⚠ Actively exploited in ransomware campaigns
This vulnerability is on the CISA Known Exploited Vulnerabilities list and has been used in known ransomware attacks. CISA required action: Apply updates per vendor instructions.. Due date: 2022-12-09.

CVE-2022-41073

CWE-787Out-of-bounds Write10 documents9 sources
Severity
7.8HIGH
EPSS
1.9%
top 16.81%
CISA KEV
KEVRansomware
Added 2022-11-08
Due 2022-12-09
Exploit
Exploited in wild
Active exploitation observed
Timeline
KEV addedNov 8
PublishedNov 9
KEV dueDec 9
Latest updateMar 14
CISA Required Action: Apply updates per vendor instructions.

Description

Windows Print Spooler Elevation of Privilege Vulnerability

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages35 packages

NVDmicrosoft/windows< 10.0.14393.5501+3
CVEListV5microsoft/windows_76.1.06.1.7601.26221
CVEListV5microsoft/windows_8.16.3.06.3.9600.20671
NVDmicrosoft/windows_10_1507< 10.0.10240.19567
NVDmicrosoft/windows_10_1607< 10.0.14393.5501

Patches

🔴Vulnerability Details

4
GHSA
GHSA-6xmp-59j9-c5x2: Windows Print Spooler Elevation of Privilege Vulnerability2022-11-10
CVEList
Windows Print Spooler Elevation of Privilege Vulnerability2022-11-09
VulnCheck
Microsoft Windows Print Spooler Privilege Escalation Vulnerability2022
Project0
Project Zero RCA: CVE-2022-41073: Windows Activation Contexts EoP

📋Vendor Advisories

2
CISA
Microsoft Windows Print Spooler Privilege Escalation Vulnerability2022-11-08
Microsoft
Windows Print Spooler Elevation of Privilege Vulnerability2022-11-08

🕵️Threat Intelligence

2
Securelist
A patched Windows attack surface is still exploitable2024-03-14
Securelist
A patched Windows attack surface is still exploitable2024-03-14
CVE-2022-41073 (HIGH CVSS 7.8) | Windows Print Spooler Elevation of | cvebase.io