ThreatCluster
  • Feed
  • Saved
THREAT HUNTING
  • Domains
  • IP Addresses
  • File Hashes
  • CVEs
THREAT INTELLIGENCE
  • APT Groups
  • Ransomware Groups
  • Malware Families
  • Attack Types
  • MITRE ATT&CK
  • Security Standards
  • Vulnerability Types
BUSINESS INTELLIGENCE
  • Companies
  • Industry Sectors
  • Security Vendors
  • Government Agencies
  • Countries
  • Platforms
Home / Feed / Cluster #1357

Proof-of-Concept Code Now Available for an Exploited Windows Local Privilege Escalation Vulnerability

Threat Score:
61
2 articles
81.0% similarity
1 day ago
JSON CSV Text STIX IoCs
Splunk Elastic Sentinel Sigma YARA All Queries

Activity Timeline

2 articles
Click to navigate
Jul 24
Jul 25
Oldest
Latest

Key Insights

1
CVE-2022-21882 is a local privilege escalation vulnerability in the Win32k.sys driver, allowing authenticated users to gain elevated privileges; it has a CVSS score of 7.0.
2
Proof-of-Concept (POC) code for CVE-2022-21882 has been publicly released, increasing the risk of exploitation in the wild.
3
CVE-2022-22718, also a local privilege escalation vulnerability in the Windows Print Spooler, has been added to CISA's Known Exploited Vulnerabilities Catalog, indicating active exploitation.
4
Microsoft has issued patches for both vulnerabilities; organizations must apply these updates to mitigate risks immediately.
5
Both vulnerabilities affect multiple versions of Windows OS, necessitating urgent action from security teams to protect systems.

Threat Overview

Recent vulnerabilities CVE-2022-21882 and CVE-2022-22718 pose significant risks to Windows systems, allowing local authenticated users to escalate privileges. The release of POC code for CVE-2022-21882 heightens the urgency for organizations to address these flaws, particularly as CVE-2022-22718 is now listed in CISA's Known Exploited Vulnerabilities Catalog. Microsoft has provided patches for both vulnerabilities, and immediate application of these updates is crucial to prevent potential exploitation. Security teams should ensure all systems are updated and monitor for any signs of unauthorized privilege escalation.

Powered by ThreatCluster AI
Generated 1 day ago
AI analysis may contain inaccuracies

Related Articles

2 articles
1

Proof-of-Concept Code Now Available for an Exploited Windows Local Privilege Escalation Vulnerability

FortiGuard Threat Signal • 1 day ago

Threat Signal Report Proof-of-Concept Code Now Available for an Exploited Windows Local Privilege Escalation Vulnerability Description FortiGuard Labs is aware that a Proof-of-Concept (POC) code for a newly patched Windows vulnerability (CVE-2022-21882) that is reported to have been exploited in the wild was released to a publicly available online repository. CVE-2022-21882 is a local privilege (LPE) escalation vulnerability which allows a local, authenticated attacker to gain elevated local sys

Score
55
95.0% similarity
Read more
2

CVE-2022-22718 on CISA's Known Exploited Vulnerabilities Catalog

FortiGuard Threat Signal • 2 days ago

Threat Signal Report CVE-2022-22718 on CISA's Known Exploited Vulnerabilities Catalog Description FortiGuard Labs is aware that the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2022-22718 to the Known Exploited Vulnerabilities Catalog. CVE-2022-24481 is a local privilege escalation vulnerability in the Windows Print Spooler and affects multiple versions of Windows OS. Microsoft issued a patch for the vulnerability as part of the February 2022 Patch Tuesday updates.

Score
50
95.0% similarity
Read more

Save to Folder

Choose a folder to save this cluster:

Cluster Intelligence

Key entities and indicators for this cluster

COMPANIES
Microsoft
Fortinet
PLATFORMS
Windows
VULNERABILITIES
Privilege Escalation
ATTACK TYPES
Privilege Escalation
DOMAINS
MS.Windows
AGENCIES
CISA
Cybersecurity and Infrastructure Security Agency
SECURITY VENDORS
Fortinet
CVES
CVE-2022-21882
CVE-2022-22718
CVE-2022-24481
FILE PATH
/Agent.A93E!exploit.CVE202221882 Outbreak Alert View the full Outbreak Alert Report Additional Resources Win32k Elevation of Privilege Vulnerability - CVE-2022-21882(Microsoft) CVE-2022-21882(MITRE) MS.Windows.Win32k.CVE-2022-21882.Privilege.Elevation(Fortinet) Experienced a Breach? We're here to help FortiGuard Threat Signal Learn More »
CLUSTER INFORMATION
Cluster #1357
Created 1 day ago
Semantic Algorithm