Finding Microsoft VPN/PPTP with runZero
Last month, researcher Alex Nichols at Nettitude reported a vulnerability in Microsoft’s Windows VPN software that could allow for remote code execution or local privilege escalation by an attacker. This vulnerability lies in a use-after-free condition that can occur in the Point-to-Point Tunneling Protocol (PPTP) logic of Microsoft’s VPN software. It has existed for over 10 years and is present in most Windows releases dating back to Windows Server 2008 and Windows 7.
What is the impact?
Tracked as CVE-2022-21972 with a CVSS “high” score of 8.1, this vulnerability is reportedly only exploitable in Windows Server versions, not Windows Desktop deployments, due to configuration differences (see “Affected Versions”). Successful exploitation requires non-trivial effort, but once achieved, an attacker may attain remote code execution (RPC) or local privilege escalation (LPE) on the target.
Are updates available?
Microsoft has provided patches for all affected Windows versions in the May 2022 Patch Tuesday update. Admins should update systems, but take note that some folks are experiencing issues with VPN (and other services, including RDP) after applying the June 2022 Patch Tuesday updates.
How do I find vulnerable Windows VPN instances with runZero?
From the Service Inventory, use the following pre-built query to locate assets running Microsoft VPN software within your network which may need remediation:
_asset.protocol:pptp and protocol:pptp and pptp.vendor:microsoft

As always, any prebuilt queries are available from our Queries Library. Check out the library for other useful inventory queries.
Get runZero for free
Don’t have runZero and need help finding vulnerable Windows VPN instances?
Start your trial today
Similar Content
June 3, 2023
Finding MOVEit File Transfer Services
Reports of active exploitation of a zero-day vulnerability in the MOVEit file transfer software are making the rounds this week. The vendor, Progress Software, has released an advisory and this issue has now been assigned CVE-2023-34362. Attackers are abusing a SQL injection …
Read MoreJune 2, 2023
Finding Barracuda Email Security Gateways
Exploitation of Barracuda Email Security Gateway (ESG) appliances has made the news recently, including on-going investigation into the attacks. Leveraging a zero-day vulnerability as far back as October 2022, attackers compromised ESG targets to deploy malware that created …
Read MoreMay 31, 2023
Finding Zyxel Network Devices
Last month, Zyxel disclosed a remote command execution vulnerability affecting a handful of their product families. This vulnerability has been assigned CVE-2023-28771, and with a CVSSv3 score of 9.8, this vulnerability is considered highly critical. Attackers who send a …
Read More