Lucene search

K
kasperskyKaspersky LabKLA12481
HistoryMar 08, 2022 - 12:00 a.m.

KLA12481 Multiple vulnerabilities in Microsoft System Center

2022-03-0800:00:00
Kaspersky Lab
threats.kaspersky.com
48
microsoft system center
vulnerabilities
execute arbitrary code
gain privileges
spoof user interface
cve-2022-23265
cve-2022-23266
cve-2022-23278
kb list
updates
ace
pe
sui
microsoft defender for endpoint
microsoft defender for iot

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.1

Confidence

High

EPSS

0.046

Percentile

92.7%

Multiple vulnerabilities were found in Microsoft System Center. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, spoof user interface.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Microsoft Defender for IoT can be exploited remotely to execute arbitrary code.
  2. An elevation of privilege vulnerability in Microsoft Defender for IoT can be exploited remotely to gain privileges.
  3. A spoofing vulnerability in Microsoft Defender for Endpoint can be exploited remotely to spoof user interface.

Original advisories

CVE-2022-23265

CVE-2022-23266

CVE-2022-23278

CVE list

CVE-2022-23265 unknown

CVE-2022-23266 unknown

CVE-2022-23278 unknown

KB list

5011487

5011485

5011580

5011493

5011503

5011497

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

Affected Products

  • Microsoft Defender for Endpoint for WindowsMicrosoft Defender for IoT

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.1

Confidence

High

EPSS

0.046

Percentile

92.7%