CVE-2022-29135
📋 TL;DR
This vulnerability allows an authenticated attacker to gain SYSTEM privileges on Windows systems using Cluster Shared Volume (CSV). It affects Windows Server systems configured with Failover Clustering and CSV enabled.
💻 Affected Systems
- Windows Server
📦 What is this software?
Windows Server by Microsoft
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with SYSTEM privileges, enabling lateral movement across the cluster, data theft, and persistent backdoor installation.
Likely Case
Privilege escalation from a standard user or service account to SYSTEM on affected cluster nodes, leading to credential harvesting and further exploitation.
If Mitigated
Limited impact due to network segmentation, strict access controls, and monitoring preventing successful exploitation.
🎯 Exploit Status
Requires authenticated access to a cluster node. Microsoft has not disclosed technical details, suggesting exploitation requires specific conditions.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: May 2022 security updates (KB5013952 for Server 2019, KB5013954 for Server 2022)
Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29135
Restart Required: Yes
Instructions:
1. Apply May 2022 Windows Server security updates via Windows Update or WSUS. 2. Restart affected servers. 3. Verify patch installation with 'wmic qfe list' showing KB5013952/KB5013954.
🔧 Temporary Workarounds
Disable CSV if not required
windowsRemove Cluster Shared Volumes from failover clusters if not essential for operations.
Remove-ClusterSharedVolume -Name "CSVName" -Cluster "ClusterName"
Restrict cluster access
allImplement strict access controls and network segmentation for cluster nodes.
🧯 If You Can't Patch
- Implement strict network segmentation isolating cluster nodes from general network traffic
- Enforce least privilege access controls and monitor for unusual authentication attempts to cluster systems
🔍 How to Verify
Check if Vulnerable:
Check if system is running vulnerable Windows Server version with Failover Clustering and CSV enabled: 'Get-Cluster | Get-ClusterSharedVolume' returns CSV objects.
Check Version:
systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
Verify Fix Applied:
Verify KB5013952 (Server 2019) or KB5013954 (Server 2022) is installed: 'Get-HotFix -Id KB5013952' or check in Installed Updates.
📡 Detection & Monitoring
Log Indicators:
- Windows Security event ID 4672 (special privileges assigned), 4688 (process creation) showing privilege escalation
- Cluster service logs showing unexpected CSV operations
Network Indicators:
- Unusual SMB traffic patterns to cluster nodes
- Authentication attempts to cluster management interfaces from unexpected sources
SIEM Query:
source="WinEventLog:Security" (event_id=4672 OR event_id=4688) AND process_name="*" AND user_name!="SYSTEM" | stats count by host, user_name, process_name