CVE-2022-29103
📋 TL;DR
This vulnerability allows an authenticated attacker to execute arbitrary code with SYSTEM privileges on Windows systems. It affects Windows Remote Access Connection Manager service, enabling local privilege escalation. Only users with valid credentials on the target system can exploit this vulnerability.
💻 Affected Systems
- Windows Remote Access Connection Manager
📦 What is this software?
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 11 by Microsoft
Windows 11 by Microsoft
Windows 7 by Microsoft
Windows 7 by Microsoft
Windows 8.1 by Microsoft
Windows 8.1 by Microsoft
Windows Rt 8.1 by Microsoft
Windows Server by Microsoft
⚠️ Risk & Real-World Impact
Worst Case
Attacker gains full SYSTEM-level control over the Windows system, enabling installation of malware, data theft, lateral movement, and complete system compromise.
Likely Case
Privileged attacker escalates from standard user to SYSTEM privileges to bypass security controls, install persistence mechanisms, or access protected resources.
If Mitigated
With proper patch management and least privilege principles, impact is limited to isolated systems with no critical data exposure.
🎯 Exploit Status
Requires authenticated access and local execution. No public exploit code available as of knowledge cutoff.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: May 2022 security updates (KB5013942 for Windows 10, KB5013943 for Windows 11, etc.)
Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29103
Restart Required: Yes
Instructions:
1. Apply May 2022 Windows security updates via Windows Update. 2. For enterprise: Deploy through WSUS or Microsoft Endpoint Configuration Manager. 3. Verify update installation with 'wmic qfe list' command.
🔧 Temporary Workarounds
Disable Remote Access Connection Manager Service
windowsDisables the vulnerable service if not required for business operations
sc config RasMan start= disabled
sc stop RasMan
Restrict Service Permissions
windowsApply least privilege to service accounts and restrict who can interact with the service
sc sdshow RasMan
sc sdset RasMan [modified SDDL string]
🧯 If You Can't Patch
- Implement network segmentation to isolate vulnerable systems
- Apply strict access controls and monitor for privilege escalation attempts
🔍 How to Verify
Check if Vulnerable:
Check if May 2022 security updates are installed: 'wmic qfe list | findstr KB501394'
Check Version:
systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
Verify Fix Applied:
Verify update installation and check service version: 'sc query RasMan' and 'wmic qfe list | findstr KB501394'
📡 Detection & Monitoring
Log Indicators:
- Event ID 4688 with RasMan.exe parent process
- Unexpected service control operations on RasMan service
- Privilege escalation attempts in security logs
Network Indicators:
- Unusual outbound connections from systems with RasMan service
- Lateral movement attempts from previously compromised systems
SIEM Query:
EventID=4688 AND (NewProcessName="*\system32\*" OR ParentProcessName="*\RasMan.exe") | stats count by Computer, ParentProcessName, NewProcessName