⚠ Actively exploited
Added to CISA KEV on 2022-07-12. Federal agencies required to patch by 2022-08-02. Required action: Apply updates per vendor instructions..

CVE-2022-22047

Severity
7.8HIGH
EPSS
1.5%
top 19.17%
CISA KEV
KEV
Added 2022-07-12
Due 2022-08-02
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedJul 12
KEV addedJul 12
KEV dueAug 2
Latest updateMar 14
CISA Required Action: Apply updates per vendor instructions.

Description

Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages32 packages

CVEListV5microsoft/windows_server_20126.2.9200.06.2.9200.23771
CVEListV5microsoft/windows_server_201610.0.14393.010.0.14393.5246
CVEListV5microsoft/windows_server_201910.0.17763.010.0.17763.3165
CVEListV5microsoft/windows_server_202210.0.20348.010.0.20348.825
CVEListV5microsoft/windows_server_2012_r26.3.9600.06.3.9600.20478

Patches

🔴Vulnerability Details

4
GHSA
GHSA-p4j8-4hv2-8733: Windows CSRSS Elevation of Privilege Vulnerability2022-07-13
CVEList
Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability2022-07-12
VulnCheck
Microsoft Windows Client Server Runtime Subsystem (CSRSS) Privilege Escalation Vulnerability2022
Project0
Project Zero RCA: CVE-2022-41073: Windows Activation Contexts EoP

📋Vendor Advisories

2
Microsoft
Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability2022-07-12
CISA
Microsoft Windows Client Server Runtime Subsystem (CSRSS) Privilege Escalation Vulnerability2022-07-12

🕵️Threat Intelligence

3
Securelist
A patched Windows attack surface is still exploitable2024-03-14
Securelist
A patched Windows attack surface is still exploitable2024-03-14
Threat Intel
Denim Tsunami
CVE-2022-22047 (HIGH CVSS 7.8) | Windows Client Server Run-time Subs | cvebase.io