Wrangling the May 2022 Patch Tuesday

(updated ), by runZero
icon

Microsoft recently released security updates for over 70 vulnerabilities, including 3 zero-days and 7 critical vulnerabilities that affect a wide-range of their products and services. The list of patches covers an actively exploited zero-day vulnerability in the Windows Local Security Authority (LSA), as well as vulnerabilities in Kerberos, NFS, and LDAP protocols.

What is the impact of these vulnerabilities? #

CVE-2022-26931 is a critical Kerberos vulnerability that provides an attacker with privilege elevation if successfully exploited.

CVE-2022-26937 is a critical NFS vulnerability included in the list of fixes. This vulnerability could allow an unauthenticated attacker to execute arbitrary code if successfully exploited over the network. Microsoft recommends disabling NFSV2 and NFSV3 as a means of exploit mitigation using the following PowerShell command. NFSv4.1, is not vulnerable:

powershell
PS C:\Set-NfsServerConfiguration -EnableNFSV2 $false -EnableNFSV3 $false

Although most of the LDAP vulnerabilities affect all versions of Windows, CVE-2022-29131 an authenticated attacker can exploit the vulnerability over the network on a domain controller running Windows Server 2019, Windows 10, Windows 11 (x64/arm64), or Windows Server 2022.

CVE-2022-22012 and CVE-2022-29130 are listed as important remote code execution (RCE) vulnerabilities that also affect domain controllers, specifically LDAP. Although, according to the CVSS score for both vulnerabilities, they are deemed critical. An unauthenticated attacker could send a specially crafted request to a vulnerable server that would allow the attacker to remotely execute code within the SYSTEM account context. According to Microsoft, this vulnerability can only be exploited if the MaxReceiveBuffer LDAP policy is set to a value higher than the default value (10,485,760); otherwise, the system is not vulnerable.

CVE-2022-29139 is also listed as important and it differs from the other LDAP vulnerabilities in that it flips the RCE on its head. If an LDAP client connects to a malicious LDAP server from a Windows host, the malicious server could allow an attacker to remotely execute code within the LDAP client.

How do I find potentially vulnerable Windows Kerberos assets with runZero? #

From the Service Inventory page, use the following query to locate Windows NFS assets within your network which may need remediation or mitigation:

_asset.protocol:kerberos and protocol:kerberos and kerberos.errorCode:68 and os:windows
Find Windows Kerberos assets

How do I find potentially vulnerable Windows NFS assets with runZero? #

From the Service Inventory page, use the following query to locate Windows NFS assets within your network which may need remediation or mitigation:

_asset.protocol:nfs and protocol:nfs and os:windows
Find Windows NFS assets

How do I find potentially vulnerable Windows domain controller instances with runZero? #

From the Service Inventory page, use the following query to locate Windows domain controller assets running LDAP within your network which may need remediation or mitigation:

_asset.protocol:ldap and protocol:ldap and (has:"ldap.isSynchronized" or has:"ldap.domainControllerFunctionality") and type:server and os:windows
Find Windows domain controllers

As always, any prebuilt queries we create are available from our Queries Library. Check out the library for other useful inventory queries.

Get runZero for free

Find all your Windows NFS, Kerberos, and domain controller assets.

Start your trial today
Learn more about runZero
runZero
Written by runZero

Similar Content

September 26, 2023

How to find TeamCity instances

How to find TeamCity assets? # On September 20th, JetBrains announced a critical authentication bypass vulnerability that impacts users running the TeamCity On-Premises product. The vulnerability is being tracked using CVE-2023-42793 and presents the weakness of CWE-288 …

Read More

September 12, 2023

How to find OpenSSL 1.1 instances

How to find OpenSSL 1.1 instances # On September 11th, the venerable OpenSSL 1.1.1 reached its end of life date. That means that it will no longer be receiving publicly-available security fixes. Users without a third-party extended support contract will no longer receive …

Read More

July 31, 2023

How to find Ivanti EPMM (MobileIron Core)

How to find Ivanti Endpoint Manager Mobile (EPMM) with runZero # On July 24th, Ivanti announced that their Endpoint Manager Mobile (EPMM, formerly MobileIron Core) product versions 11.10 and prior contain a critical authentication bypass vulnerability. Successfully …

Read More