PatchSiren cyber security CVE debrief
CVE-2022-23282 Microsoft CVE debrief
CVE-2022-23282 is a Microsoft Paint 3D vulnerability published on 2022-03-09 and rated 7.8 High by NVD. The available CVSS vector indicates local exploitation that requires user interaction, with no privileges needed and high impact to confidentiality, integrity, and availability. The public record identifies Microsoft Paint 3D as vulnerable and links to Microsoft’s security advisory for additional vendor guidance.
- Vendor
- Microsoft
- Product
- Paint 3D
- CVSS
- HIGH 7.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2022-03-09
- Original CVE updated
- 2024-11-21
- Advisory published
- 2022-03-09
- Advisory updated
- 2024-11-21
Who should care
Organizations that allow Paint 3D to be installed or used on managed Windows endpoints should care, especially desktop support, endpoint security, and vulnerability management teams. Users who open untrusted files or content in Paint 3D are the most relevant exposure group.
Technical summary
NVD lists the vulnerable product as microsoft:paint_3d and assigns CVSS 3.1 vector AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. That means exploitation is expected to be local, low complexity, requires user interaction, and can have severe impact if successful. The public metadata does not provide exploit details, so defensive interpretation should stay limited to the recorded attack characteristics and vendor advisory linkage.
Defensive priority
High for endpoint fleets that include Paint 3D, but not a top-tier internet-exposed emergency based on the published vector. Prioritize if the application is installed on many user workstations or if your environment regularly handles untrusted files.
Recommended defensive actions
- Inventory endpoints that have Microsoft Paint 3D installed.
- Apply Microsoft security updates or remediation guidance referenced by the vendor advisory.
- Restrict or remove Paint 3D where it is not needed.
- Warn users against opening untrusted files or content in Paint 3D.
- Monitor for vendor follow-up updates and verify remediation across managed devices.
Evidence notes
This debrief is based on the supplied NVD metadata, which includes the CVE publish/modify timestamps, the vulnerable CPE for microsoft:paint_3d, and the CVSS vector AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. Microsoft’s advisory URL is referenced in the source metadata, but the page content was not supplied here, so no additional vendor-specific claims are included. The title describes the issue as a remote code execution vulnerability, while the CVSS vector suggests local, user-interaction-required exploitation; this summary follows the structured CVSS evidence.
Official resources
-
CVE-2022-23282 CVE record
CVE.org
-
CVE-2022-23282 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
Publicly published on 2022-03-09T17:15:11.427Z. Last modified on 2024-11-21T06:48:19.283Z per the supplied CVE metadata.