Vulnerability identifier: #VU67274
Vulnerability risk: High
CVSSv4.0: 8.2 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber]
CVE-ID:
CWE-ID:
CWE-264
Exploitation vector: Network
Exploit availability: Yes
Vulnerable software:
Windows Server
Operating systems & Components /
Operating system
Vendor: Microsoft
Description
The vulnerability allows a remote attacker to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Windows Kerberos. A remote attacker can perform a man-in-the-middle attack, leading to security restrictions bypass and privilege escalation.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Windows Server: 2003, 2008 R2 SP1 - 2008, 2012 Gold - 2012, 2016 10.0.14393.10, 2019 10.0.17763.1 - 2019 2004, 2022 10.0.20348.202 - 2022 20H2
External links
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33679
https://bugs.chromium.org/p/project-zero/issues/detail?id=2310
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.