Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2022-30222

Опубликовано: 12 июл. 2022
Источник: msrc
CVSS3: 8.4
EPSS Низкий

Описание

Windows Shell Remote Code Execution Vulnerability

Обходное решение

The following workaround may be helpful in your situation. In all cases, Microsoft strongly recommends that you install the updates for this vulnerability as soon as they become available even if you plan to leave this workaround in place:

To remove Microsoft Japanese IME entirely from logon UI the following steps are required.

First, you must remove the Japanese language (not IME) from every account on the affected device. As long as there is an account where Japanese is installed, logon will continue to show Microsoft JPN IME.

  1. For each account on the affected device, sign in to the account.
  2. Select Settings, select Time & language.
  3. For Windows 11, select Language & region. For Windows 10, select Language.
  4. Select Japanese and then select Remove. Note that you cannot do this if Japanese is the only language installed or is located at the top in the language list. You will need to add another language to move Japanese down to second or later in the list. Then you can remove the Japanese entry.

Second, you need to make sure the Welcome screen input language is not set to Japanese.

  1. Select Settings, select Time & language.
  2. For Windows 11, select Language & region. For Windows 10, select Language.
  3. Select Administrative language settings then click Copy Settings to view the Welcome screen and new user accounts settings dialog box.
  4. Click the Administrative tab to view language settings.
  5. Under Welcome screen make sure Input language is not Japanese (Japan) – Microsoft IME. If it is, make sure Input language under **Current user ** is not Japanese (Japan) – Microsoft IME, then select Welcome screen and system accounts at the bottom of the dialog box and click OK to update the Welcome screen setting.

Impact of workaround Japanese will not be the display language on the device.

How to undo the workaround

  1. Sign into each account and repeat the workaround steps to select Japanese for the language.
  2. In the device Settings repeat the steps to update the Welcome screen setting to Japanese.

FAQ

How could an attacker exploit this vulnerability?

An unauthenticated attacker could interact with the login screen of a vulnerable system in a specific manner to execute code on that system.

Обновления

ПродуктСтатьяОбновление
Windows Server 2016
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows Server 2016 (Server Core installation)
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows 10 Version 20H2 for 32-bit Systems

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

Older Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 36%
0.00148
Низкий

8.4 High

CVSS3

Связанные уязвимости

CVSS3: 8.4
nvd
почти 3 года назад

Windows Shell Remote Code Execution Vulnerability

CVSS3: 8.4
github
почти 3 года назад

Windows Shell Remote Code Execution Vulnerability.

CVSS3: 8.4
fstec
почти 3 года назад

Уязвимость компонента Windows Shell операционных систем Windows, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 36%
0.00148
Низкий

8.4 High

CVSS3