Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2022-21907Microsoft Windows 10 Version 1809 vulnerability

11 documents10 sources
Severity
9.8CRITICALNVD
EPSS
91.9%
top 0.31%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJan 11
Latest updateJul 7

Description

HTTP Protocol Stack Remote Code Execution Vulnerability

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages10 packages

CVEListV5microsoft/windows_server_201910.0.17763.010.0.17763.2452
CVEListV5microsoft/windows_server_202210.0.20348.010.0.20348.469
CVEListV5microsoft/windows_10_version_180910.0.17763.010.0.17763.2452+1
CVEListV5microsoft/windows_10_version_20h210.0.010.0.19042.1466
CVEListV5microsoft/windows_10_version_21h110.0.010.0.19043.1466

🔴Vulnerability Details

3
GHSA
GHSA-cgqq-62rg-6vmf: HTTP Protocol Stack Remote Code Execution Vulnerability2022-01-12
CVEList
HTTP Protocol Stack Remote Code Execution Vulnerability2022-01-11
VulnCheck
HTTP Protocol Stack Remote Code Execution Vulnerability2022

💥Exploits & PoCs

1
Exploit-DB
Windows 10 v21H1 - HTTP Protocol Stack Remote Code Execution2023-07-07

🔍Detection Rules

1
Suricata
ET EXPLOIT Windows HTTP Protocol Stack UAF/RCE (CVE-2021-31166), http.sys DOS (CVE-2022-21907) Inbound2021-05-17

📋Vendor Advisories

1
Microsoft
HTTP Protocol Stack Remote Code Execution Vulnerability2022-01-11

🕵️Threat Intelligence

2
Fortinet
Analysis of Microsoft CVE-2022-21907 | FortiGuard Labs2022-02-15
Krebs
‘Wormable’ Flaw Leads January 2022 Patch Tuesday2022-01-11
CVE-2022-21907 — Microsoft vulnerability | cvebase