⚠ Actively exploited
Added to CISA KEV on 2024-04-23. Federal agencies required to patch by 2024-05-14. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. .

CVE-2022-38028

10 documents10 sources
Severity
7.8HIGH
EPSS
5.0%
top 10.34%
CISA KEV
KEV
Added 2024-04-23
Due 2024-05-14
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedOct 11
KEV addedApr 23
KEV dueMay 14
CISA Required Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Description

Windows Print Spooler Elevation of Privilege Vulnerability

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages28 packages

NVDmicrosoft/windows< 10.0.14393.5427+3
CVEListV5microsoft/windows_8.16.3.06.3.9600.20625
NVDmicrosoft/windows_8.1< 6.3.9600.20625
NVDmicrosoft/windows_rt_8.1< 6.3.9600.20625
NVDmicrosoft/windows_10_1507< 10.0.10240.19507

Patches

🔴Vulnerability Details

3
GHSA
GHSA-5vrq-5cmx-xwfc: Windows Print Spooler Elevation of Privilege Vulnerability2022-10-12
CVEList
Windows Print Spooler Elevation of Privilege Vulnerability2022-10-11
VulnCheck
Microsoft Windows Print Spooler Privilege Escalation Vulnerability2022

🔍Detection Rules

2
YARA
Windows_Exploit_CVE_2022_38028_31fdb122
Elastic
Potential privilege escalation via CVE-2022-38028

📋Vendor Advisories

2
CISA
Microsoft Windows Print Spooler Privilege Escalation Vulnerability2024-04-23
Microsoft
Windows Print Spooler Elevation of Privilege Vulnerability2022-10-11

📐Framework References

1
ATT&CK
APT28 Nearest Neighbor Campaign
CVE-2022-38028 (HIGH CVSS 7.8) | Windows Print Spooler Elevation of | cvebase.io