Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2022-34721

Опубликовано: 13 сент. 2022
Источник: msrc
CVSS3: 9.8
EPSS Средний

Описание

Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability

Меры по смягчению последствий

Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors might be helpful in your situation:

Only systems with the IKE and AuthIP IPsec Keying Modules running are vulnerable to this attack.

You can run either of the following commands to check the running status of this service:

PS: C:\> Get-Service Ikeext

  • OR

Cmd: C:\> sc query ikeext

This mitigation could have negative affects on your IPSec functionality. Microsoft strongly recommends updating your system with the latest Windows security updates.

FAQ

How could an attacker exploit this vulnerability?

An unauthenticated attacker could send a specially crafted IP packet to a target machine that is running Windows and has IPSec enabled, which could enable a remote code execution exploitation.

Does this vulnerability affect all versions of Internet Key Exchange (IKE) Protocol?

No, this vulnerability only impacts IKEv1. IKEv2 is not impacted. However, all Windows Servers are affected because they accept both V1 and V2 packets.

Обновления

ПродуктСтатьяОбновление
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2012
Windows Server 2012 (Server Core installation)

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

Older Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 95%
0.17753
Средний

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
почти 3 года назад

Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability

CVSS3: 9.8
github
почти 3 года назад

Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34722.

CVSS3: 9.8
fstec
почти 3 года назад

Уязвимость реализации протокола Internet Key Exchange (IKE) операционных систем Windows, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 95%
0.17753
Средний

9.8 Critical

CVSS3