Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-39335 | Windows Remote Desktop Protocol Security Feature Bypass |
Wed, 25 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft windows 10 21h2
Microsoft windows 10 22h2 Microsoft windows 11 21h2 Microsoft windows 11 22h2 Microsoft windows Server 2008 R2 Microsoft windows Server 2012 R2 |
|
| CPEs | cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Microsoft windows 10 21h2
Microsoft windows 10 22h2 Microsoft windows 11 21h2 Microsoft windows 11 22h2 Microsoft windows Server 2008 R2 Microsoft windows Server 2012 R2 |
Thu, 02 Jan 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 01 Jan 2025 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.20048:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.6085:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.6085:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.4645:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.4645:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.4645:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.3208:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.3208:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.3208:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.3208:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.3208:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.3208:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.2176:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.2176:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_11_22H2:10.0.22621.1992:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_11_22H2:10.0.22621.1992:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.26623:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.24374:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.21063:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.21075:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.6085:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.4645:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.1850:*:*:*:*:*:*:* |
|
| Vendors & Products |
Microsoft windows 10 21h2
Microsoft windows 10 22h2 Microsoft windows 11 21h2 Microsoft windows 11 22h2 Microsoft windows Server 2008 R2 Microsoft windows Server 2012 R2 |
Subscriptions
Status: PUBLISHED
Assigner: microsoft
Published:
Updated: 2025-01-01T01:52:19.357Z
Reserved: 2023-06-14T23:09:47.619Z
Link: CVE-2023-35332
Updated: 2024-08-02T16:23:59.695Z
Status : Modified
Published: 2023-07-11T18:15:18.307
Modified: 2024-11-21T08:08:13.523
Link: CVE-2023-35332
No data.
OpenCVE Enrichment
No data.
EUVD