9EAF-27AFF4C82CBE",
                     versionEndExcluding: "10.0.14393.6452",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "0A1BC97A-263E-4291-8AEF-02EE4E6031E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:windows:*:*",
                     matchCriteriaId: "51D2081C-CA6C-4F6F-8D29-FCCD64FAB4FC",
                     versionEndExcluding: "6.2.9200.24710",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:windows:*:*",
                     matchCriteriaId: "34FE251F-9F96-4C7A-9AE1-8040A2A98B42",
                     versionEndExcluding: "10.0.19045.3693",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "1FD62DCB-66D1-4CEA-828E-0BD302AC63CA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:windows:*:*",
                     matchCriteriaId: "C43F35FF-BCFC-434A-A6D4-6EDEEEC91E94",
                     versionEndExcluding: "10.0.22621.2715",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "D5EC3F68-8F41-4F6B-B2E5-920322A4A321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "8E3C1327-F331-4448-A253-00EAC7428317",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:windows:*:*",
                     matchCriteriaId: "60637E9C-A03E-4E64-B559-D817CF8AA82C",
                     versionEndExcluding: "10.0.10240.20308",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "A045AC0A-471E-444C-B3B0-4CABC23E8CFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "28A7FEE9-B473-48A0-B0ED-A5CC1E44194C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:windows:*:*",
                     matchCriteriaId: "8D2F0987-1200-46E8-B224-CD9E0AE33BD1",
                     versionEndExcluding: "10.0.19043.3693",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "8FC46499-DB6E-48BF-9334-85EE27AFE7AF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "83A79DD6-E74E-419F-93F1-323B68502633",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "61959ACC-B608-4556-92AF-4D94B338907A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:windows:*:*",
                     matchCriteriaId: "D4ADA63C-F2DA-4770-9D22-6E0A5521A4CC",
                     versionEndExcluding: "10.0.22000.2600",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "F2D718BD-C4B7-48DB-BE78-B9CA22F27DD0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "0C3552E0-F793-4CDD-965D-457495475805",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:windows:*:*",
                     matchCriteriaId: "C9D85511-1F11-4992-A183-0B6C78D5F8C2",
                     versionEndExcluding: "6.2.9200.24569",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "821614DD-37DD-44E2-A8A4-FE8D23A33C3C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:windows:*:*",
                     matchCriteriaId: "51D16F16-CDCD-48EE-B0A7-02DC0F2317E8",
                     versionEndExcluding: "10.0.20348.2113",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "821614DD-37DD-44E2-A8A4-FE8D23A33C3C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:windows:*:*",
                     matchCriteriaId: "53FF14C4-9735-4A8B-8DDE-D1F852346200",
                     versionEndExcluding: "10.0.17763.5122",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*",
                     matchCriteriaId: "73D24713-D897-408D-893B-77A61982597D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "306B7CE6-8239-4AED-9ED4-4C9F5B349F58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "345FCD64-D37B-425B-B64C-8B1640B7E850",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB79EE26-FC32-417D-A49C-A1A63165A968",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Microsoft Defender for Endpoint Protection Elevation of Privilege Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de elevación de privilegios de Microsoft Defender para Endpoint Protection",
      },
   ],
   id: "CVE-2024-21315",
   lastModified: "2024-11-21T08:54:05.510",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "secure@microsoft.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-02-13T18:15:48.403",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21315",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21315",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-12-12 02:04
Modified
2025-01-08 12:39
Summary
Microsoft Defender for Endpoint on Android Spoofing Vulnerability
Impacted products
Vendor Product Version
microsoft defender_for_endpoint *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:android:*:*",
                     matchCriteriaId: "9E3DD335-D880-4268-B8F4-3C3FE43A2374",
                     versionEndExcluding: "1.0.7128.0101",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Microsoft Defender for Endpoint on Android Spoofing Vulnerability",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de suplantación de Microsoft Defender for Endpoint en Android",
      },
   ],
   id: "CVE-2024-49057",
   lastModified: "2025-01-08T12:39:35.633",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 8.1,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.2,
            source: "secure@microsoft.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-12-12T02:04:29.907",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49057",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "secure@microsoft.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}