Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2022-30165

Опубликовано: 14 июн. 2022
Источник: msrc
CVSS3: 8.8
EPSS Низкий

Описание

Windows Kerberos Elevation of Privilege Vulnerability

FAQ

I am running a supported version of Windows Server. Is my system vulnerable to this issue?

Systems configured to activate both of the following features in Windows Server: CredSSP (Credential Security Service Provider) and RCG (Remote Credential Guard) might be vulnerable to this exploit.

How could an attacker exploit this vulnerability?

An authenticated attacker could exploit this vulnerability to elevate privileges and then spoof the Kerberos logon process when a remote credential guard connection is made via CredSSP over the network.

Обновления

ПродуктСтатьяОбновление
Windows Server 2016
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows Server 2016 (Server Core installation)
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows 10 Version 20H2 for 32-bit Systems

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

Older Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 83%
0.0209
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
около 3 лет назад

Windows Kerberos Elevation of Privilege Vulnerability

CVSS3: 8.8
github
около 3 лет назад

Windows Kerberos Elevation of Privilege Vulnerability.

CVSS3: 8.8
fstec
около 3 лет назад

Уязвимость реализации протокола Kerberos операционных систем Windows, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 83%
0.0209
Низкий

8.8 High

CVSS3