Finding Microsoft VPN/PPTP with runZero

(updated ), by Pearce Barry
icon

Last month, researcher Alex Nichols at Nettitude reported a vulnerability in Microsoft’s Windows VPN software that could allow for remote code execution or local privilege escalation by an attacker. This vulnerability lies in a use-after-free condition that can occur in the Point-to-Point Tunneling Protocol (PPTP) logic of Microsoft’s VPN software. It has existed for over 10 years and is present in most Windows releases dating back to Windows Server 2008 and Windows 7.

What is the impact?

Tracked as CVE-2022-21972 with a CVSS “high” score of 8.1, this vulnerability is reportedly only exploitable in Windows Server versions, not Windows Desktop deployments, due to configuration differences (see “Affected Versions”). Successful exploitation requires non-trivial effort, but once achieved, an attacker may attain remote code execution (RPC) or local privilege escalation (LPE) on the target.

Are updates available?

Microsoft has provided patches for all affected Windows versions in the May 2022 Patch Tuesday update. Admins should update systems, but take note that some folks are experiencing issues with VPN (and other services, including RDP) after applying the June 2022 Patch Tuesday updates.

How do I find vulnerable Windows VPN instances with runZero?

From the Service Inventory, use the following pre-built query to locate assets running Microsoft VPN software within your network which may need remediation:

_asset.protocol:pptp and protocol:pptp and pptp.vendor:microsoft
Microsoft VPN prebuilt query is available in the Queries Library

As always, any prebuilt queries are available from our Queries Library. Check out the library for other useful inventory queries.

Get runZero for free

Don’t have runZero and need help finding vulnerable Windows VPN instances?

Start your trial today
Learn more about runZero

Similar Content

February 3, 2023

Finding Lexmark printer assets

Printer manufacturer Lexmark recently published details on a vulnerability that affects over 100 of their printer models. Learn how runZero can help you find potentially affected assets.

December 9, 2022

Finding Cisco 7800 and 8800 series IP phone assets on your network

Cisco 7800 and 8800 IP phones can be found in many companies and organizations. Successful exploitation of this vulnerability can provide an unauthenticated attacker in the same network segment or VLAN with remote code execution or denial-of-service capabilities.

December 5, 2022

Finding MegaRAC BMC assets on your network

MegaRAC can be found in many server manufacturers’ Baseboard Management Controllers (BMCs), including AMD, Ampere Computing, ASRock, Asus, ARM, Dell EMC, Gigabyte, HPE, Huawei, Inspur, Lenovo, Nvidia, Qualcomm, Quanta, and Tyan. Successful exploitation of these …