CVE-2022-4111609.11.2022, 22:15Windows Point-to-Point Tunneling Protocol Denial of Service VulnerabilityRace ConditionEnginsightProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVectorNISTNIST5.9 MEDIUMNETWORKHIGHNONECVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:HmicrosoftCNA5.9 MEDIUMCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:CCVEADP------Awaiting analysisThis vulnerability is currently awaiting analysis.Base ScoreCVSS 3.xEPSS ScorePercentile: 26%Common Weakness EnumerationCWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.Referenceshttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41116https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41116