CVE-2022-26827

7.0 HIGH

📋 TL;DR

This vulnerability allows an authenticated attacker to elevate privileges on Windows systems by exploiting a race condition in the File Server Resource Management Service. It affects Windows Server systems with the File Server Resource Manager role installed. Attackers could gain SYSTEM-level privileges on vulnerable servers.

💻 Affected Systems

Products:
  • Windows Server
Versions: Windows Server 2019, Windows Server 2022
Operating Systems: Windows Server 2019, Windows Server 2022
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when File Server Resource Manager (FSRM) role is installed and enabled. Not applicable to client Windows versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling installation of malware, data theft, lateral movement, and persistence mechanisms.

🟠

Likely Case

Privilege escalation from a standard user account to SYSTEM, allowing attackers to bypass security controls and access sensitive data.

🟢

If Mitigated

Limited impact due to proper patch management, network segmentation, and least privilege principles restricting initial access.

🌐 Internet-Facing: LOW - This service typically runs on internal file servers, not directly internet-facing systems.
🏢 Internal Only: HIGH - Critical for internal Windows Server environments with File Server Resource Manager role.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and race condition exploitation. Proof-of-concept code has been published.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: April 2022 security updates (KB5012647 for Server 2019, KB5012596 for Server 2022)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26827

Restart Required: Yes

Instructions:

1. Apply April 2022 Windows Server security updates via Windows Update. 2. Alternatively, download and install KB5012647 (Server 2019) or KB5012596 (Server 2022) from Microsoft Update Catalog. 3. Restart the server after installation.

🔧 Temporary Workarounds

Disable FSRM Service

windows

Temporarily disable the File Server Resource Management Service if not required

sc stop FsRM
sc config FsRM start= disabled

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate file servers from other critical systems
  • Apply least privilege principles and monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check if FSRM service is installed and running on Windows Server 2019/2022 without April 2022 patches

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify KB5012647 (Server 2019) or KB5012596 (Server 2022) is installed via 'wmic qfe list' or 'Get-Hotfix'

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4688 with FSRM process creation anomalies
  • Unexpected privilege escalation events in security logs

Network Indicators:

  • Unusual authentication patterns to file servers
  • Anomalous process execution on FSRM servers

SIEM Query:

EventID=4688 AND (ProcessName="*fsrm*" OR CommandLine="*fsrm*") | stats count by host

🔗 References

📤 Share & Export