CVE-2022-29115

7.8 HIGH

📋 TL;DR

CVE-2022-29115 is a remote code execution vulnerability in the Windows Fax Service that allows authenticated attackers to execute arbitrary code with SYSTEM privileges on affected systems. This affects Windows servers and workstations running vulnerable versions of Windows. Attackers can exploit this to gain complete control over the target system.

💻 Affected Systems

Products:
  • Windows Fax Service
Versions: Windows Server 2022, Windows 11, Windows Server 2019, Windows 10 Version 21H2, Windows 10 Version 21H1, Windows 10 Version 20H2, Windows Server 2016, Windows 10 Version 1607, Windows Server 2012 R2, Windows Server 2012, Windows 8.1, Windows Server 2008 R2 SP1, Windows Server 2008 SP2, Windows 7 SP1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Systems with Windows Fax Service enabled are vulnerable. The service may not be running by default on all systems but could be enabled in certain configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with SYSTEM privileges, enabling attackers to install malware, steal data, pivot to other systems, or disrupt operations.

🟠

Likely Case

Privilege escalation leading to lateral movement within the network, data exfiltration, or ransomware deployment.

🟢

If Mitigated

Limited impact due to network segmentation, restricted service access, and proper authentication controls preventing exploitation.

🌐 Internet-Facing: MEDIUM - While the service typically isn't internet-facing, misconfigurations or VPN-connected systems could expose it.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts can exploit this to gain SYSTEM privileges and move laterally.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authentication to exploit. Microsoft has rated this as 'Exploitation More Likely' in their advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: May 2022 security updates

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29115

Restart Required: Yes

Instructions:

1. Apply May 2022 Windows security updates via Windows Update. 2. For enterprise environments, deploy updates through WSUS or SCCM. 3. Restart affected systems after patching.

🔧 Temporary Workarounds

Disable Windows Fax Service

windows

Disables the vulnerable service to prevent exploitation

sc stop Fax
sc config Fax start= disabled

Block network access to Fax Service

windows

Blocks TCP port 2000 (fax service port) at firewall

netsh advfirewall firewall add rule name="Block Fax Service" dir=in action=block protocol=TCP localport=2000

🧯 If You Can't Patch

  • Disable Windows Fax Service on all affected systems
  • Implement network segmentation to restrict access to fax service ports (TCP 2000)

🔍 How to Verify

Check if Vulnerable:

Check if Windows Fax Service is enabled and running: sc query Fax

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify May 2022 security updates are installed: wmic qfe list | findstr "KB5013942"

📡 Detection & Monitoring

Log Indicators:

  • Event ID 7036 for Fax service start/stop
  • Unexpected process creation from Fax service
  • Authentication attempts to Fax service

Network Indicators:

  • Unusual traffic on TCP port 2000
  • Network connections to Fax service from unexpected sources

SIEM Query:

source="windows" event_id=7036 service_name="Fax" OR destination_port=2000

🔗 References

📤 Share & Export