CVE-2022-21907

9.8 CRITICAL

📋 TL;DR

CVE-2022-21907 is a critical remote code execution vulnerability in the Windows HTTP Protocol Stack (http.sys) that allows unauthenticated attackers to execute arbitrary code with SYSTEM privileges by sending specially crafted packets. This affects Windows servers and workstations running the HTTP Protocol Stack. The vulnerability is wormable and can be exploited without user interaction.

💻 Affected Systems

Products:
  • Windows Server 2022
  • Windows Server 2019
  • Windows Server 2016
  • Windows 11
  • Windows 10
Versions: Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows 11, Windows 10 version 20H2 and later
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with the HTTP Protocol Stack (http.sys) enabled, which is default on Windows Server with IIS or other web services, and some Windows client versions with specific features.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise leading to ransomware deployment, data exfiltration, or creation of a persistent backdoor with SYSTEM privileges across the network.

🟠

Likely Case

Denial of service (system crash/BSOD) or remote code execution leading to malware installation, credential theft, and lateral movement.

🟢

If Mitigated

Limited impact if systems are patched, firewalled, or running non-vulnerable configurations; potential DoS still possible.

🌐 Internet-Facing: HIGH - Directly exploitable via HTTP/HTTPS traffic without authentication.
🏢 Internal Only: HIGH - Exploitable via internal network traffic; can spread laterally once compromised.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available; attacks have been observed in the wild. The vulnerability is in the HTTP/2 protocol handling within http.sys.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: January 2022 security updates (e.g., KB5009557 for Windows 10 20H2)

Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21907

Restart Required: Yes

Instructions:

1. Apply the January 2022 Windows security updates from Microsoft Update. 2. Restart the system to complete the installation. 3. Verify the patch is applied using Windows Update history or system information.

🔧 Temporary Workarounds

Disable HTTP/2 protocol

windows

Disables HTTP/2 in the HTTP Protocol Stack to mitigate the vulnerability, but may affect performance for HTTP/2 traffic.

netsh http add iplisten ipaddress=::
netsh http delete iplisten ipaddress=::

Block HTTP/2 traffic at network perimeter

all

Use firewalls or network devices to block or inspect HTTP/2 traffic to vulnerable systems.

🧯 If You Can't Patch

  • Isolate affected systems from untrusted networks using firewalls or network segmentation.
  • Monitor for exploitation attempts via network traffic analysis and system logs.

🔍 How to Verify

Check if Vulnerable:

Check if the system is running an affected Windows version and has HTTP Protocol Stack enabled (e.g., via 'netsh http show servicestate').

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify the January 2022 security update is installed using 'systeminfo' or Windows Update history, and check that http.sys version is patched.

📡 Detection & Monitoring

Log Indicators:

  • Event ID 1 from http.sys with crash details in Windows Event Logs
  • Unexpected system reboots or BSOD events

Network Indicators:

  • Malformed HTTP/2 packets targeting vulnerable systems
  • Increased HTTP traffic to internal systems

SIEM Query:

source="windows" event_id=1 process_name="http.sys" OR source="firewall" dest_port=80,443 protocol="HTTP/2"

🔗 References

📤 Share & Export