Finding Microsoft VPN/PPTP with runZero

(updated ), by Pearce Barry
icon

Last month, researcher Alex Nichols at Nettitude reported a vulnerability in Microsoft’s Windows VPN software that could allow for remote code execution or local privilege escalation by an attacker. This vulnerability lies in a use-after-free condition that can occur in the Point-to-Point Tunneling Protocol (PPTP) logic of Microsoft’s VPN software. It has existed for over 10 years and is present in most Windows releases dating back to Windows Server 2008 and Windows 7.

What is the impact?

Tracked as CVE-2022-21972 with a CVSS “high” score of 8.1, this vulnerability is reportedly only exploitable in Windows Server versions, not Windows Desktop deployments, due to configuration differences (see “Affected Versions”). Successful exploitation requires non-trivial effort, but once achieved, an attacker may attain remote code execution (RPC) or local privilege escalation (LPE) on the target.

Are updates available?

Microsoft has provided patches for all affected Windows versions in the May 2022 Patch Tuesday update. Admins should update systems, but take note that some folks are experiencing issues with VPN (and other services, including RDP) after applying the June 2022 Patch Tuesday updates.

How do I find vulnerable Windows VPN instances with runZero?

From the Service Inventory, use the following pre-built query to locate assets running Microsoft VPN software within your network which may need remediation:

_asset.protocol:pptp and protocol:pptp and pptp.vendor:microsoft
Microsoft VPN prebuilt query is available in the Queries Library

As always, any prebuilt queries are available from our Queries Library. Check out the library for other useful inventory queries.

Get runZero for free

Don’t have runZero and need help finding vulnerable Windows VPN instances?

Start your trial today
Learn more about runZero

Similar Content

August 4, 2022

Finding DrayTek Vigor routers

The Trellix Threat Labs Vulnerability Research team recently published vulnerability details affecting almost 30 models of DrayTek Vigor routers. This vulnerability resides in the management interface login page and is trivial to exploit via buffer overflow. An …

Read More

July 29, 2022

Hunting for X.509 Certificates

X.509 certificates are used to secure communications over both trusted and untrusted networks. Protocols such as Transport Layer Security (TLS) rely on X.509 certificates to keep their communications secure between endpoints. Each X.509 certificate is composed of a public …

Read More

June 3, 2022

Finding Confluence servers (again) with runZero

An actively exploited zero-day has surfaced in popular wiki software Confluence. Deemed “critical” in severity, this vulnerability affects all supported versions of Confluence Server and Confluence Data Center, and also older, unsupported versions (i.e. everything after …

Read More