CVE-2022-21990

8.8 HIGH

📋 TL;DR

CVE-2022-21990 is a remote code execution vulnerability in Windows Remote Desktop Client that allows an attacker to execute arbitrary code on a victim's system by tricking them into connecting to a malicious RDP server. This affects users of Windows Remote Desktop Client who connect to untrusted RDP servers. The vulnerability requires user interaction but can lead to full system compromise.

💻 Affected Systems

Products:
  • Windows Remote Desktop Client
Versions: Windows 10, Windows 11, Windows Server 2019, Windows Server 2022
Operating Systems: Windows 10, Windows 11, Windows Server 2019, Windows Server 2022
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Remote Desktop Client application when connecting to RDP servers. Server-side Remote Desktop Services are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with administrative privileges, data theft, ransomware deployment, and lateral movement across the network.

🟠

Likely Case

Malware installation, credential theft, and persistent backdoor access to the compromised system.

🟢

If Mitigated

Limited impact due to network segmentation, application whitelisting, and proper user training about connecting only to trusted RDP servers.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to connect to a malicious RDP server. No public proof-of-concept has been released as of knowledge cutoff.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: January 2022 security updates (KB5009543 for Windows 10 21H2, KB5009566 for Windows 11, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21990

Restart Required: Yes

Instructions:

1. Apply the January 2022 Windows security updates via Windows Update. 2. For enterprise environments, deploy updates through WSUS or Microsoft Endpoint Configuration Manager. 3. Restart systems after patch installation.

🔧 Temporary Workarounds

Restrict RDP connections to trusted servers

windows

Configure Group Policy to only allow connections to approved RDP servers and block connections to unknown servers.

Disable RDP client network level authentication bypass

windows

Configure RDP client to always require Network Level Authentication (NLA) for all connections.

🧯 If You Can't Patch

  • Implement network segmentation to isolate systems using RDP client from untrusted networks.
  • Deploy application control policies to restrict execution of unauthorized code on vulnerable systems.

🔍 How to Verify

Check if Vulnerable:

Check Windows version and patch level. Systems without January 2022 security updates are vulnerable.

Check Version:

wmic qfe list | findstr KB5009543 KB5009566

Verify Fix Applied:

Verify that January 2022 security updates (KB5009543, KB5009566, or equivalent) are installed.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing RDP connection failures to suspicious IPs
  • Security logs with unexpected process creation after RDP connections

Network Indicators:

  • RDP connections to unknown external IP addresses
  • Unusual outbound traffic from RDP client systems

SIEM Query:

source="Windows Security" EventID=4625 OR EventID=4688 | where RDP_Protocol="RDP" AND DestinationIP NOT IN (trusted_servers)

🔗 References

📤 Share & Export