CVE-2022-26807

7.0 HIGH

📋 TL;DR

CVE-2022-26807 is a Windows Work Folder Service elevation of privilege vulnerability that allows authenticated attackers to execute arbitrary code with SYSTEM privileges. This affects Windows systems with the Work Folder Service enabled, typically in enterprise environments. Attackers must have valid user credentials to exploit this vulnerability.

💻 Affected Systems

Products:
  • Windows Work Folder Service
Versions: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when Work Folder Service is enabled and running. This service is typically enabled in enterprise environments for file synchronization.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker gains SYSTEM privileges, enabling complete system compromise, data theft, lateral movement, and persistence establishment.

🟠

Likely Case

Privileged users or attackers with stolen credentials escalate to SYSTEM to bypass security controls, install malware, or access sensitive data.

🟢

If Mitigated

With proper patch management and least privilege principles, impact is limited to isolated systems with minimal lateral movement potential.

🌐 Internet-Facing: LOW - Requires authenticated access to the Work Folder Service, which is typically not exposed to the internet.
🏢 Internal Only: MEDIUM - Internal attackers with valid credentials can exploit this to escalate privileges on affected systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and specific conditions. No public exploit code was available at disclosure time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: April 2022 security updates (KB5012592 for Windows 10 21H2, KB5012591 for Windows 11, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26807

Restart Required: Yes

Instructions:

1. Apply April 2022 Windows security updates via Windows Update. 2. For enterprise environments, deploy updates through WSUS or SCCM. 3. Restart affected systems after patch installation.

🔧 Temporary Workarounds

Disable Work Folder Service

windows

Stop and disable the Windows Work Folder Service if not required for business operations.

sc stop WorkFoldersSvc
sc config WorkFoldersSvc start= disabled

🧯 If You Can't Patch

  • Implement network segmentation to isolate systems with Work Folder Service enabled
  • Enforce strict access controls and monitor for unusual authentication attempts to Work Folder Service

🔍 How to Verify

Check if Vulnerable:

Check if Work Folder Service is running and system has not applied April 2022 security updates.

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify April 2022 security updates are installed and Work Folder Service version is updated.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Work Folder Service process creation
  • Failed authentication attempts followed by successful Work Folder Service access

Network Indicators:

  • Unexpected connections to Work Folder Service ports
  • Anomalous authentication patterns

SIEM Query:

EventID=4688 AND ProcessName="WorkFoldersSvc.exe" AND ParentProcess NOT IN ("services.exe", "svchost.exe")

🔗 References

📤 Share & Export