Wrangling the May 2022 Patch Tuesday

(updated ), by runZero
icon

Microsoft recently released security updates for over 70 vulnerabilities, including 3 zero-days and 7 critical vulnerabilities that affect a wide-range of their products and services. The list of patches covers an actively exploited zero-day vulnerability in the Windows Local Security Authority (LSA), as well as vulnerabilities in Kerberos, NFS, and LDAP protocols.

What is the impact of these vulnerabilities?

CVE-2022-26931 is a critical Kerberos vulnerability that provides an attacker with privilege elevation if successfully exploited.

CVE-2022-26937 is a critical NFS vulnerability included in the list of fixes. This vulnerability could allow an unauthenticated attacker to execute arbitrary code if successfully exploited over the network. Microsoft recommends disabling NFSV2 and NFSV3 as a means of exploit mitigation using the following PowerShell command. NFSv4.1, is not vulnerable:

powershell
PS C:\Set-NfsServerConfiguration -EnableNFSV2 $false -EnableNFSV3 $false

Although most of the LDAP vulnerabilities affect all versions of Windows, CVE-2022-29131 an authenticated attacker can exploit the vulnerability over the network on a domain controller running Windows Server 2019, Windows 10, Windows 11 (x64/arm64), or Windows Server 2022.

CVE-2022-22012 and CVE-2022-29130 are listed as important remote code execution (RCE) vulnerabilities that also affect domain controllers, specifically LDAP. Although, according to the CVSS score for both vulnerabilities, they are deemed critical. An unauthenticated attacker could send a specially crafted request to a vulnerable server that would allow the attacker to remotely execute code within the SYSTEM account context. According to Microsoft, this vulnerability can only be exploited if the MaxReceiveBuffer LDAP policy is set to a value higher than the default value (10,485,760); otherwise, the system is not vulnerable.

CVE-2022-29139 is also listed as important and it differs from the other LDAP vulnerabilities in that it flips the RCE on its head. If an LDAP client connects to a malicious LDAP server from a Windows host, the malicious server could allow an attacker to remotely execute code within the LDAP client.

How do I find potentially vulnerable Windows Kerberos assets with runZero?

From the Service Inventory page, use the following query to locate Windows NFS assets within your network which may need remediation or mitigation:

_asset.protocol:kerberos and protocol:kerberos and kerberos.errorCode:68 and os:windows
Find Windows Kerberos assets

How do I find potentially vulnerable Windows NFS assets with runZero?

From the Service Inventory page, use the following query to locate Windows NFS assets within your network which may need remediation or mitigation:

_asset.protocol:nfs and protocol:nfs and os:windows
Find Windows NFS assets

How do I find potentially vulnerable Windows domain controller instances with runZero?

From the Service Inventory page, use the following query to locate Windows domain controller assets running LDAP within your network which may need remediation or mitigation:

_asset.protocol:ldap and protocol:ldap and (has:"ldap.isSynchronized" or has:"ldap.domainControllerFunctionality") and type:server and os:windows
Find Windows domain controllers

As always, any prebuilt queries we create are available from our Queries Library. Check out the library for other useful inventory queries.

Get runZero for free

Find all your Windows NFS, Kerberos, and domain controller assets.

Start your trial today
Learn more about runZero

Similar Content

February 15, 2023

Finding OpenSSH servers

The OpenSSH team surfaced a security issue earlier this month that specifically affects OpenSSH server version 9.1p1 (a.k.a. version 9.1). This version contains a memory double-free vulnerability (tracked as CVE-2023-25136) that can be reached pre-authentication by a remote …

Read More

February 8, 2023

Finding VMware ESXi assets

This Rapid Response post covers ESXiArgs, a new strain of ransomware that is targeting VMware ESXi servers. Learn how you can find potentially affected servers on your network.

February 3, 2023

Finding Lexmark printer assets

Printer manufacturer Lexmark recently published details on a vulnerability that affects over 100 of their printer models. Learn how runZero can help you find potentially affected assets.