CVE-2022-29141

8.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Windows systems running LDAP services. Attackers can exploit this without authentication by sending specially crafted requests to vulnerable LDAP servers. All Windows systems with LDAP enabled are potentially affected.

💻 Affected Systems

Products:
  • Windows Server
  • Windows Client
Versions: Windows Server 2022, 2019, 2016, 2012 R2, 2012, 2008 R2, 2008; Windows 11, 10, 8.1, 7
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Systems with LDAP services enabled are vulnerable. Domain controllers are particularly at risk.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise leading to domain takeover, data exfiltration, ransomware deployment, and lateral movement across the network.

🟠

Likely Case

Unauthenticated remote code execution allowing attackers to install malware, create backdoors, and gain persistent access to the system.

🟢

If Mitigated

Limited impact if proper network segmentation, firewalls, and endpoint protection are in place, though the vulnerability remains dangerous.

🌐 Internet-Facing: HIGH - LDAP servers exposed to the internet can be directly attacked without authentication.
🏢 Internal Only: HIGH - Even internally, attackers who gain network access can exploit this vulnerability to move laterally.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Microsoft has confirmed this vulnerability is being exploited in the wild. The CVSS score of 8.8 indicates high severity with network-based, unauthenticated attack vector.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: May 2022 security updates or later

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29141

Restart Required: Yes

Instructions:

1. Apply May 2022 Windows security updates. 2. For domain controllers, install updates during maintenance windows. 3. Restart affected systems after patching. 4. Verify patch installation via Windows Update history.

🔧 Temporary Workarounds

Block LDAP ports at network perimeter

windows

Prevent external access to LDAP services (TCP ports 389 and 636)

netsh advfirewall firewall add rule name="Block LDAP" dir=in action=block protocol=TCP localport=389,636

Enable LDAP channel binding and signing

windows

Configure LDAP to require signing and channel binding

Set-ADDCCloningExcludedApplicationList -Add "Microsoft.ActiveDirectory.WebServices"
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\NTDS\Parameters" -Name "LDAPServerIntegrity" -Value 2

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate LDAP servers
  • Deploy intrusion detection/prevention systems to monitor for LDAP exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check if system has May 2022 security updates installed. Vulnerable if missing KB5013952 (Server 2022), KB5013951 (Server 2019), or equivalent for other versions.

Check Version:

wmic qfe list | findstr KB5013952 (adjust KB number for your version)

Verify Fix Applied:

Verify Windows Update shows May 2022 security updates installed and system has been restarted.

📡 Detection & Monitoring

Log Indicators:

  • Unusual LDAP connection attempts from unexpected sources
  • Failed LDAP authentication events followed by successful exploitation
  • Windows Security Event ID 4625 (failed logon) from LDAP service

Network Indicators:

  • Unusual LDAP traffic patterns
  • LDAP requests with malformed packets
  • Connection attempts to LDAP ports from unauthorized IPs

SIEM Query:

source="windows" event_id=4625 OR event_id=4624 service_name="LDAP" | stats count by src_ip dest_ip

🔗 References

📤 Share & Export