Lucene search

K
cvelistRapid7CVELIST:CVE-2022-32230
HistoryJun 14, 2022 - 12:00 a.m.

CVE-2022-32230 SMBv3 FileNormalizedNameInformation NULL Pointer Dereference

2022-06-1400:00:00
CWE-476
rapid7
www.cve.org
2

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

65.0%

Microsoft Windows SMBv3 suffers from a null pointer dereference in versions of Windows prior to the April, 2022 patch set. By sending a malformed FileNormalizedNameInformation SMBv3 request over a named pipe, an attacker can cause a Blue Screen of Death (BSOD) crash of the Windows kernel. For most systems, this attack requires authentication, except in the special case of Windows Domain Controllers, where unauthenticated users can always open named pipes as long as they can establish an SMB session. Typically, after the BSOD, the victim SMBv3 server will reboot.

CNA Affected

[
  {
    "product": "Windows 10 Version 20H2",
    "vendor": "Microsoft",
    "versions": [
      {
        "lessThan": "19042.1706",
        "status": "affected",
        "version": "19042.1706",
        "versionType": "custom"
      },
      {
        "lessThan": "19043.1706",
        "status": "affected",
        "version": "19043.1706",
        "versionType": "custom"
      },
      {
        "lessThan": "19043.1706",
        "status": "affected",
        "version": "19044.1706",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "Windows Server Version 20H2",
    "vendor": "Microsoft",
    "versions": [
      {
        "lessThan": "19042.1706",
        "status": "affected",
        "version": "19042.1706",
        "versionType": "custom"
      },
      {
        "lessThan": "19043.1706",
        "status": "affected",
        "version": "19043.1706",
        "versionType": "custom"
      },
      {
        "lessThan": "19044.1706",
        "status": "affected",
        "version": "19044.1706",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "Windows 10 Version 21H1",
    "vendor": "Microsoft",
    "versions": [
      {
        "lessThan": "19042.1706",
        "status": "affected",
        "version": "19042.1706",
        "versionType": "custom"
      },
      {
        "lessThan": "19043.1706",
        "status": "affected",
        "version": "19043.1706",
        "versionType": "custom"
      },
      {
        "lessThan": "19044.1706",
        "status": "affected",
        "version": "19044.1706",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "Windows 10 Version 21H2",
    "vendor": "Microsoft",
    "versions": [
      {
        "lessThan": "19042.1706",
        "status": "affected",
        "version": "19042.1706",
        "versionType": "custom"
      },
      {
        "lessThan": "19043.1706",
        "status": "affected",
        "version": "19043.1706",
        "versionType": "custom"
      },
      {
        "lessThan": "19044.1706",
        "status": "affected",
        "version": "19044.1706",
        "versionType": "custom"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

65.0%