CVE-2022-21895

7.8 HIGH

📋 TL;DR

This vulnerability allows an authenticated attacker to exploit the Windows User Profile Service to gain SYSTEM privileges on affected Windows systems. It affects Windows 10, 11, and Server versions where an attacker can execute code with low privileges and escalate to full system control. The vulnerability requires local access to the target system.

💻 Affected Systems

Products:
  • Windows 10
  • Windows 11
  • Windows Server 2016
  • Windows Server 2019
  • Windows Server 2022
Versions: Various versions prior to January 2022 security updates
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations; requires authenticated user access. Not all Windows versions may be affected - check Microsoft advisory for specific versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling installation of persistent malware, credential theft, lateral movement, and data exfiltration.

🟠

Likely Case

Local privilege escalation from a standard user or service account to SYSTEM, allowing attackers to bypass security controls and maintain persistence.

🟢

If Mitigated

Limited impact if proper endpoint protection, least privilege principles, and network segmentation are implemented to contain lateral movement.

🌐 Internet-Facing: LOW - Requires local authenticated access; not directly exploitable over the internet.
🏢 Internal Only: HIGH - Significant risk in internal environments where attackers gain initial foothold through phishing, compromised credentials, or other vectors.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires authenticated access; proof-of-concept code has been published. The vulnerability is relatively straightforward to exploit once initial access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: January 2022 security updates (KB5009543 for Windows 10 21H2, KB5009566 for Windows 11, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21895

Restart Required: Yes

Instructions:

1. Apply January 2022 Windows security updates via Windows Update. 2. For enterprise environments, deploy updates through WSUS, SCCM, or Intune. 3. Restart systems after update installation.

🔧 Temporary Workarounds

Restrict User Profile Service Access

windows

Limit access to User Profile Service through Group Policy to reduce attack surface

Configure via Group Policy: Computer Configuration > Windows Settings > Security Settings > System Services > User Profile Service > Define this policy setting: Disabled

🧯 If You Can't Patch

  • Implement strict least privilege principles - ensure users operate with minimal necessary permissions
  • Deploy endpoint detection and response (EDR) solutions to detect privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check Windows version and compare with patched versions in Microsoft advisory. Systems without January 2022 security updates are likely vulnerable.

Check Version:

wmic os get caption, version, buildnumber, csdversion

Verify Fix Applied:

Verify Windows Update history shows January 2022 security updates installed, or check system version matches patched versions in Microsoft advisory.

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4688 with process creation from unusual parent processes
  • Security log events showing privilege escalation attempts
  • User Profile Service abnormal behavior in Application logs

Network Indicators:

  • Unusual lateral movement following local privilege escalation
  • Increased authentication attempts from compromised systems

SIEM Query:

EventID=4688 AND (ProcessName="*\userprofile*" OR ParentProcessName="*\userprofile*") AND NewProcessName="*\cmd.exe" OR NewProcessName="*\powershell.exe")

🔗 References

📤 Share & Export