CVE-2022-22047

7.8 HIGH

📋 TL;DR

This vulnerability allows an attacker to gain SYSTEM-level privileges on Windows systems by exploiting a flaw in the Client Server Runtime Subsystem (CSRSS). It affects Windows 10, 11, and Server 2019/2022 systems. Successful exploitation requires an attacker to already have local access to the system.

💻 Affected Systems

Products:
  • Windows 10
  • Windows 11
  • Windows Server 2019
  • Windows Server 2022
Versions: Windows 10 versions 20H2, 21H1, 21H2; Windows 11; Windows Server 2019; Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Systems must have CSRSS running (default on all Windows systems). No special configurations required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling installation of malware, data theft, and persistence mechanisms.

🟠

Likely Case

Local privilege escalation from a standard user account to SYSTEM, allowing attackers to bypass security controls and access sensitive data.

🟢

If Mitigated

Limited impact if proper patch management and least privilege principles are enforced, though local attackers could still escalate privileges.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring initial access to the system.
🏢 Internal Only: HIGH - Once an attacker gains initial access (via phishing, malware, etc.), they can exploit this to gain full system control.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit code is publicly available and has been observed in the wild. Requires local access to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2022 security updates (KB5015807, KB5015814, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22047

Restart Required: Yes

Instructions:

1. Apply July 2022 Windows security updates via Windows Update. 2. For enterprise environments, deploy patches through WSUS or SCCM. 3. Restart systems after patch installation.

🔧 Temporary Workarounds

Restrict local user privileges

windows

Implement least privilege principles to limit what standard users can do on systems.

Enable Windows Defender Exploit Guard

windows

Configure Exploit Guard to detect and block privilege escalation attempts.

🧯 If You Can't Patch

  • Implement strict access controls and monitor for suspicious privilege escalation attempts.
  • Segment networks to limit lateral movement and contain potential breaches.

🔍 How to Verify

Check if Vulnerable:

Check if July 2022 security updates are installed via 'wmic qfe list' or 'systeminfo' command.

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify KB5015807 (Windows 10) or KB5015814 (Windows 11) is installed and system has been restarted.

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4688 with suspicious parent processes spawning SYSTEM-level processes
  • Unexpected privilege escalation events in Security logs

Network Indicators:

  • Unusual outbound connections from systems after local exploitation

SIEM Query:

EventID=4688 AND NewProcessName="*" AND SubjectUserName!="SYSTEM" AND TokenElevationType="%%1936"

🔗 References

📤 Share & Export