CVE-2022-29138

7.0 HIGH

📋 TL;DR

This vulnerability allows an authenticated attacker with local access to a Windows Server Failover Cluster to elevate privileges to SYSTEM level. It affects Windows Server systems using Clustered Shared Volumes (CSV) for shared storage in clustered environments.

💻 Affected Systems

Products:
  • Windows Server
Versions: Windows Server 2022, 2019, 2016, 2012 R2, 2012
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Failover Clustering and Clustered Shared Volumes (CSV) configured. Standalone Windows systems or clusters without CSV are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains SYSTEM privileges on a cluster node, potentially compromising the entire cluster, accessing sensitive data on CSV volumes, and moving laterally across the cluster.

🟠

Likely Case

Privilege escalation from a standard user or service account to SYSTEM on a cluster node, enabling further compromise of that node and potentially other cluster resources.

🟢

If Mitigated

Limited to authenticated users with local access to cluster nodes; proper network segmentation and access controls significantly reduce exposure.

🌐 Internet-Facing: LOW - Requires local authenticated access to cluster nodes, not directly exploitable over the internet.
🏢 Internal Only: MEDIUM - Affects internal Windows Server clusters; attackers with internal access to cluster nodes could exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access to a cluster node and knowledge of cluster configuration. No public exploit code has been disclosed as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: May 10, 2022 security updates (KB5013952 for Server 2022, KB5013951 for Server 2019, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29138

Restart Required: Yes

Instructions:

1. Apply the May 2022 Windows Server security updates via Windows Update or WSUS. 2. Restart affected cluster nodes (may require cluster-aware patching procedures). 3. Verify all nodes are updated.

🔧 Temporary Workarounds

Restrict cluster node access

windows

Limit local and remote access to Windows Server cluster nodes to only authorized administrators.

Implement network segmentation

all

Isolate cluster networks from general user networks to reduce attack surface.

🧯 If You Can't Patch

  • Implement strict access controls: Only allow trusted administrators to access cluster nodes locally or remotely.
  • Monitor cluster nodes for suspicious activity: Look for privilege escalation attempts or unusual CSV access patterns.

🔍 How to Verify

Check if Vulnerable:

Check if Windows Server is running a vulnerable version (pre-May 2022 updates) and has Failover Clustering with CSV enabled.

Check Version:

wmic os get caption, version, buildnumber, csdversion

Verify Fix Applied:

Verify that May 2022 security updates (e.g., KB5013952 for Server 2022) are installed and the system has been restarted.

📡 Detection & Monitoring

Log Indicators:

  • Windows Security event logs showing privilege escalation (Event ID 4672, 4688)
  • Cluster logs showing unexpected CSV operations or access

Network Indicators:

  • Unusual SMB or cluster communication patterns to CSV shares from non-admin accounts

SIEM Query:

EventID=4672 OR EventID=4688 | where ProcessName contains "csv" OR CommandLine contains "csv"

🔗 References

📤 Share & Export