Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2022-23294

Опубликовано: 08 мар. 2022
Источник: msrc
CVSS3: 8.8
EPSS Низкий

Описание

Windows Event Tracing Remote Code Execution Vulnerability

Меры по смягчению последствий

Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors might be helpful in your situation:

Access to the Event Log service endpoint is blocked by default and a firewall rule change is required to make the endpoint accessible from a locally triggered attack.

FAQ

How can an attacker exploit this vulnerability?

An authenticated attacker could potentially take advantage of this vulnerability to execute malicious code through the Event Log's Remote Procedure Call (RPC) endpoint on the server-side.

According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated user could trigger this vulnerability. It does not require admin or other elevated privileges.

What is a Remote Procedure Call?

Remote Procedure Call (RPC) is a communication mechanism that allows computers to communicate with one another over a network. An RPC consists of a procedure identifier, parameters passed to the procedure, and a value returned to the caller (client computer) after the procedure has executed on the remote system (server computer).

See Remote procedure call (RPC) for more information.

Обновления

ПродуктСтатьяОбновление
Windows Server 2012
Windows Server 2012 (Server Core installation)
Windows 8.1 for 32-bit systems
Windows 8.1 for x64-based systems
Windows Server 2012 R2
Windows RT 8.1
-
Windows Server 2012 R2 (Server Core installation)
Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows Server 2016

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation More Likely

Older Software Release

Exploitation More Likely

DOS

N/A

EPSS

Процентиль: 89%
0.05204
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
больше 3 лет назад

Windows Event Tracing Remote Code Execution Vulnerability

CVSS3: 8.8
github
больше 3 лет назад

Windows Event Tracing Remote Code Execution Vulnerability.

CVSS3: 8.8
fstec
больше 3 лет назад

Уязвимость службы трассировки (Windows Event Tracing) операционной системы Microsoft Windows, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 89%
0.05204
Низкий

8.8 High

CVSS3