{"id":44305,"date":"2022-05-11T14:11:21","date_gmt":"2022-05-11T18:11:21","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=44305"},"modified":"2022-08-10T18:53:36","modified_gmt":"2022-08-10T22:53:36","slug":"windows-actively-exploited-vulnerability-cve-2022-26925","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/windows-actively-exploited-vulnerability-cve-2022-26925\/44305\/","title":{"rendered":"Actively exploited vulnerability in Windows"},"content":{"rendered":"<p>On the latest Patch Tuesday (May 10) Microsoft released updates for 74 vulnerabilities. At least one of them is already being actively exploited by attackers. Thus, it\u2019s a good idea to install patches as soon as possible.<\/p>\n<h2>CVE-2022-26925 \u2013 the most dangerous of the addressed vulnerabilities<\/h2>\n<p>Apparently, the most dangerous vulnerability addressed in this update pack is <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-26925\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2022-26925<\/a>, which is contained in the Windows Local Security Authority. However, the vulnerability scores 8.1 on the CVSS scale, which is relatively low. Nevertheless, Microsoft representatives believe that when this vulnerability is used in <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/ADV210003\" target=\"_blank\" rel=\"nofollow noopener\">NTLM Relay attacks<\/a> on Active Directory Certificate Services, the severity level of this bundle rises to CVSS 9.8. The reason for the increased severity level is that in such a scenario CVE-2022-26925 could allow an attacker to authenticate on a domain controller.<\/p>\n<p>The vulnerability can affect all Windows operating systems from Windows 7 (Windows Server 2008 for server systems) and later. Microsoft didn\u2019t go into the details of the exploitation of this vulnerability; however, judging by the description of the problem, unknown attackers are already actively using exploits for CVE-2022-26925 in the wild. The good news is that, according to experts, exploiting this vulnerability in real attacks is quite difficult.<\/p>\n<p>The fix detects and denies anonymous connection attempts to the Local Security Authority Remote Protocol. However, according to the official <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-26925\" target=\"_blank\" rel=\"nofollow noopener\">FAQ<\/a>, installing this update on Windows Server 2008 SP2 may affect backup software.<\/p>\n<h2>Other vulnerabilities<\/h2>\n<p>In addition to CVE-2022-26925, the latest update fixes several other vulnerabilities with a \u201ccritical\u201d severity level. Among them are the <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-26937\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2022-26937<\/a> RCE vulnerability in the Windows Network File System (NFS), as well as <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-22012\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2022-22012<\/a>\u00a0and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-29130\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2022-29130<\/a> \u2013 two RCE vulnerabilities in the LDAP service.<\/p>\n<p>Two other vulnerabilities were also already known to the public at the time the patches were published: <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-29972\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2022-29972<\/a> \u2013 a bug in Insight Software\u2019s Magnitude Simba Amazon Redshift driver, and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-22713\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2022-22713<\/a> \u2013 a DoS vulnerability in Windows Hyper-V. However, no attempts to exploit them have been detected to date.<\/p>\n<h2>How to stay protected<\/h2>\n<p>First and foremost, install the recent updates from Microsoft. If for some reason it\u2019s impossible in your environment, refer to the <em>FAQs, Mitigations, and Workarounds<\/em> section of <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2022-May\" target=\"_blank\" rel=\"nofollow noopener\">Microsoft\u2019s official May 2022 Security Updates guide<\/a>. Hopefully one of the methods described there can be used for protection from vulnerabilities that are relevant to your infrastructure.<\/p>\n<p>For our part, we recommend protecting every device connected to the internet with a <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">reliable solution<\/a> that can detect exploitation of previously unknown vulnerabilities.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\">\n","protected":false},"excerpt":{"rendered":"<p>Time to update Windows! Microsoft has released patches for several dozen vulnerabilities, one of which cybercriminals are actively exploiting.<\/p>\n","protected":false},"author":2698,"featured_media":44306,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3051,3052,2683],"tags":[1343,38,121,268,113],"class_list":{"0":"post-44305","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"category-threats","11":"tag-0days","12":"tag-microsoft","13":"tag-updates","14":"tag-vulnerabilities","15":"tag-windows"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/windows-actively-exploited-vulnerability-cve-2022-26925\/44305\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/windows-actively-exploited-vulnerability-cve-2022-26925\/24144\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/windows-actively-exploited-vulnerability-cve-2022-26925\/19627\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/windows-actively-exploited-vulnerability-cve-2022-26925\/9912\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/windows-actively-exploited-vulnerability-cve-2022-26925\/26466\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/windows-actively-exploited-vulnerability-cve-2022-26925\/24412\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/windows-actively-exploited-vulnerability-cve-2022-26925\/24776\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/windows-actively-exploited-vulnerability-cve-2022-26925\/27152\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/windows-actively-exploited-vulnerability-cve-2022-26925\/26700\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/windows-actively-exploited-vulnerability-may-2022\/33157\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/windows-actively-exploited-vulnerability-cve-2022-26925\/10676\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/windows-actively-exploited-vulnerability-cve-2022-26925\/18884\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/windows-actively-exploited-vulnerability-cve-2022-26925\/19406\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/windows-actively-exploited-vulnerability-cve-2022-26925\/28539\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/windows-actively-exploited-vulnerability-may-2022\/25016\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/windows-actively-exploited-vulnerability-cve-2022-26925\/30505\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/windows-actively-exploited-vulnerability-cve-2022-26925\/30258\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/vulnerabilities\/","name":"vulnerabilities"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/44305","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2698"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=44305"}],"version-history":[{"count":6,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/44305\/revisions"}],"predecessor-version":[{"id":45133,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/44305\/revisions\/45133"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/44306"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=44305"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=44305"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=44305"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}