CVE-2022-30141

8.1 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Windows systems running LDAP services. Attackers can exploit this without authentication by sending specially crafted requests to vulnerable LDAP servers. All Windows systems with LDAP enabled are potentially affected.

💻 Affected Systems

Products:
  • Windows Server
  • Windows Client
Versions: Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows 11, Windows 10
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Systems with LDAP role enabled or applications using Windows LDAP services are vulnerable. Domain controllers are particularly at risk.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise leading to domain takeover, data exfiltration, ransomware deployment, and persistent backdoor installation across the network.

🟠

Likely Case

Unauthenticated remote code execution allowing attackers to gain initial foothold, move laterally within the network, and escalate privileges to domain administrator.

🟢

If Mitigated

Limited impact with proper network segmentation, LDAP hardening, and endpoint protection blocking exploitation attempts.

🌐 Internet-Facing: HIGH - LDAP servers exposed to the internet can be directly exploited without authentication.
🏢 Internal Only: HIGH - Internal LDAP servers remain vulnerable to attackers who gain initial network access through other means.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Microsoft has confirmed exploitation is more likely. The vulnerability requires sending specially crafted LDAP requests but does not require authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: June 2022 security updates (KB5014665, KB5014692, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30141

Restart Required: Yes

Instructions:

1. Apply June 2022 Windows security updates from Microsoft Update. 2. Restart affected systems. 3. Verify patch installation via Windows Update history or systeminfo command.

🔧 Temporary Workarounds

Disable LDAP over UDP

windows

Prevents exploitation via UDP channel by disabling LDAP over UDP (LDAP ping)

Set registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Parameters\"LDAPServerIntegrity"=dword:00000002

Enable LDAP Channel Binding

windows

Requires LDAP channel binding which may prevent some exploitation vectors

Set registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Parameters\"LdapEnforceChannelBinding"=dword:00000002

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate LDAP servers from untrusted networks
  • Deploy network-based intrusion prevention systems with rules to detect and block LDAP exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check if June 2022 security updates are installed via Windows Update history or systeminfo command showing build numbers after the patch.

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify KB5014665 (Server 2022), KB5014692 (Server 2019), or equivalent June 2022 patches are installed and system has been restarted.

📡 Detection & Monitoring

Log Indicators:

  • Windows Security event logs showing LDAP service crashes (Event ID 1000)
  • Unusual LDAP bind requests from unexpected sources
  • Failed LDAP authentication attempts followed by successful exploitation

Network Indicators:

  • Unusual LDAP traffic patterns, especially UDP LDAP requests
  • LDAP requests with malformed packets or unusual opcodes
  • Traffic to LDAP ports (389, 636, 3268, 3269) from unexpected sources

SIEM Query:

source="windows" event_id=1000 process_name="lsass.exe" OR source="windows" event_id=4625 logon_type=3 protocol="LDAP"

🔗 References

📤 Share & Export