Windows Scripting Languages Remote Code Execution Vulnerability
References
| Link | Resource |
|---|---|
| https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41128 | Patch Vendor Advisory |
| https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41128 | Patch Vendor Advisory |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-41128 | US Government Resource |
Configurations
Configuration 1 (hide)
|
History
30 Oct 2025, 19:37
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-41128 - US Government Resource |
22 Oct 2025, 00:18
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 20:19
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 19:19
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Nov 2024, 07:22
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41128 - Patch, Vendor Advisory |
28 Jun 2024, 13:50
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10:22h2:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:* |
cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:* |
| References | () https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41128 - Patch, Vendor Advisory | |
| First Time |
Microsoft windows 10 21h1
Microsoft windows 11 21h2 Microsoft windows 10 22h2 Microsoft windows 10 1507 Microsoft windows 10 21h2 Microsoft windows 10 20h2 Microsoft windows 10 1809 Microsoft windows 10 1607 Microsoft windows 11 22h2 |
08 Aug 2023, 14:21
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-787 |
19 May 2023, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | Windows Scripting Languages Remote Code Execution Vulnerability | |
| References |
|
|
Information
Published : 2022-11-09 22:15
Updated : 2025-10-30 19:37
NVD link : CVE-2022-41128
Mitre link : CVE-2022-41128
CVE.ORG link : CVE-2022-41128
JSON object : View
Products Affected
microsoft
- windows_10_20h2
- windows_10_1809
- windows_server_2012
- windows_8.1
- windows_server_2008
- windows_10_22h2
- windows_7
- windows_10_1507
- windows_server_2019
- windows_11_22h2
- windows_server_2022
- windows_10_1607
- windows_11_21h2
- windows_server_2016
- windows_10_21h1
- windows_10_21h2
CWE
CWE-787
Out-of-bounds Write
