{"id":19011,"date":"2022-05-11T10:30:05","date_gmt":"2022-05-11T18:30:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/05\/11\/news-12744\/"},"modified":"2022-05-11T10:30:05","modified_gmt":"2022-05-11T18:30:05","slug":"news-12744","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/05\/11\/news-12744\/","title":{"rendered":"Actively exploited vulnerability in Windows | Kaspersky official blog"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/05\/11140633\/windows-actively-exploited-vulnerability-may-2022-featured.jpg\"\/><\/p>\n<p><strong>Credit to Author: Editorial Team| Date: Wed, 11 May 2022 18:11:21 +0000<\/strong><\/p>\n<p>In the latest Patch Tuesday Microsoft has released updates for 74 vulnerabilities. At least one of them is already actively exploited by attackers. That said, it&#8217;s a good idea to install patches as soon as possible.<\/p>\n<h2>CVE-2022-26925, the most dangerous of the addressed vulnerabilities<\/h2>\n<p>Apparently, the most dangerous vulnerability addressed in the recent update pack is <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-26925\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2022-26925<\/a> that is contained in the Windows Local Security Authority. The vulnerability per se scores 8.1 on CVSS scale, which is relatively low. However, company representatives believe that when this vulnerability is used in <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/ADV210003\" target=\"_blank\" rel=\"nofollow noopener\">NTLM Relay attacks<\/a> on Active Directory Certificate Services, the severity level of this bundle rises to CVSS 9.8. The reason for the increased severity level is that in such a scenario CVE-2022-26925 could allow an attacker to authenticate on a domain controller.<\/p>\n<p>The vulnerability is relevant to operating systems starting with Windows 7 (Windows Server 2008 in case of server systems). Microsoft didn&#8217;t go into details about the exploitation of this vulnerability, however, judging by the description of the problem, unknown attackers are already actively using exploits for CVE-2022-26925 in the wild. The good news is that, according to experts, exploiting this vulnerability in real attacks is quite difficult.<\/p>\n<p>The fix detects and denies anonymous connection attempts to the Local Security Authority Remote Protocol. However, according to the official <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-26925\" target=\"_blank\" rel=\"nofollow noopener\">FAQ<\/a>, installing this update on Windows Server 2008 SP2 may affect backup software.<\/p>\n<h2>Other vulnerabilities<\/h2>\n<p>In addition to CVE-2022-26925, the latest update fixes several more vulnerabilities with the &#8220;critical&#8221; severity level. Among them are the <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-26937\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2022-26937<\/a> RCE vulnerability in the Windows Network File System (NFS), as well as <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-22012\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2022-22012<\/a>\u00a0and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-29130\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2022-29130<\/a>, two RCE vulnerabilities in the LDAP service.<\/p>\n<p>Two other vulnerabilities were also already known to the public at the time the patches were published: <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-29972\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2022-29972<\/a> , a bug in Insight Software&#8217;s Magnitude Simba Amazon Redshift driver, and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-22713\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2022-22713<\/a>, a DoS vulnerability in Windows Hyper-V. However, attempts to exploit them have not yet been detected.<\/p>\n<h2>How to stay protected<\/h2>\n<p>First and foremost, install the recent updates from Microsoft. If for some reason it&#8217;s impossible in your environment, refer to <em>FAQs, Mitigations, and Workarounds<\/em> section of the <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2022-May\" target=\"_blank\" rel=\"nofollow noopener\">Microsoft&#8217;s official May 2022 Security Updates guide<\/a>. Hopefully, one of the methods described there can be used for protection from vulnerabilities that are relevant to your infrastructure.<\/p>\n<p>For our part, we recommend protecting every device connected to the Internet with a <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\">reliable solution<\/a>, that can detect exploitation of yet unknown vulnerabilities.<\/p>\n<p> <input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\" \/> <br \/><a href=\"https:\/\/www.kaspersky.com\/blog\/windows-actively-exploited-vulnerability-cve-2022-26925\/44305\/\" target=\"bwo\" >https:\/\/blog.kaspersky.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/05\/11140633\/windows-actively-exploited-vulnerability-may-2022-featured.jpg\"\/><\/p>\n<p><strong>Credit to Author: Editorial Team| Date: Wed, 11 May 2022 18:11:21 +0000<\/strong><\/p>\n<p>Time to update Windows! Microsoft released patches for several vulnerabilities, including CVE-2022-26925 that is being actively exploited by cybercriminals.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10425,10378],"tags":[24586,1001,12177,10516,12321,10438,1583,24940,10752,10525],"class_list":["post-19011","post","type-post","status-publish","format-standard","hentry","category-kaspersky","category-security","tag-0days","tag-business","tag-enterprise","tag-microsoft","tag-smb","tag-threats","tag-updates","tag-vulberabilities","tag-vulnerabilities","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19011","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19011"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19011\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19011"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19011"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19011"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}